Why is SHA-1 still offered if it's deprecated?
SHA-1 is deprecated for security-critical uses (certificates, signatures) but remains widely used for non-security checksums, Git commit IDs, and legacy system compatibility. We include it so you can verify hashes against older systems. For any new security application, always use SHA-256 or above.
What is the difference between SHA-256 and SHA-512?
Both belong to the SHA-2 family. SHA-256 uses 32-bit words and produces a 256-bit digest; SHA-512 uses 64-bit words and produces a 512-bit digest. On 64-bit processors, SHA-512 can actually be fasterthan SHA-256 because its internal operations align with the CPU's native word size. SHA-384 is a truncated version of SHA-512 with a different initialization vector, offering a middle ground.
How does hash verification work?
Paste a known hash into the “Verify Against” field, then generate a hash of your text. The tool performs a constant-time comparison — checking every character regardless of where a mismatch occurs. If the hashes match, the text is identical to whatever produced the original hash. This is the same principle behind software download verification and database integrity checks.