Password Hash Generator

Hash passwords using multiple algorithms — compare MD5, SHA-256, bcrypt, and PBKDF2 side by side.

About Password Hashing

Different algorithms have vastly different security properties for password storage. This tool generates hashes using multiple algorithms so you can compare their output and understand their differences. MD5 and SHA are general-purpose hash functions — fast, but not suitable for passwords. PBKDF2, bcrypt, and Argon2 are password-specific algorithms designed to be slow and memory-intensive to resist brute-force attacks.

The correct choice for production password storage in 2024 is Argon2id (winner of the Password Hashing Competition), bcrypt (battle-tested since 1999), or PBKDF2-SHA256 (NIST recommended, used in LUKS and Django). Never store passwords as MD5, SHA-1, or even SHA-256 hashes — they are too fast for password hashing.

FAQ

Which algorithm should I use for passwords?
In order of recommendation: 1) Argon2id (modern, memory-hard), 2) bcrypt (widely supported, time-tested), 3) PBKDF2-SHA256 (NIST recommended). Never use MD5, SHA-1, or plain SHA-256/512 for password storage — they are too fast.