Hash String
Compute cryptographic hashes using SHA-256, SHA-512, BLAKE2b, and more.
/v1/auth/hash
curl -X POST "https://auth.toolkitapi.io/v1/auth/hash" \
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json" \
-d '{
"input": "Hello, World!",
"algorithm": "sha256"
}'
import httpx
resp = httpx.post(
"https://auth.toolkitapi.io/v1/auth/hash",
json={
"input": "Hello, World!",
"algorithm": "sha256"
},
)
print(resp.json())
const resp = await fetch("https://auth.toolkitapi.io/v1/auth/hash", {
method: "POST",
headers: {
"Content-Type": "application/json",
},
body: JSON.stringify({
"input": "Hello, World!",
"algorithm": "sha256"
}),
});
const data = await resp.json();
console.log(data);
# See curl example
{
"hash": "dffd6021bb2bd5b0af676290809ec3a53191dd81c7f70a4b28688a362182986f",
"algorithm": "sha256",
"input_length": 13
}
Try It Live
Description
How to Use
1. Set the `input` field to the string you want to hash.
2. Choose an `algorithm` — defaults to `sha256` if not specified. Available options: `md5`, `sha1`, `sha256`, `sha384`, `sha512`, `sha3-256`, `sha3-512`, `blake2b`.
3. Send a POST request. The response contains the hex-encoded hash digest.
About This Tool
The Hash String endpoint computes a cryptographic hash digest of any input string. It supports a wide range of algorithms including MD5, SHA-1, SHA-256, SHA-384, SHA-512, SHA3-256, SHA3-512, and BLAKE2b.
Cryptographic hashes are one-way functions that produce a fixed-size digest from arbitrary input. They are fundamental to data integrity verification, content addressing, digital signatures, and deduplication workflows.
Note that MD5 and SHA-1 are considered cryptographically broken for collision resistance and should only be used for checksums or legacy compatibility — not for security purposes.
Why Use This Tool
- Data integrity verification — Hash files or payloads and compare digests to detect changes
- Content addressing — Use hashes as unique identifiers for data deduplication
- Checksum generation — Create checksums for downloads or data transfers
- Fingerprinting — Generate unique fingerprints for strings, documents, or configurations
- Cache key generation — Hash complex query parameters into fixed-length cache keys
Frequently Asked Questions
Which algorithm should I use?
Can I hash binary data?
Is the hash deterministic?
What's the difference between SHA-256 and SHA3-256?
Start using Hash String now
Get your free API key and make your first request in under a minute.