SHA-1 Generator
Compute a SHA-1 digest for legacy interop and non-security checksums. Use SHA-256 for anything that matters.
What is SHA-1 — and is it safe to use?
SHA-1 (Secure Hash Algorithm 1, NSA-designed and published by NIST in 1995) produces a 160-bit digest and was the workhorse of internet security for two decades, signing TLS certificates, Git commits, and countless code-signed binaries. It is now BROKEN: in 2017 the SHAttered attack produced the first public SHA-1 collision, and by 2020 chosen-prefix collisions were demonstrated for under $50k of compute. Major browsers and CAs have removed SHA-1 from TLS. SHA-1 should NEVER be used for new digital signatures, certificates, password storage, or any adversarial setting. It remains acceptable for legacy interop (Git still uses SHA-1 for object IDs) and for non-security checksums in trusted environments. For anything new, use SHA-256.
Text Input
0 chars
0 B
Hash Results
Enter text above to generate hashes for all algorithms.
About SHA-1
SHA-1 is a 1995 NIST hash function (FIPS 180-4). It has been broken for collision resistance since 2017's SHAttered attack.
- Output: 160 bits / 20 bytes / 40 hex characters
- Status: BROKEN for collision resistance since 2017 (SHAttered)
- Removed from: TLS certificates, modern code-signing roots
- Still used in: Git object IDs (legacy), older HMAC deployments
- Replacement: SHA-256 for any new security application
