File Checksum Verifier
Drag and drop a file to calculate its SHA-256, SHA-512, SHA-1, or MD5 checksum. Verify file integrity instantly — no upload, 100% client-side.
Drag & drop a file here
How to Verify a File Checksum
- Select the algorithm — choose SHA-256 (recommended), SHA-512, SHA-1, or MD5 using the chips above.
- Drop your file — drag and drop the file onto the upload area, or click "browse to select".
- Wait for the hash — the checksum appears instantly for small files. A progress bar shows for large files.
- Verify (optional) — paste the expected hash from the download page into the verification box and click Verify.
- Check the result — a green "Match" confirms the file is intact. Red "Mismatch" means the file may be corrupted or tampered with.
Why File Checksums Matter
Every time you download software, a disk image, or a large archive, there is a small chance the file was corrupted during transmission. Network errors, disk failures, or incomplete downloads can silently alter file contents. A checksum is a cryptographic fingerprint of the file — even changing a single bit produces a completely different hash. By comparing the computed hash with the official hash published by the software developer, you can be certain the file you received is exactly what was intended.
Security-conscious users also verify checksums to detect tampering. If an attacker intercepts your download and substitutes a malicious file, the checksum will not match — giving you a clear warning. This is especially important for operating system images (Ubuntu, Debian, Tails), security tools, and any software you plan to run with administrator privileges.
Algorithm Guide
- SHA-256 — The current gold standard. Produces a 64-character hex digest. Used by most modern software distributions (Linux ISOs, Docker images, npm packages).
- SHA-512 — Produces a 128-character hex digest. Stronger than SHA-256 but slower. Used by some high-security distributions.
- SHA-1 — Produces a 40-character hex digest. No longer recommended for security-critical uses due to known collision vulnerabilities, but still commonly published alongside SHA-256.
- MD5 — Produces a 32-character hex digest. Cryptographically broken for security purposes (collisions are easy to construct) but still widely used for quick integrity checks on trusted networks. This tool implements MD5 entirely in JavaScript since the Web Crypto API does not support it.
Command-Line Equivalents
If you prefer the command line, the equivalent commands are:
- Linux/macOS:
sha256sum filename,sha512sum filename,sha1sum filename,md5sum filename - macOS only:
shasum -a 256 filename - Windows (PowerShell):
Get-FileHash filename -Algorithm SHA256 - Windows (CertUtil):
certutil -hashfile filename SHA256
For related cryptographic tools, see the Hash Generator (hash text strings), the HMAC Generator (authenticated hashing), and the Data URL Creator (encode files as data URIs).