Use this tool to quickly calculate SHA1, SHA256, SHA384 and SHA512 hashes.

Use this tool to quickly calculate SHA1, SHA256, SHA384 and SHA512 hashes.

SHA-1, SHA-256, SHA-384, and SHA-512 are cryptographic hash functions that belong to the Secure Hash Algorithm (SHA) family. They are widely used for data integrity, digital signatures, and other cryptographic applications.

SHA-1 (Secure Hash Algorithm 1) produces a 160-bit hash value and operates on 512-bit blocks. However, due to security vulnerabilities, including collision attacks, it is considered weak and no longer recommended for secure applications.

SHA-256 (Secure Hash Algorithm 256-bit) is a widely used variant of SHA-2. It generates a 256-bit hash value and operates on 512-bit blocks. It offers significantly stronger security than SHA-1 and is considered secure for most applications.

SHA-384 and SHA-512 are both members of the SHA-2 family and provide even stronger security. SHA-384 generates a 384-bit hash value, while SHA-512 produces a 512-bit hash value. They operate on 1024-bit blocks, making them slower but more secure than SHA-256.

These SHA algorithms are designed to provide integrity and security, with longer hash lengths offering increased resistance against collision and pre-image attacks. SHA-256, SHA-384, and SHA-512 are widely recommended for cryptographic purposes today and are used in various applications, including digital signatures, password storage, and data integrity verification.

MD2, MD4 and MD5
SHA1, SHA256 and SHA512
CRC-16 checksum calculator
CRC-24 checksum calculator
CRC-32 checksum calculator
PJW hash calculator
JS hash calculator
DEK hash calculator
RS hash calculator
AP hash calculator
DJB hash calculator
TIGER hash calculator
WHIRLPOOL hash calculator
RIPEMD hash calculator
SNEFRU hash calculator
GOST hash calculator
HAVAL hash calculator
ADLER checksum
FLETCHER checksum
XOR checksum