ハッシュ
SHA hash generator
Try it
Compute SHA-256, SHA-384, or SHA-512 digests of any text — Web Crypto, client-side only.
Loading…
How to use this tool, examples, and related tips.
Type or paste your input string into the field.
Select your target SHA algorithm — SHA-1, SHA-224, SHA-256, SHA-384, or SHA-512.
The hash is computed instantly and displayed as a hexadecimal string. Copy it for use in your application or verification workflow.
SHA (Secure Hash Algorithm) is a family of cryptographic hash functions standardized by NIST. Each variant takes an input of any length and produces a fixed-length output — a digest — that is unique to that input with overwhelming probability. SHA functions are one-way: given a hash, recovering the original input is computationally infeasible. The SHA family includes SHA-1 (legacy, 160-bit), the SHA-2 family (SHA-224, SHA-256, SHA-384, SHA-512), and SHA-3 (a separate algorithm based on the Keccak construction). SHA-256 is the most widely deployed member and is used in TLS, code signing, and blockchain protocols.
Choosing the right SHA variant — Use this tool to compare output lengths and decide which SHA algorithm fits your use case before implementing it in code.
Quick hashing across algorithms — When you need to test the same input against multiple SHA variants without switching tools.
Generating checksums — Produce SHA digests for data integrity verification across any supported algorithm.
Learning the SHA family — Experiment with different inputs and algorithms to understand how output length and collision resistance vary across SHA variants.
Answers about this tool and how your data is handled.
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, and SHA-3. For dedicated single-algorithm tools, see the individual hash generator pages.
SHA-256 is the recommended default for most use cases. SHA-512 offers a larger output and is preferred in some security protocols. SHA-1 is deprecated for security use — avoid it in new systems. SHA-3 is suitable where algorithm diversity is a requirement.
No. All SHA variants are fast by design, making them unsuitable for password storage. Use bcrypt, Argon2, or scrypt for passwords. Use SHA for data integrity, digital signatures, and HMAC construction.
No. Hashing runs entirely in your browser using the Web Crypto API. Nothing is uploaded.
Lowercase hexadecimal by default. Output length varies by algorithm: SHA-1 = 40 chars, SHA-256 = 64 chars, SHA-512 = 128 chars.
同じカテゴリを優先し、その他のユーティリティを表示します。
ハッシュ
Compute SHA-256, SHA-384, or SHA-512 digests of any text — Web Crypto, client-side only.