Generate SHA-1, SHA-256, SHA-384 & SHA-512 hashes using the Web Crypto API — 100% client-side, no data leaves your browser.
Part of the SHA-2 family, produces a 256-bit (32-byte) hash. Used in Bitcoin, SSL certificates, JWT signing, and most modern security applications. Recommended default for general-purpose integrity verification.
Produces a 512-bit (64-byte) hash. More resistant to brute-force due to longer output. Actually faster than SHA-256 on 64-bit architectures due to wider internal word size. Used where higher security margins are required.
A truncated version of SHA-512 producing 384 bits. Used in TLS 1.2/1.3 cipher suites and Subresource Integrity (SRI) hashes for web assets. A good middle ground between SHA-256 and SHA-512.
SHA-1 (160-bit) is cryptographically broken — collision attacks have been demonstrated. Use only for legacy compatibility. HMAC (Hash-based Message Authentication Code) adds a secret key to any SHA variant to produce a keyed hash for authentication, not just integrity.