logo

ilovehash.dev

  • Bookmarks
  • Compare
Star on GitHub
  1. Home
  2. Hashes
  3. SHA-2

SHA-2

Modern cryptographic hash functions recommended for security applications. Includes SHA-256, SHA-384, and SHA-512 with truncated variants.

6 algorithms•Category
SHA-224
SHA-2

Secure SHA-224 cryptographic hash for digital signatures and certificates

Added: 2026-01-19
SHA-256
SHA-2

Industry-standard SHA-256 secure hash for blockchain, TLS, and digital security

Added: 2026-01-19
SHA-384
SHA-2

High-security SHA-384 hash for government and enterprise cryptographic applications

Added: 2026-01-19
SHA-512
SHA-2

Powerful SHA-512 cryptographic hash for maximum security and large data integrity

Added: 2026-01-19
SHA-512/224
SHA-2

Truncated SHA-512/224 hash - secure 224-bit output from SHA-512 algorithm

Added: 2026-01-19
SHA-512/256
SHA-2

Truncated SHA-512/256 hash - secure 256-bit output from SHA-512 algorithm

Added: 2026-01-19
Showing 6 of 6 algorithms
logoilovehash.dev

Compute and verify cryptographic hashes. No data stored.

Quick Links

  • Home
  • Categories
  • GitHub

Categories

  • BLAKE2
  • Checksum
  • Cryptographic
  • Modern
  • Non-cryptographic
  • Password

Categories

  • SHA-2
  • SHA-3
  • SHAKE
  • Similarity

Connect

GitHub
Theme

© 2026 ilovehash.dev. All rights reserved.

Built with Next.js & shadcn/ui•Powered by Node.js & Vercel