HCODX/SHA-256 Hash
100% browser-based · 256-bit digest · Web Crypto

SHA -256

Generate a SHA-256 hash from any text in your browser. Produces a 256-bit digest as 64 hex characters using the browser native crypto.subtle API. SHA-256 is the modern default for cryptographic checksums.

Plain text
SHA-256 digest
Hash options
Multi-algorithm checksum
Input size
0 B
Digest size
0 B
Length
Status
Ready
Example

Text in, SHA-256 out

Every input maps to a fixed 256-bit digest (64 hex characters). Changing one byte randomises the entire output.

Plain text
Hello, world!
SHA-256 (hex)
315f5bdb76d078c43b8ac0064e4a0164612b1fce77c869345bfc94c75894edd3
Use cases

What you will use SHA-256 for

SHA-256 fingerprints data so you can detect changes, verify integrity, and build authenticated protocols.

Security audits

Verify that a file you downloaded matches the official checksum.

API authentication

Many APIs sign requests with SHA-256 or HMAC-SHA-256.

File integrity

Detect corruption or tampering across storage and transport.

Tokens & IDs

Build deterministic IDs from input data using SHA-256.

Step by step

How to generate a SHA-256 hash

1

Paste your text

Drop any text — UTF-8 is handled automatically.

2

Set options

Pick lowercase or uppercase.

3

Click Generate

Or leave auto-hash on for live updates.

4

Copy or download

Grab the 64-char hex digest.

FAQ

Frequently asked questions

SHA-256 processes input through the Merkle-Damgård construction, producing a fixed 256-bit digest. It is deterministic and one-way.

Yes — SHA-256 is part of the SHA-2 family (FIPS 180-4). No practical preimage or collision attacks are known as of 2026.

No — hashes are one-way. Short or common inputs may be found in rainbow tables, but there is no general decryption.

Usually whitespace, trailing newlines, or line endings (LF vs CRLF). Also confirm both tools UTF-8 encode the input.

Yes. No signup, no limits, no ads. Everything runs entirely in your browser.

About

About SHA-256 hashing

SHA-256 is a cryptographic hash function in the SHA-2 family standardised by NIST in FIPS 180-4. It compresses arbitrary input into a fixed 256-bit digest.

Properties

  • Deterministic — same input always produces the same digest.
  • Fixed-size output — 256 bits / 64 hex characters.
  • Avalanche — changing one input bit randomises about half the output bits.
  • Hardware-accelerated in modern browsers via the Web Crypto API.

When to use which

  • SHA-256 — the default for most modern protocols (TLS, JWT, Bitcoin).
  • SHA-384 / SHA-512 — when you want a longer digest or run on 64-bit-heavy hardware.
  • HMAC-SHA-* — for authenticated messages with a shared secret key.
Related

Related tools