SHA-256 Hash of "example"
SHA-256
50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c
The SHA-256 hash of "example" is: 50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c
All hash values
SHA-256Recommended50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c
SHA-1c3499c2729730a7f807efb8676a92dcb6f8a3f8f
SHA-384feeebf884f6dabe6eca8d68e373d6be488cdaa5eb764e895290336ffe9ff969686f2a9d362e9a8bbddf6e7b2e1455f2d
SHA-5123bb12eda3c298db5de25597f54d924f2e17e78a26ad8953ed8218ee682f0bbbe9021e2f3009d152c911bf1f25ec683a902714166767afbd8e5bd0fb0124ecb8a
⚠️ Do not use SHA-1 for security
SHA-1 is considered cryptographically broken. Use SHA-256 or higher for all security-sensitive applications.
How SHA-256 works
SHA-256 is a cryptographic hash function that produces a fixed 256-bit (64-character hex) output. Even a tiny change in the input produces a completely different hash. It is one-way — you cannot reverse a hash to get the original input.
Common uses for hash functions
- Password hashing and storage
- File integrity verification
- Digital signatures and certificates
- Blockchain and cryptocurrency
- Data deduplication
Generate more hashes
Loading tool...