SHA-256 Hash of "jessica"

SHA-256

e1fc45f7880e0505ff0b6a079b9af149f225e260f59b1d20225357a8cce8ffd8

The SHA-256 hash of "jessica" is: e1fc45f7880e0505ff0b6a079b9af149f225e260f59b1d20225357a8cce8ffd8

All hash values

SHA-256Recommendede1fc45f7880e0505ff0b6a079b9af149f225e260f59b1d20225357a8cce8ffd8
SHA-199996b911567c83cce17cdf194f314975c57ddf1
SHA-384596fba8934c4b164af505f1b2cc2bf663194647c086e214a0fcdee26b33bcc9d086c0267127fcffb87f5cf0ee22cd0e2
SHA-512a747737003637ae4f91a0c9bbb5c7f9528afcd7bbf77832fbcf588dbf7cb2b84cda0679a43e42e799f2ad57606b17f8e236e0515f871ed52153a648273c62d7f
⚠️ Do not use SHA-1 for security

SHA-1 is considered cryptographically broken. Use SHA-256 or higher for all security-sensitive applications.

How SHA-256 works

SHA-256 is a cryptographic hash function that produces a fixed 256-bit (64-character hex) output. Even a tiny change in the input produces a completely different hash. It is one-way — you cannot reverse a hash to get the original input.

Common uses for hash functions

  • Password hashing and storage
  • File integrity verification
  • Digital signatures and certificates
  • Blockchain and cryptocurrency
  • Data deduplication

Generate more hashes

Loading tool...