SHA-256 Hash of "jessica"
SHA-256
e1fc45f7880e0505ff0b6a079b9af149f225e260f59b1d20225357a8cce8ffd8
The SHA-256 hash of "jessica" is: e1fc45f7880e0505ff0b6a079b9af149f225e260f59b1d20225357a8cce8ffd8
All hash values
SHA-256Recommendede1fc45f7880e0505ff0b6a079b9af149f225e260f59b1d20225357a8cce8ffd8
SHA-199996b911567c83cce17cdf194f314975c57ddf1
SHA-384596fba8934c4b164af505f1b2cc2bf663194647c086e214a0fcdee26b33bcc9d086c0267127fcffb87f5cf0ee22cd0e2
SHA-512a747737003637ae4f91a0c9bbb5c7f9528afcd7bbf77832fbcf588dbf7cb2b84cda0679a43e42e799f2ad57606b17f8e236e0515f871ed52153a648273c62d7f
⚠️ Do not use SHA-1 for security
SHA-1 is considered cryptographically broken. Use SHA-256 or higher for all security-sensitive applications.
How SHA-256 works
SHA-256 is a cryptographic hash function that produces a fixed 256-bit (64-character hex) output. Even a tiny change in the input produces a completely different hash. It is one-way — you cannot reverse a hash to get the original input.
Common uses for hash functions
- Password hashing and storage
- File integrity verification
- Digital signatures and certificates
- Blockchain and cryptocurrency
- Data deduplication
Generate more hashes
Loading tool...