SHA-256 Hash of "secret"
SHA-256
2bb80d537b1da3e38bd30361aa855686bde0eacd7162fef6a25fe97bf527a25b
The SHA-256 hash of "secret" is: 2bb80d537b1da3e38bd30361aa855686bde0eacd7162fef6a25fe97bf527a25b
All hash values
SHA-256Recommended2bb80d537b1da3e38bd30361aa855686bde0eacd7162fef6a25fe97bf527a25b
SHA-1e5e9fa1ba31ecd1ae84f75caaa474f3a663f05f4
SHA-38458a775ba4112be3005ae4407ce757d88fda71d40497bb8026ecac54d4e3ffc7232ce8de3ab5acb30ae39760fee7c53ed
SHA-512bd2b1aaf7ef4f09be9f52ce2d8d599674d81aa9d6a4421696dc4d93dd0619d682ce56b4d64a9ef097761ced99e0f67265b5f76085e5b0ee7ca4696b2ad6fe2b2
⚠️ Do not use SHA-1 for security
SHA-1 is considered cryptographically broken. Use SHA-256 or higher for all security-sensitive applications.
How SHA-256 works
SHA-256 is a cryptographic hash function that produces a fixed 256-bit (64-character hex) output. Even a tiny change in the input produces a completely different hash. It is one-way — you cannot reverse a hash to get the original input.
Common uses for hash functions
- Password hashing and storage
- File integrity verification
- Digital signatures and certificates
- Blockchain and cryptocurrency
- Data deduplication
Generate more hashes
Loading tool...