SHA-256 Hash of "true"
SHA-256
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b
The SHA-256 hash of "true" is: b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b
All hash values
SHA-256Recommendedb5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b
SHA-15ffe533b830f08a0326348a9160afafc8ada44db
SHA-384f2b40fcce9088bd92bacc099e215fd6ed11dc85464bdf25e7646db94a2938d72cd08fa6d85ca426e5db73f6979dbdcde
SHA-5129120cd5faef07a08e971ff024a3fcbea1e3a6b44142a6d82ca28c6c42e4f852595bcf53d81d776f10541045abdb7c37950629415d0dc66c8d86c64a5606d32de
⚠️ Do not use SHA-1 for security
SHA-1 is considered cryptographically broken. Use SHA-256 or higher for all security-sensitive applications.
How SHA-256 works
SHA-256 is a cryptographic hash function that produces a fixed 256-bit (64-character hex) output. Even a tiny change in the input produces a completely different hash. It is one-way — you cannot reverse a hash to get the original input.
Common uses for hash functions
- Password hashing and storage
- File integrity verification
- Digital signatures and certificates
- Blockchain and cryptocurrency
- Data deduplication
Generate more hashes
Loading tool...