SHA-384 Hash Calculator

hash

All hashing runs in your browser. Data is never sent to any server.

Text Input

File Input

📁

Drag & drop a file or click to select

1. How to Use

  1. Paste text or upload a file to generate SHA-384 hash.
  2. Click 'Generate SHA-384 Hash' for the 96-character result.
  3. Verify SHA384 hashes in the comparison section.
  4. Copy for TLS certificate or digital signature verification.
  5. No variant selection—SHA-384 has fixed 384-bit output.

2. How It Works

SHA-384 is SHA-512 with different initial values and truncated to 384 bits (leftmost 48 bytes).

SHA-512 uses 1024-bit blocks and 64-bit words. State: eight 64-bit words. Functions: Ch(x,y,z)=(x∧y)⊕(¬x∧z), Maj(x,y,z)=(x∧y)⊕(x∧z)⊕(y∧z), Σ₀(x)=ROTR(x,28)⊕ROTR(x,34)⊕ROTR(x,39), Σ₁(x)=ROTR(x,14)⊕ROTR(x,18)⊕ROTR(x,41), σ₀(x)=ROTR(x,1)⊕ROTR(x,8)⊕SHR(x,7), σ₁(x)=ROTR(x,19)⊕ROTR(x,61)⊕SHR(x,6).

80 rounds; round constants from cube roots of first 80 primes. Message schedule extends 16 words to 80.

SHA-384 initial values are the first 64 bits of the fractional parts of the square roots of primes 9–16. Output: truncate SHA-512 to 384 bits.

3. About SHA-384

SHA-384 is a 384-bit truncated SHA-512 variant. It offers a balance between output size and security.

This SHA-384 hash calculator computes hashes for text and files. SHA-384 is used in TLS 1.2+, digital signatures, and when SHA-512 output is unnecessarily long.

All processing runs in your browser—no server-side hashing.

4. Advantages

  • Medium output: 96 hex chars—shorter than SHA-512, longer than SHA-256.
  • Strong security: Same cryptographic strength as SHA-512.
  • TLS support: Commonly used in TLS handshakes and certificate verification.
  • Privacy: Client-side only.

5. Real-World Use Cases

  • TLS certificate fingerprinting: Many servers use SHA-384 for certificate chains.
  • Digital signatures: Hash documents before RSA or ECDSA signing.
  • Secure storage: Checksums for sensitive files.
  • Protocol compliance: When SHA-384 is required by a specification.