SHA-256

SHA-2, the name comes from the abbreviation of Secure Hash Algorithm 2, a cryptographic hash function algorithm standard, developed by the US National Security Agency [3], by the US National Security Council The Institute of Standards and Technology (NIST) was released in 2001. It belongs to one of the SHA algorithms and is the successor of SHA-1. It can be further divided into six different algorithm standards, including: SHA-224, SHA- 256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.

What can the SHA-256 online calculation tool do?

  • Compute text SHA-256 digest
How to use?

  • 1) Paste the text to be entered into the first input box
  • 2) Click the calculation button
  • 3) Hexadecimal data format: 1a2cdc...
Comparison of SHA family functions

Comparison of SHA family functions
Algorithms and their variants Output length
(bit)
Internal state size
(bit)
Block size
(bit)
Maximum message length
(bit)
Cycle Operation Security
(bit)
Performance MiB/s)
MD5
(For reference)
128 128
(4 × 32)
512 264 − 1 64 Bitwise AND, bitwise XOR, cyclic shift, padding(Module 232), Bitwise OR <18
(Collision found)
335
SHA-0 160 160
(5 × 32)
512 264 − 1 80 Bitwise AND, bitwise XOR, cyclic shift, padding(Module 232), Bitwise OR <34
(Collision found)
-
SHA-1 160 160
(5 × 32)
512 264 − 1 80 <63
(Collision found)
192
SHA-2 SHA-224
SHA-256
224
256
256
(8 × 32)
512 264 − 1 64 Bitwise AND, bitwise XOR, cyclic shift, padding(Module 232), Bitwise OR, Shift Yes
112/128
139
SHA-384
SHA-512
SHA-512/224
SHA-512/256
384
512
224
256
512
(8 × 64)
1024 2128 − 1 80 Bitwise AND, bitwise XOR, cyclic shift, padding(Module 264), Bitwise OR, Shift Yes
192/256/112/128
154
SHA-3 SHA3-224
SHA3-256
SHA3-384
SHA3-512
224
256
384
512
1600
(5 × 5 × 64)
1152
1088
832
576
Unlimited 24 Bitwise AND, bitwise XOR, cyclic shift, negation Yes
112/128/192/256
-
SHAKE128
SHAKE256
d (Variable length)
d (Variable length)
1344
1088
Yes
min (d/2, 128)
min (d/2, 256)
-