Input

Output

What Is SHA-384?

SHA-384 is a cryptographic hash function belonging to the SHA-2 family. It produces a 384-bit (48-byte) hash value, typically rendered as a 96-character hexadecimal string. SHA-384 is essentially a truncated version of SHA-512, using different initial hash values.

SHA-384 is widely used in security protocols such as TLS 1.2, digital signatures, and certificate verification. It offers a good balance between security and performance, providing stronger collision resistance than SHA-256 while being faster than SHA-512 on 64-bit platforms.

How to Use This Tool

1

Enter Your Text

Type or paste the text you want to hash in the left editor. You can also click Sample to load example text, or Upload a text file.

2

View the Hash

The right panel instantly displays the SHA-384 hash of your input as a 96-character hexadecimal string.

3

Copy or Download

Click Copy to copy the hash to your clipboard, or Download to save it as a text file.

Hash Examples

Here is an example of SHA-384 hashing:

Input Text

Input

SHA-384 Hash Output

Output

Frequently Asked Questions

What is the difference between SHA-384 and SHA-256?

SHA-384 produces a 384-bit hash while SHA-256 produces a 256-bit hash. SHA-384 is actually based on SHA-512 internally, making it faster on 64-bit systems. For a detailed comparison, see this guide to SHA algorithm differences.

Is SHA-384 secure?

Yes, SHA-384 is considered cryptographically secure and is approved by NIST for use in federal information processing. It provides 192 bits of collision resistance.

Is my data sent to a server?

No. All hashing happens locally in your browser using the Web Crypto API. No data leaves your machine.

Where is SHA-384 used in practice?

SHA-384 is used in TLS/SSL certificates, code signing, and various security protocols. Many programming languages support it natively. See the Java Security Standard Names for an example of SHA-384 support in Java.

Related Tools

Learn more: NIST FIPS 180-4 (Secure Hash Standard) and RFC 4634 - US Secure Hash Algorithms.