{ ILoveJS }

SHA-384 Hash Generator

Generate SHA-384 hashes from text input.

sha384hashchecksum

What is SHA-384 Hash Generator?

The SHA-384 Hash Generator converts any text input into a fixed-length 384-bit cryptographic hash using the SHA-384 algorithm. SHA-384 is a member of the SHA-2 family and is technically a truncated variant of SHA-512, operating on the same 1024-bit block size and using 64-bit word arithmetic — making it highly efficient on 64-bit systems. The resulting digest is always 96 hexadecimal characters long, regardless of how short or long your input is.

For developers, SHA-384 strikes a practical balance between SHA-256's speed and SHA-512's strength. It is widely used in TLS certificate signatures, JWT algorithm suites (RS384, HS384, ES384), content integrity verification, and anywhere a longer digest than SHA-256 is required without the full overhead of SHA-512. Because it shares SHA-512's internal structure, it also inherits strong resistance to length-extension attacks when compared to SHA-256.

How to Use

Using the tool is straightforward: paste or type any text into the input field and the SHA-384 hash is generated instantly in the output area. The result is displayed as a lowercase 96-character hexadecimal string — for example, hashing the word 'hello' will always produce the same deterministic digest. You can copy the output with a single click for use in your code, configuration files, or verification workflows.

Keep in mind that SHA-384 is a one-way function — it is computationally infeasible to reverse a hash back to the original input. This means the tool is ideal for generating reference hashes to compare against, but not for encryption or data recovery. Also note that even a single character change in your input will produce a completely different hash, which is expected behavior known as the avalanche effect.

One important edge case: whitespace matters. A trailing newline, a leading space, or different line endings (CRLF vs LF) will produce a different hash. When using this tool for checksum verification, make sure your input exactly matches what was originally hashed, with no unintended extra characters.

Use Cases

Integrity verification: Generate a SHA-384 checksum of a configuration file's contents or an API response body, then compare it on the receiving end to confirm the data has not been tampered with or corrupted in transit.
JWT signature verification: When working with JWTs that use the HS384 or RS384 algorithm, use SHA-384 hashes to manually inspect and validate the signing digest during debugging or security audits.
Subresource Integrity (SRI): Generate SHA-384 hashes for external JavaScript or CSS files to create SRI integrity attributes for your HTML script and link tags, ensuring browsers only execute resources that match the expected hash.
Password hashing reference: During development and testing, quickly hash sample plaintext values to compare expected outputs against your application's hashing pipeline, verifying that your SHA-384 implementation is producing correct digests before deploying to production.

Related Tools