SHA-384 Hash Calculator
hash
All hashing runs in your browser. Data is never sent to any server.
Text Input
File Input
Drag & drop a file or click to select
1. How to Use
- Paste text or upload a file to generate SHA-384 hash.
- Click 'Generate SHA-384 Hash' for the 96-character result.
- Verify SHA384 hashes in the comparison section.
- Copy for TLS certificate or digital signature verification.
- No variant selection—SHA-384 has fixed 384-bit output.
2. How It Works
SHA-384 is SHA-512 with different initial values and truncated to 384 bits (leftmost 48 bytes).
SHA-512 uses 1024-bit blocks and 64-bit words. State: eight 64-bit words. Functions: Ch(x,y,z)=(x∧y)⊕(¬x∧z), Maj(x,y,z)=(x∧y)⊕(x∧z)⊕(y∧z), Σ₀(x)=ROTR(x,28)⊕ROTR(x,34)⊕ROTR(x,39), Σ₁(x)=ROTR(x,14)⊕ROTR(x,18)⊕ROTR(x,41), σ₀(x)=ROTR(x,1)⊕ROTR(x,8)⊕SHR(x,7), σ₁(x)=ROTR(x,19)⊕ROTR(x,61)⊕SHR(x,6).
80 rounds; round constants from cube roots of first 80 primes. Message schedule extends 16 words to 80.
SHA-384 initial values are the first 64 bits of the fractional parts of the square roots of primes 9–16. Output: truncate SHA-512 to 384 bits.
3. About SHA-384
SHA-384 is a 384-bit truncated SHA-512 variant. It offers a balance between output size and security.
This SHA-384 hash calculator computes hashes for text and files. SHA-384 is used in TLS 1.2+, digital signatures, and when SHA-512 output is unnecessarily long.
All processing runs in your browser—no server-side hashing.
4. Advantages
- Medium output: 96 hex chars—shorter than SHA-512, longer than SHA-256.
- Strong security: Same cryptographic strength as SHA-512.
- TLS support: Commonly used in TLS handshakes and certificate verification.
- Privacy: Client-side only.
5. Real-World Use Cases
- TLS certificate fingerprinting: Many servers use SHA-384 for certificate chains.
- Digital signatures: Hash documents before RSA or ECDSA signing.
- Secure storage: Checksums for sensitive files.
- Protocol compliance: When SHA-384 is required by a specification.