SHA-256 Generator

Use this generator to easily calculate the SHA-256 hash of a given string. Generate SHA-256 checksums.

Share calculator:

Embed this tool:
get code     

    Quick navigation:
  1. What is SHA-256?
  2. Practical Usage of the SHA256 algorithm

    What is SHA-256?

The above SHA-256 generator allows you to easily compute hashes and checksums, but what are they exactly? SHA256 is a part of the SHA-2 (Secure Hash Algorithm 2) family of one-way cryptographic functions, developed in 2001 by the United States National Security Agency (NSA). Hashing functions are cryptographic devices that take as input any string of characters or a file of any type, and then output a computed collision-resistant hash. Collision resistance means that nobody should be able to find two different inputs that produce the same hash.

Below are some examples of SHA256 hashes from different strings, all with a length of 256 bits (spread over several lines to prevent horizontal scrolling).

SHA-256 examples
InputComputed hash
The quick brown fox jumps over the lazy dog d7a8fbb307d7809469ca9a
bcb0082e4f8d5651e46d3c
db762d02d0bf37c9e592
The quick brown fox jumps over tha lazy dog 77125ec2f977a62aaca3bf
bfd0834dd52d1b0cd19976
4994a4d57edc855d15f4
123456789 15e2b0d3c33891ebb0f1ef
609ec419420c20e320ce94
c65fbc8c3312448eb225
qwerty 65e84be33532fb784c4812
9675f9eff3a682b27168c0
ea744b2cf58ee02337c5
sha256 generator 132397527aa31b6a639a83
0192a57c6d25d02d4509f0
ef7f85f695c16fb62e41

The above table was produced using our SHA-256 generator.

There are two documents by the IETF that describe how the message digest should be computed: RFC 4634: "US Secure Hash Algorithms (SHA and HMAC-SHA)" released in 2006, which was replaced in 2011 by RFC 6234 "US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)".

    Practical Usage of the SHA256 algorithm

SHA-256 is implemented in widely used security applications like TLS, PGP, SSH, IPsec, DKIM, in Unix/Linux systems for password hashing, and others. It is required by law for use in certain government agency applications and is coming in place of the older SHA-1, which is no longer considered secure and deprecated in many widely used applications, including web browsers.

SHA256 functions are available in many programming languages such as PHP, Java, Python, and libraries for them, and used for developing secure apps. When passwords are stored, they are usually salted to prevent an attacker from cracking the passwords of many users who happen to have chosen the same password, at once.

Finally, SHA-256 plays a role in the currently popular Bitcoin network for mining and the creation of Bitcoin addresses. In mining, it is the function used as proof of work. Bitcoin addresses are hashed public keys, which have the advantage of shortness (making them more convenient) and added security.

Cite this calculator & page

If you'd like to cite this online calculator resource and information as provided on the page, you can use the following citation:
Georgiev G.Z., "SHA256 Online Generator", [online] Available at: https://www.gigacalculator.com/calculators/sha256-online-generator.php URL [Accessed Date: 01 Apr, 2023].