SHA-512 Generator

Use this generator to easily calculate the SHA-512 hash of a given string. Compute SHA-512 checksum.

Share calculator:

Embed this tool!
get code

What is SHA-512?

The above SHA-512 generator allows you to easily compute hashes / checksums, but what are they exactly and how are they used? SHA-256 is a part of a family of one-way cryptographic functions called SHA-2 (Secure Hash Algorithm 2). It was developed in 2001 by the United States National Security Agency (NSA) in response for the need of stronger cryptography to replase the existing SHA-1 standard.

Hashing functions are cryptographic functions that can take an input of basically any set of characters, or a file of any type, and produce as output a hash of a much shorter length. Key property of the hash is that it is collision resistant, meaning that nobody should be able to reverse the process and find two different inputs that result in the same computed hash. This property of hash functions is key in identification and validation of connections, files, identity, etc.

Below are some examples of SHA512 hashes from different strings, which are appreciably longer than MD5 or SHA-256 hashes for the same content and are spread over several lines for the purpose of presentation.

SHA-512 examples
InputComputed hash
The quick brown fox jumps over the lazy dog 07e547d9586f6a73f73fbac0435ed769
51218fb7d0c8d788a309d785436bbb64
2e93a252a954f23912547d1e8a3b5ed6
e1bfd7097821233fa0538f3db854fee6
The quick brown fox jumps over tha lazy dog aa471ccd4bb25f6420fba10a036cf73b
da59847b7cb926dee76887acf6ec31d1
2ec7d29e8a2a89518252a32ca0daecd2
b7689568b2ed28a0a717628d8ad6d4dc
123456789 d9e6762dd1c8eaf6d61b3c6192fc408d
4d6d5f1176d0c29169bc24e71c3f274a
d27fcd5811b313d681f7e55ec02d73d4
99c95455b6b5bb503acf574fba8ffe85
qwerty 0dd3e512642c97ca3f747f9a76e374fb
da73f9292823c0313be9d78add7cdd8f
72235af0c553dd26797e78e1854edee0
ae002f8aba074b066dfce1af114e32f8
sha512 generator 9f7c77251d4d5bd7ff4a2cc2d235e34a
03b39156b2245d780b7bf383a33d64eb
5a1f125321c1ffd972e665e7cdd0e333
b54aa1de664aee2f22072ed9e7103ff4

The above table was produced using our SHA-512 generator. As can be seen, the output is of fixed length of 512 bits.

The IETF has produced two documents that describe how to compute the message digest: RFC 4634: "US Secure Hash Algorithms (SHA and HMAC-SHA)", released in 2006 and replaced in 2011 by RFC 6234 "US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)".

Practical Usage of the SHA512 algorithm

SHA-512 is implemented in many security applications, for example TLS, PGP, SSH, IPsec, DKIM, and others. It is required by law for use in some government agency applications and is taking the place of the older SHA-1 algo, that is no longer considered secure and is deprecated. A modern web browsers will reject an SHA-1 signed certificate, but will accept one signed using SHA-512.

In-built or user developed SHA512 functions are available in many programming languages such as PHP, Java, Python, and they are used for developing secure desktop software, mobile and web applications. If passwords need to be stored they are usually salted before hashing in order to prevent a malicious entity from cracking the passwords of many users at once, if they happen to share the same password.

Cite this calculator & page

If you'd like to cite this online calculator resource and information as provided on the page, you can use the following citation:
Georgiev G.Z., "SHA512 Online Generator", [online] Available at: https://www.gigacalculator.com/calculators/sha512-online-generator.php URL [Accessed Date: 27 May, 2019].