Developer Playground
SHA-2 Hash & HMAC
SHA-2 (Secure Hash Algorithm 2) is a family of secure hash functions, supporting multiple output sizes: SHA-224 (224-bit), SHA-256 (256-bit), SHA-384 (384-bit), and SHA-512 (512-bit). Optionally, enable HMAC mode to use a secret key.
SHA-2 Hash Generator
Generate SHA-2 hash or HMAC for your input text.
What is SHA-2?
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed "hash" (the execution output) to a known and expected hash value, a person can determine the data's integrity.
What is HMAC?
HMAC (Hash-based Message Authentication Code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. It may be used to simultaneously verify both the data integrity and the authentication of a message.
How to use this tool
First, select your desired mode: Hash for standard hashing, or HMAC if you need to use a secret key. Then, choose the SHA-2 variant (224, 256, 384, or 512).
Select your preferred output format (Hexadecimal or Base64). Finally, type or paste your text into the Input area and click Generate Hash. The result will be instantly calculated and displayed in the Output box, ready to be copied.