Developer Playground
SHA-3 Hash & HMAC
SHA-3 (Secure Hash Algorithm 3) is the latest hash function based on the Keccak algorithm. It supports multiple output sizes: SHA3-224 (224-bit), SHA3-256 (256-bit), SHA3-384 (384-bit), and SHA3-512 (512-bit). Optionally, enable HMAC mode to use a secret key.
SHA-3 Hash Generator
Generate SHA-3 hash or HMAC for your input text.
What is SHA-3?
SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST in 2015. Unlike SHA-1 and SHA-2, which were built on the Merkle-Damgård construction, SHA-3 is fundamentally different. It is based on a cryptographic sponge construction called Keccak.
Why use SHA-3 instead of SHA-2?
While SHA-2 (e.g., SHA-256) remains highly secure and is currently unbroken, NIST standardized SHA-3 to serve as a robust alternative. If a mathematical breakthrough were ever to compromise the underlying structure of SHA-2, SHA-3 would remain secure due to its entirely different Keccak architecture.
How to use this tool
Select standard Hash mode or HMAC mode if you have a secret key. Choose your preferred variant (SHA3-224, 256, 384, or 512) and output format. Type or paste your text into the Input area, then click Generate Hash to compute the highly secure SHA-3 hash.