Miklix

SHA-384 Hash Code Calculator

Published: February 10, 2025 at 4:49:15 PM UTC

Hash code calculator that uses the Secure Hash Algorithm 384 bit (SHA-384) hash function to calculate a hash code based on text input or file upload.

SHA-384 (Secure Hash Algorithm 384-bit) is a cryptographic hash function that takes an input (or message) and produces a fixed-size, 384-bit (48-byte) output, commonly represented as a 96-character hexadecimal number. It belongs to the SHA-2 family of hash functions, designed by the NSA and typically used for applications where you need extra security, such as government-grade encryption, financial systems or military communications.

Full disclosure: I did not write the specific implementation of the hash function used on this page. It is a standard function included with the PHP programming language. I only made the web interface to make it publicly available here for convenience.


Calculate New Hash Code

Data submitted or files uploaded through this form will only be kept on the server for as long as it takes to generate the requested hash code. It will be deleted immediately before the result is returned to your browser.

Input data:



Submitted text is UTF-8 encoded. Since hash functions operate on binary data, the result will be different than if the text was in another encoding. If you need to calculate a hash of a text in a specific encoding, you should upload a file instead.



About the SHA-384 Hash Algorithm

I'm not particularly good at math and by no means consider myself a mathematician, so I'll try to explain this hash function in a way that my fellow non-mathematicians can understand. If you prefer the scientifically correct math-version, I'm sure you can find that on plenty of other websites ;-)

Anyway, let's imagine that the hash function is a super high-tech blender designed to create a unique smoothie from any ingredients you put into it. This takes three steps:

Step 1: Put in Ingredients (Input)

  • Think of the input as anything you want to blend: bananas, strawberries, pizza slices, or even a whole book. It doesn't matter what you put in - big or small, simple or complex.

Step 2: Blending Process (The Hash Function)

  • You press the button, and the blender goes wild - chopping, mixing, spinning at crazy speeds. It has a special recipe inside that no one can change.
  • This recipe includes crazy rules like: "Spin left, spin right, flip upside down, shake, chop in weird ways." All of this happens behind the scenes.

Step 3: You Get a Smoothie (Output):

  • No matter what ingredients you used, the blender always gives you exactly one cup of smoothie (that's the fixed size of 384 bits in SHA-384).
  • The smoothie has a unique flavor and color based on the ingredients you put in. Even if you just change one tiny thing - like adding one grain of sugar - the smoothie will taste completely different.

I personally consider the related SHA-256 hash function secure enough for my purposes, but if you want something extra, SHA-384 may be the way to go. You could also go extra-extra and check out the even more secure SHA-512: SHA-512 Hash Code Calculator ;-)

Share on BlueskyShare on FacebookShare on LinkedInShare on TumblrShare on XShare on LinkedInPin on Pinterest

Mikkel Bang Christensen

About the Author

Mikkel Bang Christensen
Mikkel is the creator and owner of miklix.com. He has over 20 years experience as a professional computer programmer/software developer and is currently employed full-time for a large European IT corporation. When not blogging, he spends his spare time on a vast array of interests, hobbies, and activities, which may to some extent be reflected in the variety of topics covered on this website.