Miklix

SHA-512/224 Hash Code Calculator

Published: February 10, 2025 at 4:50:05 PM UTC

Hash code calculator that uses the Secure Hash Algorithm 512/224 bit (SHA-512/224) hash function to calculate a hash code based on text input or file upload.

SHA-512/224 (Secure Hash Algorithm 512/224-bit) is a cryptographic hash function that takes an input (or message) and produces a fixed-size, 224-bit (28-byte) output, commonly represented as a 56-character hexadecimal number. It belongs to the SHA-2 family of hash functions, designed by the NSA. It is really SHA-512 with different initialization values and the result truncated to 224 bits, to take advantage of the fact that SHA-512 runs faster than SHA-256 (which SHA-224 is a truncated version of) on 64 bit computers, but to keep the smaller storage requirements of 224 bit hash codes.

The outputs of SHA-512, SHA-224 and SHA-512/224 are completely different for the same input, so they are not compatible - i.e. it does not make sense to compare a SHA-224 hash code of a file to a SHA-512/224 hash code of the same file to see if it has been changed.

Full disclosure: I did not write the specific implementation of the hash function used on this page. It is a standard function included with the PHP programming language. I only made the web interface to make it publicly available here for convenience.


Calculate New Hash Code

Data submitted or files uploaded through this form will only be kept on the server for as long as it takes to generate the requested hash code. It will be deleted immediately before the result is returned to your browser.

Input data:



Submitted text is UTF-8 encoded. Since hash functions operate on binary data, the result will be different than if the text was in another encoding. If you need to calculate a hash of a text in a specific encoding, you should upload a file instead.



About the SHA-512/224 Hash Algorithm

I'm not particularly good at math and by no means consider myself a mathematician, so I'll try to explain this hash function in a way that my fellow non-mathematicians can understand. If you prefer the scientifically correct math-version, I'm sure you can find that on plenty of other websites ;-)

Anyway, let's imagine that the hash function is a super high-tech blender designed to create a unique smoothie from any ingredients you put into it. This takes four steps, three of which are the same as SHA-512:

Step 1: Put in Ingredients (Input)

  • Think of the input as anything you want to blend: bananas, strawberries, pizza slices, or even a whole book. It doesn't matter what you put in - big or small, simple or complex.

Step 2: Blending Process (The Hash Function)

  • You press the button, and the blender goes wild - chopping, mixing, spinning at crazy speeds. It has a special recipe inside that no one can change.
  • This recipe includes crazy rules like: "Spin left, spin right, flip upside down, shake, chop in weird ways." All of this happens behind the scenes.

Step 3: You Get a Smoothie (Output):

  • No matter what ingredients you used, the blender always gives you exactly one cup of smoothie (that's the fixed size of 512 bits in SHA-512).
  • The smoothie has a unique flavor and color based on the ingredients you put in. Even if you just change one tiny thing - like adding one grain of sugar - the smoothie will taste completely different.

Step 4: Truncate

  • By truncating (cutting off) the result down to 224 bits, we take advantage of the fact that SHA-512 runs faster than SHA-224 on 64 bit systems, but also keep the benefit of smaller storage requirements for 224 bit hash codes. Notice that the results are not compatible, SHA-512/224 and SHA-224 generate completely different hash codes.
Share on BlueskyShare on FacebookShare on LinkedInShare on TumblrShare on XShare on LinkedInPin on Pinterest

Mikkel Bang Christensen

About the Author

Mikkel Bang Christensen
Mikkel is the creator and owner of miklix.com. He has over 20 years experience as a professional computer programmer/software developer and is currently employed full-time for a large European IT corporation. When not blogging, he spends his spare time on a vast array of interests, hobbies, and activities, which may to some extent be reflected in the variety of topics covered on this website.