Home All Algorithms File Hash bcrypt Verify Hash Blog MD5 SHA-1 SHA-256 SHA-512 FAQ More Tools
100% Client-Side — Your text never leaves your browser

SHA-384 Hash Generator

SHA-384 is a member of the SHA-2 family, producing a 384-bit (96 hex character) hash. It is a truncated variant of SHA-512, operating on 64-bit words with a different initializatio...

Input Text
Drop a file here, or click to browse
SHA-384 hash computed locally — file never leaves your device
Any file type · Tested up to ~500 MB
filename.ext
size: 0 B
Reading…0%
Copy the SHA-384 hash value
What is SHA-384?

SHA-384 is a member of the SHA-2 family, producing a 384-bit (96 hex character) hash. It is a truncated variant of SHA-512, operating on 64-bit words with a different initialization vector. SHA-384 provides higher security than SHA-256 while being faster than SHA-512 on 64-bit systems for longer inputs.

When to Use SHA-384

TLS/SSL with higher security

Some TLS configurations use SHA-384 for stronger security margins.

Financial & banking systems

Applications requiring higher assurance than SHA-256 provide.

Long-term archival

Document signing for records that must remain valid for decades.

Government & compliance

NIST recommends SHA-384 in Suite B cryptography for classified systems.

Frequently asked questions
What is SHA-384 and how is it different from SHA-512?
SHA-384 is a member of the SHA-2 family that produces a 384-bit (48-byte) hash value. It is essentially SHA-512 truncated to 384 bits, with different initial hash values. The internal computation uses 64-bit operations identical to SHA-512, so the speed is the same. SHA-384 is preferred over SHA-512 in some protocols where the larger 512-bit output is unnecessary but the security level of SHA-512 (192 bits collision resistance) is desired.
How do I generate a SHA-384 hash online?
Paste your text into the input box on this page, or use the File tab to drop a file. The 96-character hexadecimal SHA-384 hash appears instantly. Calculation runs locally in your browser via the Web Crypto API — no upload, no signup.
Is SHA-384 secure?
Yes, SHA-384 is cryptographically secure as of 2026 with no known practical attacks. It provides approximately 192 bits of collision resistance, exceeding the security requirements of nearly all current applications. SHA-384 is part of NSA Suite B cryptography and is approved for protecting U.S. government Top Secret information.
What is SHA-384 used for?
SHA-384 is used in NSA Suite B cryptography for U.S. government Top Secret information, in some TLS 1.2 and TLS 1.3 cipher suites (especially with ECDHE-ECDSA), in IPsec implementations, and in some PDF/A digital signatures. It is less common than SHA-256 in everyday applications but appears regularly in high-security government and financial contexts.
How long is a SHA-384 hash?
A SHA-384 hash is 384 bits = 48 bytes. In hexadecimal it is exactly 96 characters. In Base64 it is 64 characters with padding. The empty string hashes to 38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b.
SHA-384 vs SHA-512: which is better?
Both have identical computational cost and security level (192-bit collision resistance). Choose SHA-384 when you want a smaller digest (48 bytes vs 64 bytes) and the application doesn't need the full 512-bit output. Choose SHA-512 when you need the full output, for example when using it as a basis for a key derivation function or when the protocol mandates 512 bits.
Is SHA-384 used in TLS or HTTPS?
Yes — SHA-384 appears in several TLS 1.2 and TLS 1.3 cipher suites, particularly those used with ECDHE-ECDSA P-384 keys. Common suites include TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384. It is favored in higher-security contexts where matching the 192-bit security level of P-384 is desired.
Can SHA-384 hashes be cracked?
No — SHA-384 cannot be reversed or efficiently broken. With 192 bits of collision resistance and 384 bits of preimage resistance, it would take approximately 2^192 operations to find a collision, which is far beyond the capability of any current or foreseeable computing technology.

Need More Hash Algorithms?

Generate MD5, SHA-256, SHA-512, CRC32 and 6 more — all at once on our main tool.

Our Network