What is SHA-384 and how is it different from SHA-512? ▾
SHA-384 is a member of the SHA-2 family that produces a 384-bit (48-byte) hash value. It is essentially SHA-512 truncated to 384 bits, with different initial hash values. The internal computation uses 64-bit operations identical to SHA-512, so the speed is the same. SHA-384 is preferred over SHA-512 in some protocols where the larger 512-bit output is unnecessary but the security level of SHA-512 (192 bits collision resistance) is desired.
How do I generate a SHA-384 hash online? ▾
Paste your text into the input box on this page, or use the File tab to drop a file. The 96-character hexadecimal SHA-384 hash appears instantly. Calculation runs locally in your browser via the Web Crypto API — no upload, no signup.
Is SHA-384 secure? ▾
Yes, SHA-384 is cryptographically secure as of 2026 with no known practical attacks. It provides approximately 192 bits of collision resistance, exceeding the security requirements of nearly all current applications. SHA-384 is part of NSA Suite B cryptography and is approved for protecting U.S. government Top Secret information.
What is SHA-384 used for? ▾
SHA-384 is used in NSA Suite B cryptography for U.S. government Top Secret information, in some TLS 1.2 and TLS 1.3 cipher suites (especially with ECDHE-ECDSA), in IPsec implementations, and in some PDF/A digital signatures. It is less common than SHA-256 in everyday applications but appears regularly in high-security government and financial contexts.
How long is a SHA-384 hash? ▾
A SHA-384 hash is 384 bits = 48 bytes. In hexadecimal it is exactly 96 characters. In Base64 it is 64 characters with padding. The empty string hashes to 38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b.
SHA-384 vs SHA-512: which is better? ▾
Both have identical computational cost and security level (192-bit collision resistance). Choose SHA-384 when you want a smaller digest (48 bytes vs 64 bytes) and the application doesn't need the full 512-bit output. Choose SHA-512 when you need the full output, for example when using it as a basis for a key derivation function or when the protocol mandates 512 bits.
Is SHA-384 used in TLS or HTTPS? ▾
Yes — SHA-384 appears in several TLS 1.2 and TLS 1.3 cipher suites, particularly those used with ECDHE-ECDSA P-384 keys. Common suites include TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384. It is favored in higher-security contexts where matching the 192-bit security level of P-384 is desired.
Can SHA-384 hashes be cracked? ▾
No — SHA-384 cannot be reversed or efficiently broken. With 192 bits of collision resistance and 384 bits of preimage resistance, it would take approximately 2^192 operations to find a collision, which is far beyond the capability of any current or foreseeable computing technology.