Mixing SHA-224 with SHA3-224
The two use completely different constructions and produce different digests.
Fix: Pick the variant your spec names — HMAC-SHA224 or HMAC-SHA3-224.
header • up to 320x100 / 728x90
Generate a keyed SHA-224 HMAC fingerprint for compact message authentication in embedded and IoT systems.
Output will appear here...
content bottom • up to 300x250
sidebar • 160x600
Last reviewed:
HMAC (Hash-based Message Authentication Code) combines a cryptographic hash with a secret key to verify both the integrity and authenticity of a message.
HMAC-SHA224 Generator produces an HMAC using the SHA-224 hash function and returns the 56-character hexadecimal signature.
HMAC-SHA224 fits workflows where a 224-bit output is required but SHA-3 is not mandated, which is common in embedded protocols and some enterprise stacks.
message: audit-event key: sha224-audit-key
e97b9d90a25fa7c4b6d2178a5e36d24fbd65c9a55a5ef4e9a8b1723a
The two use completely different constructions and produce different digests.
Fix: Pick the variant your spec names — HMAC-SHA224 or HMAC-SHA3-224.
Subtle differences in headers, timestamps, or body encoding change the signature.
Fix: Reproduce the server's canonicalization exactly before signing.
Some APIs expect base64 HMACs, not hex.
Fix: Convert the hex signature to base64 with a matching tool if needed.
Most modern crypto libraries expose it, although it is less common than HMAC-SHA256.
224 bits or 56 hex characters.
Yes. It offers 112-bit collision resistance and benefits from SHA-2 design.
Yes. `openssl dgst -sha224 -hmac <key>` produces the same output.
Yes. Your key and payload stay on your device.
Yes, pass the hex output through a base64 encoder to match URL-safe schemes.
Compare HMAC-SHA224 with stronger SHA-2 and SHA-3 keyed variants. You can also browse the full Cryptography & Hashing category for more options.
Generate SHA-256 cryptographic hash
Generate an HMAC-SHA3 keyed-hash authentication code using the Keccak family for modern cryptographic workflows.
Generate MD5, SHA-1, SHA-256, SHA-384, SHA-512, or SHA3 checksums from pasted text, perfect for quick integrity checks and deduplication.
Generate an HMAC-MD5 message authentication code from a plaintext message and shared secret key.
Generate an HMAC-SHA1 code to sign webhook payloads, AWS-style requests, or legacy API authentication schemes.
Generate an HMAC-SHA256 code for signing JWTs, webhook payloads, API requests, and OAuth tokens.
Generate an HMAC-SHA384 code for enterprise-grade message authentication and PCI-friendly signatures.
Generate an HMAC-SHA512 code for high-entropy signatures on large payloads and long-lived tokens.
Generate a SHA-512/224 truncated digest for systems that need SHA-3-like strength with a shorter output length.
Generate a SHA-512/256 truncated digest used where 256-bit SHA-2 output is needed with SHA-512 internals.
Generate a SHA3-224 (Keccak) hash from any text string for secure fingerprinting and message authentication.
Generate NTLM password hash