Assuming HMAC-SHA384 is SHA3
SHA-384 is from the SHA-2 family, not SHA-3.
Fix: Pick HMAC-SHA3-384 if your spec calls for the SHA-3 variant.
header • up to 320x100 / 728x90
Generate an HMAC-SHA384 code for enterprise-grade message authentication and PCI-friendly signatures.
Output will appear here...
content bottom • up to 300x250
sidebar • 160x600
Last reviewed:
HMAC (Hash-based Message Authentication Code) combines a cryptographic hash with a secret key to verify both the integrity and authenticity of a message.
HMAC-SHA384 Generator computes the RFC 2104 HMAC of a message with a shared secret and the SHA-384 hash function, returning a 96-character hexadecimal signature.
HMAC-SHA384 is specified by multiple enterprise and government profiles (including some PCI and NSA Suite B variants) that require an HMAC output longer than 256 bits.
message: ecdsa-p384-payload key: sha384-sign-key
4abf23f93a1f7b8f4d0c1a08e23a1b96ec57a6c0d5ad35d66db9e8f1e45aa43c6f8c1a3e7d70e98b07f3d2b7c0b1b6de
SHA-384 is from the SHA-2 family, not SHA-3.
Fix: Pick HMAC-SHA3-384 if your spec calls for the SHA-3 variant.
The 96-character digest can wrap awkwardly in terminals.
Fix: Use the copy button to keep the full hex string intact.
Header order, casing, and whitespace in the canonical string change the HMAC.
Fix: Exactly reproduce the spec's canonicalization before signing.
It offers a wider output and is paired with ECDSA P-384 at matched security levels. In practice HMAC-SHA256 is already ample for most APIs.
384 bits (96 hex characters).
NSA Suite B, some PCI deployments, and JWT HS384 all use HMAC-SHA384.
Yes. `openssl dgst -sha384 -hmac <key>` returns the same digest.
Yes. Your payload and secret stay in your browser.
Convert binary to base64 or hex first; the input panel expects UTF-8.
Compare HMAC-SHA384 with other HMAC lengths and matched hash tools. You can also browse the full Cryptography & Hashing category for more options.
Generate SHA-384 cryptographic hash
Generate HMAC authentication codes
Generate MD5, SHA-1, SHA-256, SHA-384, SHA-512, or SHA3 checksums from pasted text, perfect for quick integrity checks and deduplication.
Generate an HMAC-SHA256 code for signing JWTs, webhook payloads, API requests, and OAuth tokens.
Generate an HMAC-SHA512 code for high-entropy signatures on large payloads and long-lived tokens.
Generate an HMAC-MD5 message authentication code from a plaintext message and shared secret key.
Generate an HMAC-SHA1 code to sign webhook payloads, AWS-style requests, or legacy API authentication schemes.
Generate a keyed SHA-224 HMAC fingerprint for compact message authentication in embedded and IoT systems.
Generate an HMAC-SHA3 keyed-hash authentication code using the Keccak family for modern cryptographic workflows.
Encrypt plaintext with AES and a passphrase, or decrypt CryptoJS-formatted ciphertext back to readable text, entirely in your browser.
Generate CRC-16 checksum
Generate CRC-32 checksum