Mixing up SHA3-256 and Keccak-256
Ethereum, Solidity, and some older libraries use the pre-FIPS Keccak-256, which has different padding.
Fix: If you are hashing Ethereum data, use a dedicated Keccak-256 generator rather than SHA3-256.
header • up to 320x100 / 728x90
Generate a SHA3-256 hash from any text string to match Ethereum, Keccak-family, and NIST FIPS 202 checksums.
Output will appear here...
content bottom • up to 300x250
sidebar • 160x600
Last reviewed:
SHA-3 is the latest member of the Secure Hash Algorithm family, based on the Keccak sponge construction and designed as a backup to SHA-2.
SHA3-256 Hash Generator computes a 64-character hexadecimal SHA3-256 digest from any text using the NIST FIPS 202 standard hash function.
It is useful for verifying payloads, generating deterministic identifiers, and comparing reference vectors when implementing Keccak-family primitives in a backend or smart-contract toolchain.
hello world
644bcc7e564373040999aac89e7622f3ca71fba1d972fd94a31c3bfbf24e3938
Ethereum, Solidity, and some older libraries use the pre-FIPS Keccak-256, which has different padding.
Fix: If you are hashing Ethereum data, use a dedicated Keccak-256 generator rather than SHA3-256.
"Hello" and "hello" produce entirely different digests because hashing is byte-exact.
Fix: Normalize casing and whitespace in your input before hashing if you need stable output.
No tool can reverse a correctly implemented SHA3-256 hash, despite lookup tables for short inputs.
Fix: Store a reference of the original value alongside the digest if you need the plaintext later.
No. Ethereum uses Keccak-256, which pre-dates FIPS 202 and uses different padding. Outputs differ.
256 bits, shown as 64 hexadecimal characters.
Yes. It targets 128-bit collision resistance and has no known practical attacks.
This tool hashes text. For files, use a dedicated file-checksum tool or `openssl dgst -sha3-256`.
No. The hash is computed entirely on your device using client-side JavaScript.
Use SHA-3 when you need algorithm diversity, must comply with FIPS 202, or want a structurally different hash function.
Compare SHA3-256 with other SHA-3 lengths, SHA-2 digests, and keyed HMAC variants. You can also browse the full Cryptography & Hashing category for more options.
Generate SHA-256 cryptographic hash
Generate an HMAC-SHA3 keyed-hash authentication code using the Keccak family for modern cryptographic workflows.
Generate MD5, SHA-1, SHA-256, SHA-384, SHA-512, or SHA3 checksums from pasted text, perfect for quick integrity checks and deduplication.
Generate a SHA3-512 hash from any text for maximum-strength Keccak-family digests and FIPS 202 outputs.
Generate SHA-3 cryptographic hash
Generate a SHA3-224 (Keccak) hash from any text string for secure fingerprinting and message authentication.
Generate a SHA3-384 hash from any text for long-collision-resistant digests and certificate fingerprints.
Generate an extendable-output (XOF) SHAKE-256 hash from any text, with a configurable digest length for custom use-cases.
Generate a SHA-512/256 truncated digest used where 256-bit SHA-2 output is needed with SHA-512 internals.
Generate SHAKE128 hash (SHA-3 derived)
Generate CRC-16 checksum
Generate CRC-32 checksum