Truncating the hex output
Copy-pasting through narrow terminals can cut the 96-character digest.
Fix: Use the copy button so the full hex string is preserved.
header • up to 320x100 / 728x90
Generate a SHA3-384 hash from any text for long-collision-resistant digests and certificate fingerprints.
Output will appear here...
content bottom • up to 300x250
sidebar • 160x600
Last reviewed:
SHA-3 is the latest member of the Secure Hash Algorithm family, based on the Keccak sponge construction and designed as a backup to SHA-2.
SHA3-384 Hash Generator takes a text input and outputs a 96-character hexadecimal SHA3-384 digest derived from the Keccak sponge construction as standardized by NIST FIPS 202.
The extra length is useful for long-lived artifacts such as certificate pins, release manifests, and archive integrity records where you want a safety margin beyond SHA-256.
The quick brown fox jumps over the lazy dog
7063465e08a93bce31cd89d2e3ca8f602498696e253592ed26f07bf7e703cf328581e1471a7ba7ab119b1a9ebdf8be41
Copy-pasting through narrow terminals can cut the 96-character digest.
Fix: Use the copy button so the full hex string is preserved.
SHA-384 (SHA-2 family) and SHA3-384 share a length but use different algorithms and produce different output.
Fix: Pick the tool and algorithm label that matches the spec you are implementing.
Single-pass hashes do not include work factor and are not suitable for storing credentials.
Fix: Use bcrypt, argon2, or scrypt for passwords instead.
384 bits, shown as 96 hexadecimal characters.
It offers a larger security margin against collisions, which matters for long-lived fingerprints.
Yes. `openssl dgst -sha3-384` returns the same digest as this tool for identical input.
Usually no, but use SHA3-384 when you need certificate-pin sized output or must meet specific compliance.
It hashes pasted text. For file hashing, use a dedicated file-checksum tool or the OpenSSL CLI.
Yes. Your input is never sent to a server.
Compare SHA3-384 with other SHA-3 lengths, SHA-2 digests, and keyed HMAC-SHA3 signatures. You can also browse the full Cryptography & Hashing category for more options.
Generate SHA-384 cryptographic hash
Generate an HMAC-SHA3 keyed-hash authentication code using the Keccak family for modern cryptographic workflows.
Generate MD5, SHA-1, SHA-256, SHA-384, SHA-512, or SHA3 checksums from pasted text, perfect for quick integrity checks and deduplication.
Generate SHA-3 cryptographic hash
Generate a SHA3-224 (Keccak) hash from any text string for secure fingerprinting and message authentication.
Generate a SHA3-256 hash from any text string to match Ethereum, Keccak-family, and NIST FIPS 202 checksums.
Generate a SHA3-512 hash from any text for maximum-strength Keccak-family digests and FIPS 202 outputs.
Generate SHAKE128 hash (SHA-3 derived)
Generate an extendable-output (XOF) SHAKE-256 hash from any text, with a configurable digest length for custom use-cases.
Generate CRC-16 checksum
Generate CRC-32 checksum
Generate MD2 cryptographic hash