Requesting too small an output
Very short lengths like 32 bits have weak collision resistance and should not be used for security-sensitive identifiers.
Fix: Use 128 bits or more for anti-collision properties in the real world.
header • up to 320x100 / 728x90
Generate an extendable-output (XOF) SHAKE-256 hash from any text, with a configurable digest length for custom use-cases.
Output will appear here...
content bottom • up to 300x250
sidebar • 160x600
Last reviewed:
SHAKE-256 Hash Generator computes an extendable-output function (XOF) from the FIPS 202 Keccak family. You can request any output length in bits and the tool returns the matching hexadecimal digest.
XOFs such as SHAKE-256 are useful when you need a hash with a non-standard length — for key derivation, custom identifiers, or zero-knowledge proof systems where the protocol specifies an exact bit size.
hello
8eb4b6a932f280335ee1a279f8c208a349e7bc65daf831d3021c213825292463
Very short lengths like 32 bits have weak collision resistance and should not be used for security-sensitive identifiers.
Fix: Use 128 bits or more for anti-collision properties in the real world.
SHAKE-256 at a 256-bit length is not the same as SHA3-256 — they use different domain separation.
Fix: Pick the SHA3-256 tool when you specifically need FIPS 202 SHA3-256 output.
Different requested lengths are prefixes of the same squeeze; changing a length changes the output.
Fix: Always request the final output length your protocol expects.
An XOF can produce an output of any length from a single input, unlike a classic hash that has one fixed output size.
Yes. It is specified in NIST FIPS 202 alongside SHA3 and SHAKE-128.
Both use Keccak, but SHAKE-256 is a variable-length XOF with different domain-separation bits. Outputs differ.
Use the length your protocol specifies. For general fingerprints, 256 bits is a safe default.
Most modern crypto libraries in Node.js, Go, Rust, and Python support SHAKE-256.
Yes. The tool hashes your input in the browser.
Pair SHAKE-256 with fixed-length SHA-3 digests and HMAC variants for comprehensive hashing workflows. You can also browse the full Cryptography & Hashing category for more options.
Generate SHAKE128 hash (SHA-3 derived)
Generate an HMAC-SHA3 keyed-hash authentication code using the Keccak family for modern cryptographic workflows.
Generate MD5, SHA-1, SHA-256, SHA-384, SHA-512, or SHA3 checksums from pasted text, perfect for quick integrity checks and deduplication.
Generate SHA-256 cryptographic hash
Generate a SHA3-256 hash from any text string to match Ethereum, Keccak-family, and NIST FIPS 202 checksums.
Generate a SHA-512/256 truncated digest used where 256-bit SHA-2 output is needed with SHA-512 internals.
Generate SHA-3 cryptographic hash
Generate a SHA3-224 (Keccak) hash from any text string for secure fingerprinting and message authentication.
Generate a SHA3-384 hash from any text for long-collision-resistant digests and certificate fingerprints.
Generate a SHA3-512 hash from any text for maximum-strength Keccak-family digests and FIPS 202 outputs.
Generate CRC-16 checksum
Generate CRC-32 checksum