The SHA-2 family
Standardized by NIST in 2001. SHA-256 and SHA-512 are the workhorses; SHA-384 is SHA-512 truncated to 384 bits, used by some specific protocols (TLS cipher suites, Apple's CryptoKit defaults).
Four SHA variants, computed live in your browser as you type.
A cryptographic hash is a fixed-length fingerprint of an input. Change a single character in the input and the entire hash changes; finding two distinct inputs that produce the same hash is computationally infeasible (for any algorithm except MD5 and SHA-1 in adversarial settings). Convertitive computes four SHA variants using your browser’s Web Crypto API — fast, hardware- accelerated, and never reaches a server.
…………Computed locally via the browser’s Web Crypto API. MD5 is not offered— it’s cryptographically broken and Web Crypto omits it by design. Use SHA-256 or stronger wherever security matters.
Any text: a password, a JSON payload, the contents of a small file pasted as text. Encoding is UTF-8.
All four variants compute simultaneously. SHA-256 is the modern default; SHA-512 is preferred when bigger collision resistance margins matter (long-lived archives, signing keys).
Each row has a copy button. Hash output is hex-encoded — lowercase, no prefix.
Standardized by NIST in 2001. SHA-256 and SHA-512 are the workhorses; SHA-384 is SHA-512 truncated to 384 bits, used by some specific protocols (TLS cipher suites, Apple's CryptoKit defaults).
On 64-bit hardware, SHA-512 is sometimes faster than SHA-256 despite producing more bits. On constrained devices (microcontrollers, smart cards), the opposite is true. For text input at this size, all four computations are effectively instant.