What is SHA-256?
SHA-256 (Secure Hash Algorithm 256-bit) is the current standard cryptographic hash function. It produces a 64-character hexadecimal digest and has no known practical collision attacks.
Output
SHA-256 of hello produces: 2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824 — always 64 hex characters regardless of input size.
Where SHA-256 Is Used
- TLS/HTTPS certificates — certificate signatures use SHA-256
- Digital signatures — signing the hash of a document
- Bitcoin — double SHA-256 is used in the proof-of-work algorithm
- Password hashing — as part of PBKDF2 and scrypt
- HMAC authentication — HMAC-SHA256 signs API requests
- File integrity — verifying downloads haven't been tampered with
SHA-2 Family
SHA-2 includes SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256. SHA-256 is the most widely deployed. All are considered secure. SHA-3 is a separate, newer family using a different algorithm (Keccak).
Generate SHA-256 hashes (and MD5, SHA-1, SHA-512): Open Hash Generator →
Frequently Asked Questions
Is SHA-256 the same as SHA-2?
SHA-256 is one member of the SHA-2 family. SHA-2 is the family name; SHA-256 specifies the 256-bit variant.
Can SHA-256 be reversed?
Not feasibly. SHA-256 is a one-way function with no known practical reversal method. Unlike MD5, it has no known collision attacks.
Related Terms
- MD5 — The older, broken algorithm SHA-256 replaced.
- Hash Functions — The category SHA-256 belongs to.