Cloudesk

SHA-384 Checksum Calculator

Calculate the SHA-384 hash of any text or file using the native Web Crypto API

SHA-384 Hash

Enter text or select a file to calculate the SHA-384 hash.

When to use SHA-384

TLS/SSL Certificates

SHA-384 is widely used in TLS 1.2 and TLS 1.3 cipher suites (e.g., TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) as the HMAC and PRF hash, offering stronger security than SHA-256 for protecting web traffic.

NSA Suite B Cryptography

SHA-384 is one of the two approved hash algorithms in the NSA Suite B standard (alongside SHA-512), mandated for classified US government communications and high-assurance systems requiring top-secret level protection.

Code Signing & PKI

Certificate authorities and code-signing workflows use SHA-384 in ECDSA-SHA384 and RSA-SHA384 signatures to balance performance and security, providing a 192-bit security level well beyond SHA-256's 128-bit level.

About the SHA-384 Algorithm

What is SHA-384?

SHA-384 is a member of the SHA-2 family, designed by the NSA and published by NIST in 2001. It is a truncated variant of SHA-512 — it uses the same 64-bit word arithmetic and 80-round compression function, but starts with different initial hash values and outputs only the first 384 bits (48 bytes), producing a 96-character hex string.

Security Strength

With a 384-bit output, SHA-384 delivers a 192-bit collision resistance level (~2¹⁹² brute-force operations). This places it squarely between SHA-256 (128-bit) and SHA-512 (256-bit), making it ideal when SHA-256 is too weak but SHA-512 overhead is undesirable.

Web Crypto API

This tool uses window.crypto.subtle.digest('SHA-384', …) — a native browser API with no external dependencies. The implementation is FIPS-certified on supported platforms and significantly faster than any pure JavaScript alternative.

How to use the SHA-384 Checksum Calculator

  1. 1Choose Text mode for strings or File mode for local files.
  2. 2In Text mode, type or paste your input. The 96-character hash updates automatically.
  3. 3In File mode, drop a file or click "Select File". The file is hashed locally via the native Web Crypto API — nothing is uploaded.
  4. 4Both Lowercase and Uppercase results are displayed simultaneously — click Copy on the row you want.

Related Tools