CRYPTOGRAPHIC
hash function

Designed by United States National Security Agency (NSA) and first published in 2001

Checksums
of almost anything

text_string_to_sha-256_hash
file_to_sha-256_hash
multiline_text_to_sha-256_hash

Files, text, multiline text. Everything is happening in your internet browser.

Check our opensource GitHub repository to be sure that we can’t access your data.

SHA-256
for everyone!

Despite the complexity of the algorithm, everyone can use it and everyone can understand how protected it is by design. If you want to learn more about how the algorithm works, where it is used, and why it is trusted by many organizations around the world, then welcome to the article section of our website!

sha-256_articles