SHA-2 is a widely used algorithm to verify the integrity of data during transmission. It is used for verifying the integrity of files downloaded over the internet by comparing the SHA-2 hash of the downloaded file (via computing it) with the one listed on the website.
The type of the input text (not applicable for files).
Lore ipsum dolor sit amet
Click on Browse File and select a file for Binary Input Type
The hash to compare to in Base64 or Hex format
The SHA algorithm to use for hashing. You can choose between SHA-1, SHA-2 & SHA-3
The size of the output SHA hash. The available options vary by the algorithm selected.
|SHA-2||224, 256, 384, 512|
|SHA-3||224, 256, 384, 512|