Random SHA-384 Hashes Generator
Generate cryptographically secure random SHA-384 hashes instantly. Configurable batch size, format, and output options for testing and development.
About
SHA-384 is a truncated variant of SHA-512 from the SHA-2 family, producing a 384-bit (96 hexadecimal character) digest. It provides a security strength of 192 bits against collision attacks per the birthday bound n/2, making it stronger than SHA-256 for applications requiring higher collision resistance. Incorrect hash selection in certificate pinning, HMAC construction, or integrity verification can degrade cryptographic guarantees without visible symptoms until exploitation occurs. This generator uses the Web Crypto API crypto.subtle.digest with cryptographically secure random input from crypto.getRandomValues, not Math.random. Each output is a genuine SHA-384 digest of 48 random bytes.
The tool approximates uniform distribution across the 2384 output space, subject to browser CSPRNG quality. It is intended for test fixtures, database seeding, and protocol prototyping. It does not replace key derivation functions like PBKDF2 or Argon2 for password storage.
Formulas
Each hash is computed as a genuine SHA-384 digest of cryptographically random input bytes. The process follows two stages:
where R is a 384-bit random buffer produced by the operating system's entropy pool via crypto.getRandomValues.
The digest H is then encoded as a 96-character hexadecimal string. SHA-384 internally uses the SHA-512 compression function with a different initialization vector IV, then truncates the final 512-bit state to 384 bits. The compression operates on 1024-bit blocks over 80 rounds.
Collision probability for n generated hashes follows the birthday approximation:
where Pcollision = probability of at least one collision, n = number of hashes generated, and 2384 = size of the output space. For n = 500, this probability is negligibly close to 0.
Reference Data
| Hash Algorithm | Family | Digest Size (bits) | Hex Characters | Block Size (bits) | Collision Resistance (bits) | Status (NIST) |
|---|---|---|---|---|---|---|
| MD5 | MD | 128 | 32 | 512 | 64 (broken) | Deprecated |
| SHA-1 | SHA | 160 | 40 | 512 | 80 (broken) | Deprecated |
| SHA-224 | SHA-2 | 224 | 56 | 512 | 112 | Approved |
| SHA-256 | SHA-2 | 256 | 64 | 512 | 128 | Approved |
| SHA-384 | SHA-2 | 384 | 96 | 1024 | 192 | Approved |
| SHA-512 | SHA-2 | 512 | 128 | 1024 | 256 | Approved |
| SHA-512/224 | SHA-2 | 224 | 56 | 1024 | 112 | Approved |
| SHA-512/256 | SHA-2 | 256 | 64 | 1024 | 128 | Approved |
| SHA3-256 | SHA-3 | 256 | 64 | 1088 | 128 | Approved |
| SHA3-384 | SHA-3 | 384 | 96 | 832 | 192 | Approved |
| SHA3-512 | SHA-3 | 512 | 128 | 576 | 256 | Approved |
| BLAKE2b-256 | BLAKE2 | 256 | 64 | 1024 | 128 | RFC 7693 |
| BLAKE3 | BLAKE3 | 256 | 64 | 512 | 128 | Non-NIST |
| RIPEMD-160 | RIPEMD | 160 | 40 | 512 | 80 | Legacy |
| Whirlpool | Whirlpool | 512 | 128 | 512 | 256 | ISO/IEC 10118-3 |