Generate JH cryptographic hashes from text strings or files with our secure online tool
Generate JH-224, JH-256, JH-384, and JH-512 hashes
JH was a SHA-3 finalist with excellent cryptographic properties
Copy generated hash to clipboard with a single click
🔒 Client-Side Processing
All hashing is done in your browser using JavaScript. Your data never leaves your device, ensuring maximum privacy and security.
JH is a cryptographic hash function that was one of the five finalists in the NIST SHA-3 competition. It was designed by Hongjun Wu and is known for its high security margin and good performance. JH uses a sponge construction and operates on 1024-bit blocks.
✅ Security Status: JH is considered highly secure and was a finalist in the SHA-3 competition. It has no known practical attacks and provides strong cryptographic security.
| Variant | Output Size | Security Level | Common Uses |
|---|---|---|---|
| JH-224 | 224 bits (56 hex chars) | 112-bit security | Lightweight applications |
| JH-256 | 256 bits (64 hex chars) | 128-bit security | General purpose |
| JH-384 | 384 bits (96 hex chars) | 192-bit security | High security applications |
| JH-512 | 512 bits (128 hex chars) | 256-bit security | Maximum security |
| Algorithm | Designer | Construction | Status |
|---|---|---|---|
| Keccak (SHA-3) | Guido Bertoni et al. | Sponge | Winner |
| JH | Hongjun Wu | Sponge | Finalist |
| BLAKE | Jean-Philippe Aumasson et al. | HAIFA | Finalist |
| Skein | Bruce Schneier et al. | UBI | Finalist |
| Grøstl | Praveen Gauravaram et al. | Wide-pipe | Finalist |
💡 While Keccak was selected as SHA-3, JH remains an excellent cryptographic hash function with strong security properties and is suitable for most cryptographic applications.
English