Generate Grøstl hashes from text strings, files, or other content types with our secure online tool
Generate Grøstl-224, Grøstl-256, Grøstl-384, and Grøstl-512 hashes
Based on AES design principles, highly secure and efficient
Copy generated hash to clipboard with a single click
            🔒 Client-Side Processing
            All hashing is done in your browser using JavaScript. Your data never leaves your device, ensuring maximum privacy and security.        
Grøstl is a cryptographic hash function that was one of the five finalists in the NIST SHA-3 competition. It was designed by a team of cryptographers including Lars Knudsen and others. Grøstl uses the same components as the AES block cipher and produces hash values of 224, 256, 384, or 512 bits.
✅ Security Status: Grøstl is considered cryptographically secure and was a finalist in the SHA-3 competition. It provides strong security properties and is suitable for security-sensitive applications.
| Variant | Output Size | Security Level | Internal State | 
|---|---|---|---|
| Grøstl-224 | 224 bits | 112 bits | 512 bits | 
| Grøstl-256 | 256 bits | 128 bits | 512 bits | 
| Grøstl-384 | 384 bits | 192 bits | 1024 bits | 
| Grøstl-512 | 512 bits | 256 bits | 1024 bits | 
| Algorithm | Output Sizes | Security Status | Design | 
|---|---|---|---|
| Grøstl | 224, 256, 384, 512 | Secure | AES-based, wide-pipe | 
| SHA-256 | 256 | Secure | Merkle-Damgård | 
| SHA-3 | 224, 256, 384, 512 | Secure | Sponge construction | 
| BLAKE2 | 256, 512 | Secure | HAIFA construction | 
💡 Note: While Grøstl is a secure and well-designed algorithm, SHA-3 (Keccak) was ultimately selected as the winner of the NIST competition. For maximum interoperability, SHA-3 might be preferred in some contexts, but Grøstl remains an excellent choice for cryptographic applications.
                        English