Generate JH cryptographic hashes from text strings or files with our secure online tool
Generate JH-224, JH-256, JH-384, and JH-512 hashes
JH was a SHA-3 finalist with excellent cryptographic properties
Copy generated hash to clipboard with a single click
            🔒 Client-Side Processing
            All hashing is done in your browser using JavaScript. Your data never leaves your device, ensuring maximum privacy and security.        
JH is a cryptographic hash function that was one of the five finalists in the NIST SHA-3 competition. It was designed by Hongjun Wu and is known for its high security margin and good performance. JH uses a sponge construction and operates on 1024-bit blocks.
✅ Security Status: JH is considered highly secure and was a finalist in the SHA-3 competition. It has no known practical attacks and provides strong cryptographic security.
| Variant | Output Size | Security Level | Common Uses | 
|---|---|---|---|
| JH-224 | 224 bits (56 hex chars) | 112-bit security | Lightweight applications | 
| JH-256 | 256 bits (64 hex chars) | 128-bit security | General purpose | 
| JH-384 | 384 bits (96 hex chars) | 192-bit security | High security applications | 
| JH-512 | 512 bits (128 hex chars) | 256-bit security | Maximum security | 
| Algorithm | Designer | Construction | Status | 
|---|---|---|---|
| Keccak (SHA-3) | Guido Bertoni et al. | Sponge | Winner | 
| JH | Hongjun Wu | Sponge | Finalist | 
| BLAKE | Jean-Philippe Aumasson et al. | HAIFA | Finalist | 
| Skein | Bruce Schneier et al. | UBI | Finalist | 
| Grøstl | Praveen Gauravaram et al. | Wide-pipe | Finalist | 
💡 While Keccak was selected as SHA-3, JH remains an excellent cryptographic hash function with strong security properties and is suitable for most cryptographic applications.
                        English