All Algorithms

SHA-512

Conditionally Safe

Hash Function algorithm

This algorithm is safe with sufficient key/output size. Grover's algorithm halves the effective security level.

Algorithm Details

Category

Hash Function

Quantum Safety

Conditionally Safe

Key Lengths (bits)

512

FIPS Standard

FIPS 180-4

Known Vulnerabilities

  • Grover's algorithm (collision resistance ~170-bit, preimage ~256-bit)

Notes

Highest security SHA-2 variant. Excellent quantum resilience with ~256-bit post-Grover preimage resistance.

Discover which algorithms your organization is using.

Run Free Assessment
NetflixOracleFigmaCoinbaseDellServiceNowAppleDeloitteNikeAWSJPMorgan ChaseT-MobileAtlassianBoschStripeL'OrealDatadogMicrosoftPalantirHPRobinhoodEYSonyCanvaVisaAutoCADDiscordBellAdobeCharles SchwabE*TRADENVIDIAGoogleJohnson & JohnsonFidelityClaudeMastercardIntuitBoeingAT&TShopifyPwCOpenAIKPMGIBMDatabricksSalesforceGitHubAmerican ExpressWorkday