These three terms are often confused but refer to very different operations:
SHA (Secure Hash Algorithm) is a family of cryptographic hash functions published by NIST. The tools on this page cover the most commonly used variants:
| Function | Output length | Common uses |
|---|---|---|
| SHA-1 | 160 bits (40 hex chars) | Legacy systems, Git commit IDs (being phased out) |
| SHA-256 | 256 bits (64 hex chars) | Password storage, digital signatures, file verification |
| SHA-384 | 384 bits (96 hex chars) | TLS certificates, higher-security applications |
| SHA-512 | 512 bits (128 hex chars) | High-security hashing, when collision resistance is critical |
SHA-1 is considered cryptographically broken for security-sensitive uses — chosen-prefix collisions have been demonstrated. For new applications, use SHA-256 or higher.
Base64 represents binary data using 64 printable ASCII characters (A–Z, a–z, 0–9, +, /). It was designed to transmit binary data through channels that only handle text — for example, embedding images in HTML or CSS as data URIs, or encoding binary attachments in emails.
Base64 increases data size by approximately 33%. It is not compression and not encryption. Any Base64 string can be instantly decoded by anyone.
Common Base64 applications include embedding images as data URIs (data:image/png;base64,...), encoding
API credentials in HTTP Basic Authentication headers, and representing binary data in JSON payloads.
The Caesar cipher and transposition cipher are simple historical encryption methods, useful for teaching concepts but not suitable for any real security use.
The Caesar cipher shifts each letter in the alphabet by a fixed number of positions. With a shift of 3, A becomes D, B becomes E, and so on. It was used by Julius Caesar for military correspondence. It can be broken trivially by trying all 25 possible shifts (brute force) or by frequency analysis.
The transposition cipher rearranges the characters in a message according to a key, rather than substituting them. The letters themselves are unchanged but their positions are shuffled. Transposition ciphers are more complex than substitution ciphers but are still easily broken with modern analysis.
This website may contain affiliate links. If you click on an affiliate link and make a purchase, we may receive a small commission at no additional cost to you.