Encryption-Decryption

Encrypt and decrypt text or data to secure your sensitive information during storage or transmission.

Use Tool

HMAC Generator

Generate Hash-based Message Authentication Codes (HMAC) to verify data integrity and authenticity.

Use Tool

MD2 Hash Generator

Generate MD2 hashes for data, a cryptographic hash function primarily used for 8-bit processors.

Use Tool

MD4 Hash Generator

Generate MD4 hashes, an older hash function known for its speed, though less secure for modern applications.

Use Tool

MD5 Hash Generator

Generate MD5 hashes, commonly used for checking data integrity and creating unique digital fingerprints.

Use Tool

MD6 Hash Generator

Generate MD6 hashes, a modern hash function designed for high performance and parallelism.

Use Tool

NTLM Hash Generator

Generate NTLM hashes, a common hash algorithm used for password storage in Windows systems.

Use Tool

SHA1 Hash Generator

Generate SHA1 hashes for data, a widely used cryptographic hash function for data integrity verification.

Use Tool

SHA2 Hash Generator

Generate SHA2 hashes, a family of cryptographic hash functions including SHA-256 and SHA-512, for secure hashing.

Use Tool

SHA224 Hash Generator

Generate SHA-224 hashes, a variant of the SHA-2 family producing a 224-bit hash value.

Use Tool

SHA256 Hash Generator

Generate SHA-256 hashes, a robust cryptographic hash function commonly used for blockchain and digital signatures.

Use Tool

SHA384 Hash Generator

Generate SHA-384 hashes, a truncated version of SHA-512 producing a 384-bit hash.

Use Tool

SHA512 Hash Generator

Generate SHA-512 hashes, a strong cryptographic hash function producing a 512-bit hash value for high security.

Use Tool

SHA512/224 Hash Generator

Generate SHA-512/224 hashes, a variant of SHA-512 truncated to 224 bits.

Use Tool

SHA512/256 Hash Generator

Generate SHA-512/256 hashes, a variant of SHA-512 truncated to 256 bits.

Use Tool

SHA3-224 Hash Generator

Generate SHA-3 (Keccak) hashes with a 224-bit output, part of the new generation of hash functions.

Use Tool

SHA3-256 Hash Generator

Generate SHA-3 (Keccak) hashes with a 256-bit output, providing strong security and collision resistance.

Use Tool

SHA3-384 Hash Generator

Generate SHA-3 (Keccak) hashes with a 384-bit output, suitable for high-security applications.

Use Tool

SHA3-512 Hash Generator

Generate SHA-3 (Keccak) hashes with a 512-bit output, offering the highest level of security in the SHA-3 family.

Use Tool

CRC-16 Hash Generator

Generate a 16-bit Cyclic Redundancy Check (CRC) hash, commonly used for error detection in data transmission.

Use Tool

CRC-32 Hash Generator

Generate a 32-bit Cyclic Redundancy Check (CRC) hash, widely used for detecting accidental changes to data.

Use Tool

Shake-128 Hash Generator

Generate Shake-128 hashes, a SHA-3 based extendable-output function (XOF) with a 128-bit security strength.

Use Tool

Shake-256 Hash Generator

Generate Shake-256 hashes, an extendable-output function (XOF) from the SHA-3 family with a 256-bit security strength.

Use Tool

Whirlpool Hash Generator

Generate Whirlpool hashes, a robust cryptographic hash function producing a 512-bit hash value.

Use Tool

WordPress Password Hash Generator

Generate secure password hashes compatible with WordPress, useful for manual password updates or migrations.

Use Tool