Encryption-Decryption
Encrypt and decrypt text or data to secure your sensitive information during storage or transmission.
Use ToolHMAC Generator
Generate Hash-based Message Authentication Codes (HMAC) to verify data integrity and authenticity.
Use ToolMD2 Hash Generator
Generate MD2 hashes for data, a cryptographic hash function primarily used for 8-bit processors.
Use ToolMD4 Hash Generator
Generate MD4 hashes, an older hash function known for its speed, though less secure for modern applications.
Use ToolMD5 Hash Generator
Generate MD5 hashes, commonly used for checking data integrity and creating unique digital fingerprints.
Use ToolMD6 Hash Generator
Generate MD6 hashes, a modern hash function designed for high performance and parallelism.
Use ToolNTLM Hash Generator
Generate NTLM hashes, a common hash algorithm used for password storage in Windows systems.
Use ToolSHA1 Hash Generator
Generate SHA1 hashes for data, a widely used cryptographic hash function for data integrity verification.
Use ToolSHA2 Hash Generator
Generate SHA2 hashes, a family of cryptographic hash functions including SHA-256 and SHA-512, for secure hashing.
Use ToolSHA224 Hash Generator
Generate SHA-224 hashes, a variant of the SHA-2 family producing a 224-bit hash value.
Use ToolSHA256 Hash Generator
Generate SHA-256 hashes, a robust cryptographic hash function commonly used for blockchain and digital signatures.
Use ToolSHA384 Hash Generator
Generate SHA-384 hashes, a truncated version of SHA-512 producing a 384-bit hash.
Use ToolSHA512 Hash Generator
Generate SHA-512 hashes, a strong cryptographic hash function producing a 512-bit hash value for high security.
Use ToolSHA512/224 Hash Generator
Generate SHA-512/224 hashes, a variant of SHA-512 truncated to 224 bits.
Use ToolSHA512/256 Hash Generator
Generate SHA-512/256 hashes, a variant of SHA-512 truncated to 256 bits.
Use ToolSHA3-224 Hash Generator
Generate SHA-3 (Keccak) hashes with a 224-bit output, part of the new generation of hash functions.
Use ToolSHA3-256 Hash Generator
Generate SHA-3 (Keccak) hashes with a 256-bit output, providing strong security and collision resistance.
Use ToolSHA3-384 Hash Generator
Generate SHA-3 (Keccak) hashes with a 384-bit output, suitable for high-security applications.
Use ToolSHA3-512 Hash Generator
Generate SHA-3 (Keccak) hashes with a 512-bit output, offering the highest level of security in the SHA-3 family.
Use ToolCRC-16 Hash Generator
Generate a 16-bit Cyclic Redundancy Check (CRC) hash, commonly used for error detection in data transmission.
Use ToolCRC-32 Hash Generator
Generate a 32-bit Cyclic Redundancy Check (CRC) hash, widely used for detecting accidental changes to data.
Use ToolShake-128 Hash Generator
Generate Shake-128 hashes, a SHA-3 based extendable-output function (XOF) with a 128-bit security strength.
Use ToolShake-256 Hash Generator
Generate Shake-256 hashes, an extendable-output function (XOF) from the SHA-3 family with a 256-bit security strength.
Use ToolWhirlpool Hash Generator
Generate Whirlpool hashes, a robust cryptographic hash function producing a 512-bit hash value.
Use ToolWordPress Password Hash Generator
Generate secure password hashes compatible with WordPress, useful for manual password updates or migrations.
Use Tool