CoderTools

Encryption Tools

Encryption, decryption, and hash generation tools

Showing 0 tools

MD5/MD4 Hash Generator

Generate MD5 and MD4 hash values for text or files with multiple output formats

SHA Hash Generator

Online SHA hash generator supporting SHA-1, SHA-256, SHA-384, SHA-512 algorithms

AES Encryption/Decryption

Securely encrypt and decrypt text using AES algorithm

JWT Encoder/Decoder

Decode, verify, and generate JSON Web Tokens with support for multiple signing algorithms

HMAC Generator

Generate HMAC authentication codes with MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA3, and RIPEMD-160 algorithms

RSA Encryption/Decryption

Use RSA asymmetric encryption for public key encryption, private key decryption, digital signing and verification

DES/3DES Encryption/Decryption

Encrypt and decrypt using DES and 3DES algorithms with multiple modes and padding options

Blowfish Encryption/Decryption

Fast symmetric block cipher with variable key length (32-448 bits), designed by Bruce Schneier

Twofish Encryption/Decryption

AES finalist symmetric cipher with 128-bit blocks and 128/192/256-bit keys, designed by Bruce Schneier

BLAKE Hash Generator

Generate BLAKE2b, BLAKE2s, and BLAKE3 hashes for text and files, fast and secure hashing algorithms

Password Hash Generator

Generate and verify secure password hashes using Bcrypt, Scrypt, and Argon2 algorithms

CRC Calculator

Calculate CRC-8, CRC-16, CRC-32, CRC-64 checksums with support for Modbus, CCITT and other protocol standards

Adler-32 Checksum Calculator

Calculate Adler-32 checksums for text and files, fast checksum used in zlib/gzip compression

RIPEMD Hash Generator

Generate RIPEMD-128/160/256/320 hashes for text and files, RIPEMD-160 widely used in Bitcoin

Whirlpool Hash Generator

Generate 512-bit Whirlpool hashes using Whirlpool-0, Whirlpool-T, and Whirlpool ISO standard algorithms

Snefru Hash Generator

Generate Snefru-128/256 hashes for text and files, early cryptographic hash function by Ralph Merkle

HAS-160 Hash Generator

Generate HAS-160 hashes, Korean cryptographic standard for KCDSA digital signatures

xxHash Generator

Extremely fast non-cryptographic hash supporting xxHash32, xxHash64, xxHash3, and xxHash128

SHA-3 / Keccak Hash Generator

Generate SHA3-224/256/384/512 and Keccak hashes with WebAssembly acceleration, used in Ethereum

MurmurHash Generator

High-performance non-cryptographic hash function for hash tables, Bloom filters, and data partitioning

FNV Hash Generator

Fowler-Noll-Vo hash function with FNV-1 and FNV-1a variants, used in DNS, hash tables and data structures

GOST Hash Generator

Generate GOST R 34.11-94 and Streebog (GOST R 34.11-2012) hashes, Russian national cryptographic standards

SM Cryptography Tools

Chinese national standard cryptography tools supporting SM2 public key cipher, SM3 hash, and SM4 block cipher

Cryptography & Hashing Tools

Cryptography is the practice of using mathematical algorithms to secure data against unauthorized access and manipulation. This category covers essential cryptographic operations including symmetric encryption (AES, DES, Blowfish, Twofish), asymmetric encryption (RSA), hashing algorithms (MD5, SHA, BLAKE), HMAC for authentication, and JWT for secure token generation. These tools are fundamental to protecting sensitive information in applications, APIs, databases, and data transmission. Modern cryptography provides confidentiality through encryption, integrity through hashing, and authenticity through digital signatures. Understanding when and how to use each cryptographic algorithm is critical for building secure systems. This guide covers algorithm selection, key management best practices, security considerations, and common pitfalls to avoid.

🔧 Key Cryptographic Tools

AES Encryption

Advanced Encryption Standard (AES) is the industry standard for symmetric encryption, used by government agencies and enterprises worldwide. It supports 128, 192, and 256-bit key sizes, with AES-256 providing quantum-resistant security for highly sensitive data.

RSA Encryption

RSA is a public-key cryptosystem enabling secure communication without prior key exchange. Essential for HTTPS, digital signatures, and asymmetric encryption scenarios where parties haven't met before.

SHA Hashing

SHA (Secure Hash Algorithm) family provides cryptographic hash functions for data integrity verification, password storage, and digital signatures. SHA-256 and SHA-3 are recommended for new applications.

Cryptographic Algorithm Comparison

Algorithm Type Description & Use Cases
Symmetric Encryption (AES, DES, Blowfish)Uses single shared key for both encryption and decryption. Fast and efficient for large data volumes. Examples: AES-256, DES (deprecated), Blowfish. Best for: Database encryption, file encryption, local data protection. Drawback: Key distribution challenge.
Asymmetric Encryption (RSA)Uses public key to encrypt and private key to decrypt. Enables secure communication without key pre-sharing. Best for: HTTPS, digital signatures, key exchange. Drawback: Slower than symmetric encryption, suitable for small data.
Hashing (MD5, SHA, BLAKE)One-way function producing fixed-size fingerprint of data. Cannot be reversed to original data. Used for integrity verification and password storage. Examples: SHA-256, SHA-3, BLAKE2. Avoid: MD5 (collision vulnerabilities).
HMAC (Hash-based Message Authentication Code)Combines hashing with a secret key to verify both integrity and authenticity. Essential for API authentication and message verification. Supports any hash algorithm (HMAC-SHA256, HMAC-SHA512).
JWT (JSON Web Tokens)Compact, URL-safe token format for stateless authentication and information exchange. Contains header, payload, and signature. Use RS256/ES256 for asymmetric signing, HS256 only for trusted parties.
SM Cryptography (Chinese Standard)Chinese national cryptographic standards including SM2 (asymmetric), SM3 (hashing), SM4 (symmetric). Used in China-compliant systems. SM2 provides similar security to RSA-2048 with 256-bit keys.

Cryptographic Best Practices

Choose Algorithms Wisely

Use AES-256 for symmetric encryption, RSA-2048+ or ECC for asymmetric encryption, SHA-256+ or SHA-3 for hashing. Avoid deprecated algorithms: MD5 (collisions), SHA-1 (weaknesses), DES (56-bit keys), RC4. Check NIST recommendations for compliance requirements.

Key Management is Critical

Generate keys using cryptographically secure random generators. Store keys securely (hardware security modules, key vaults, never hardcode). Rotate keys regularly (annually recommended). Use different keys for different purposes. Never log or expose keys in error messages.

Use Authenticated Encryption

For sensitive data, use AES-GCM (Galois/Counter Mode) providing both encryption and authentication. Never use ECB mode (encrypts identical plaintext blocks identically). Avoid unauthenticated encryption followed by separate HMAC (use AEAD modes instead).

Hash Passwords Correctly

Never store plaintext passwords. Use bcrypt, scrypt, or Argon2 for password hashing (not simple SHA). Add unique salt per password. Use work factors preventing brute-force attacks. Implement account lockout after failed attempts.

Secure Random Number Generation

Use cryptographically secure RNGs (java.security.SecureRandom, /dev/urandom on Unix, CryptGenRandom on Windows). Seed RNGs properly. Avoid Math.random() and predictable seeds. Generate sufficient entropy for key sizes.

Verify JWT Signatures and Expiration

Always verify JWT signature before accepting tokens. Check expiration timestamps. Validate issuer (iss) and audience (aud) claims. Use short expiration times (15-60 minutes). Implement refresh token mechanism. Never trust 'alg: none' tokens.

Cryptography Troubleshooting

Why does my decrypted data look corrupted?

Check: (1) Using same IV for decryption as encryption, (2) Key is identical, (3) Padding mode matches (PKCS5, PKCS7), (4) Data wasn't corrupted during transmission. For authenticated encryption (GCM), authentication tag must also be identical.

How do I know if my key size is secure?

For symmetric encryption: AES-256 is sufficient for most applications. For asymmetric: RSA-2048 minimum (RSA-4096 for highly sensitive), ECC-256 equivalent to RSA-2048. For hashing: SHA-256+ is secure (MD5/SHA-1 deprecated). Check NIST SP 800-57 recommendations.

What's the difference between encryption and hashing?

Encryption is reversible (requires key): AES, RSA. Hashing is one-way (cannot reverse): SHA-256, MD5. Use encryption for confidential data, hashing for integrity verification and password storage.

Can I use the same key for encryption and HMAC?

No, use separate keys. Different key derivation functions should generate different keys from a master key. HMAC with encryption key reduces security margin. Use KDF (Key Derivation Function) to derive separate keys if needed.