๐ก๏ธ Encryption & Decryption Tools
50 symmetric encryption tools - AES, DES, 3DES, ChaCha20, Blowfish, Twofish and more
Advanced Encryption Standard - The gold standard for symmetric encryption
Data Encryption Standard - Legacy 56-bit encryption
Rivest-Shamir-Adleman - Asymmetric encryption with public/private keys
Triple DES applies DES cipher three times - 168-bit effective key
Modern stream cipher with authenticated encryption - Used in TLS 1.3
Fast block cipher with variable key length (32-448 bits)
AES finalist - 128-bit block cipher with up to 256-bit keys
Encrypt files with AES-256-GCM for maximum security
Click to upload a file
Any file type supported
Different AES operating modes - CBC, GCM, CTR, and key sizes
Key generation, IV generation, and key validation tools
๐ AES Key Generator
๐ AES IV Generator
๐ AES Key Checker
Authenticated encryption with associated data (AEAD) - Used in TLS 1.3
Stream cipher designed by Daniel J. Bernstein - 256-bit key
Rivest Cipher 4 - Variable key length stream cipher
Japanese block cipher - Same security level as AES, 128/192/256-bit keys
International Data Encryption Algorithm - 128-bit key block cipher
Carlisle Adams and Stafford Tavares cipher - Variable key length
AES finalist - Known for high security margin, 128/192/256-bit keys
Rivest Cipher 2 - Variable key length (8-128 bits)
Generate secure session keys and tokens for web applications
๐ Encrypt Session Data
Generate and manage secure authentication tokens
๐ Validate Token
Encrypt multiple files in a folder with a single password
Click to select multiple files
No files selected
๐ฒ Password Generator
Generate secure random passwords
๐ Key Generator
Generate cryptographic keys
๐๏ธ Public Key Cryptography Tools
RSA, Diffie-Hellman, ECC, SSH, PGP, Certificates and Key Utilities
RSA signatures, key analysis, and format conversion
Secure key exchange protocol for establishing shared secrets
ECC provides same security as RSA with smaller keys
Generate and convert SSH and PGP keys (simulation)
CSR generation, certificate parsing, and fingerprint calculation
Generate, analyze, convert, and validate cryptographic keys
#๏ธโฃ Hash Functions
Calculate cryptographic hashes - 40 hash algorithms available
Secure Hash Algorithm 2 - Federal Standard
SHA-3 family - Based on Keccak sponge construction
High-speed cryptographic hash - Faster than MD5, more secure than SHA-2
Additional cryptographic hash functions
Hash-based Message Authentication Code
Individual SHA-3 hash generators with dedicated output
SHA3-224
SHA3-256
SHA3-384
SHA3-512
BLAKE3 is faster than MD5 and SHA-3, with parallel processing support (Simulated)
Calculate MD5 and SHA-256 hashes for files
๐ File MD5 Hash
No file selected
๐ File SHA-256 Hash
No file selected
Hash identification and analysis tools
๐ Hash Identifier
๐ฅ Hash Brute-Force Demo
โก Hash Collision Tester
๐ Hash List Generator
File integrity, benchmarks, and utility tools
๐ File Integrity Checker
๐ Rainbow Table Simulator
๐ Hash Chain Generator
๐ Multi-Hash Generator
๐ Streaming Hash
โก Hash Benchmark
โ Hash Verification
๐ก๏ธ Secure Checksum
Compare two hashes or check hash against text
XOF (Extendable Output Functions) - SHAKE128 and SHAKE256
SHAKE128
SHAKE256
Analyze differences between two hashes - avalanche effect analysis
Calculate combined hash for multiple files (enter file paths)
๐ฎ Post-Quantum Cryptography
Quantum-resistant algorithms to protect against future quantum computer attacks
Quantum computers could break RSA, ECC, and DH within hours. Post-quantum algorithms are designed to resist both classical and quantum attacks.
NIST Post-Quantum Standard - Key Encapsulation Mechanism (KEM)
๐ Key Encapsulation
NIST Post-Quantum Standard - Digital Signature Algorithm
โ๏ธ Digital Signatures
Mathematical foundation for Kyber and Dilithium
2D Lattice Visualization
NIST Post-Quantum Standard - Lattice-based Digital Signature
โ๏ธ Digital Signatures
NIST Post-Quantum Standard - Stateless Hash-based Signature
โ๏ธ Hash-based Signatures
NTRU Encrypt - Lattice-based Public Key Encryption
๐ Encryption
Analysis, benchmarking, and conversion tools for PQ cryptography
๐ PQ Key Analyzer
โก PQ Algorithm Benchmark
๐ Hybrid Encryption (Classical + PQ)
Combine classical (RSA/ECDH) with post-quantum for maximum security
๐ PQ Security Estimator
๐ฏ Quantum Attack Simulator
Compare classical vs quantum attack complexity
โ๏ธ Quantum Cryptography
Leverage quantum mechanics for unbreakable encryption
Quantum cryptography uses the laws of physics (quantum mechanics) to guarantee security. Any eavesdropping attempt disturbs the quantum states and can be detected.
First quantum key distribution protocol (Bennett & Brassard, 1984)
๐ Quantum Key Distribution Simulation
True random numbers from quantum phenomena
๐ฒ Randomness Tests
"Spooky action at a distance" - Einstein
Entangled particles have correlated properties regardless of distance
๐ป Encoding & Decoding Tools
Convert text between different encoding formats - 50 tools available
Binary-to-text encoding scheme
Base-16 number system representation
Percent-encoding for URLs
Base32 encoding using A-Z and 2-7
Bitcoin-style encoding (no 0, O, I, l)
Adobe-style encoding with 85 characters
Convert text to binary (0s and 1s)
Convert text to ASCII code values
Convert text to Unicode code points
Convert special characters to HTML entities
Decode JSON Web Tokens
Convert text to/from Morse code
Simple letter substitution cipher (rotate by 13)
Generate QR codes from text
Create Data URIs from text or files
Convert text to and from emoji representations
Convert between UTF-8 and UTF-16 encodings
View complete ASCII character table
Convert between hex and text representations
Parse and analyze URL components
Convert numbers between binary, octal, decimal, and hexadecimal
Perform bitwise operations on binary numbers
Format and validate JSON and XML data
JSON Formatter
XML Formatter
Compress and decompress text using RLE (Run-Length Encoding)
Serialize and deserialize data in multiple formats
Analyze text character by character with Unicode details
Identify the encoding format of unknown data
Decode QR codes from images (URL-based)
๐๏ธ Visual Cryptography & Steganography
Hide secret messages and data in images, audio, text, and more
Hide secret messages in images using Least Significant Bit encoding
Click to upload an image
PNG, JPG, GIF supported (PNG recommended)
Extract hidden messages from steganographic images
Click to upload an encoded image
Hide one image inside another using steganography
Upload cover image
Upload secret image
Analyze images for potential hidden steganographic content
Upload image for analysis
Calculate how much data can be hidden in an image
Hide messages in audio files using LSB or phase coding (simulated)
Upload audio file
Hide messages in video files using frame manipulation (simulated)
Upload video file
Hide messages using whitespace, capitalization, or linguistic methods
Embed any file inside another file using steganography
Upload carrier file (image, PDF, etc.)
Upload secret file to hide
Hide messages using invisible Unicode zero-width characters
Strip or modify metadata from files to remove identifying information
Upload file to clean (Image, PDF, etc.)
View all metadata and hidden information in files
Upload file to analyze
Generate secure keys for encrypted steganography
How Steganography Works
1. LSB Steganography
We use Least Significant Bit encoding to hide your message in the image pixels.
2. Invisible Changes
The modifications are imperceptible to human eyes while storing your secret data.
3. Secure Extraction
Only someone with the encoded image can extract the hidden message.
๐ Classical Ciphers
Historical encryption methods - educational and fun to explore
Simple substitution cipher shifting letters by a fixed number
Polyalphabetic cipher using a keyword
Digraph substitution cipher using a 5x5 key square
Polygraphic substitution cipher using matrix multiplication
Transposition cipher writing message in zigzag pattern
E(x) = (ax + b) mod 26 - uses two keys
Replace each letter with another based on a key alphabet
Rearrange characters by writing in columns and reading by rows
๐ Password Security Tools
Comprehensive password generation, analysis, and security tools
Generate secure passwords with various methods
๐ Strong Password Generator
๐ฒ Random Password Generator
๐ Passphrase Generator
Generate memorable word-based passphrases
๐ฒ Diceware Passphrase
Simulated dice-based passphrase generation
๐ข Secure PIN Generator
Analyze password security and vulnerabilities
๐ Password Dictionary Tester
Check if password appears in common wordlists
๐จ Password Breach Checker
Check if password appears in known data breaches (simulation)
๐ Password Mutation Tool
Generate common password variations
๐ Password Complexity Tester
Detailed complexity analysis
๐ Password Similarity Checker
Compare passwords and check for similarity
Educational simulations of password cracking techniques
๐จ Brute Force Simulator
Calculate time to crack via brute force
๐ Dictionary Attack Simulator
Test against common password lists
โฑ๏ธ Cracking Time Estimator
Estimate time to crack passwords of different complexities
Additional password tools and utilities
๐ Password Policy Tester
๐ Password Hash Identifier
Identify hash type of password hashes
๐ Password Leak Checker
Check if password has been exposed (simulation)
๐ Password Reuse Detector
Check multiple passwords for reuse patterns
๐ข OTP Generator (TOTP/HOTP)
Generate one-time passwords
โ OTP Verifier
Verify one-time passwords
๐ฒ Password Randomizer
Transform an existing password into variations
Secure password hashing using bcrypt simulation
โ๏ธ Blockchain Cryptography Tools
Comprehensive blockchain and cryptocurrency tools
Generate blockchain addresses and keys
โฟ Bitcoin Address Generator
โ Ethereum Address Generator
๐ Bitcoin Private Key Generator
Generate a random Bitcoin private key
๐ Bitcoin Public Key Generator
Derive public key from private key
๐ณ HD Wallet Generator (BIP32/BIP44)
Generate hierarchical deterministic wallet keys
๐ Wallet Seed Checker
Validate and derive addresses from seed phrase
Blockchain transaction signature and verification tools
โ Blockchain Signature Verifier
Verify blockchain signatures
โ๏ธ Transaction Signature Generator
Sign messages with blockchain keys
๐ Transaction Signature Verifier
Verify raw transaction signatures
๐ Smart Contract Hash Tool
Generate function selectors and event topic hashes
Merkle trees, block headers, and mining tools
๐ณ Merkle Tree Generator
Generate Merkle tree from transaction hashes
๐งฎ Merkle Root Calculator
Calculate Merkle root from leaf nodes
๐ Block Header Parser
Parse Bitcoin block header information
โ๏ธ Mining Hash Simulator
Simulate proof-of-work mining
๐ Difficulty Calculator
Calculate mining difficulty from target
๐ Blockchain Timestamp Converter
Convert between Unix time and block timestamps
โ Blockchain Address Validator
Validate addresses for multiple blockchains
Blockchain key conversion and generation utilities
๐ Blockchain Key Converter
Convert between key formats
๐ฒ Wallet Entropy Generator
Generate secure entropy for wallets
๐ Wallet Checksum Generator
Generate checksums for wallet addresses
๐ฑ Seed Phrase Generator
Generate BIP39 compatible seed phrases
๐ Extended Key Derivation
Derive child keys from extended keys (BIP32)
๐ฌ Cryptanalysis Tools
Comprehensive cryptographic analysis and cipher breaking toolkit
Identify cipher types, encodings, and encryption algorithms from ciphertext
๐ Cipher Identifier
๐ Encoding Detector
๐ Encryption Detector
Statistical frequency analysis for cryptanalysis
๐ Letter Frequency Analysis
๐ N-gram Analyzer
๐ฏ Index of Coincidence
๐ Chi-Squared Test
๐ฒ Entropy Analysis
Automated tools for breaking classical ciphers
๐ Vigenรจre Cipher Breaker
Uses Kasiski examination + frequency analysis
๐ Substitution Cipher Solver
Automated solving using hill climbing
๐ข Affine Cipher Breaker
๐๏ธ Autokey Cipher Breaker
๐ Hill Cipher Analyzer
โ๏ธ Playfair Cipher Breaker
๐ Caesar Cipher Brute Force
Detect patterns, structures, and known plaintext attacks
๐ Pattern Analyzer
๐ Repeated Pattern Detector
๐ Word Pattern Structure
๐ฏ Crib Dragging Tool
Known plaintext attack on XOR ciphers
Evaluate cipher security and perform attack simulations
๐ข Keyspace Calculator
๐ช Cipher Strength Estimator
โฑ๏ธ Encryption Benchmark
โ๏ธ Cipher Comparison
โ๏ธ Cryptanalysis Attack Simulators
Statistical analysis and randomness testing
๐ฒ Randomness Tester
NIST-style statistical tests
๐ Statistical Analyzer
๐ Cipher Graph Analyzer
๐งฎ Cipher Complexity Calculator
๐ Cipher Timeline Explorer
๐ Learn Cryptography
Understanding the fundamentals of cryptographic systems
๐ What is Cryptography?
Cryptography is the practice and study of techniques for secure communication. It transforms readable data into unreadable format to protect it from unauthorized access.
- Confidentiality - Keeping information private
- Integrity - Ensuring data hasn't been modified
- Authentication - Verifying identity
- Non-repudiation - Proving who sent a message
๐ฎ Post-Quantum Cryptography
Quantum computers could break RSA, ECC, and DH. Post-quantum algorithms are designed to resist quantum attacks.
| Algorithm | Type | Quantum Safe |
|---|---|---|
| RSA-2048 | Encryption/Signature | โ Broken by Shor's |
| ECC P-256 | Encryption/Signature | โ Broken by Shor's |
| Kyber-768 | Key Encapsulation | โ Quantum Resistant |
| Dilithium3 | Digital Signature | โ Quantum Resistant |
โ๏ธ Quantum Cryptography
Uses quantum mechanics for unbreakable encryption. BB84 protocol allows secure key exchange with guaranteed eavesdropping detection.