Cryptographic Tools
Professional cryptographic utilities for hashing, encryption, JWT operations, and key generation. All processing happens locally in your browser.
RS256 Key Pair Generator
Generate RSA key pairs for RS256 JWT signing and verification
MD5 Hash
Generate MD5 hash from text input for checksums and verification
SHA-1 Hash
Calculate SHA-1 hash for data integrity verification
SHA-256 Hash
Generate secure SHA-256 cryptographic hash
SHA-512 Hash
Generate SHA-512 hash for maximum security applications
HMAC-SHA256
Create HMAC-SHA256 message authentication codes
PBKDF2 Derive Key
Derive cryptographic keys from passwords using PBKDF2
AES Encrypt
Encrypt data with AES using a passphrase
AES Decrypt
Decrypt AES encrypted data using a passphrase
JWT Decode
Decode JWT tokens without verification to inspect payload
JWT Sign (HS256)
Create and sign JWT tokens using HS256 algorithm
JWT Verify (HS256)
Verify JWT token signatures using HS256 secret
PEM Normalizer
Format and normalize PEM encoded certificates and keys
CRC32 (Text)
Calculate CRC32 checksum for text data