Text Encryption

Base64 Encoding (base64-encode)

Base64 encoding converts binary data into a text format, allowing it to be safely transmitted in environments like email, URLs, and web APIs. This method is widely used for losslessly converting data into a text format.

Base64 Decoding (base64-decode)

Base64 decoding is the process of restoring Base64-encoded data to its original binary format. It plays a crucial role in file transfers and image data restoration, ensuring data integrity.

MD5 Hash (md5)

MD5 is an algorithm that generates a 128-bit hash value, commonly used for data integrity checks. However, due to known security vulnerabilities, SHA-2 family hashes are recommended for important security purposes.

SHA-1 Hash (sha1)

SHA-1 is a hash function that produces a 160-bit hash value. It was once widely used for digital signatures and certificates, but it is now being phased out in favor of more secure hash algorithms due to its susceptibility to collision attacks.

SHA-256 Hash (sha256)

SHA-256 is one of the SHA-2 family of hash functions, generating a robust 256-bit hash value. It is one of the most trusted hash algorithms today and is widely used in blockchain, security certificates, and password storage.

SHA-224 Hash (sha224)

SHA-224 is a hash function in the SHA-2 family that produces a 224-bit hash value. It strikes a balance between security and processing speed and is used in various security protocols.

SHA-512 Hash (sha512)

SHA-512 is a hash function in the SHA-2 family that generates a very long 512-bit hash value, providing extremely high security. It is primarily used in high-performance servers and security-critical environments.

SHA-384 Hash (sha384)

SHA-384 is a hash function in the SHA-2 family that produces a 384-bit hash value and is a variant of SHA-512. It is mainly used in systems requiring a high degree of security.

SHA-3 Hash (sha3)

SHA-3 is the latest cryptographic hash standard. It has a different internal structure from SHA-2, further enhancing its security. It is expected to become the standard hash algorithm in various security systems in the future.

RIPEMD-160 Hash (ripemd160)

RIPEMD-160 is a cryptographic hash function that generates a 160-bit hash value. It is particularly used in generating cryptocurrency wallet addresses. It is an algorithm that balances security and efficiency.

URI Encoding (encodeURI)

The encodeURI function encodes an entire URI string, converting it so that it can be safely included in a web address. It transforms special characters or non-ASCII characters into a format that can be correctly handled by web browsers.

URI Component Encoding (encodeURIComponent)

The encodeURIComponent function is used to encode individual components of a URI (e.g., query parameters). It is more suitable for safely handling partial strings rather than the entire URL.

URI Decoding (decodeURI)

The decodeURI function restores a URI string encoded with encodeURI to its original form. It interprets encoded characters in a web address and converts them into a human-readable string.

URI Component Decoding (decodeURIComponent)

The decodeURIComponent function restores a URI component encoded with encodeURIComponent. It is mainly used for restoring query strings or form data.

HMAC-MD5 (HmacMD5)

HMAC-MD5 is a method that generates a message authentication code by combining a secret key with the MD5 hash function. It is used to ensure data integrity and authentication, and it significantly enhances security compared to using MD5 alone.

HMAC-RIPEMD160 (HmacRIPEMD160)

HMAC-RIPEMD160 performs message authentication by combining the RIPEMD-160 hash with a secret key. It is widely used in security protocols, especially those related to cryptocurrencies.

HMAC-SHA1 (HmacSHA1)

HMAC-SHA1 creates a message authentication code by combining the SHA-1 hash algorithm with a secret key. It was widely used in the past but is gradually being replaced by the SHA-2 family.

HMAC-SHA224 (HmacSHA224)

HMAC-SHA224 ensures message authentication using the SHA-224 hash and a secret key. It is suitable for environments that require a balance of security and performance.

HMAC-SHA256 (HmacSHA256)

HMAC-SHA256 combines the SHA-256 hash with a secret key to generate a highly secure message authentication code. It is used as a standard in API authentication, token signing, and more.

HMAC-SHA3 (HmacSHA3)

HMAC-SHA3 provides strong message authentication by combining the latest SHA-3 hash function with a secret key. It is suitable for modern applications where security is critical.

HMAC-SHA384 (HmacSHA384)

HMAC-SHA384 generates a message authentication code with the SHA-384 hash and a secret key, supporting reliable authentication in high-security environments.

HMAC-SHA512 (HmacSHA512)

HMAC-SHA512 combines the very strong SHA-512 hash function with a secret key to provide a high level of data integrity and authentication. It is used in financial and government systems.

AES Encryption (AES)

AES (Advanced Encryption Standard) is a symmetric-key algorithm widely used for data encryption. It encrypts sensitive information to prevent external intrusion or data leakage.

AES Decryption (AES)

AES decryption is the process of restoring AES-encrypted data to its original plaintext. It is used in tandem with encryption and is essential for secure data exchange.

TripleDES Encryption (TripleDES)

TripleDES is a symmetric-key encryption method that enhances security by applying the DES algorithm three times. It was widely used before AES and is still used for compatibility.

TripleDES Decryption (TripleDES)

TripleDES decryption is the process of restoring TripleDES-encrypted data to its original data. It is essential for maintaining data security along with encryption.

RC4 Encryption (RC4)

RC4 is a stream cipher that provided fast encryption, but it is not commonly used in modern security systems due to several security vulnerabilities. It is used only for limited compatibility with older protocols.

RC4 Decryption (RC4)

RC4 decryption is the process of restoring RC4-encrypted data to its original state. Due to security issues, using RC4 in new projects is not recommended.

Rabbit Encryption (Rabbit)

Rabbit is a lightweight stream cipher algorithm that provides fast and efficient encryption. It is useful in low-power devices and embedded systems.

Rabbit Decryption (Rabbit)

Rabbit decryption is the process of restoring Rabbit stream-encrypted data, providing security while maintaining high processing speed.

RabbitLegacy Encryption (RabbitLegacy)

RabbitLegacy is an older version of the Rabbit algorithm, used in some systems for compatibility. Its security level may be lower than the modern version.

RabbitLegacy Decryption (RabbitLegacy)

RabbitLegacy decryption is the process of restoring RabbitLegacy-encrypted data. It may not be suitable for modern security requirements, so caution is advised.