🔐

HMAC Hash Encryption

Generate Keyed-Hash Message Authentication Code with your secret key

Key strength: Medium

HMAC Algorithm

HMAC-SHA-1
HMAC-SHA-256
HMAC-SHA-384
HMAC-SHA-512

Output Format

Hexadecimal
UPPERCASE HEX
Base64
Base64 URL Safe

HMAC Result

HMAC-SHA-256:
HMAC will be displayed here...

Quick Examples

hello world
API Endpoint
JSON Payload
Empty string

Preset Keys

Security Note

  • Keep your secret key confidential
  • For optimal security, use strong, randomly generated keys
  • Never transmit your secret key over insecure channels
  • HMAC operations are performed entirely in your browser

Key Options

16 bytes (128 bits)
24 bytes (192 bits)
32 bytes (256 bits)
64 bytes (512 bits)

Generated Key

32-byte (256-bit) Hex Key:
Key will be displayed here...

Key Generation Notes

  • Keys are generated using cryptographically secure random numbers
  • For HMAC-SHA-256, a 32-byte key is recommended
  • For HMAC-SHA-512, a 64-byte key is recommended
  • Store your generated keys securely
  • Generated keys are only available in your browser

Compare HMAC Values

Verification Options

HMAC-SHA-256
HMAC-SHA-1
HMAC-SHA-384
HMAC-SHA-512
Hexadecimal
UPPERCASE HEX
Base64
Base64 URL Safe

About HMAC Verification

  • HMAC verification ensures that a message has not been tampered with
  • Both parties must know the same secret key
  • The sender computes the HMAC and sends both the message and HMAC
  • The receiver computes the HMAC of the received message and compares it to the received HMAC
  • If the HMACs match, the message is authentic and has not been altered

About HMAC

  • HMAC stands for Keyed-Hash Message Authentication Code
  • HMAC combines a cryptographic hash function with a secret key
  • It provides both message integrity and authentication
  • HMAC is resistant to collision attacks, even if the underlying hash function is not
  • Common use cases include API authentication, message signing, and data integrity verification
  • All operations are performed locally in your browser, your data never leaves your device

Important Security Considerations

  • Never share your secret keys with unauthorized parties
  • Rotate your keys periodically to maintain security
  • Use a key management system for production applications
  • HMAC-SHA-1 is less secure than SHA-2 based HMACs and should be avoided for new applications
  • Always use HTTPS when transmitting HMACs