Bcrypt.tools - HMAC Hash Generator and Verifier Tool

Easily generate and verify HMAC hashes for your passwords and sensitive data online.

Encrypt

Generate a secure HMAC hash from any plaintext for enhanced password protection.

Verify

Verify if a plaintext matches a specific HMAC hash, ensuring secure login validation.

FAQ - Frequently Asked Questions

What is HMAC?

HMAC (Hash-based Message Authentication Code) is a specific type of message authentication code (MAC) that involves a cryptographic hash function and a secret cryptographic key. It is used to verify both the data integrity and the authenticity of a message.

How HMAC Works

HMAC uses a combination of a hash function (such as SHA-256 or MD5) and a secret key. The secret key is combined with the message using a hashing algorithm to produce a hash value that can be used for both verifying the integrity of the message and ensuring that it hasn't been tampered with.

The result is a secure code that can be used to confirm that the sender of the message had access to the shared secret key, preventing forgeries.

Field Explanations

Key: The secret cryptographic key used in combination with the hash function. The key ensures that only someone with access to the key can verify the HMAC.

Message (Plain Text): The data or message you want to protect with the HMAC. The hash function will be applied to this message along with the secret key to generate the HMAC.

Hash Function: The cryptographic hash function used to process the message and the key. Common hash functions used in HMAC include SHA-256, SHA-512, and MD5.

Relevant Links