Generate HMAC authentication codes with SHA-256, SHA-512, and other algorithms. Create keyed-hash message authentication codes for API authentication, JWT signing, and secure message verification.
Message: Hello, World! | Key: secreta4331d1b1e0e8c5e8e8c5e8e8c5e8e8c5e8e8c5e8e8c5e8e8c5e8e8c5e8e8c5eMessage: GET /api/users | Key: api_key_123b5442e2c2f1f9d6f9f9d6f9f9d6f9f9d6f9f9d6f9f9d6f9f9d6f9f9d6f9f9d6fMessage: header.payload | Key: jwt_secretc6553f3d3g2g0e7g0g0e7g0g0e7g0g0e7g0g0e7g0g0e7g0g0e7g0g0e7g0g0e7gGenerate secure SHA-256 hashes from text or files instantly. Create 256-bit (64 character) cryptographic hashes for security applications, file verification, and blockchain. The industry standard for secure hashing.
Decode and inspect JWT tokens without verification. View header, payload, claims, and expiration status. Debug authentication tokens from OAuth, OpenID Connect, and API authorization systems.
Verify file integrity by comparing hashes. Auto-detect MD5, SHA-1, SHA-256, SHA-512 algorithms. Confirm downloads weren't corrupted or tampered with by comparing computed hashes against expected values.