Browser-Based Security Tools
Every tool on this page runs entirely in your browser using the Web Crypto API. No data is sent to any server - key generation, hashing, HMAC signing, and JWT decoding all happen client-side. Open your browser's network tab to verify.
Hashing vs HMAC
A hash function takes input and produces a fixed-size digest. It proves integrity - that the data has not been tampered with. HMAC adds a secret key to the process, proving both integrity and authenticity. Use hashes for checksums and fingerprinting. Use HMAC for API signatures and message authentication where you need to verify the sender.
RSA Key Pairs
RSA is an asymmetric algorithm - it uses two mathematically linked keys. The public key encrypts data or verifies signatures. The private key decrypts or signs. This separation means you can share the public key freely while keeping the private key secret. RSA is used in TLS certificates, SSH authentication, JWT signing, and encrypted email.
JWT Tokens
JSON Web Tokens encode claims as a compact, URL-safe string. They are used for authentication, API authorisation, and information exchange. A JWT has three parts: header, payload, and signature. Our decoder lets you inspect all three without sending the token to any server - important since tokens often contain sensitive user data.
Quick Links
Benefits
- 100% browser-based
- No registration
- Free