Base32 Encode & Decode

Base32 is the base-32 numeral system. It uses a set of 32 digits, each of which can be represented by 5 bits. One way to represent Base32 numbers in a human-readable way is by using a standard 32-character set, such as the twenty-two upper-case letters A–V and the digits 0-9.

Featured Tools

Featured tools that you might find useful.

Popular Tools

List of popular tools that users love and frequently use.

New Tools

The latest tools added to our collection, designed for you.

Topics

The tools grouped by topics to quickly find what you need.
SHA encryption is a term that refers to a family of cryptographic hash functions that are used to verify the integrity and authenticity of data. A hash function is a mathematical function that takes an input and produces a fixed-length output, called a hash or a digest, that is unique for each input. SHA encryption can be used to generate digital signatures, checksums, passwords and other security applications.

SHA Encrypt

SHA encryption is a term that refers to a family of cryptographic hash functions that are used to verify the integrity and authenticity of data. A hash function is a mathematical function that takes an input and produces a fixed-length output, called a hash or a digest, that is unique for each input. SHA encryption can be used to generate digital signatures, checksums, passwords and other security applications.
​PBKDF2 Encryption is a specific type of Password-Based Key Derivation Function Encryption (PBKDF Encryption) that uses a pseudorandom function, such as hash-based message authentication code (HMAC), to generate a derived key from a password or a passphrase

PBKDF2 Encrypt

​PBKDF2 Encryption is a specific type of Password-Based Key Derivation Function Encryption (PBKDF Encryption) that uses a pseudorandom function, such as hash-based message authentication code (HMAC), to generate a derived key from a password or a passphrase
Symmetric Encrypt & Decrypt Online Tool is a web online tool that allows you to encrypt and decrypt text using symmetric encryption algorithms such as AES, Triple DES and DES. Symmetric encryption is widely used for data protection, authentication and digital signatures.

Symmetric Encrypt & Decrypt

Symmetric Encrypt & Decrypt Online Tool is a web online tool that allows you to encrypt and decrypt text using symmetric encryption algorithms such as AES, Triple DES and DES. Symmetric encryption is widely used for data protection, authentication and digital signatures.
TEA (Tiny Encryption Algorithm) is a block cipher notable for its simplicity of description and implementation, typically a few lines of code. TEA Encrypt & Decrypt is a free online tool that for Tiny Encryption Algorithm Encrypt & Decrypt.

TEA Encrypt & Decrypt

TEA (Tiny Encryption Algorithm) is a block cipher notable for its simplicity of description and implementation, typically a few lines of code. TEA Encrypt & Decrypt is a free online tool that for Tiny Encryption Algorithm Encrypt & Decrypt.