$devtoolkit.sh/tools/bcrypt-hash-generator

PBKDF2 Hash Generator

Derive a key from a password using PBKDF2 (SHA-256). Configure salt and iterations.

Related Tools

FAQ

What is PBKDF2?
PBKDF2 (Password-Based Key Derivation Function 2) repeatedly applies HMAC to a password and salt to produce a derived key. High iteration counts make brute-force attacks expensive.
What iteration count should I use?
OWASP recommends at least 600 000 iterations with HMAC-SHA-256 for password hashing. 100 000 is a reasonable minimum but higher is better.
Is data sent to a server?
No. All derivation uses the browser Web Crypto API.

Derive a cryptographic key from a password using PBKDF2-SHA-256 via the Web Crypto API. Specify a custom salt or auto-generate a random one, and set the iteration count (default 100 000). The derived key is displayed as hex. PBKDF2 is suitable for password hashing, key stretching, and key derivation in client-side applications.

/tools/bcrypt-hash-generatorv1.0.0