🔐

API Key Hasher — Secure Storage Tool

Hash API keys using SHA-256, SHA-512, or PBKDF2 before storing them in your database. Generates a Node.js verification snippet and shows the recommended storage format — all 100% client-side using the Web Crypto API.

Security ToolsPrivacy & Security
Loading tool...

How to Use API Key Hasher — Secure Storage Tool

How to Use the API Key Hasher

Step 1: Paste Your API Key

Enter or paste the API key you want to hash. Use the eye icon to toggle visibility. You can also click an example preset to test with a realistic-looking key.

Step 2: Choose an Algorithm

AlgorithmSpeedOutputBest for
SHA-256Fast64 hex charsChecksums, lookup indices, low-risk keys
SHA-512Fast128 hex charsLonger keys, signing secrets, higher security
PBKDF2Slow (safe)64 hex charsCredentials needing offline attack protection

SHA-256 and SHA-512 are fast cryptographic hash functions. They are suitable when your main threat model is a database breach exposing stored keys, and the keys themselves have high entropy (randomly generated). They do not protect against GPU-based brute-force attacks if the key has low entropy.

PBKDF2 applies 100,000 iterations of HMAC-SHA256 to derive the hash. The high iteration count makes GPU cracking prohibitively expensive, similar to how bcrypt protects passwords. Use PBKDF2 when the API key might be reused as a password or when your keys have lower entropy.

Step 3: Add a Salt (Optional for SHA, Auto-generated for PBKDF2)

A salt is a random value mixed into the input before hashing. It prevents two identical keys from producing the same hash and defeats precomputed rainbow table attacks.

  • For SHA-256 and SHA-512, the salt is optional. If provided, the tool hashes salt:apiKey and you store the salt separately.
  • For PBKDF2, a salt is mandatory. If you leave the field blank, the tool generates a cryptographically random 16-byte salt automatically.

Step 4: Click Hash Key

The tool outputs:

  • The raw hex hash
  • The full stored record string (algorithm prefix + salt + hash)
  • A Node.js verification snippet using timingSafeEqual

Step 5: Store and Verify

Store the hash in your database, never the original key. When a user presents a key for authentication, hash it with the same algorithm and salt, then compare using timingSafeEqual to prevent timing attacks.

Storage Format Reference

AlgorithmFormat
SHA-256 (no salt)sha256:hexHash
SHA-256 (with salt)sha256:salt:hexHash
SHA-512 (no salt)sha512:hexHash
SHA-512 (with salt)sha512:salt:hexHash
PBKDF2pbkdf2:100000:saltHex:hashHex

Frequently Asked Questions

Most Viewed Tools

🔐

TOTP Code Generator — 2FA Testing Tool

3,204 views

Generate time-based one-time passwords from a TOTP secret key. Enter your base32 secret, choose a period and digit length, and get the current and next codes with a live countdown timer. Useful for testing and debugging 2FA integrations.

Use Tool →
{ }

JSON to Zod — Schema Generator

3,159 views

Generate Zod validation schema code from a JSON sample object. Infers z.string(), z.number(), z.boolean(), z.array(), z.object(), and z.null() types automatically. Handles nested objects, arrays of objects with optional field detection, and outputs copy-ready TypeScript with import and z.infer type alias.

Use Tool →
{}

JSONL Formatter — Line-by-Line Validator

3,101 views

Format, validate, and inspect JSON Lines (JSONL) and NDJSON files. Validates each line individually, reports parse errors by line number, outputs compact JSONL or a pretty-print preview, and lets you download the cleaned file.

Use Tool →
🔐

TLS Cipher Suite Checker — Strength Analyzer

2,797 views

Check TLS protocol version compatibility and cipher suite strength ratings against current best practices. Supports IANA and OpenSSL cipher names — rates each suite as Strong, Weak, or Deprecated and explains why.

Use Tool →
🔑

Password Entropy Calculator — Crack Time Estimator

2,755 views

Calculate the information-theoretic bit entropy of any password or API key. Detects character set pools automatically, shows the total number of possible combinations, and estimates crack time across five attack scenarios from rate-limited web logins to GPU cracking clusters.

Use Tool →
🔍

Secret Scanner — API Key & Credential Detector

2,713 views

Scan pasted text, code, or config files for accidentally exposed API keys, tokens, passwords, and private keys. Detects 50+ secret types across AWS, GitHub, Stripe, OpenAI, and more — all client-side, nothing leaves your browser.

Use Tool →
📺

Screen Size Converter — Diagonal Dimension Tool

2,650 views

Calculate screen width and height from diagonal size and aspect ratio. Convert between inches and centimeters for displays, TVs, and monitors with instant dimension calculations.

Use Tool →

TOML Config Validator — Syntax Error Finder

2,447 views

Validate TOML configuration file syntax and report errors with line numbers. Paste any TOML content — Cargo.toml, pyproject.toml, config.toml — and instantly see a green checkmark with key counts and structure stats, or a precise error message pointing to the exact line. Includes a collapsible JSON structure preview to confirm what was parsed.

Use Tool →

Related Privacy & Security Tools

🛡️

PGP Key Generator — Browser-Based Key Pair Tool

Generate PGP public and private key pairs for email encryption and code signing. Supports ECC (Curve25519) and RSA up to 4096-bit. Entirely browser-side — keys never leave your device.

Use Tool →
🔐

TOTP Code Generator — 2FA Testing Tool

Generate time-based one-time passwords from a TOTP secret key. Enter your base32 secret, choose a period and digit length, and get the current and next codes with a live countdown timer. Useful for testing and debugging 2FA integrations.

Use Tool →
🔑

OAuth 2.0 Scope Builder — Permission String Tool

Build and decode OAuth 2.0 scope strings for Google, GitHub, Stripe, and custom providers. Toggle permissions with risk indicators, generate ready-to-use scope strings, and decode existing scope strings to understand what access they grant.

Use Tool →
🔐

TLS Cipher Suite Checker — Strength Analyzer

Check TLS protocol version compatibility and cipher suite strength ratings against current best practices. Supports IANA and OpenSSL cipher names — rates each suite as Strong, Weak, or Deprecated and explains why.

Use Tool →
🔐

IP Allowlist Generator — Firewall Rule Builder

Generate ready-to-paste IP allowlist and blocklist rules for nginx, Apache, iptables, UFW, and AWS Security Groups. Enter IP addresses or CIDR ranges, select your target platform, and get production-ready firewall config instantly.

Use Tool →
🔑

Password Entropy Calculator — Crack Time Estimator

Calculate the information-theoretic bit entropy of any password or API key. Detects character set pools automatically, shows the total number of possible combinations, and estimates crack time across five attack scenarios from rate-limited web logins to GPU cracking clusters.

Use Tool →
🔒

Content Security Policy Generator — XSS Shield Builder

Build Content Security Policy headers interactively. Toggle directives like script-src, style-src, and img-src, select allowed source tokens, and add custom origins. Instantly outputs your CSP as an HTTP header, meta tag, Nginx directive, or Apache header.

Use Tool →
🔐

SSH Key Generator — Ed25519 & RSA Key Pair Tool

Generate Ed25519 and RSA 4096-bit SSH key pairs entirely in your browser. Keys are never sent to any server — 100% client-side using the Web Crypto API.

Use Tool →

Share Your Feedback

Help us improve this tool by sharing your experience

We will only use this to follow up on your feedback