SHA1 Online Encryption

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST.[2] SHA-1 produces a 160-bit (20-byte) hash value known as a message digest. A SHA-1 hash value is typically rendered as a hexadecimal number, 40 digits long.

PHP SHA1 Example of use

$str = "Hello";
echo "The string: ".$str;
echo "TRUE - Raw 20 character binary format: ".sha1($str, TRUE);
echo "FALSE - 40 character hex number: ".sha1($str);

Our Usefull Tools

What is my ip address?

An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."


Use this tool now

Secure password generator

Everybody needs strong passwords, even if you are an progammer or a simple internet user. Sometimes we have no idea what password to put. From this reason we have created this usefull tool. You can select the lenght of password you want, and we generate it for you. It is time saving and sometimes can me be fun to see what password is generated!


Use this tool now

Find Website Ip

Finds the IP address(s) of a website. An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.


Use this tool now

Get HTTP Headers Information

HTTP header fields are components of the header section of request and response messages in the Hypertext Transfer Protocol (HTTP). They define the operating parameters of an HTTP transaction.


Use this tool now

SHA1 Online Encryption

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST.[2] SHA-1 produces a 160-bit (20-byte) hash value known as a message digest. A SHA-1 hash value is typically rendered as a hexadecimal number, 40 digits long.


Use this tool now

SHA256 Online Encryption

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the National Security Agency (NSA). Cryptographic hash functions are mathematical operations run on digital data;


Use this tool now

TRIPLE DES Encryption Online

In cryptography, Triple DES (3DES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block.


Use this tool now

TRIPLE DES Decryption Online

In cryptography, Triple DES (3DES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block.


Use this tool now

Base64 Encoder Online

Base64 is a group of similar binary-to-text encoding schemes that represent binary data in an ASCII string format by translating it into a radix-64 representation. The term Base64 originates from a specific MIME content transfer encoding. Each base64 digit needs exactly 6 bits of information to be represented.


Use this tool now

Base64 Decoder Online

Base64 is a group of similar binary-to-text encoding schemes that represent binary data in an ASCII string format by translating it into a radix-64 representation. The term Base64 originates from a specific MIME content transfer encoding. Each base64 digit needs exactly 6 bits of information to be represented.


Use this tool now

MD5 Online Encryption

The MD5 algorithm is a widely used hash function producing a 128-bit hash value. Although MD5 was initially designed to be used as a cryptographic hash function, it has been found to suffer from extensive vulnerabilities. It can still be used as a checksum to verify data integrity, but only against unintentional corruption.


Use this tool now

A project developed by EnkoSoft Company