Variable-length hash generator for SHAKE-128/256, featuring salt support, multiple iterations, and various input/output formats.

Caesar Cipher Encoder & Decoder
Easily encrypt and decrypt text using the Caesar cipher (shift cipher) with custom alphabets and shift values online.

NTLM Hash Calculator
Calculate the NTLM hash of any string. Supports plaintext, Hex, and Base64 inputs, outputting results in Hex and Base64 formats.

Random Number Generator
Generate random integers or decimals within a specified range, featuring duplicate removal, sorting, and formatted output.

Random Password Generator
Customize character types and length to generate strong random passwords and secure your accounts.

Caesar Cipher Encoder & Decoder
Easily encrypt and decrypt text using the Caesar cipher (shift cipher) with custom alphabets and shift values online.

NTLM Hash Calculator
Calculate the NTLM hash of any string. Supports plaintext, Hex, and Base64 inputs, outputting results in Hex and Base64 formats.

Random Number Generator
Generate random integers or decimals within a specified range, featuring duplicate removal, sorting, and formatted output.

Random Password Generator
Customize character types and length to generate strong random passwords and secure your accounts.

LM Hash Calculator
Convert plaintext, Hex, or Base64 strings into LM hashes. Get instant Hex and Base64 outputs with uppercase and lowercase formatting options.
When you need a cryptographic tool that generates a hash of any length, a fixed-length algorithm like SHA-256 might not meet your requirements. The SHAKE hash generator is designed specifically for this purpose. It converts arbitrary input data (text, Hex, Base64, or byte streams) into an irreversible hash digest of a specified length using the SHAKE-128 or SHAKE-256 algorithms. Its core principle is based on the Keccak sponge construction, which "absorbs" input data and "squeezes" out an output of any length. It belongs to the Extendable-Output Functions (XOFs) within the SHA-3 family.
Q: What is the difference in output length between SHAKE-256 and SHA-256?
SHAKE-256 can generate a hash value of any length, whereas the output length of SHA-256 is fixed at 256 bits. The "256" suffix in SHAKE-256 refers to its security strength (collision resistance at the 256-bit level), not its output length.
Q: How do I use this tool to hash a password with a salt?
It's simple. Enter your password in the input box, enter a random salt (e.g., "mysalt123") in the "Salt" box, select the salt position, set the algorithm and output length, and then execute. Salting ensures that even if passwords are identical, the hash results will be completely different, greatly improving storage security.
Ensure that the format of your input text matches the selected "Input Type"; otherwise, an incorrect hash will be generated. When customizing the output bit length, balance security and efficiency: a length that is too short may compromise security, while one that is too long increases computational overhead. Please note that hashing is a one-way process, and this tool cannot perform reverse decryption. When handling sensitive information, we recommend using a local environment.
In protocols that require generating keys or tokens of a specific length (such as certain Key Derivation Function applications), SHAKE's XOF characteristics offer more flexibility than traditional hashes. A typical example: inputting the string "API_Secret", using SHAKE-128, and setting the output length to 160 bits yields a token length that perfectly matches specific system requirements. Note that salts should be generated using a cryptographically secure pseudo-random number generator (CSPRNG) rather than simple strings. For standard data integrity checks, the default 256-bit output is sufficient. If used for password storage, be sure to enable a salt and consider increasing the iteration count (e.g., 10,000+ rounds) to defend against GPU brute-force attacks.