Browser Extension
A personalized new tab page for cryptocurrency enthusiasts, free to add markets, websites, HD wallpapers, provide profit analysis and early warnings, and help you keep abreast of market changes
A must-have plug-in for currency speculation! Pay attention to the latest prices in real time, comprehensively integrate exchange trends such as OKX, Binance, CoinEx, etc., add markets and warnings freely, and keep abreast of market changes at any time.
A must-have plug-in for currency speculation! Pay attention to the latest prices in real time, comprehensively integrate exchange trends such as OKX, Binance, CoinEx, etc., add markets and warnings freely, and keep abreast of market changes at any time.
It redefines your Chrome new tab page. Compared to the new tab page that comes with Chrome, the new tab page is no longer a blank search, but contains many useful functions.
Hashing
MD5 is a widely used hash function. It's been used in a variety of security applications and is also commonly used to check the integrity of files
The SHA hash functions were designed by the National Security Agency (NSA). SHA-1 is the most established of the existing SHA hash functions, and it's used in a variety of security applications and protocols. Though, SHA-1's collision resistance has been weakening as new attacks are discovered or improved.
In February 2004, a change notice was issued for FIPS PUB 180-2 to include an additional variant SHA-224, which was defined to comply with the key length required for dual-key 3DES
SHA-256 is one of the four variants in the SHA-2 set. It isn't as widely used as SHA-1, though it appears to provide much better security.
The five algorithms of the SHA family, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512, were designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). It's a U.S. government standard. The latter four are sometimes called SHA-2 together.
SHA-512 is largely identical to SHA-256 but operates on 64-bit words rather than 32.
SHA-3 is the winner of a five-year competition to select a new cryptographic hash algorithm where 64 competing designs were evaluated.
RIPEMD-160 is a modified version of MD4 that generates 20-byte digest values and is almost as secure as SHA-1 (note that the SHA-1 standard does not say how the K value is determined, which is very suspicious). RIPEMD-160 can be thought of as two MD4 computates in parallel, and if two threads are used, the performance will not be much different.
Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.
Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.
Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.
Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.
Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.
Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.
Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.
PBKDF2 is a password-based key derivation function. In many applications of cryptography, user security is ultimately dependent on a password, and because a password usually can't be used directly as a cryptographic key, some processing is required. A salt provides a large set of keys for any given password, and an iteration count increases the cost of producing keys from a password, thereby also increasing the difficulty of attack.
Ciphers
The Advanced Encryption Standard (AES) is a U.S. Federal Information Processing Standard (FIPS). It was selected after a 5-year process where 15 competing designs were evaluated.
DES is a previously dominant algorithm for encryption, and was published as an official Federal Information Processing Standard (FIPS). DES is now considered to be insecure due to the small key size.
Triple DES applies DES three times to each block to increase the key size. The algorithm is believed to be secure in this form.
Rabbit is a high-performance stream cipher and a finalist in the eSTREAM Portfolio. It is one of the four designs selected after a 3 1/2-year process where 22 designs were evaluated.
RC4 is a widely-used stream cipher. It's used in popular protocols such as SSL and WEP. Although remarkable for its simplicity and speed, the algorithm's history doesn't inspire confidence in its security.
It was discovered that the first few bytes of keystream are strongly non-random and leak information about the key. We can defend against this attack by discarding the initial portion of the keystream. This modified algorithm is traditionally called RC4-drop.
Encoders
Translation
Block Chain
Some online practical tools for The Open Network(TON), including mnemonics to generate private and public keys, generate addresses, address conversion, send TON, etc.
Decode Bitcoin, Litecoin, Dogecoin mainnet and testnet raw transactions online
Some online practical technical tools for ADA (Cardano), including mnemonics to generate private and public keys, generate addresses, address conversion, send ADA, pledge, multi-signature wallets, etc.
Others
Online QR code utility tool, enter text content, URL and other information in the input box, and the corresponding QR code will be generated immediately
Online two-dimensional code utility, in the input box JSON array, you can immediately generate the corresponding two-dimensional code wheel
How many days have passed in your life, how many days are left, use numbers to measure life, a tool to calculate your life time. Life span is predetermined by heaven, so don't worry about it. Cherish every day is the most important thing.
Experience classic games online, reminisce about childhood and find back childhood memories
Parse QR codes online, read the QR code content and display the content text
An online tool for converting image to Base64 strings. Click or drag the image to convert.