← ← All Tools

🔑 PBKDF2 Key Derivation

Client-side PBKDF2 key derivation calculator with SHA-1/256/384/512, configurable iterations and key length, UTF-8/Hex/Base64 salt formats, RFC 6070 test vectors, Web Worker for long iterations, multi-format output (Hex/Base64/byte array/code snippets), OpenSSL CLI preview, and OWASP 2023 defaults

Hash Algorithm / 哈希算法

🧪 RFC 6070 official test vectors (PBKDF2-HMAC-SHA1)

Click any vector to auto-fill parameters and run. Vector #5 includes a NUL-byte boundary test.

Online PBKDF2 key derivation calculator powered by the browser WebCrypto API with native SHA-1, SHA-256, SHA-384, and SHA-512 support. Configure iterations (presets: 100K Fast, 310K NIST, 600K OWASP 2023, 1.2M Paranoid), salt (UTF-8 / Hex / Base64 encodings with a one-click 16-byte random salt generator), and key length (1–256 bytes). Built-in RFC 6070 official test vectors for one-click validation. A Web Worker kicks in automatically for long iterations so the UI never freezes. Output formats include hex, Base64, Base64URL, byte array, and JavaScript / Python / Java / Go code snippets. Includes a Verify mode, OpenSSL CLI equivalent preview, and a shareable URL (never contains your password). All computation runs locally — your password and derived key are not uploaded by the tool. Great for password hashing, symmetric key derivation, WPA key generation, and cryptography study.