Password Hash Generator / Verifier (PBKDF2)

Generate and verify password hashes with PBKDF2 (Web Crypto API)

100% In-BrowserNo Server UploadFree, No Signup
Cryptography
For EngineersFastPass - AI Career Agent

AI analyzes your skills and matches you with the best opportunities. Get a free market value assessment.

Get Started Free

How to Use

  1. Select mode

    Choose "Generate" or "Verify" in the toolbar.

  2. Enter password

    For generation, enter a password. For verification, enter a password and an existing hash.

  3. Run

    Click "Convert" to generate or verify the hash. Iteration count can be changed in the toolbar.

Password Hash Generator / Verifier (PBKDF2) Examples

Generate a password hash

Input
password123
Output
pbkdf2:100000:base64salt:base64hash

A secure hash is generated with the selected iteration count and random salt.

Verify a hash

Input
password123
Output
Match: OK

Use verify mode to compare a password against an existing hash.

Features

  • PBKDF2-SHA-256 password hashing
  • Configurable iterations (10,000 / 100,000 / 600,000)
  • Auto-generated random salt (16 bytes)
  • Hash verification mode for password matching
  • Output format: algorithm:iterations:salt:hash
  • Local processing (your input is not sent to servers)
  • Dark mode support

FAQ

What is the difference between PBKDF2 and bcrypt?

PBKDF2 is an HMAC-based key derivation function natively supported by Web Crypto API. bcrypt is Blowfish-based and not memory-hard but has GPU resistance. Both can safely hash passwords with sufficient iterations.

How many iterations should I use?

OWASP recommends at least 600,000 iterations for PBKDF2-SHA-256. Choose based on the balance between server load and security. Generally 100,000 or more is recommended.

Is my data sent to a server?

No. All hashing is done locally in your browser using the Web Crypto API. Your passwords are never transmitted externally.