Tiny Online Tools logoTiny Online Toolssearch搜索工具…grid_view全部工具
首页chevron_right安全工具chevron_rightHMAC 生成器HMAC 生成器

HMAC 生成器

从文本生成 HMAC 签名。

info在上方输入密钥和消息以生成 HMAC 签名。

相似工具

MD5 生成器

MD5 生成器

快速生成 MD5 哈希值。

SHA-256 生成器

SHA-256 生成器

从文本生成 SHA-256 哈希。

Bcrypt 生成器

Bcrypt 生成器

生成 bcrypt 密码哈希值。

JWT 签名验证器

JWT 签名验证器

在浏览器中本地验证 HMAC JWT 签名。

打乱文本行

打乱文本行

Randomize the order of 文本 lines.

PDF 表单填写工具

PDF 表单填写工具

在浏览器中直接打开任何可填写的 PDF,编辑其表单字段并保存完整副本——可选择扁平化选项以锁定值。

周数计算器

周数计算器

获取任意日期的 ISO 8601 周数、美式周数、一年中的第几天及剩余天数。

apps

更多工具

浏览我们完整的免费在线工具集合。

HMAC Generator

While regular hashing functions like SHA-256 prove data integrity ("this file hasn't been modified"), they don't prove origin ("this file came from someone I trust"). HMAC (Hash-based Message Authentication Code) solves that by combining a message with a secret key, producing a signature that only someone with the secret key could have 生成d. This tool 创建s HMAC signatures used in API authentication, webhook verification, and digital signatures.

How HMAC differs from plain hashing

If you hash a message, anyone can verify the hash matches—they just recompute it. But with HMAC, you hash the message combined with a secret key. An attacker who intercepts the message and hash cannot 创建 a valid HMAC for a modified message without knowing the secret key. This makes HMAC perfect for situations where you need to prove both integrity and authenticity.

Real-world HMAC usage

Web APIs frequently use HMAC for request signing. A client hashes their request body with their secret API key and includes the resulting signature in the request. The server repeats this calculation and verifies the signature matches—proving the request came from the legitimate client and wasn't tampered with. Webhook providers use the same approach: they sign the webhook payload with their secret, and you verify the signature before processing the webhook.

Algorithm selection

This tool supports HMAC with SHA-1, SHA-256, SHA-384, and SHA-512. Prefer SHA-256 or higher for new applications. SHA-1 is older and less secure, though for HMAC specifically (rather than plain hashing), SHA-1 remains acceptable in some legacy systems.

Key management

The strength of HMAC depends entirely on keeping the secret key secret. If your API key or signing key is compromised, attackers can forge valid signatures. Store keys securely (in environment variables or secrets managers), never commit them to version control, and rotate them periodically.