Scrypt Hash / Key Derivation
Generate Scrypt-derived keys online. Memory-hard password-based key derivation function.
Enter text to derive key from
Derived key (hex) will appear here
Salt: (auto-generated 16 bytes)
Scrypt Key Derivation Function
Scrypt is a password-based key derivation function (KDF) created by Colin Percival. It is designed to be memory-hard, making it resistant to hardware brute-force attacks using FPGAs and ASICs.
Unlike simpler algorithms like PBKDF2 or Bcrypt, Scrypt requires a significant amount of memory to compute, which makes parallelizing attacks on custom hardware much more expensive.
Why Use Scrypt?
- Memory-Hard: Resistant to GPU and ASIC attacks.
- Configurable: Adjustable CPU/memory cost (N), block size (r), and parallelization (p).
- Security: High security for password storage and key derivation.