Key derivation · Memory hard

scrypt File Derivation Tool

Drop in any file and derive a scrypt key with custom parameters — the entire workflow stays inside your browser. Working with text? Jump to the scrypt text tool →

File scrypt derivation

Derive scrypt keys from uploaded files with adjustable parameters. All computation happens locally in your browser.

Upload a file

Click to browse or drag & drop files here

Files never leave your device.

Record the salt and parameter values to reproduce this key in other environments.

Select a file and provide a derived key to compare.

Leave the salt blank to generate a random 16-byte value automatically.

scrypt for files

Use this workflow to derive scrypt keys directly from file contents. Parameters behave just like the text tool: N sets the CPU/memory cost, r controls block size, andp defines parallelism. The derived key length determines how many bytes of output you receive.

Salts must be unique and are commonly 16 bytes. Generate a fresh one for every run or provide a known value (base64 or hex) to reproduce hashes. Always store the salt with the derived key so it can be recalculated.

For very large files you may wish to hash the file with SHA-2/BLAKE first and feed the digest into scrypt. It keeps the working set small while retaining strong memory-hard protections.