Key derivation · Memory hard

scrypt Text Derivation Tool

Produce scrypt-derived keys with full control over N, r, p, and output length. Keep salts local and verify results instantly. Need to process files instead? Use the scrypt file tool →

Text scrypt derivation

Derive keys with scrypt using custom cost parameters and salts. scrypt is ideal for password hashing and key expansion workloads that need memory hardness.

Current length: 0 characters

Provide input text and click Derive key to compute scrypt.

Enter a target hash to validate.

Provide a salt to reproduce a hash or leave blank for a random 16-byte salt.

scrypt overview

scrypt is a memory-hard key derivation function that defends against GPU and ASIC brute-force attacks. TheN (cost factor), r (block size), andp (parallelism) parameters control CPU and memory usage: larger values raise the attack cost but also increase runtime locally.

The derived key length determines how many bytes are produced—common choices are 32 bytes for keys or 64 bytes for storing comparison hashes. Salts should be random and unique per derivation; this tool produces them for you, but you can supply known salts for deterministic results.

CipherTools performs the derivation entirely in your browser. Extremely high parameter combinations can consume significant CPU or memory, so ramp values carefully. Need to process file contents instead? Switch to the file-based scrypt workflow for the same controls.