§ Tool 23 of 23 · Network & Security

Hashes & ciphers, locally.

A three-tab cryptographic suite: hash functions (MD5, CRC32, SHA-1/256/384/512), symmetric encryption (AES-GCM-256), and asymmetric encryption (RSA-2048/4096). All powered by Apple's first-party CryptoKit and Security frameworks.

Updated
v1.12
Suite shipped
Hashes
MD5 · CRC · SHA
SHA-1/256/384/512
Symmetric
AES-GCM-256
Authenticated
Asymmetric
RSA-2048/4096
Security framework
DevUtilities Crypto Tools — three-tab interface with hash, symmetric, asymmetric panels.
Plate xxiii — Crypto Tools with the three-tab layout and the AES key generator.
§ 01Capabilities

Eight things it does correctly.

i

Hash functions

MD5, CRC32, SHA-1, SHA-256, SHA-384, SHA-512. Real-time as you type; output in hex or Base64.

ii

AES-GCM-256

Authenticated symmetric encryption / decryption. Keys generated locally; outputs are Base64-encoded for transport.

iii

RSA-2048 / 4096

Public-key encryption / decryption. PEM keys imported via Apple's Security framework.

iv

Three-tab UI

One screen per primitive: hash, symmetric, asymmetric. Consistent input/output panels make the muscle memory transfer.

v

Key generation

Generate AES keys with a click. RSA key pairs come from your existing PEM material; the tool doesn't generate keys it can't audit.

vi

Real-time hashing

Type into the input; the hash updates instantly. No "hash" button — the result follows the keystrokes.

vii

Hex or Base64 outputs

Toggle for the format your downstream consumer expects.

viii

First-party crypto

CryptoKit for hashes and AES; Security framework for RSA. No third-party crypto libraries; all sandbox-friendly.

§ 02A typical session

Four moves across the suite.

Pick a primitive

Hash, symmetric, or asymmetric. Tabs along the top.

Tab

Provide inputs

Plaintext, ciphertext, or message. AES needs a key; RSA needs a PEM.

Inputs

Run

Encrypt, decrypt, hash. Results appear in the output pane.

Run

Copy

Hex or Base64; copy buttons everywhere.

Copy · ⌘ C
§ 03Made for these tasks

The work it actually does.

i — Auth

API signature tokens

Generate the SHA-256 / HMAC-SHA-256 signatures third-party APIs require for authentication.

ii — Verify

File integrity

Confirm a downloaded file matches its published checksum, in seconds.

iii — Audit

Password derivation

Hash candidate passwords against published rules during a security review.

iv — Transport

Envelope encryption

Encrypt small payloads with AES-GCM and an ephemeral key for safe transport.

v — Keys

RSA round-trip

Encrypt a session key with the recipient's RSA public key; decrypt with the matching private key.

vi — Test

Crypto fixtures

Produce known-good ciphertexts and hashes for unit tests.

§ 04Questions, answered

Things people ask before they download.

Which hash algorithms are supported?

MD5, CRC32, SHA-1, SHA-256, SHA-384, and SHA-512. MD5 and SHA-1 are kept for legacy verification, not for new security uses.

What's the symmetric mode?

AES-GCM-256 — authenticated, modern, Apple-recommended. Pairs a 256-bit key with the standard 12-byte nonce.

What about RSA padding?

OAEP via the Security framework, with the standard SHA-256 hash. Suitable for current best practice.

Where are keys stored?

Only in your local session. AES keys live in memory; RSA PEMs are pasted directly. Nothing leaves the machine.

Hex or Base64 output?

Both available; toggle per panel. Hex for human reading, Base64 for transport.

Are the operations local?

Yes. CryptoKit and the Security framework run on-device; there are no servers in the loop.

§ 05Companion tools

Better with the rest of the shelf.

§ Download

Hashes, ciphers, signatures — locally.

Download — Mac App StoreChangelog