BMR AI
By using this service you agree to read and accept our Terms and conditions and Privacy Policy
Chat Now

Tiger128_3 Encryption/Decryption Tool

Convert/Implement Text to Tiger128_3 hash

Input

Encrypt Decrypt

Output

Note: There is no way to decrypt a given value after you use Tiger128_3 algorithm. We use our database to match the original data of the input data and return the decrypted data.
Decrypt your encrypted value and get the most from our large database containing over 10 Million records and expanding from time to time.

LEARN

Tiger-128 (3 passes)

Type: Cryptographic hash function
Designed by: Ross Anderson and Eli Biham (1995)
Output Size: 128-bit (16-byte)

Description

A cryptographic hash function optimized for 64-bit architectures, truncated to 128 bits.

Common Use Cases

Used in some peer-to-peer applications and file integrity checks.

Security Considerations

Considered reasonably secure, but not as widely analyzed as some other hash functions.

Performance

Fast on 64-bit processors.

Fun Fact

Tiger was designed to be fast on modern processors while still being secure.

How to Use Tiger-128 (3 passes)

  1. Enter your data in the input field above.
  2. Click the "Encrypt" or "Decrypt" button to generate the required Tiger-128 (3 passes) value.
  3. The resulting hash will be displayed in the output field.
  4. Use the export options to save or share your result.

Note: Tiger-128 (3 passes) is a one-way function. Once data is hashed, it cannot be reversed to obtain the original input.

How does our tool work?

  1. Enter your data in the input field
  2. Extract the data from url and files as needed from the options provided at the input field
  3. Our tool will automatically encrypts and decrypts your input data securely by using the Tiger128_3 encryption algorithm.
  4. Change the mode from encrypt to decrypt as needed
  5. Use our export tools to export the conversion to other platforms quickly and easily

DOCS


Implementing Using JS

Using JS Using jQuery Using PHP Using Python

Library

Implement your own Encyption/Decryption tool with our libray for free. Refer the implemtation code using js and jquery to use the library.

A total of 60 Encryption/Decryption Tools are present in this library.

  1. Used for: Encryption/Decryption
  2. Developer: BMR DEVELOPERS
  3. Total algorithms: 60
  4. Version: 3
  5. Model: 1.0.4
  6. Available in: JavaScript
  7. Script Tag: <script async src="https://online-tools.bmreducation.com/lib/encrypt-decrypt/v3.1.0.4.js"></script>

ABOUT

Why choose our tool?

  1. We provide encryption as well as decryption methods to convert your data
  2. We provide Implementation codes and examples with different programing languages.
  3. Securely converts your data by our tool.
  4. Your input data is stored in our servers securely while using this tool and will not be connected to any users or device in anyway possible. Your privacy matter's the most to us.
  5. Expericence our newly designed, upgraded and easy-to-use version 3 tools.
Similar Tools MORE

ADLER32 Encryption/Decryption Tool

Convert/Implement Text to ADLER32 hash

CRC32 Encryption/Decryption Tool

Convert/Implement Text to CRC32 hash

CRC32B Encryption/Decryption Tool

Convert/Implement Text to CRC32B hash

CRC32C Encryption/Decryption Tool

Convert/Implement Text to CRC32C hash

FNV132 Encryption/Decryption Tool

Convert/Implement Text to FNV132 hash

FNV164 Encryption/Decryption Tool

Convert/Implement Text to FNV164 hash

Load More