BMR AI
By using this service you agree to read and accept our Terms and conditions and Privacy Policy
Chat Now

Tiger192_3 Encryption/Decryption Tool

Convert/Implement Text to Tiger192_3 hash

Input

Encrypt Decrypt

Output

Note: There is no way to decrypt a given value after you use Tiger192_3 algorithm. We use our database to match the original data of the input data and return the decrypted data.
Decrypt your encrypted value and get the most from our large database containing over 10 Million records and expanding from time to time.

LEARN

Tiger-192 (3 passes)

Type: Cryptographic hash function
Designed by: Ross Anderson and Eli Biham (1995)
Output Size: 192-bit (24-byte)

Description

The full-output version of the Tiger hash function.

Common Use Cases

Used in some peer-to-peer applications and as a strong alternative to MD5.

Security Considerations

Considered the most secure of the Tiger variants due to its full output size.

Performance

Fast on 64-bit processors, though slightly slower than shorter output variants.

Fun Fact

Tiger-192 is the original, untruncated version of the Tiger algorithm.

How to Use Tiger-192 (3 passes)

  1. Enter your data in the input field above.
  2. Click the "Encrypt" or "Decrypt" button to generate the required Tiger-192 (3 passes) value.
  3. The resulting hash will be displayed in the output field.
  4. Use the export options to save or share your result.

Note: Tiger-192 (3 passes) is a one-way function. Once data is hashed, it cannot be reversed to obtain the original input.

How does our tool work?

  1. Enter your data in the input field
  2. Extract the data from url and files as needed from the options provided at the input field
  3. Our tool will automatically encrypts and decrypts your input data securely by using the Tiger192_3 encryption algorithm.
  4. Change the mode from encrypt to decrypt as needed
  5. Use our export tools to export the conversion to other platforms quickly and easily

DOCS


Implementing Using JS

Using JS Using jQuery Using PHP Using Python

Library

Implement your own Encyption/Decryption tool with our libray for free. Refer the implemtation code using js and jquery to use the library.

A total of 60 Encryption/Decryption Tools are present in this library.

  1. Used for: Encryption/Decryption
  2. Developer: BMR DEVELOPERS
  3. Total algorithms: 60
  4. Version: 3
  5. Model: 1.0.4
  6. Available in: JavaScript
  7. Script Tag: <script async src="https://online-tools.bmreducation.com/lib/encrypt-decrypt/v3.1.0.4.js"></script>

ABOUT

Why choose our tool?

  1. We provide encryption as well as decryption methods to convert your data
  2. We provide Implementation codes and examples with different programing languages.
  3. Securely converts your data by our tool.
  4. Your input data is stored in our servers securely while using this tool and will not be connected to any users or device in anyway possible. Your privacy matter's the most to us.
  5. Expericence our newly designed, upgraded and easy-to-use version 3 tools.
Similar Tools MORE

ADLER32 Encryption/Decryption Tool

Convert/Implement Text to ADLER32 hash

CRC32 Encryption/Decryption Tool

Convert/Implement Text to CRC32 hash

CRC32B Encryption/Decryption Tool

Convert/Implement Text to CRC32B hash

CRC32C Encryption/Decryption Tool

Convert/Implement Text to CRC32C hash

FNV132 Encryption/Decryption Tool

Convert/Implement Text to FNV132 hash

FNV164 Encryption/Decryption Tool

Convert/Implement Text to FNV164 hash

Load More