Scrypt Hash Generator

Memory-Hard ASIC Resistant Configurable
Anish Nath
Generate Scrypt Hash
Password
Salt
Scrypt Parameters
CPU/Memory Cost
Block Size
Parallelization
Memory Required: 2 MB

Verify Hash
Scrypt Hash Output

Scrypt hash will appear here

Enter a password and configure parameters
Parameter Guide
Use Case N r p Memory
Interactive login 16384 8 1 ~16 MB
Recommended 32768 8 1 ~32 MB
Sensitive storage 65536 8 1 ~64 MB
High security 1048576 8 1 ~1 GB
Memory = 128 × N × r bytes

Support This Free Tool

Every coffee helps keep the servers running. Every book sale funds the next tool I'm dreaming up. You're not just supporting a site — you're helping me build what developers actually need.

500K+ users
200+ tools
100% private
Privacy Guarantee: Private keys you enter or generate are never stored on our servers. All tools are served over HTTPS.
Understanding Scrypt
What is Scrypt?

Scrypt is a password-based key derivation function created by Colin Percival in 2009 for the Tarsnap backup service. It's designed to be memory-hard, requiring significant RAM to compute, making it resistant to large-scale custom hardware attacks (GPUs, FPGAs, ASICs).

Key Parameters
N - CPU/Memory Cost

Must be a power of 2. Determines overall memory and CPU usage. Doubling N doubles both time and memory. Primary parameter to increase security.

r - Block Size

Controls memory read size. Affects memory bandwidth usage. Typical value is 8. Higher values increase memory per-block but may reduce parallelism benefits.

p - Parallelization

Allows parallel computation. Each parallel thread needs N×r memory. Useful for multi-core systems. Usually kept at 1 for password hashing.

Memory Calculation
Memory = 128 × N × r bytes
Example: N=16384, r=8 → 128 × 16384 × 8 = 16,777,216 bytes = 16 MB
Scrypt vs Other Algorithms
Algorithm Memory-Hard GPU Resistant Configurable Notes
Scrypt Yes High N, r, p Good choice, proven in production (Litecoin, Tarsnap)
Argon2 Yes High t, m, p PHC winner (2015), recommended for new applications
BCrypt Limited Medium Cost only Fixed 4KB memory, still widely used
PBKDF2 No Low Iterations NIST recommended but GPU-vulnerable
Code Examples

Python

import hashlib
dk = hashlib.scrypt(
    password.encode(),
    salt=salt.encode(),
    n=16384, r=8, p=1,
    dklen=32
)

Node.js

const crypto = require('crypto');
crypto.scrypt(password, salt, 32,
  { N: 16384, r: 8, p: 1 },
  (err, key) => {
    console.log(key.toString('hex'));
  });