100% Client-side  |  Entropy analysis  |  25+ patterns detected

Cipher Text Identifier & Analyser

Paste any cipher text, hash, encoding or token and the tool identifies the algorithm using entropy analysis, length fingerprinting and pattern matching.

Input analysis
Shannon entropy: (0 = uniform, 8 = random)
Detected 0 possible match(es) — sorted by confidence

How the identifier works

The cipher text identifier uses a combination of techniques to determine what algorithm likely produced a given string:

  • Length fingerprinting — many algorithms produce fixed-length outputs (MD5 = 32 hex chars, SHA-256 = 64 hex chars)
  • Character set analysis — hex strings only contain 0-9 a-f, Base64 uses A-Z a-z 0-9 +/=, binary uses only 0 and 1
  • Shannon entropy — encrypted/compressed data has high entropy (near 8.0), natural language has low entropy (near 4.0)
  • Structural pattern matching — JWTs have three dot-separated Base64URL parts, PEM certificates have specific headers, URL encoding uses % sequences
  • Statistical analysis — Caesar cipher text retains natural language letter frequency distribution

Detection categories

CategoryAlgorithms detectedMethod
HashMD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, bcrypt, NTLMLength + hex charset
EncodingBase64, Base64URL, Hex, Binary, URL encoding, HTML entitiesCharset + structure
Modern cipherAES-128/192/256, DES, 3DES, Blowfish (CBC/ECB output)Length + entropy + Base64
Classical cipherCaesar, ROT13, Vigenère, Atbash, Rail FenceLetter frequency + charset
AsymmetricRSA (PEM), RSA (raw), PGP message, OpenSSH keyPEM header + structure
TokenJWT (HS256/RS256/ES256), API key patternsStructure + Base64URL

Understanding Shannon entropy

Entropy rangeLikely typeExample
0.0 – 2.0Highly repetitive / binary flag0000111100001111
2.0 – 4.0Natural language textCaesar cipher, Vigenere
4.0 – 6.0Mixed / encoded textBase64, URL encoding
6.0 – 7.5Compressed or encryptedAES-CBC, hashes
7.5 – 8.0Highly random — strong encryptionAES-GCM, true random

Limitations

Cipher identification is probabilistic, not definitive. The tool shows the most likely candidates based on observable properties. Short strings, custom encodings, or non-standard outputs may produce inaccurate results. Always verify against the context in which the cipher text was generated.