Sign In

Crypto

Perform cryptographic operations including hashing, HMAC signing, UUID generation, random bytes, and Base64 encoding.

The Crypto node performs common cryptographic and encoding operations within a workflow. Use it to hash data, sign payloads with HMAC, generate UUIDs, create random bytes, or encode and decode Base64 strings.

Configuration

FieldTypeRequiredDescription
OperationSelectYesThe cryptographic operation to perform.

Operations and Their Fields

Hash -- Compute a cryptographic hash of the input data.

FieldTypeRequiredDescription
AlgorithmSelectNoHash algorithm: SHA-256, SHA-512, SHA-1, or MD5. Defaults to SHA-256.
InputText (variable)YesThe data to hash.
Output EncodingSelectNoEncoding for the result: Hex or Base64. Defaults to Hex.

HMAC -- Compute a keyed-hash message authentication code.

FieldTypeRequiredDescription
AlgorithmSelectNoHash algorithm: SHA-256, SHA-512, SHA-1, or MD5. Defaults to SHA-256.
InputText (variable)YesThe data to sign.
Secret KeyText (variable)YesThe HMAC secret key.
Output EncodingSelectNoEncoding for the result: Hex or Base64. Defaults to Hex.

Generate UUID -- Generates a cryptographically random UUID v4. No additional fields.

Random Bytes -- Generates cryptographically secure random bytes.

FieldTypeRequiredDescription
Byte LengthNumberNoNumber of random bytes to generate (1-1024). Defaults to 32.
Output EncodingSelectNoEncoding for the result: Hex or Base64. Defaults to Hex.

Base64 Encode -- Encodes input text to Base64.

FieldTypeRequiredDescription
InputText (variable)YesThe text to encode.

Base64 Decode -- Decodes a Base64 string back to UTF-8 text.

FieldTypeRequiredDescription
InputText (variable)YesThe Base64 string to decode.

Output

FieldTypeDescription
resultstringThe operation result: hash digest, HMAC signature, UUID string, random bytes, or encoded/decoded text.
algorithmstringThe hash algorithm used (Hash and HMAC operations only).
encodingstringThe output encoding used (Hash, HMAC, and Random Bytes operations only).
byteLengthnumberThe number of random bytes generated (Random Bytes operation only).

Example

A workflow that verifies an incoming webhook signature using HMAC:

  1. Webhook Listener -- Receives a POST request with a payload and an X-Signature header.
  2. Crypto -- Operation: HMAC, Algorithm: SHA-256, Input: webhookTrigger_1.body, Key: stored secret, Encoding: Hex.
  3. If/Else -- Check crypto_1.result equals webhookTrigger_1.headers.x-signature.
  4. HTTP Request (true branch) -- Process the verified payload.
  5. Stop and Error (false branch) -- Reject the request with "Invalid signature."

On this page

Crypto | Buildorado