Crypto Nodes
Crypto Nodes provide essential cryptographic utilities for workflows that require security, integrity, and randomness.
They are commonly used for data protection, authentication, validation, and secure token generation.
Crypto nodes are especially useful when working with:
- API authentication
- Webhooks
- Passwords and secrets
- Data integrity checks
- Secure identifiers and tokens
puq.ai currently provides three Crypto-related nodes:
- Hash Data
- HMAC Generation
- Generate Random Data
Cryptography Basics (Short Overview)
Before diving into the nodes, it’s important to understand a few key concepts:
What is Hashing?
Hashing is a one-way transformation of data into a fixed-length value (hash).
- The same input always produces the same hash
- Even a tiny change in input creates a completely different hash
- Hashed data cannot be reversed or decoded back to the original value
Hashing is commonly used for:
- Password storage
- Data integrity verification
- Digital signatures
- Identifying content uniquely
Hash Data Node
The Hash Data node generates a cryptographic hash from text or binary data using widely accepted hashing algorithms.
Supported Algorithms
- MD5
- SHA-256
- SHA-384
- SHA-512
- SHA-3 variants
⚠️ Note: MD5 is fast but not recommended for security-sensitive use cases. Prefer SHA-256 or higher for secure workflows.
Configuration Parameters
Hash Algorithm
- Select box
- Choose the hashing algorithm to use
Input Text
- Text area
- The data you want to hash
(Can be plain text or binary data)
Output Encoding
- Select box
- Options:
hexadecimalbase64
Uppercase Output
- On / Off
- Converts hexadecimal output to uppercase
- Applies only when
hexadecimalencoding is selected
Common Use Cases
- Verifying payload integrity
- Creating unique identifiers
- Hashing sensitive fields before storage
- Comparing incoming webhook signatures
HMAC Generation Node
The HMAC Generation node creates a Hash-based Message Authentication Code (HMAC) using a secret key and a hash algorithm.
HMAC adds an extra layer of security by combining:
- The input data
- A secret key
This ensures that the data has not been tampered with and that it came from a trusted source.
Configuration Parameters
Hash Algorithm
- Select box
- Same algorithm options as Hash Data
Input Text
- Text input
- The message to be signed
Secret Key
- Text input
- A private key used to generate the HMAC
- Must be kept secure
Output Encoding
- Select box
hexadecimalorbase64
Uppercase Output
- On / Off
- Converts hexadecimal output to uppercase (hex only)
Common Use Cases
- Webhook signature verification
- Secure API request signing
- Authenticating incoming events
- Ensuring message integrity
Generate Random Data Node
The Generate Random Data node creates random and cryptographically secure values for identifiers, tokens, passwords, and secrets.
This node is designed for both general-purpose randomness and security-critical use cases.
Generation Types
You can choose from multiple generation formats:
- UUID v4
- Random Bytes
- Random String (alphanumeric)
- Random String (alphabetic)
- Random String (numeric)
- Random String (custom characters)
- Cryptographic Token
- Password
Configuration Parameters
Generation Type
- Select box
- Determines the type of random data generated
Length
- Number input
- Defines the size of the output (where applicable)
Output Encoding
- Select box
- Encoding format of the generated output
Include Symbols
- On / Off
Include Numbers
- On / Off
Include Uppercase
- On / Off
Include Lowercase
- On / Off
Uppercase Output
- On / Off
- Forces output to uppercase (useful for tokens or IDs)
Common Use Cases
- Generating API keys
- Creating secure passwords
- Issuing temporary tokens
- Generating unique workflow identifiers
- Creating cryptographic nonces
Best Practices
- Use SHA-256 or higher for security-sensitive hashing
- Never store plain secrets or passwords — always hash them
- Use HMAC when authenticity matters, not just integrity
- Prefer Cryptographic Token for security-critical identifiers
- Keep secret keys out of logs and outputs
Summary
Crypto nodes in puq.ai provide foundational security building blocks for workflows:
- Hash Data ensures integrity and uniqueness
- HMAC Generation guarantees authenticity
- Generate Random Data creates secure and unpredictable values
These nodes are essential for building secure, production-ready automations.