home / mcp / crypto_mcp server
A Model Context Protocol (MCP) server for encrypting/decrypting/algorithm/hash
Configuration
View docs{
"mcpServers": {
"1595901624-crypto-mcp": {
"command": "node",
"args": [
"path/to/crypto-mcp/build/index.js"
]
}
}
}Crypto_MCP is a Model Context Protocol server that provides encryption, decryption, and hashing capabilities. It enables you to perform AES and DES encryption/decryption with multiple modes and padding schemes, as well as base64 and hex encoding/decoding, and various digest algorithms from a single MCP endpoint.
You connect to Crypto_MCP with your MCP client and invoke the available tools to encrypt, decrypt, or hash data. Use the AES or DES tools to encrypt or decrypt text with configurable modes, padding, and output formats. Use the Digest tools to generate MD5 or SHA family hashes. Use Base64 and Hex tools to encode or decode data. The server is designed to work with text inputs and return results in your chosen format.
Typical usage patterns include encrypting sensitive data with a chosen algorithm and mode, then sharing the encrypted output in base64 or hex form. You can also hash inputs to verify integrity, or encode/decode between base64 and raw text for transport or storage.
Prerequisites: you need Node.js and a package manager. You may also use the Smithery installer to pull Crypto_MCP directly.
Install via Smithery (automatic):
npx -y @smithery/cli install @1595901624/crypto-mcp --client claudeManual installation steps (clone, install, build):
git clone https://github.com/1595901624/crypto-mcp.git
pnpm install
pnpm run buildAdd the MCP server to your Claude Desktop MCP settings using the following configuration snippet. This starts Crypto_MCP as a local stdio server that runs the built index.js.
{
"mcpServers": {
"crypto-mcp": {
"command": "node",
"args": ["path/to/crypto-mcp/build/index.js"],
"disabled": false,
"autoApprove": []
}
}
}Configuration shown here maps Crypto_MCP to a local stdio server. If you prefer, you can also install and run the server via the Smithery flow described above and point your MCP client to the local binary or a deployed URL if available.
Security considerations: protect your keys and IVs, and use appropriate padding and mode settings for your data. When sharing outputs, ensure that only non-sensitive information is exposed through your MCP client.
Encrypt text with AES using configurable key, padding, mode, IV, and output format (base64 or hex).
Decrypt AES-encrypted text with corresponding key, padding, IV, mode, and input format.
Encrypt text with DES using configurable key, padding, mode, IV, and output format.
Decrypt DES-encrypted text with corresponding key, padding, IV, mode, and input format.
Encode text to base64.
Decode base64 to text.
Encode text to hex.
Decode hex to text.
Calculate MD5 hash of a string.
Calculate SHA-1 hash of a string.
Calculate SHA-256 hash of a string.
Calculate SHA-384 hash of a string.
Calculate SHA-512 hash of a string.
Calculate SHA-224 hash of a string.