SnappTools logoSnappTools

AES Encrypt/Decrypt

Encrypt or decrypt text using AES-256-GCM with PBKDF2 key derivation. Everything runs in your browser.

How it works: Uses AES-256-GCM encryption with PBKDF2 key derivation (100,000 iterations, SHA-256). A random salt and IV are generated for each encryption and stored with the ciphertext. Everything runs in your browser using the Web Crypto API.

About AES Encrypt/Decrypt

AES Encrypt/Decrypt uses AES-256-GCM — one of the strongest symmetric encryption algorithms available — to encrypt and decrypt text directly in your browser. Enter a passphrase, and the text is encrypted using PBKDF2 key derivation with a random salt and initialization vector. Decrypt requires the same passphrase.

AES-256-GCM provides both confidentiality and authenticated integrity — it detects if the encrypted data has been tampered with. PBKDF2 key derivation prevents brute-force attacks against weak passphrases.

All cryptography uses the browser's Web Crypto API. Nothing leaves your device.

Features

  • AES-256-GCM encryption and decryption
  • PBKDF2 key derivation from passphrase
  • Random salt and IV per encryption
  • Authenticated encryption (tamper detection)
  • Web Crypto API — no server, no third-party libraries

Common Use Cases

  • Encrypting sensitive notes before storing or sharing
  • Learning how AES-GCM encryption works
  • Securely sharing a secret message that requires a password to read
  • Protecting sensitive text data in transit

Frequently Asked Questions

Is AES-256-GCM safe to use?

Yes. AES-256-GCM is the gold standard for symmetric encryption, used in TLS, Signal, and most secure systems. The security depends on your passphrase strength.

What happens if I lose the passphrase?

The encrypted data cannot be decrypted without the passphrase. There is no recovery mechanism — this is a fundamental property of good encryption.