AES Encrypt/Decrypt
Encrypt or decrypt text using AES-256-GCM with PBKDF2 key derivation. Everything runs in your browser.
How it works: Uses AES-256-GCM encryption with PBKDF2 key derivation (100,000 iterations, SHA-256). A random salt and IV are generated for each encryption and stored with the ciphertext. Everything runs in your browser using the Web Crypto API.
About AES Encrypt/Decrypt
AES Encrypt/Decrypt uses AES-256-GCM — one of the strongest symmetric encryption algorithms available — to encrypt and decrypt text directly in your browser. Enter a passphrase, and the text is encrypted using PBKDF2 key derivation with a random salt and initialization vector. Decrypt requires the same passphrase.
AES-256-GCM provides both confidentiality and authenticated integrity — it detects if the encrypted data has been tampered with. PBKDF2 key derivation prevents brute-force attacks against weak passphrases.
All cryptography uses the browser's Web Crypto API. Nothing leaves your device.
Features
- ✓AES-256-GCM encryption and decryption
- ✓PBKDF2 key derivation from passphrase
- ✓Random salt and IV per encryption
- ✓Authenticated encryption (tamper detection)
- ✓Web Crypto API — no server, no third-party libraries
Common Use Cases
- →Encrypting sensitive notes before storing or sharing
- →Learning how AES-GCM encryption works
- →Securely sharing a secret message that requires a password to read
- →Protecting sensitive text data in transit
Frequently Asked Questions
Is AES-256-GCM safe to use?
Yes. AES-256-GCM is the gold standard for symmetric encryption, used in TLS, Signal, and most secure systems. The security depends on your passphrase strength.
What happens if I lose the passphrase?
The encrypted data cannot be decrypted without the passphrase. There is no recovery mechanism — this is a fundamental property of good encryption.