Loading tool…
Loading tool…
AES-256-GCM secure text encryption and decryption with password-based key derivation.
Was this tool useful?
Does this AES encryption tool upload my text or password to any server?
No. All encryption and decryption happens entirely in your browser using the Web Crypto API (SubtleCrypto). Your text, password, salt, IV, and encrypted payload never leave your device, giving you complete privacy with zero server interaction.
What encryption algorithm does this tool use?
This tool uses AES-256-GCM, one of the strongest modern encryption modes, combined with PBKDF2-SHA256 for password-based key derivation. A fresh 16-byte salt and 12-byte IV are generated for every encryption, ensuring high security and preventing key reuse vulnerabilities.
What are PBKDF2 iterations and how many should I use?
Iterations determine how many times your password is hashed during key derivation. Higher values dramatically increase security by slowing down brute-force attacks. The recommended range is 100,000 to 300,000 iterations depending on your device speed. The tool enforces a minimum of 10,000 iterations for safety.
Why does the encrypted output contain BEGIN/END markers and JSON?
The encrypted result is wrapped in a structured format that includes the salt, IV, ciphertext, and iteration count encoded in Base64. These BEGIN/END markers make the payload easy to copy, paste, store, or transport, and ensure the tool has all parameters needed for successful decryption.
What should I do if decryption fails or shows an error?
Decryption failures typically occur if the password is incorrect, the encrypted payload was modified, or the JSON fields are incomplete. Ensure you pasted the entire block including all JSON fields, used the correct password, and kept the original iteration count. The tool strictly validates structure before decrypting.
Does this tool work on all browsers and devices?
This tool requires the Web Crypto API (SubtleCrypto), which is supported in modern browsers like Chrome, Edge, Firefox, and Safari. Older browsers or embedded in-app browsers may not support AES-GCM or PBKDF2. If unsupported, the tool shows a clear warning.