Encryption/Decryption Tool

Secure encryption and decryption using industry-standard algorithms. All processing happens in your browser for maximum privacy.

Your message is processed locally and never sent to our servers
Use a strong password with at least 12 characters

How to Use This Tool

Symmetric Encryption
Same key for encryption and decryption
1
Choose Operation: Select "Encrypt" or "Decrypt"
2
Select Algorithm: Choose "AES-256-GCM" (recommended) or "AES-256-CBC"
3
For Encryption:
  • Enter your message in the text area
  • Create a strong password (12+ characters)
  • Click "Encrypt Message"
4
For Decryption:
  • Paste the encrypted data in the text area
  • Enter the same password used for encryption
  • Click "Decrypt Message"
Best for: Personal data, files, or when you can securely share the password with the recipient.
Asymmetric Encryption
Public key for encryption, private key for decryption
1
Generate Keys: Click "Generate New Key Pair" to create your keys, or use existing ones
2
Share Public Key: Give your public key to anyone who wants to send you encrypted messages
3
For Encryption:
  • Enter your message
  • Paste the recipient's public key
  • Click "Encrypt Message"
4
For Decryption:
  • Paste the encrypted data
  • Enter your private key
  • Click "Decrypt Message"
Remember: Never share your private key! Only share your public key.
When to Use Which Method
Use Symmetric When:
  • You can securely share a password
  • Encrypting large amounts of data
  • Personal backups or storage
  • Communication with known parties
Use Asymmetric When:
  • Communicating with strangers
  • Can't securely share passwords
  • One-way secure communication
  • Digital signatures (future feature)

Symmetric Encryption

  • AES-256-GCM: Advanced authenticated encryption with integrity verification
  • AES-256-CBC: Classic block cipher mode with 256-bit security
  • PBKDF2: Password-based key derivation with 100,000 iterations
  • Fast: Ideal for large amounts of data

Asymmetric Encryption

  • RSA-OAEP: Secure public key encryption with optimal padding
  • Key Sizes: 2048, 3072, and 4096-bit options
  • Public/Private: Encrypt with public, decrypt with private
  • Secure Sharing: No need to share secret keys

Privacy & Security

  • Client-Side: All processing happens in your browser
  • No Data Storage: Messages never leave your device
  • Secure Random: Cryptographically secure random number generation
  • Industry Standard: Using proven cryptographic libraries

Frequently Asked Questions

Symmetric encryption uses the same key for both encryption and decryption. It's faster and suitable for encrypting large amounts of data, but you need to securely share the password. Asymmetric encryption uses a public/private key pair - encrypt with the public key, decrypt with the private key. It's more secure for sharing but slower for large data.
For symmetric encryption, AES-256-GCM is recommended as it provides both confidentiality and authenticity. For asymmetric encryption, RSA-OAEP with 2048-bit keys is the current standard. Use 3072 or 4096-bit keys for higher security requirements or longer-term protection.
Yes, this tool is designed with security in mind. All encryption and decryption happens locally in your browser using the industry-standard Web Crypto API. Your data never leaves your device, and we don't store any keys or messages on our servers. However, for extremely sensitive data, consider using dedicated offline tools.
This tool uses standard encryption formats, so data encrypted here can be decrypted with other compatible tools that support the same algorithms. However, the specific format (how we combine salt, IV, and ciphertext) is documented for interoperability. For RSA, we use standard PEM key formats.
Data is unrecoverable without the correct password or private key. This is by design - strong encryption means that even we cannot help you recover encrypted data. Always keep secure backups of your passwords and private keys. Consider using a password manager for symmetric encryption passwords.
For symmetric encryption, share the encrypted data through any channel, but share the password through a separate secure channel (never together). For asymmetric encryption, you can safely share encrypted data publicly - only the holder of the private key can decrypt it. Never share private keys.