Skip to content

Text Encryptor

Encrypt and decrypt text with AES-256-GCM. Password-based encryption using PBKDF2 key derivation, entirely in your browser.

Encryption happens entirely in your browser. No data is sent to any server.

AES-256-GCM with PBKDF2 key derivation

Free Text Encryptor — Encrypt & Decrypt Text Online with AES-256

Text encryption is one of the most important tools in modern digital privacy. Whether you need to protect sensitive messages, store confidential notes, or share private information securely, encryption transforms readable text (plaintext) into an unreadable format (ciphertext) that can only be decoded with the correct password. Our free text encryptor uses military-grade AES-256-GCM encryption, the same standard trusted by governments and financial institutions worldwide.

AES (Advanced Encryption Standard) is a symmetric block cipher adopted by the U.S. government in 2001 after an extensive five-year evaluation process. The "256" refers to the key length in bits, providing 2^256 possible key combinations — a number so astronomically large that brute-force attacks are computationally infeasible even with the most powerful supercomputers. GCM (Galois/Counter Mode) adds authenticated encryption, meaning it not only encrypts your data but also verifies its integrity, detecting any tampering or corruption during transmission.

Key derivation is a critical component of password-based encryption. Our tool uses PBKDF2 (Password-Based Key Derivation Function 2) with 100,000 iterations and SHA-256 hashing to transform your password into a cryptographic key. This process, known as key stretching, deliberately slows down key generation to make dictionary attacks and brute-force attempts against weak passwords much more expensive. A random 16-byte salt is generated for each encryption operation, ensuring that identical passwords produce different encryption keys.

The encryption output consists of a random salt (16 bytes), a random initialization vector (12 bytes), and the AES-GCM ciphertext with authentication tag, all concatenated and encoded in Base64 for easy copying and sharing. The IV ensures that encrypting the same plaintext with the same password produces different ciphertext each time, preventing pattern analysis attacks. All cryptographic operations are performed entirely in your browser using the Web Crypto API (SubtleCrypto), meaning your text and password never leave your device.

FAQ

Share

FAQ

How secure is AES-256-GCM encryption?+
AES-256-GCM is considered one of the strongest encryption standards available. It is approved by the U.S. National Security Agency (NSA) for protecting top-secret information. With a 256-bit key, there are 2^256 possible combinations, making brute-force attacks practically impossible. The GCM mode also provides authentication, ensuring encrypted data has not been tampered with.
Can someone decrypt my text without the password?+
No, without the correct password, it is computationally infeasible to decrypt AES-256-GCM encrypted text. However, the security of your encrypted data depends entirely on the strength of your password. Use a long, unique password with a mix of letters, numbers, and symbols for maximum protection.
Is my data sent to any server?+
No, all encryption and decryption operations happen entirely in your browser using the Web Crypto API (SubtleCrypto). Your text and password never leave your device. You can verify this by disconnecting from the internet and using the tool offline, or by checking the network tab in your browser developer tools.
What is PBKDF2 and why is it used?+
PBKDF2 (Password-Based Key Derivation Function 2) is an algorithm that converts a human-readable password into a cryptographic key. It applies SHA-256 hashing 100,000 times with a random salt, making it extremely slow for attackers to try many password guesses. This protects even relatively short passwords against dictionary and brute-force attacks.
Can I decrypt on a different device?+
Yes, as long as you have the encrypted Base64 string and the same password used for encryption, you can decrypt on any device using this tool. The salt and IV are included in the encrypted output, so no additional information is needed beyond the password.

Most Popular Tools