AES Decrypt
Decrypt AES ciphertext in your browser. Supports GCM, CBC, CTR, and ECB modes with 128/192/256-bit keys. Password never transmitted.
Save the encrypted output and your password — without both, data cannot be recovered.
How to use AES Decrypt
-
Switch to Decrypt mode
The AES tool opens in Encrypt mode by default. Click the 'Decrypt' tab to switch.
-
Select the matching algorithm
Choose the same AES algorithm used during encryption (e.g. AES-256-GCM). Using the wrong mode or key size will cause decryption to fail.
-
Enter your password
Type the same passphrase used during encryption. The key is re-derived using PBKDF2 with the salt stored inside the ciphertext.
-
Paste the Base64 ciphertext
Paste the full Base64-encoded ciphertext into the input panel.
-
Copy the plaintext
The decrypted plaintext appears in the output panel. Click Copy to copy it.
AES Decrypt FAQ
What do I need to decrypt AES ciphertext?
Is this tool safe? Is my password sent to a server?
Are inputs sent to a server?
Why does decryption fail with the correct password?
Can I decrypt OpenSSL AES output here?
What is AES-GCM authentication?
What is the difference between AES-GCM and AES-CBC?
Does this tool support file decryption?
How is the key derived from my password?
Background
Decrypt AES-encrypted ciphertext directly in your browser using the WebCrypto API. All cryptographic operations run on your device — no data is transmitted.
This tool reverses AES encryption produced by the AES Encrypt tool on this site. Paste the Base64 ciphertext, select the same algorithm used during encryption, enter the passphrase, and your plaintext is recovered.
Supported modes:
- AES-256-GCM / AES-192-GCM / AES-128-GCM — authenticated encryption. GCM decryption verifies integrity automatically; if the ciphertext was tampered with, decryption fails with an authentication error.
- AES-256-CBC / AES-128-CBC — classic block cipher mode with PKCS7 padding.
- AES-256-CTR / AES-128-CTR — stream cipher mode, no padding required.
- AES-128-ECB / AES-256-ECB — no IV; not recommended but supported for compatibility.
Key derivation: The passphrase is derived using PBKDF2 (SHA-256, 100,000 iterations) with the random salt embedded in the ciphertext. You only need the ciphertext and your original password.
Privacy: Your key never leaves your browser. Nothing is transmitted.
Related tools
AES Encrypt
Encrypt text with AES-256-GCM, AES-CBC, AES-CTR, or AES-ECB in your browser. PBKDF2 key derivation, random IV, zero uploads.
RSA Decrypt
Decrypt RSA-OAEP ciphertext with your PEM private key in the browser. Supports RSA-2048 and RSA-4096. Private key never transmitted.
Base64 Decoder
Decode Base64 or Base64URL strings to plain text or download as a binary file. Handles MIME line-wrapping and PEM certificates automatically.
SHA-256 Hash Generator
Generate SHA-256 hashes from text instantly. WebCrypto hardware-accelerated, real-time output. Used in Bitcoin, TLS, and digital signatures. Zero uploads.
Bcrypt Hash Generator
Generate bcrypt hashes with configurable cost factor (4–31). Auto-salted, rainbow-table resistant, fully browser-based. Recommended for secure password storage.