AES Encrypt
Runs in browserEncrypt text with AES-256-GCM, AES-CBC, AES-CTR, or AES-ECB in your browser. PBKDF2 key derivation, random IV, zero uploads.
Last updated 02 Apr 2026
Paste your text, enter a password, and click Encrypt. Supports AES-256-GCM (recommended), AES-CBC, AES-CTR, and AES-ECB. Key derived via PBKDF2 with a random salt. All processing is client-side via WebCrypto — nothing leaves your browser.
Save the encrypted output and your password — without both, data cannot be recovered.
How to use
- 1
Choose your AES algorithm
Select from the algorithm dropdown. AES-256-GCM is recommended — it provides authenticated encryption that detects tampered ciphertext during decryption.
- 2
Enter your password
Type a passphrase in the Password field. This is used with PBKDF2 to derive a strong AES key. Use a long, unique password for best security.
- 3
Paste your plaintext
Enter the text you want to encrypt in the input panel.
- 4
Click Encrypt
Click the Encrypt button. The Base64-encoded ciphertext appears in the output panel — it includes the salt, IV, and encrypted data in one self-contained string.
- 5
Save the ciphertext and password
Copy the ciphertext and store it with your password. Use the AES Decrypt tool with the same algorithm and password to recover the plaintext later.
Frequently asked questions
What is AES encryption?
Which AES mode should I use?
Is this tool safe to use for sensitive data?
Are inputs sent to a server?
How is the key derived from my password?
What happens if I lose my password?
What does the Base64 output contain?
What is the difference between AES-256-GCM and AES-256-CBC?
Can I decrypt the output with OpenSSL?
Encrypt any text with AES (Advanced Encryption Standard) directly in your
browser using the WebCrypto API. No data is uploaded or transmitted.
**Supported modes:**
- **AES-256-GCM** (recommended) — authenticated encryption that detects
tampering automatically during decryption
- **AES-192-GCM / AES-128-GCM** — GCM with smaller key sizes
- **AES-256-CBC / AES-128-CBC** — widely compatible block cipher mode
- **AES-256-CTR / AES-128-CTR** — stream cipher mode, no padding required
- **AES-128-ECB / AES-256-ECB** — no IV; avoid in production (identical
plaintext blocks produce identical ciphertext)
**How it works:** Your passphrase is stretched into a strong AES key using
PBKDF2 (SHA-256, 100,000 iterations) with a random 16-byte salt. A random
IV/nonce is generated for every encryption. The salt and IV are prepended
to the ciphertext before Base64 encoding — the output is completely
self-contained; only the ciphertext and your password are needed to decrypt.
**Privacy:** All cryptographic operations use the browser's WebCrypto API.
Your key and plaintext never leave your device.
Related tools
AES Decrypt
Decrypt AES ciphertext in your browser. Supports GCM, CBC, CTR, and ECB modes with 128/192/256-bit keys. Password never transmitted.
RSA Encrypt
Encrypt text with RSA-OAEP using a public key in your browser. Generate RSA-2048 or RSA-4096 key pairs. Max ~190 bytes plaintext. Nothing uploaded.
SHA-256 Hash Generator
Generate SHA-256 hashes from text instantly. WebCrypto hardware-accelerated, real-time output. Used in Bitcoin, TLS, and digital signatures. Zero uploads.
Base64 Encoder
Encode text or binary files to Base64 or Base64URL. Supports MIME line wrapping, data URIs, and files up to 50 MB. Fully browser-based.
Password Generator
Generate cryptographically secure passwords with custom length (8–128), character sets, entropy display, and exclude-ambiguous option. Runs in your browser.