| Field | Value | Copy |
|---|---|---|
| {{ row.k }} | {{ row.v }} | |
| No details available. | ||
Encrypted text is readable writing turned into coded characters with a secret that the reader knows, so only the right person can bring it back to plain words. Password based text encryption and decryption helps protect notes, drafts, and snippets you want to keep private or share safely.
Enter your text and a memorable passphrase, then choose whether to protect it or to recover something you received. The result can be a compact self describing envelope for easy sharing, a raw string for pipelines, or a legacy style output for tools that expect a traditional format.
A quick example is saving a meeting summary before sending it to a teammate. Protect it with a strong passphrase, share the encoded output, and they can paste it back with the same passphrase to read it clearly.
Stronger passphrases lead to better protection, and keeping the salt and the initial value when you choose raw output avoids surprises later. If an integrity check reports a mismatch, treat the content as untrusted.
The object is password protected text, transformed using symmetric ciphers so that one secret unlocks what the same secret created. The observable quantities are ciphertext length, authentication tag length, optional associated data length, and the presence of a message authentication code.
Keys are derived from a passphrase and a per message salt using a key derivation function (KDF). Two KDFs are available: Argon2id and PBKDF2 using Secure Hash Algorithm 256. The transformation encrypts UTF‑8 bytes of the text; authenticated modes attach a verification tag, and envelope packaging can carry a separate Hash‑based Message Authentication Code (HMAC) for integrity.
Results indicate confidentiality and, when present, integrity. Authenticated encryption with associated data (AEAD) uses an authentication tag to detect changes. Envelopes may also include an HMAC; a negative check means the inputs or content do not match and should not be trusted.
Comparability depends on keeping the algorithm, KDF parameters, salt, and initialization vector constant. An envelope records these so another reader can decrypt without guessing. Raw outputs omit those labels and require you to manage the salt and initial value yourself.
| Symbol | Meaning | Unit/Datatype | Source |
|---|---|---|---|
| P | Plaintext length | bytes | Input |
| K | Derived key length | bytes | Derived |
| IV | Initialization vector or nonce | bytes (hex) | Input or generated |
| S | Salt for the KDF | bytes (hex) | Input or generated |
| CT | Ciphertext length | bytes | Derived |
| TAG | Authentication tag length (AEAD) | bytes | Derived |
| H | HMAC‑SHA256 digest | 32 bytes (64‑hex) | Derived |
All byte counts are integers. Hex fields use two hex characters per byte. Base 64 uses standard alphabet with optional padding.
| Field | Type | Min | Max | Step/Pattern | Error Text | Placeholder |
|---|---|---|---|---|---|---|
| Text | string | 1 char | — | — | Enter text and password. | Paste or type text… |
| Password | string | 1 char | — | — | Enter text and password. | Enter password |
| Algorithm | enum | — | — | AES‑GCM 128/256; AES‑CBC/CTR/CFB/OFB 128/192/256; DES‑CBC; 3DES‑CBC; RC4; Rabbit | OpenSSL format requires AES‑CBC. | — |
| KDF | enum | — | — | Argon2id; PBKDF2‑SHA256 | — | — |
| Argon2 passes | number | 1 | — | step 1 | — | — |
| Argon2 memory | number | 16 MB | — | step 1 | — | — |
| PBKDF2 iterations | number | 10 000 | — | step 1 000 | — | — |
| IV / Nonce (hex) | hex string | 0 or exact | — | Exact length per algorithm | invalid_iv | — |
| Salt (hex) | hex string | typ. 16 bytes | — | 2 hex per byte | Raw mode requires the correct Salt (hex). | — |
| Output format | enum | — | — | Envelope; Raw; Raw Binary; OpenSSL b64/bin | OpenSSL format requires AES‑CBC. | — |
| Output encoding | enum | — | — | Base 64; Hex (Binary for Raw Binary) | — | — |
| Padding | enum | — | — | PKCS#7; ZeroPadding; NoPadding | — | — |
| HMAC‑SHA256 | boolean | — | — | Envelope integrity | Bad HMAC | — |
| AAD (GCM) | string | 0 bytes | — | UTF‑8 | — | Optional associated data |
| Input | Accepted Families | Output | Encoding/Precision | Rounding |
|---|---|---|---|---|
| Plain text | Textarea or .txt file | Envelope JSON, Raw, Raw binary, OpenSSL | Hex or Base 64; Binary for file outputs | Not applicable |
| Decryption inputs | Envelope JSON; Raw hex; Raw Base 64; OpenSSL Base 64 | Plain text | UTF‑8 | Not applicable |
Processing is browser‑based. Content is transformed locally, and downloads are created as temporary object URLs. No data is transmitted or stored server‑side.
Given the same algorithm, KDF settings, salt, IV, and text, outputs are deterministic. When salt or IV are created for you, results will differ across runs by design.
AES and Galois/Counter Mode, PBKDF2 with SHA‑256, Argon2id, and HMAC‑SHA256 are established methods in cryptography standards and academic specifications.
No data is transmitted or stored server‑side. Handle secrets responsibly and follow applicable privacy regulations for sensitive content.
Password protected text lets you turn readable content into ciphertext and recover it later with the same passphrase.
Example: Encrypt a note with AES‑GCM and Argon2id. Share the envelope JSON. The recipient pastes the envelope and enters the same password to read it.
Keep the salt and IV with raw outputs to ensure future decryption.
Processing happens locally. Nothing is uploaded, and downloads are created on your device as temporary object URLs.
Keep passphrases private.Self describing envelopes, raw strings that join IV and ciphertext, raw binary files, and OpenSSL Salted outputs are supported for compatibility.
Pick envelope for portability.AES‑GCM, AES‑CBC/CTR/CFB/OFB, DES‑CBC, TripleDES‑CBC, RC4, and Rabbit are available to fit modern and legacy needs.
Authenticated modes detect tampering.The integrity check failed. Either the password, salt, IV, or content is wrong, or the data was altered. Do not trust the decrypted text.
Check inputs and try again.Select an AES‑CBC variant and enter the password used to create it. The tool detects the Salted header and derives the key and IV from the salt.
Iterations are configurable.Once loaded, encryption and decryption work without a network connection because computation runs in the browser.
Reloading later may require connectivity.No pricing or licensing terms are stated here. Use according to the site’s terms and applicable law.
Check your organization’s policy.