AES Decrypt
Decrypt compatible AES-GCM JSON payloads locally with the original password and recover plaintext entirely in your browser. Perfect for secret recovery checks, browser-side decryption testing, and payload verification.
Complete Guide: AES Decrypt
Everything you need to know about using this tool effectively
The AES Decrypt tool reverses AES-GCM encryption to recover the original text. You paste the encrypted string and enter the password that was used to encrypt it. The tool derives the key from the password using PBKDF2 and decrypts the ciphertext. All processing happens in the browser.
This tool uses the browser's SubtleCrypto API to perform AES-GCM decryption. It extracts the salt and IV from the Base64-encoded input, derives the 256-bit key from the password using PBKDF2, and decrypts the ciphertext. If the password is wrong or the ciphertext has been tampered with, the tool reports an error.
Decrypting received messages
Decrypt a message that was encrypted by someone who shared the password with you.
Recovering encrypted API keys
Decrypt API keys or credentials that were encrypted for secure storage.
Reading encrypted personal notes
Decrypt notes or journal entries that were encrypted for privacy.
Verifying encrypted data integrity
Attempt to decrypt and verify that encrypted data has not been tampered with.
Paste the encrypted text
Enter the Base64-encoded encrypted string.
Enter the password
Type the password that was used during encryption.
Decrypt
Click Decrypt. If the password is correct, the original text is displayed.
Copy the result
Copy the decrypted text.
The password must match exactly what was used during encryption.
If decryption fails, double-check the password for typos.
The encrypted string includes the salt and IV, so no additional information is needed.
AES-GCM will detect if the ciphertext has been tampered with.
What if decryption fails?
An error is shown if the password is incorrect or the ciphertext has been corrupted. Check that the encrypted string is complete and the password matches exactly.
Is my text sent to a server?
No. All decryption happens in your browser using the Web Crypto API. The ciphertext and password never leave your device.
Can I decrypt text encrypted by other tools?
The tool expects AES-256-GCM with PBKDF2 key derivation and a specific format (salt + IV + ciphertext in Base64). Other tools using the same scheme will work.
Does it detect tampering?
Yes. AES-GCM is an authenticated encryption mode. If the ciphertext has been modified, decryption will fail with an integrity error.
What is the difference between this and the AES Encrypt tool?
AES Encrypt converts plaintext to ciphertext. AES Decrypt reverses the process, converting ciphertext back to plaintext using the correct password.