AES Decrypt

AES Decrypt

Decrypt compatible AES-GCM JSON payloads locally with the original password and recover plaintext entirely in your browser. Perfect for secret recovery checks, browser-side decryption testing, and payload verification.

aes
decryption
crypto
Share this tool:
Quick Presets
A sample payload you can decrypt locally with the matching password
AES-GCM Input & Settings
Decrypt a compatible AES-GCM payload back into plaintext.
Characters: 0
Lines: 0
Bytes: 0
How it works: This tool derives a 256-bit AES-GCM key from your password using PBKDF2 with SHA-256, a random salt, and 250,000 iterations. Encryption output is stored as JSON containing the algorithm, salt, IV, and ciphertext so you can decrypt it later with the same password.

Complete Guide: AES Decrypt

Everything you need to know about using this tool effectively

What is AES Decrypt?

The AES Decrypt tool reverses AES-GCM encryption to recover the original text. You paste the encrypted string and enter the password that was used to encrypt it. The tool derives the key from the password using PBKDF2 and decrypts the ciphertext. All processing happens in the browser.

This tool uses the browser's SubtleCrypto API to perform AES-GCM decryption. It extracts the salt and IV from the Base64-encoded input, derives the 256-bit key from the password using PBKDF2, and decrypts the ciphertext. If the password is wrong or the ciphertext has been tampered with, the tool reports an error.

Key Features
AES-256-GCM decryption via Web Crypto API
PBKDF2 key verification
Authenticated decryption (tamper detection)
Handles salt and IV from encrypted input
Copy decrypted output to clipboard
Error messages for wrong password or corrupted data
Runs in the browser with no uploads
Compatible with AES Encrypt tool output
Common Use Cases
When and why you might need this tool

Decrypting received messages

Decrypt a message that was encrypted by someone who shared the password with you.

Recovering encrypted API keys

Decrypt API keys or credentials that were encrypted for secure storage.

Reading encrypted personal notes

Decrypt notes or journal entries that were encrypted for privacy.

Verifying encrypted data integrity

Attempt to decrypt and verify that encrypted data has not been tampered with.

How to Use This Tool
Step-by-step guide to get the best results
1

Paste the encrypted text

Enter the Base64-encoded encrypted string.

2

Enter the password

Type the password that was used during encryption.

3

Decrypt

Click Decrypt. If the password is correct, the original text is displayed.

4

Copy the result

Copy the decrypted text.

Pro Tips
1

The password must match exactly what was used during encryption.

2

If decryption fails, double-check the password for typos.

3

The encrypted string includes the salt and IV, so no additional information is needed.

4

AES-GCM will detect if the ciphertext has been tampered with.

Frequently Asked Questions
What if decryption fails?

An error is shown if the password is incorrect or the ciphertext has been corrupted. Check that the encrypted string is complete and the password matches exactly.

Is my text sent to a server?

No. All decryption happens in your browser using the Web Crypto API. The ciphertext and password never leave your device.

Can I decrypt text encrypted by other tools?

The tool expects AES-256-GCM with PBKDF2 key derivation and a specific format (salt + IV + ciphertext in Base64). Other tools using the same scheme will work.

Does it detect tampering?

Yes. AES-GCM is an authenticated encryption mode. If the ciphertext has been modified, decryption will fail with an integrity error.

What is the difference between this and the AES Encrypt tool?

AES Encrypt converts plaintext to ciphertext. AES Decrypt reverses the process, converting ciphertext back to plaintext using the correct password.