AES Encrypt
Encrypt text locally with AES-GCM using a password-derived key, random salt, and self-contained JSON payload output. Perfect for private notes, shared secrets, and browser-side encryption workflows without server uploads.
Complete Guide: AES Encrypt
Everything you need to know about using this tool effectively
The AES Encrypt tool protects text by encrypting it with a password using the AES-GCM algorithm through the Web Crypto API. You enter text and a password, and the tool produces an encrypted string that can only be decrypted with the same password. The encryption happens entirely in the browser, so the plaintext never leaves your device.
This tool uses the browser's SubtleCrypto API to perform AES-GCM encryption. It derives a 256-bit key from your password using PBKDF2 with a random salt, generates a random initialization vector (IV), and encrypts the text. The output includes the salt, IV, and ciphertext in a single Base64-encoded string.
Encrypting sensitive messages
Encrypt a message before sending it through an untrusted channel like email or chat.
Protecting API keys and credentials
Encrypt API keys or passwords for secure storage in configuration files.
Securing personal notes
Encrypt personal notes or journal entries that you want to keep private.
Sharing secrets securely
Encrypt a secret with a shared password and send the ciphertext separately from the password.
Enter your text
Type or paste the text you want to encrypt.
Enter a password
Type a strong password that will be used to derive the encryption key.
Encrypt
Click Encrypt. The tool produces an encrypted Base64 string.
Copy the output
Copy the encrypted string for storage or transmission.
Use a strong password with at least 12 characters including letters, numbers, and symbols.
The encrypted output includes the salt and IV, so you only need the password to decrypt.
Share the password through a different channel than the encrypted text.
AES-GCM provides both confidentiality and integrity verification.
What encryption algorithm is used?
AES-256-GCM through the browser's Web Crypto API. AES-GCM provides authenticated encryption, meaning it verifies that the ciphertext has not been tampered with.
Is my text sent to a server?
No. All encryption happens in your browser using the Web Crypto API. The plaintext and password never leave your device.
How is the key derived from the password?
The tool uses PBKDF2 with 100,000 iterations and a random 16-byte salt to derive a 256-bit AES key from your password. The salt is included in the output.
Can the encrypted output be decrypted elsewhere?
Yes. Any tool that supports AES-256-GCM decryption with PBKDF2 key derivation can decrypt the output. The companion AES Decrypt tool on this site handles it directly.
What happens if I forget the password?
There is no way to recover the encrypted text without the correct password. Keep your password in a secure password manager.