Text Encryption & Decryption

Encrypt and decrypt text using AES-256-GCM (secure), ROT13, or Caesar cipher. Password-based encryption with the Web Crypto API. All processing happens entirely in your browser—your data never leaves your device.

🔒
100% Client-Side Encryption: All encryption and decryption happens in your browser using JavaScript and the Web Crypto API. Your text and password never leave your device. No data is sent to any server.

Encrypted Text

Features

🔒

AES-256-GCM

Industry-standard encryption using AES-256 in Galois/Counter Mode with password-based key derivation (PBKDF2). Provides both confidentiality and authenticity.

🔐

Multiple Ciphers

Choose between AES-256-GCM for security, ROT13 for simple obfuscation, or Caesar cipher with customizable shift for educational purposes.

🛠

Password Strength

Real-time password strength indicator helps you choose strong passwords for AES encryption. Visual feedback shows weak, medium, or strong ratings.

🚪

100% Private

All encryption happens in your browser using the Web Crypto API. Your text and password never leave your device. No server communication.

Understanding Text Encryption

Encryption is the process of converting readable text (plaintext) into an unreadable format (ciphertext) using a mathematical algorithm and a key or password. Only someone with the correct key can decrypt the ciphertext back to plaintext. Encryption is fundamental to modern digital security, protecting everything from passwords and financial data to private messages and sensitive documents. This tool provides three encryption methods, each suited for different purposes.

AES-256-GCM: Modern Secure Encryption

AES (Advanced Encryption Standard) with a 256-bit key in Galois/Counter Mode is the gold standard for encryption. It's used by governments, banks, and security professionals worldwide. AES-256-GCM provides authenticated encryption, meaning it not only encrypts your data but also verifies that it hasn't been tampered with. This tool uses the Web Crypto API to perform AES-256-GCM encryption with PBKDF2 (Password-Based Key Derivation Function 2) to derive a strong encryption key from your password. A random salt and initialization vector (IV) are generated for each encryption, ensuring the same plaintext produces different ciphertext each time. The encrypted output is Base64-encoded for easy copying and sharing.

ROT13 and Caesar Cipher: Simple Substitution

ROT13 and Caesar cipher are simple substitution ciphers from classical cryptography. ROT13 rotates each letter by 13 positions in the alphabet (A becomes N, B becomes O, etc.). Because there are 26 letters, applying ROT13 twice returns the original text, making encryption and decryption the same operation. Caesar cipher is similar but allows you to choose the shift amount (1-25). Julius Caesar famously used a shift of 3 to encode military messages. These ciphers are not secure—they can be broken in seconds—but they're useful for simple obfuscation, educational purposes, or hiding spoilers. Never use ROT13 or Caesar cipher to protect sensitive data.

Choosing Strong Passwords

For AES-256 encryption, your password's strength is critical. A weak password can be cracked through brute-force or dictionary attacks, rendering even the strongest encryption useless. A strong password should be at least 12 characters long, include uppercase and lowercase letters, numbers, and special characters, and avoid common words or patterns. Passphrases—long phrases made of random words—are both strong and memorable. This tool includes a password strength indicator to help you choose an appropriate password. For maximum security, consider using a password manager to generate and store truly random passwords.

Frequently Asked Questions

What is AES-256-GCM encryption?
AES-256-GCM is a modern, secure encryption standard that uses a 256-bit key (one of the strongest available) and Galois/Counter Mode for authenticated encryption. The "256" refers to the key length in bits—longer keys are harder to break. GCM (Galois/Counter Mode) provides both confidentiality (encryption) and authenticity (verification that data hasn't been tampered with). This tool uses the Web Crypto API to perform AES-256-GCM encryption entirely in your browser. Your password is converted to a 256-bit key using PBKDF2 with 100,000 iterations, making brute-force attacks computationally expensive.
Is my data private when using this tool?
Yes, absolutely. All encryption and decryption happens entirely in your browser using JavaScript and the Web Crypto API. Your text and password never leave your device. Nothing is sent to any server. No data is collected, stored, or transmitted. The tool works completely offline once the page is loaded. You can verify this by checking your browser's network activity—no requests are made when you encrypt or decrypt text. Your privacy is guaranteed because all processing is local to your device.
Can I decrypt text encrypted with this tool later?
Yes, as long as you remember your password. For AES-256-GCM, the encrypted output includes the salt and IV (initialization vector) needed for decryption, encoded in the Base64 string. Simply paste the encrypted text, enter the same password you used to encrypt it, and click "Decrypt". If you forget your password, the data is unrecoverable—this is a feature, not a bug. It means no one (including us) can decrypt your data without the password. For ROT13 and Caesar cipher, you can decrypt by using the same method and shift (for Caesar).
What's the difference between ROT13 and Caesar cipher?
ROT13 is a specific Caesar cipher with a fixed shift of 13. Because the English alphabet has 26 letters, shifting by 13 means applying ROT13 twice returns the original text (encryption and decryption are the same operation). Caesar cipher is more general—you choose the shift amount (1-25). A shift of 3 was famously used by Julius Caesar. Both are simple substitution ciphers that replace each letter with another letter a fixed number of positions away in the alphabet. Neither is secure for protecting sensitive data—they're easily broken. Use them for simple obfuscation, educational purposes, or hiding spoilers, not for security.
How do I choose a strong password?
A strong password should be: (1) At least 12 characters long (longer is better). (2) Include a mix of uppercase and lowercase letters, numbers, and special characters. (3) Avoid common words, names, or patterns that appear in dictionaries. (4) Avoid personal information like birthdays or names. Consider using a passphrase—a long phrase made of random words (e.g., "correct horse battery staple"). Passphrases are both strong and memorable. This tool includes a password strength indicator that evaluates your password in real-time. For maximum security, use a password manager to generate and store truly random passwords. Remember: even the strongest encryption is useless with a weak password.
What is PBKDF2?
PBKDF2 (Password-Based Key Derivation Function 2) is a standard method for converting a password into a cryptographic key. Since user passwords are often weak or variable-length, they can't be used directly as encryption keys. PBKDF2 takes your password, adds a random salt (to prevent rainbow table attacks), and runs it through a hash function many times (100,000 iterations in this tool). This process is computationally expensive, making brute-force attacks much slower. The output is a 256-bit key suitable for AES encryption. The salt is unique for each encryption and stored with the encrypted data, so you can decrypt later with just your password.
Can I use this for encrypting files?
This tool is designed for encrypting text only. For encrypting files, you would need to convert the file to Base64 text first, encrypt it, then decode it after decryption. However, this is impractical for large files due to browser memory limitations and the size increase from Base64 encoding. For file encryption, consider using dedicated tools like GPG, VeraCrypt, or 7-Zip with AES encryption. These tools are optimized for file handling and can encrypt large files efficiently. Use this tool for passwords, notes, messages, configuration snippets, API keys, and other text data.
Is AES-256 encryption unbreakable?
AES-256 is considered computationally secure against brute-force attacks with current technology. A brute-force attack would need to try 2^256 possible keys, which is astronomically large (more atoms than exist in the observable universe). Even with all the computing power on Earth working together, it would take trillions of years to break AES-256 by brute force. However, encryption is only as strong as its implementation and key management. Weak passwords, implementation bugs, or side-channel attacks can compromise security. This tool uses the browser's Web Crypto API, which is implemented by security experts and regularly audited. As long as you use a strong password and keep it secret, your encrypted data is secure.

Explore More Developer Tools

Check out our other free security and encoding tools. Generate passwords, encode Base64, hash text, and more.

Password Generator →