100% Browser-Side
All cryptographic operations run in the Web Crypto API inside your browser. The passphrase, key material, plaintext, and ciphertext never reach any server.
500+ fast, free tools. Most run in your browser only; Image & PDF tools upload files to the backend when you run them.
PBKDF2-hardened AES-GCM encrypt and decrypt.
AES Text Encryptor on UtilityKit lets you encrypt and decrypt plain text using AES-256-GCM entirely inside your browser via the Web Crypto API. Enter your message, type a passphrase, and the tool derives a 256-bit key with PBKDF2 (600,000 iterations, SHA-256) before encrypting the text and outputting a Base64-encoded ciphertext you can share over email or Slack. Decryption is the reverse: paste the ciphertext, enter the passphrase, and the plaintext is restored — no server round-trip ever. This tool is designed for learning cryptography concepts, testing encryption flows in development, and low-stakes text protection. For production secrets, use dedicated tools like AWS Secrets Manager, HashiCorp Vault, or GPG. The passphrase, key, and plaintext never leave your device.
All cryptographic operations run in the Web Crypto API inside your browser. The passphrase, key material, plaintext, and ciphertext never reach any server.
Uses the authenticated encryption mode of AES with 256-bit keys — the same standard used by TLS 1.3, Signal, and most modern encryption libraries.
Your passphrase is never used as a key directly. PBKDF2 with 600,000 iterations and SHA-256 derives a strong key, making brute-force attacks significantly slower.
See exactly how IV, salt, key derivation, and authenticated tags work in a real AES-GCM implementation — an interactive reference for developers studying cryptography.
Output is a self-contained Base64 string encoding the IV, salt, and ciphertext — share it anywhere text is accepted and decrypt it later from any device.
Open the tool in any modern browser and start encrypting immediately. No extension, no download, no account, and no dependency on an external encryption service.
Input: Plaintext: "Meet at 5pm — location shared separately", Passphrase: "correct-horse-battery"
Output: Base64 ciphertext: "U2FsdGVkX1..." (self-contained blob with salt + IV + ciphertext + auth tag, ~120 chars for this message length)
Input: Ciphertext: "U2FsdGVkX1...", Passphrase: "correct-horse-battery"
Output: Decrypted: "Meet at 5pm — location shared separately"
Input: Ciphertext: "U2FsdGVkX1...", Passphrase: "wrong-passphrase"
Output: Error: Decryption failed — incorrect passphrase or corrupted ciphertext