Text Encryption & Decryption
Encrypt and decrypt text online for free with 12 algorithms. AES-256-GCM, MD5, SHA-256, Base64, Hex, URL Encoding, ROT13, Caesar, Vigenère, Atbash, Reverse & Morse. Real-time processing, 100% browser-based.
Plain Text
0 chars
Encrypted Text
0 chars
Secure Text Encryption in Your Browser
Protect sensitive text with military-grade AES-256-GCM encryption, generate cryptographic hashes with MD5 and SHA-256, encode data with Base64/Hex/URL encoding, or explore classical ciphers like Caesar, Vigenère, and Atbash. All 12 algorithms run entirely in your browser — no data is ever sent to a server.
Understanding AES-256-GCM & the Password: When you select AES-256-GCM, your password is the single most important element. The tool uses PBKDF2 to derive a 256-bit encryption key from your password through 100,000 iterations of hashing with a random salt. A random IV (Initialization Vector) ensures that encrypting the same text with the same password produces different output every time. The "GCM" (Galois/Counter Mode) provides authenticated encryption — it not only keeps your data confidential but also detects any tampering. Without the exact password, the encrypted data is completely unrecoverable. There is no master key, no backdoor, and no reset mechanism.
Hashing vs. Encryption: MD5 and SHA-256 are hashing algorithms — they produce a fixed-size fingerprint (digest) of your text that cannot be reversed. This is fundamentally different from encryption (like AES), which can be reversed with the correct key. Hashes are used for file integrity checks, digital signatures, password storage, and blockchain. Use SHA-256 for security-sensitive hashing; MD5 is faster but has known vulnerabilities.
How to Encrypt or Decrypt Text
Choose Algorithm & Mode
Select your encryption algorithm from the dropdown. Choose Encrypt or Decrypt mode. For AES-256-GCM, enter a strong password.
Enter Your Text
Type or paste your text in the input area. The output updates in real-time as you type for most algorithms.
Copy the Result
Click Copy to copy the encrypted or decrypted text. Use the swap button to quickly reverse the operation.
All 12 Algorithms Explained
AES-256-GCM
Military-grade authenticated encryption. Your password derives a 256-bit key via PBKDF2 (100k iterations). Random salt + IV per encryption. GCM verifies data integrity. The only true encryption in this tool.
MD5 Hash
One-way 128-bit hash (32 hex chars). Cannot be decrypted. Created by Ronald Rivest in 1991. Used for checksums, file integrity, and fingerprinting. Not recommended for security due to collision vulnerabilities.
SHA-256 Hash
One-way 256-bit hash (64 hex chars). Cannot be decrypted. Part of the SHA-2 family. Used in Bitcoin mining, TLS certificates, and digital signatures. Much stronger than MD5.
Base64 Encoding
Encodes text as ASCII-safe characters (A-Z, a-z, 0-9, +, /). Not encryption — fully reversible without a key. Used in email (MIME), data URIs, JWT tokens, and API payloads.
Hex Encoding
Converts each character to its hexadecimal (base-16) value. Each char becomes 2 hex digits. Used in programming for color codes (#FF8C00), memory addresses, and binary data inspection.
URL Encoding
Percent-encodes special characters for safe use in URLs. Spaces become %20, & becomes %26. Required for query strings and form data. Follows RFC 3986 standard.
ROT13
Shifts each letter 13 positions in the alphabet. Self-reversible — applying twice returns original text. No security, just obfuscation. Popular online for hiding spoilers.
Caesar Cipher
One of the oldest ciphers (100 BC). Shifts each letter by a fixed amount (1-25). Named after Julius Caesar. Only 25 possible keys makes it trivially easy to brute-force crack.
Vigenère Cipher
Polyalphabetic substitution using a keyword. Each letter shifts by a different amount based on the keyword. Called "the unbreakable cipher" for 300 years until broken in the 1860s.
Atbash Cipher
Ancient Hebrew cipher that reverses the alphabet: A→Z, B→Y, C→X. Self-reversible like ROT13. Used in biblical texts. Simple substitution with no key needed.
Reverse Text
Reverses the character order of the input text. Not encryption. Useful for palindrome checking, basic obfuscation, or text manipulation experiments.
Morse Code
Invented by Samuel Morse (1830s) for telegraph. Encodes as dots (.) and dashes (-). Words separated by " / ". Still used in aviation, ham radio, and emergency signaling (SOS).
Common Use Cases
Secure Communication
- Encrypt sensitive messages before sending
- Protect passwords and API keys in transit
- Share confidential data securely
- Encrypt notes and personal information
Development
- Base64 encode data for API payloads
- Test encryption/decryption workflows
- Generate encoded strings for configs
- Debug encoded data in applications
Education
- Learn cryptography concepts hands-on
- Explore classical ciphers (Caesar, ROT13)
- Understand modern encryption (AES)
- Practice Morse code encoding
Fun & Puzzles
- Create encoded messages for friends
- Solve cipher puzzles and challenges
- Obfuscate spoilers with ROT13
- Convert messages to Morse code
Security Tips
Use Strong Passwords for AES
Use passwords with 12+ characters mixing uppercase, lowercase, numbers, and symbols. The strength indicator helps you gauge quality. A weak password defeats even military-grade encryption.
Remember Your Password
AES-256-GCM has no recovery mechanism. If you lose the password, the encrypted data is gone forever. Store your password securely and separately from the encrypted text.
Hashes Are One-Way
MD5 and SHA-256 produce irreversible fingerprints. You cannot "decrypt" a hash. They're for verifying integrity (comparing hashes), not for hiding and recovering data.
Know the Security Spectrum
Real security: AES-256-GCM only. Integrity: SHA-256 > MD5. Encoding only: Base64, Hex, URL. Weak ciphers: Vigenère > Caesar > ROT13/Atbash. Not ciphers: Reverse, Morse.