AES-256-GCM Utility
A professional, client-side tool for high-security encryption and decryption.
About This AES-256-GCM Utility
A simple, powerful, fully client-side AES-256-GCM authenticated encryption tool built for privacy-conscious users.
This utility lets you encrypt and decrypt text messages using AES-256 in Galois/Counter Mode (GCM) — the same authenticated encryption algorithm trusted by TLS 1.3, secure messaging protocols, and modern file encryption standards. All operations run exclusively in your browser via the Web Crypto API — no data ever leaves your device, no servers are involved, and no tracking occurs.
AES-256-GCM provides two essential protections in one efficient pass:
- Confidentiality — your plaintext is transformed into unreadable ciphertext using a 256-bit key and a unique nonce.
- Integrity & authenticity — an authentication tag verifies that the message has not been tampered with. If even one bit is changed, decryption fails with an error.
Key features include:
- Client-side PBKDF2 key & nonce derivation from any passphrase you choose (for convenience/testing only — not recommended for high-security use)
- Realtime input validation (key = 64 hex chars, nonce = 24 hex chars)
- Support for messages up to 1,000,000 characters (~1 MB)
- Clear warnings about nonce reuse, weak keys, and deterministic derivation risks
- Responsive Bootstrap interface with dark mode support
- Copy-to-clipboard buttons for easy transfer of keys, nonces, and ciphertext
This tool is ideal for developers, security enthusiasts, privacy advocates, or anyone who wants to experiment with strong authenticated encryption without trusting third-party servers. It is not a replacement for dedicated password managers or production-grade cryptographic libraries — always follow best practices (random keys, never reuse nonces) when protecting real sensitive data.
Open-source · No analytics · No tracking · Runs 100% in your browser
How to Use This Tool
Generate Key & Nonce (Optional)
Go to the Generate tab. Enter any memorable phrase or long text. The tool uses PBKDF2 (SHA-256, 100,000 iterations) to deterministically derive a 64-character hex key (256 bits) and 24-character hex nonce (96 bits). Copy both values. Remember: same phrase → same output every time.
Encrypt Your Message
Switch to the Encrypt tab. Paste or type your plaintext (up to 1 MB). Enter your 64-hex key and 24-hex nonce. Click Encrypt. The output is base64-encoded ciphertext + authentication tag. Copy the full string and store it securely.
Decrypt When Needed
Go to the Decrypt tab. Paste the full base64 output from step 2. Enter the exact same key and nonce used for encryption. Click Decrypt. If the tag verifies, you’ll see your original plaintext. If anything is wrong, you’ll get a clear error.
Security Reminders
Never reuse the same nonce with the same key. Use truly random keys for important data (not derived phrases). Test decryption immediately after encryption. Keep backups of important ciphertext + key/nonce pairs.