Ad
🔒 Encrypt
🔓 Decrypt
All three (IV, salt, key) are required to decrypt.
Common use cases
- Encrypt sensitive notes
- Test AES integration before implementing
- Verify encrypted output from your code
Frequently asked questions
Why does the tool require a salt and IV?
Modern AES uses PBKDF2 to derive a strong key from your passphrase using a random salt and 100,000 iterations. The salt prevents rainbow table attacks. The IV ensures identical plaintexts produce different ciphertexts. Save both alongside your ciphertext to decrypt.
Which mode should I use?
CBC is the safe default. CTR is good for streaming or large data. Avoid ECB for sensitive data — identical input blocks produce identical ciphertext.
Is the encryption secure?
The implementation uses standard AES with PBKDF2-SHA256 and 100,000 iterations — same primitives as production-grade software. For production systems, integrate AES into your application using a vetted crypto library.