Encrypt files up to 5 MiB (5.24 MB) size, using the AES encryption algorithm with 256-bit key.
Compute a file hash code to verify that the contents of a file have not been changed.
Everything runs in your browser, no data is sent to our servers and can even be run in offline mode.
Not all browsers support the API’s used by this tool. Tested on Firefox 46, Google Chrome 51, Microsoft Edge, Vivaldi 1.3, Firefox 46 for Android and Google Chrome 51 for Android.
Default parameters
String encoding
When you pass a string, it's automatically converted to a 'WordArray' encoded as UTF-8.
Key derivation
The default key derivation algorithm is PBKDF2 (Password Based Key Derivation Function 2). If you use a password phrase, then by default it will generate a 256-bit key. If you don't provide salt data for key derivation, a salt will be randomly generated.
Encryption
Default encryption algorithm is AES-256 (Advanced Encryption Standard with 256-bit key). Default block mode is CBC (Cipher Block Chaining). Default padding scheme is Pkcs7. For the key, when you pass a string, it's treated as a password phrase and used to derive an actual key and IV (Initialization Vector).
Files
File encryption/decryption
Encrypting files is a way to protect them from unwanted access.
Encrypt file
Decrypt file
Compute file hash
The purpose of hash values is to provide a cryptographically-secure way to verify that the contents of a file have not been changed. While some hash algorithms, including MD5 and SHA1, are no longer considered secure against attack, the goal of a secure hash algorithm is to render it impossible to change the contents of a file—either by accident, or by malicious or unauthorized attempt—and maintain the same hash value. You can also use hash values to determine if two different files have exactly the same content. If the hash values of two files are identical, the contents of the files are also identical.
Messages
Message encryption/decryption
Encrypting messages is a way to protect them from unwanted access.
Encrypt message
Decrypt message
Step 1 - Enter/Paste message to decrypt
No data is sent to our server.
Message size is too big...
Step 2 - Enter a pass phrase
This must be the same password phrase that was used to encrypt the message.
Step 3 - Decrypt
Press the 'Decrypt' button to decrypt the message text using the entered password.
Your message is being decrypted. Please wait...
Decrypted data
Note: If you do not see the expected message, this probably means that the password, or the ciphertext, or its format or any other parameter is invalid.
Compute message hash
The purpose of hash values is to provide a cryptographically-secure way to verify that the contents of a message have not been changed. While some hash algorithms, including MD5 and SHA1, are no longer considered secure against attack, the goal of a secure hash algorithm is to render it impossible to change the contents of a message—either by accident, or by malicious or unauthorized attempt—and maintain the same hash value. You can also use hash values to determine if two different messages have exactly the same content. If the hash values of two messages are identical, the contents of the messages are also identical.
Input message
Step 1 - Enter message to compute hash
No data is sent to our server.
Message size is too big...
Step 2 - Choose an algorithm
Step 3 - Compute hash code
0%
The message hash is being computed. Please wait...