Encrypt or decrypt text with AES-GCM locally. Free, private, runs in your browser.
100% private — your files and text never leave your browser. All processing happens locally on your device.
Lost passwords cannot be recovered, and failed decrypts mean the password or package did not authenticate.
AES Encrypt / Decrypt uses AES-GCM with a random IV for every encryption. The output JSON package includes the algorithm, KDF settings, salt, IV, and base64 ciphertext needed for local decryption.
A passphrase is converted into a 256-bit AES key with PBKDF2-SHA-256 and a random salt. The iteration count is visible and adjustable so test packages are understandable and repeatable to decrypt.
AES-GCM authenticates ciphertext. If the password is wrong or the package was tampered with, decryption fails instead of returning guessed plaintext. Lost passwords cannot be recovered by Convertful.
Convertful uses AES-GCM, an authenticated encryption mode. AES-CBC is not used or offered as the default.
The password is turned into an AES key with PBKDF2-SHA-256, a random salt, and the iteration count shown in the UI.
Each encryption uses a fresh random salt and IV, so ciphertext is intentionally different on every run.
AES-GCM authentication fails and the tool shows a clear wrong-password or tampered-ciphertext message.
No. Everything runs locally, and lost passwords cannot be recovered.