AES Encryption and Decryption Online (2024)

Advanced Encryption Standard(AES) is a symmetric encryption algorithm. AES is the industry standard as of now as it allows 128 bit, 192 bit and 256 bits encryption. Symmetric encryption is rapid as compared to asymmetric encryption and are used in systems such as database system. Following is an online tool to perform AES encryption and decryption of any plain-text or password.

The tool provides multiple modes of encryption and decryption such as ECB, CBC, CTR and GCM mode. GCM is considered more secure than CBC mode and is widely adopted for its performance.

For more info on AES encryption, visit this explanation on AES Encryption. Below is the form to take the inputs for the encryption and decryption.

AES Encryption

Base64 Hex

Loading...

AES Decryption

Base64 Plain-Text

Loading...

Any secret key value that you enter, or we generate is not stored on this site, this tool is provided via an HTTPS URL to ensure that any secret keys cannot be stolen.

If you appreciate this tool, then you can consider donating.

We are thankful for your never ending support.

Key Features

  • Symmetric Key Algorithm: Same key is used for both encryption and decryption.
  • Block Cipher: AES operates on fixed-size blocks of data. The standard block size is 128 bits.
  • Key Lengths: AES supports key lengths of 128, 192, and 256 bits. The longer the key, the stronger the encryption.
  • Security: AES is considered very secure and is widely used in various security protocols and applications.

AES Encryption Terms & Terminologies

For encryption, you can either enter the plain text or password that you want to encrypt. Now choose the block cipher mode of encryption.

Different Supported Modes of AES Encryption

AES offers multiple modes of encryption such as ECB, CBC, CTR, OFB, CFB and GCM mode.

  • ECB(Electronic Code Book) is the simplest encryption mode and does not require IV for encryption. The input plain text will be divided into blocks and each block will be encrypted with the key provided and hence identical plain text blocks are encrypted into identical cipher text blocks.

  • CBC(Cipher Block Chaining) mode is highly recommended, and it is an advanced form of block cipher encryption. It requires IV to make each message unique meaning the identical plain text blocks are encrypted into dissimilar cipher text blocks. Hence, it provides more robust encryption as compared to ECB mode, but it is a bit slower as compared to ECB mode. If no IV is entered then default will be used here for CBC mode and that defaults to a zero-based byte[16].

  • CTR(Counter) CTR mode (CM) is also known as integer counter mode (ICM) and segmented integer counter (SIC) mode. Counter-mode turns a block cipher into a stream cipher. CTR mode has similar characteristics to OFB, but also allows a random-access property during decryption. CTR mode is well suited to operate on a multiprocessor machine, where blocks can be encrypted in parallel.

  • GCM(Galois/Counter Mode) is a symmetric-key block cipher mode of operation that uses universal hashing to provide authenticated encryption. GCM is considered more secure than CBC mode because it has built-in authentication and integrity checks and is widely used for its performance.

Padding

For AES Encryption modes CBC and ECB, the padding can be PKCS5PADDING and NoPadding. With PKCS5Padding, a 16-byte string will produce a 32-byte output (the next multiple of 16).

AES GCM PKCS5Padding is a synonym for NoPadding because GCM is a streaming mode that doesn't require padding. The ciphertext in GCM is only as long as the plaintext. Hence, nopadding is by default selected.

AES Key Size

The AES algorithm has a 128-bit block size, regardless of whether your key length is 256, 192 or 128 bits. When a symmetric cipher mode requires an IV, the length of the IV must be equal to the block size of the cipher. Hence, you must always use an IV of 128 bits (16 bytes) with AES.

AES Secret Key

AES provides 128 bits, 192 bits and 256 bits of secret key size for encryption. If you are selecting 128 bits for encryption, then the secret key must be of 16 bits long and 24 and 32 bits for 192 and 256 bits of key size respectively. For example, if the key size is 128, then a valid secret key must be of 16 characters i.e., 16*8 = 128 bits

Now you can enter the secret key accordingly. By default, the encrypted text will be base64 encoded, but you have options to select the output format as HEX too.

Similarly, for image and .txt file the encrypted form will be Base64 encoded.

Below is a screenshot that shows a sample usage of this online AES encryption tool.

AES Encryption and Decryption Online (1)

AES decryption has also the same process. By default, it assumes the entered text be in Base64 and the final decrypted output will be a plain-text string.

Applications of AES

  • Data protection: Encrypting sensitive information.
  • Secure communications: Used in SSL/TLS for secure web browsing.
  • Cryptographic protocols: Employed in various security protocols and standards such as WPA2 for wireless security.
  • AES is trusted for its strength and efficiency, making it a cornerstone of modern cryptographic practices.

AES Encryption and Decryption Online (2024)

FAQs

Why is 256 AES so hard to crack? ›

AES is a substitution-permutation network that uses a key expansion process where the initial key is used to come up with new keys called round keys. The round keys are generated over multiple rounds of modification. Each round makes it harder to break the encryption. The AES-256 encryption uses 14 such rounds.

Has AES 128 ever been cracked? ›

Hence, it is safe to say that AES-128 encryption is safe against brute-force attacks. AES has never been cracked yet and it would take large amounts of computational power to crack this key. Governmental organizations and businesses trust the AES for securing sensitive information.

Can I decrypt AES without a key? ›

If its encrypted, the only way to get the contents without the encryption key is to brute-force it, but I wouldn't get your hopes up. All these malware variants as of late rely on encryption being nearly unbreakable without government-funded super computing power, and even then its time consuming.

How to decrypt an AES encrypted password? ›

You decrypt using the same key as used for AES encryption. AES is a symmetric block cipher after all: both the “sender” and “receiver” need to use the same key. Guessing the AES key is next to impossible unless you know the data used to generate it in the first place. Note that AES in itself is not a secure cipher.

How long would it take a quantum computer to crack AES-256? ›

A 256-bit encryption is considered to be highly secure and it would take classical computers millions of years to crack it. However, quantum computers could potentially crack this level of encryption in mere seconds or minutes.

Can NSA break AES 256? ›

The bottom line is: NSA is engaged in “harvest now, decrypt later” surveillance of encrypted data; they are not anywhere near the ability to break AES-256, but was (in 2012) “on the verge” of being able to break a more vulnerable encryption algorithm (RSA?).

Can a quantum computer break AES encryption? ›

AES is considered secure against classical computers, but it is vulnerable to quantum attacks. To understand why AES is vulnerable to quantum attacks, it is important to understand how the algorithm works. AES uses a key to encrypt and decrypt data. The key is typically 128 bits, 192 bits, or 256 bits in length.

Is AES 128 better than Triple DES? ›

Which is more secure, 3DES or AES? Without a doubt, AES is more secure than 3DES. Its larger key sizes and more sophisticated encryption processes provide a stronger defense against brute-force attacks and cryptographic analysis.

Can hackers break AES 256? ›

It's virtually impossible to break AES-256 through brute force attacks, no matter how powerful the computer(s) involved in the process.

What is the secret key in AES? ›

AES uses 128-, 192- or 256-bit keys to encrypt and decrypt data. AES is a symmetric encryption algorithm and a block cipher. The former means that it uses the same key to encrypt and decrypt data. The sender and the receiver must both know -- and use -- the same secret encryption key.

What happens if you decrypt with wrong key? ›

Using the wrong decryption key is like trying to open a lock with the wrong key—it won't work. You'll end up with gibberish or random characters that make no sense. To successfully decrypt data, you need the exact matching decryption key that was used to encrypt it.

How do I know if my AES is encrypted? ›

In the absence of any standard header, you could look at the byte frequency. AES encrypted data (or indeed anything encrypted with a decent algorithm) will appear to be a random sequence of bytes. This means that the distribution of byte values 0-255 will be approximately flat (i.e. all byte values are equally likely).

How long does AES take to decrypt? ›

With the right quantum computer, AES-128 would take about 2.61*10^12 years to crack, while AES-256 would take 2.29*10^32 years.

What is salt in encryption? ›

A salt is a piece of random data added to a password before it is hashed and stored. Adding a salt to stored passwords is a security process used alongside the hashing of passwords before they are stored.

How to open AES crypt? ›

The file can only be decrypted by someone who knows the password and uses AES Crypt.
  1. In File Explorer, right-click the file you want to decrypt (it always ends in “. aes”).
  2. Choose “AES Decrypt” from the context menu.
  3. Enter the password.
  4. The file will be opened.

How long does it take to crack 256-bit AES? ›

With the right quantum computer, AES-128 would take about 2.61*10^12 years to crack, while AES-256 would take 2.29*10^32 years. For reference, the universe is currently about 1.38×10^10 years old, so cracking AES-128 with a quantum computer would take about 200 times longer than the universe has existed.

Can hackers break AES-256? ›

It's virtually impossible to break AES-256 through brute force attacks, no matter how powerful the computer(s) involved in the process.

Is 256 AES vulnerable? ›

AES-256 is considered to be quantum resistant, as it has similar quantum resistance to AES-128's resistance against traditional, non-quantum, attacks at 128 bits of security. AES-192 and AES-128 are not considered quantum resistant due to their smaller key sizes.

Is AES-256 unbreakable? ›

Some hail AES-256 as unbreakable through brute force, but the truth lies in the enormity of time and computational power required. While theoretically crackable with extraordinary resources, it would take around 10 to 18 years to breach AES-256 encryption.

Top Articles
Latest Posts
Article information

Author: Dean Jakubowski Ret

Last Updated:

Views: 5924

Rating: 5 / 5 (70 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Dean Jakubowski Ret

Birthday: 1996-05-10

Address: Apt. 425 4346 Santiago Islands, Shariside, AK 38830-1874

Phone: +96313309894162

Job: Legacy Sales Designer

Hobby: Baseball, Wood carving, Candle making, Jigsaw puzzles, Lacemaking, Parkour, Drawing

Introduction: My name is Dean Jakubowski Ret, I am a enthusiastic, friendly, homely, handsome, zealous, brainy, elegant person who loves writing and wants to share my knowledge and understanding with you.