CommandDialog

Encrypt / Decrypt Text

Encrypt clear text or Decrypt ciphertext using symmetric encryption algorithms like AES, TripleDES, DES, Rabbit or RC4.

Introduction

This tool is an online encryption/decryption platform integrating five cryptographic algorithms: AES, DES, 3-DES, RC4, and Rabbit. It supports flexible configurations including two key modes (passphrase or Key+IV combination), five block modes (CBC/CFB/CTR/OFB/ECB), and six padding schemes (PKCS7-Padding, etc.). Parameters can be easily selected via visual dropdown menus, with results displayed in real time. Designed as a pure web-based tool requiring no plugins, it works across all platforms.

How to Encrypt?

  1. Input Plaintext
    Paste or enter the original string to be encrypted in the input text box.

  2. Configure Parameters (Optional)

    • Algorithm Selection: Choose an encryption algorithm based on security requirements (AES-256 recommended).
    • Key Settings: Select passphrase mode or manually enter Key + IV (note the bit-length requirements).
    • Block Mode: Select a block mode according to your transmission scenario (CBC suits most cases).
    • Padding: Match the target system’s padding rules (default: PKCS7-Padding).
  3. Enter Key Information
    Input either a passphrase or Key + IV based on your key settings.

  4. Generate Ciphertext
    Encryption results appear in real time in the “Output Ciphertext” section. Copy the ciphertext using the top-right button.

How to Decrypt?

  1. Input Ciphertext
    Paste the ciphertext string in the input text box.

  2. Configure Parameters (Optional)
    Similar to encryption (padding mode input not required):

    • Algorithm Selection: Choose the decryption algorithm.
    • Key Settings: Select passphrase mode or enter Key + IV manually.
    • Block Mode: Choose the block mode used during encryption.
  3. Enter Key Information
    Input the passphrase or Key + IV based on your key settings.

  4. Generate Plaintext
    Decryption results appear in real time in the “Output Plaintext” section. Copy using the top-right button.

Key Parameters Explained

1. Encryption Algorithms

AlgorithmKey LengthSecurity StrengthUse Cases
AES128/192/256-bitHighGeneral-purpose encryption
DES56-bitLowLegacy system compatibility
3-DES168-bitMediumFinancial transition plans
RC440-2048-bitMediumLightweight encryption
Rabbit128-bitMediumIoT high-speed encryption

2. Key Modes

  • Passphrase: Generates keys via memorable strings.
  • Key + IV: Manually input hexadecimal keys and initialization vectors (enables precise key control).

3. Block Modes

ModeCharacteristicsTypical Use Cases
CBCRequires IV; data-dependentFile encryption, HTTPS
CFBStream mode; parallelizableReal-time data streams
CTRCounter mode; no paddingStorage/media encryption
OFBOutput Feedback; error-resistantHigh-noise environments
ECBSimple (not recommended)Demo purposes (vulnerable)

4. Padding Schemes

Padding ModeRuleCompatibility
PKCS7-PaddingPad full blocks; last byte = block sizeSSL/TLS, XML encryption
ISO-97971Preserves data tail featuresFinancial messaging
ANSI-X923Similar to PKCS7; last byte = 0U.S. financial standards
ISO-10126Random bytes + size identifierTamper-proof scenarios
Zero PaddingNull bytes (\0)Simple system support
No paddingNo padding (data length must align)Custom protocols

Usage Recommendations

  1. Security Principles:

    • Use AES-256-CBC with PBKDF2 key derivation in production.
    • Avoid reusing identical Key+IV combinations.
    • Apply secondary encoding (e.g., Base64) to ciphertext.
  2. Debugging Tips:

    • For decryption failures, verify:
      1. Matching Key/IV
      2. Consistent block/padding modes
      3. Absence of invisible characters
  3. Special Scenarios:

    • Use CTR mode for binary data.
    • Convert Unicode characters (e.g., Chinese) to UTF-8 beforehand.
  4. Applicable Scenarios:

    • Suitable for cryptography research, API authentication, and temporary data protection.
    • Not recommended for financial/classified data—use dedicated hardware instead.