Introduction
This tool is an online encryption/decryption platform integrating five cryptographic algorithms: AES, DES, 3-DES, RC4, and Rabbit. It supports flexible configurations including two key modes (passphrase or Key+IV combination), five block modes (CBC/CFB/CTR/OFB/ECB), and six padding schemes (PKCS7-Padding, etc.). Parameters can be easily selected via visual dropdown menus, with results displayed in real time. Designed as a pure web-based tool requiring no plugins, it works across all platforms.
How to Encrypt?
-
Input Plaintext
Paste or enter the original string to be encrypted in the input text box. -
Configure Parameters (Optional)
- Algorithm Selection: Choose an encryption algorithm based on security requirements (AES-256 recommended).
- Key Settings: Select passphrase mode or manually enter Key + IV (note the bit-length requirements).
- Block Mode: Select a block mode according to your transmission scenario (CBC suits most cases).
- Padding: Match the target system’s padding rules (default: PKCS7-Padding).
-
Enter Key Information
Input either a passphrase or Key + IV based on your key settings. -
Generate Ciphertext
Encryption results appear in real time in the “Output Ciphertext” section. Copy the ciphertext using the top-right button.
How to Decrypt?
-
Input Ciphertext
Paste the ciphertext string in the input text box. -
Configure Parameters (Optional)
Similar to encryption (padding mode input not required):- Algorithm Selection: Choose the decryption algorithm.
- Key Settings: Select passphrase mode or enter Key + IV manually.
- Block Mode: Choose the block mode used during encryption.
-
Enter Key Information
Input the passphrase or Key + IV based on your key settings. -
Generate Plaintext
Decryption results appear in real time in the “Output Plaintext” section. Copy using the top-right button.
Key Parameters Explained
1. Encryption Algorithms
Algorithm | Key Length | Security Strength | Use Cases |
---|---|---|---|
AES | 128/192/256-bit | High | General-purpose encryption |
DES | 56-bit | Low | Legacy system compatibility |
3-DES | 168-bit | Medium | Financial transition plans |
RC4 | 40-2048-bit | Medium | Lightweight encryption |
Rabbit | 128-bit | Medium | IoT high-speed encryption |
2. Key Modes
- Passphrase: Generates keys via memorable strings.
- Key + IV: Manually input hexadecimal keys and initialization vectors (enables precise key control).
3. Block Modes
Mode | Characteristics | Typical Use Cases |
---|---|---|
CBC | Requires IV; data-dependent | File encryption, HTTPS |
CFB | Stream mode; parallelizable | Real-time data streams |
CTR | Counter mode; no padding | Storage/media encryption |
OFB | Output Feedback; error-resistant | High-noise environments |
ECB | Simple (not recommended) | Demo purposes (vulnerable) |
4. Padding Schemes
Padding Mode | Rule | Compatibility |
---|---|---|
PKCS7-Padding | Pad full blocks; last byte = block size | SSL/TLS, XML encryption |
ISO-97971 | Preserves data tail features | Financial messaging |
ANSI-X923 | Similar to PKCS7; last byte = 0 | U.S. financial standards |
ISO-10126 | Random bytes + size identifier | Tamper-proof scenarios |
Zero Padding | Null bytes (\0) | Simple system support |
No padding | No padding (data length must align) | Custom protocols |
Usage Recommendations
-
Security Principles:
- Use AES-256-CBC with PBKDF2 key derivation in production.
- Avoid reusing identical Key+IV combinations.
- Apply secondary encoding (e.g., Base64) to ciphertext.
-
Debugging Tips:
- For decryption failures, verify:
- Matching Key/IV
- Consistent block/padding modes
- Absence of invisible characters
- For decryption failures, verify:
-
Special Scenarios:
- Use CTR mode for binary data.
- Convert Unicode characters (e.g., Chinese) to UTF-8 beforehand.
-
Applicable Scenarios:
- Suitable for cryptography research, API authentication, and temporary data protection.
- Not recommended for financial/classified data—use dedicated hardware instead.