AES Encryption

Encryption is process of transforming data (referred as PlainText) using a key and algorithm into random characters (referred as CipherText) that hides original data

How to use this tool?

This tool allows you to encrypt any text that you want to protect. It can be used to

  • Protect any sensitive or private information from others
  • Compare cipher text from other implemtnation by specifying same Key and IV

Steps:

  • Enter or paste plain text data that needs to be encrypted in the first text box
  • Select what type of key you want to specify.
    • Use "Secret" option, if want to remember the key to decrypt at later point of time.
    • Use "Key (Base64 encoded)", if you already have a key and same should be used for encryption. This is useful when you need to compare or validate cipher text with other program. Key should be Base64 encoded.
  • Enter secret text or Key depending on option selected in previous step
  • IV (Initialization Vector) - Specifying this value is optional. If specified, this should be a valid Base64 value and same IV should be passed during decryption
  • Select encryption algorithm from the drop down
  • Click "Encrypt" to perform encryption operation

About AES Encryption & Decryption

The Advanced Encryption Standard (AES) is a symmetric block cipher that can encrypt and decrypt information. AES is NIST approved and recommended cryptographic algorithm that can be used to protect data. The AES algorithm capable of using cryptographic keys for 128, 192 and 256 bits to encrypt and decrypt data in blocks of 128 bits.

Cipher Modes

There are five confidentiality modes of operation for AES

  • ECB (Electronic Codebook)
  • CBC (Cipher Block Chaining)
  • CFB (Cipher Feedback)
  • OFB (Output Feedback)
  • CTR (Counter)
Plain Text

Text that needs to be encrypted is referred as Plain Text

Cipher Text

Encrypted text is referred to as Cipher Text

Initialization Vector (IV)

The IV is used in an intial step in the encryption of a message and in the corresponding decryption of the message.

The IV value should be unique for each encryption operation, this will produce different output for same plain text and encryption key inputs. This prevents an hacker to find any pattern between Plain Text and Cipher Text. The IV is not a secret and it can be passed along with Cipher Text