AES 加密 / 解密 在线工具

Browser-only 免费 · 无需注册 · 数据不上传
Mode
Output
Password
AES-256-CBC: password is hashed with PBKDF2-SHA256 (100k iterations) to derive a 256-bit key. A random 16-byte IV is prepended to the ciphertext.
Error
PLAINTEXT
CIPHERTEXT (BASE64)
// output appears here

更多开发工具

哈希生成器
MD5/SHA-256
HMAC 生成器
HMAC-SHA256
RSA 加密
RSA-OAEP
JWT 解码
查看令牌
Base64
编码/解码
密码生成器
安全随机
URL 编码
百分比编码
JSON 格式化
格式化、验证与压缩

为什么这是最好的在线 AES 加密工具

AES-256-CBC & GCM

Supports both AES-256-CBC (widely compatible) and AES-256-GCM (authenticated encryption). GCM is recommended for new projects as it detects tampering automatically.

PBKDF2 密钥派生

Passwords are never used directly as keys. PBKDF2-SHA256 with 100,000 iterations and a random salt derives a secure 256-bit key, protecting against brute-force attacks.

Web Crypto API

All cryptographic operations use the browser's built-in Web Crypto API — the same engine used for HTTPS. No third-party crypto libraries are loaded.

隐私优先

Your plaintext, ciphertext, and password never leave your device. No analytics, no logging, no server calls of any kind during encryption or decryption.

常见问题

What is AES encryption?

AES (Advanced Encryption Standard) is the most widely used symmetric encryption algorithm. It encrypts and decrypts data using the same key, making it fast and secure. AES-256 uses a 256-bit key and is approved by NIST for top-secret data.

What is the difference between AES-CBC and AES-GCM?

AES-CBC (Cipher Block Chaining) encrypts blocks sequentially and requires a separate integrity check. AES-GCM (Galois/Counter Mode) is an authenticated encryption mode that provides both confidentiality and integrity in one step, making it the preferred choice for modern applications.

Is it safe to use this AES tool for sensitive data?

All encryption and decryption runs entirely in your browser using the Web Crypto API — no data is ever sent to a server. However, ensure you use a strong, unique password and keep it secret, as the security of AES depends entirely on key secrecy.

What is PBKDF2 and why is it used?

PBKDF2 (Password-Based Key Derivation Function 2) derives a cryptographic key from a human-readable password by applying a hash function many times with a random salt. This makes brute-force attacks significantly harder than using the password directly as a key.

深度指南
开发者安全工具指南
哈希、HMAC、AES、RSA 与 JWT
阅读指南