AES Encryption

16 bytes

128 bits

192 bits

256 bits

Hex

Base 64

CBC

CTR

CFB

OFB

If you found this tool helpful, consider buying us a coffee ☕️

How to Use the AES Encryption Tool

Step 1 : Paste or type the text you want to encrypt in the input box. At top right of the input box, you can see the size of the text you have entered.

Step 2 : Provide the encryption key in the input box. Or you can generate a random key by clicking on the bits indicator button. The size of the key will be decided base on key size selected in below step. Make sure key length must be 16, 24, or 32 bytes. Save the key for decryption.

Step 3 : Select the key size in bits. You can select 128, 192, or 256 bits. The key size will decide the encryption strength.

Step 4 : Select output format. You can select HEX, Base64.

Step 4 :Select mode of AES encryption you want to use. You can select CBC, CFB, OFB, CTR.

Step 5 :Base on AES encryption mode you have selected, you will see extra options such as Inital Vector, Counter, Segment Size etc.

Step 6 :Click on the Encrypt button to encrypt the text. You will see the encrypted text in the output box. If paramters are not upto the mark, you will see the error message below of the output box.

When to use CBC

CBC (Cipher Block Chaining) mode is more secure than ECB mode. CBC mode requires an initialization vector (IV) to encrypt the data.

Area where CBC shine :


Area where CBC is not good :Summary :

CBC mode is suitable for scenarios where preserving data order, security, and compatibility with legacy systems are important considerations. However, it's essential to be aware of its vulnerabilities and properly manage initialization vectors to ensure the security of encrypted data.

When to use CTR

CTR (Counte) requires an counter will be used for generate a stream of pseudo-random bits, which are then XORed with the plaintext to produce the ciphertext. The counter is typically a sequence of numbers, often starting from a random valu


Area where CTR shine :
Area where CTR is not good :
Summary :

TO mode is designed for random access, parallelization, deterministic encryption, category stream encryption, and other scenarios that need to be considered. However, to ensure the security of the encryption process, it is important to first check the security vectors and not reuse the counter values.

When to use CFB

CFB (Password Feedback) mode is an alternative to block ciphers. Similar to other modes, CFB mode can be useful in some situations and not the best choice in others.


Area where CFB is not good :Area where CFB is not good : Summary :

In summary, the CFB format is designed for situations where data stream encryption, error reporting, long bit changes, or compatibility with legacy systems are decision-making critical. But the initial vectors must be carefully controlled and potentially affect the safety of this model.

When to use OFB

OFB (Output Feedback), the previous ciphertext block is encrypted and then XORed with the plaintext to create the current ciphertext. The encryption of the previous ciphertext block is used as input to encrypt the next plaintext block, creating a stream of pseudo-random ciphertext blocks. OFB mode is mainly used in the stream cipher class where each plaintext block can be encrypted independently.


Area where OFB shine :
Area where OFB is not good :
Summary :

In summary, use OFB when you need streaming quality encryption, error message control, uninterrupted access, or low latency. However, if data integrity, countermeasures, or comparisons are important, consider using other formats such as GCM or TO (counter) formats.

Choose Key Size

Factor involved in choosing key size :

128 bit192 bit256 bit

Choose Output Format

HexBase64