Protect a message with a passphrase using AES-256-GCM (authenticated encryption) and PBKDF2 key stretching in the Web Crypto API. Each encryption uses a
random salt and IV; ciphertext is prefixed with dxp1: for a clear format. Nothing is uploaded to DroidXP — processing stays in your browser, like our
APK Analyzer and APK String Extractor.
PBKDF2-SHA-256 with 250,000 iterations derives the AES key. If you lose the passphrase, ciphertext cannot be recovered.
Running key derivation — may take a few seconds on slow devices…
It encrypts UTF-8 text with AES-256-GCM, which provides both confidentiality and authenticity (tampering is detected on decrypt). A random 16-byte salt and 12-byte IV are generated per encryption. Your passphrase is stretched with PBKDF2 (SHA-256, 250,000 iterations) before deriving the AES key — this slows brute-force guessing compared to using the passphrase directly.
The ciphertext string is dxp1: followed by Base64 encoding of salt ∥ IV ∥ ciphertext (including GCM authentication tag). Only data produced by this page with that prefix is accepted for
decrypt — other tools use different layouts unless you reimplement the same parameters.
Plaintext, passphrase, and ciphertext stay in your browser tab. DroidXP does not receive them. No third-party crypto libraries are loaded — only the browser’s built-in Web Crypto implementation is used.
dxp1:), enter the same passphrase, and click Decrypt.No. Encryption and decryption run entirely in your browser using Web Crypto. Nothing is sent to DroidXP servers for this tool.
AES-256-GCM for encryption, PBKDF2 with SHA-256 and 250,000 iterations for key derivation, a 16-byte random salt, and a 12-byte random IV per encryption.
PBKDF2 intentionally performs many hash iterations so guessing weak passphrases is slower. On low-end devices this can take a few seconds — that is expected.
No. If you lose the passphrase, the ciphertext cannot be recovered. We do not store keys or offer recovery.
Not directly. Those tools use different file formats, options, and often different KDFs. This page is for self-contained browser use with the dxp1: format only.
crypto.subtle is restricted to secure contexts (HTTPS or localhost). On plain HTTP, encryption may fail — use HTTPS or test locally.
This is a general-purpose browser helper, not a certified product. For regulated, high-value, or long-term secrets, follow your organization’s policies and use reviewed, audited tooling.
The passphrase may be mistyped, the ciphertext truncated or edited, or the data may not have been produced by this tool. GCM verification fails on any bit flip.
Prefer a unique strong passphrase for encrypted notes, stored separately from website passwords. A password manager can help generate and store it.
Clipboard contents may be visible to other apps or history tools. Clear fields after use on shared machines, especially for passphrase and plaintext.
The Hash Generator produces one-way fingerprints. This tool is reversible with the passphrase — use it when you need confidentiality, not just a checksum.