Training & Educational Use Only — This tool demonstrates AES-256-GCM encryption concepts for educational purposes. Do not use it to protect classified information, CUI, or any data subject to CMMC, DFARS, ITAR, or HIPAA controls. For regulated data, use approved and certified encryption solutions.
| Algorithm | AES-256-GCM (Advanced Encryption Standard, Galois/Counter Mode) |
| Key length | 256 bits — the same key length used for Top Secret US government data |
| IV length | 96 bits, randomly generated per file |
| Auth tag | 128 bits — provides integrity verification in addition to confidentiality |
| Key format | Hexadecimal string (64 characters = 32 bytes = 256 bits) |
| Output format | IV (12 bytes) + Ciphertext + Auth Tag — saved as .enc file |
| Crypto engine | Browser Web Crypto API (SubtleCrypto) — FIPS 140-2 compliant in most implementations |
| Data handling | File never leaves your browser. No network requests made during encryption or decryption. |
Why GCM mode matters: AES can be used in several modes. GCM (Galois/Counter Mode) provides both confidentiality and authenticity — it encrypts your data AND produces a tag that proves it hasn't been altered. Older modes like CBC only provide confidentiality. NIST recommends GCM for most applications, and it's the mode used in TLS 1.3, the protocol securing most HTTPS traffic today.
Key management is everything: AES-256 has never been broken. Every real-world failure of AES-encrypted data is a key management failure — the key was stored insecurely, transmitted in plaintext, or lost. This tool generates strong keys. What you do with that key is the security-critical decision.