Documentation

Encryption Tools Guide

Cryptica provides powerful encryption tools to help you secure your sensitive data. This guide explains how our encryption features work and how to use them effectively.

Client-Side Encryption

All encryption and decryption operations are performed locally in your browser. Your data and keys never leave your device, ensuring maximum privacy and security.

Encryption Methods

AES Encryption

Cryptica uses the Advanced Encryption Standard (AES) with a 256-bit key length, which is one of the most secure encryption algorithms available today and is widely used for protecting sensitive data.

How to Use:
  1. Enter or paste the text you want to encrypt in the input field.
  2. Create a strong password or passphrase to use as your encryption key.
  3. Click the Encrypt button to generate the encrypted text.
  4. Copy the encrypted result to share or store securely.

Important Note:

Remember your encryption password! If you lose it, there is no way to recover your encrypted data as we don't store your keys.

Decryption

To decrypt previously encrypted text, you'll need the original encryption password.

How to Use:
  1. Switch to the Decrypt tab in the encryption tool.
  2. Paste the encrypted text into the input field.
  3. Enter the password that was used for encryption.
  4. Click the Decrypt button to retrieve the original text.

Security Best Practices

Use Strong Passwords

For encryption, use a strong, unique password that you haven't used elsewhere. Consider using Cryptica's password generator to create a strong encryption key.

Secure Sharing

Never share the encrypted text and the password in the same channel. Use separate communication methods for added security.

Store Separately

If you need to store your encryption password, keep it in a secure password manager or a separate secure location from the encrypted data.

Technical Details

For those interested in the technical implementation, Cryptica uses:

  • AES-256 encryption algorithm (via CryptoJS library)
  • PBKDF2 for key derivation with 1000 iterations
  • CBC mode with random IV generation for each encryption
  • Base64 encoding for the final encrypted output
Encryption