Encrypt Sensitive Data Online
Protecting sensitive data requires the right cryptographic tool for the job: symmetric AES encryption for encrypting data with a shared key, RSA key pairs for asymmetric encryption and JWT signing, and cryptographic hashing for integrity verification and password storage. devtoolkit.sh provides all three capabilities in your browser, with no server involvement — your plaintext, keys, and secrets never leave your device. Use AES-256 to encrypt configuration values, credentials, and sensitive payloads for storage or transmission. Generate RSA key pairs for JWT RS256 signing, SSH authentication, or TLS certificate workflows. Hash any content with SHA-256, SHA-512, MD5, or HMAC for integrity checking. All operations use the browser's native Web Crypto API for specification-compliant implementations.
Encrypt and decrypt text with AES-GCM using a password. Runs entirely in your browser.
Generate RSA key pairs (2048 or 4096-bit) and export as PEM in your browser.
Generate SHA-1, SHA-256, SHA-384, and SHA-512 cryptographic hashes from any text.
FAQ
- Is the cryptography implemented correctly?
- Yes. All cryptographic operations use the browser's built-in Web Crypto API (SubtleCrypto), which provides audited, specification-compliant implementations of AES, RSA, and SHA algorithms.
- Is my data safe to encrypt here?
- Yes. All operations run locally in your browser. No plaintext, keys, or ciphertext is transmitted to any server.
- When should I use AES versus RSA?
- Use AES (symmetric) when both parties share a secret key — it is fast and suitable for bulk data. Use RSA (asymmetric) when you need to encrypt for a recipient without sharing a secret, or for digital signing.