AES Decrypt
Runs in browserDecrypt AES ciphertext in your browser. Supports GCM, CBC, CTR, and ECB modes with 128/192/256-bit keys. Password never transmitted.
Last updated 02 Apr 2026
Paste Base64 AES ciphertext, select the matching algorithm, enter your password, and get your plaintext back. Supports AES-256-GCM, AES-CBC, AES-CTR, and AES-ECB. 100% client-side via WebCrypto — your password and ciphertext are never uploaded.
Save the encrypted output and your password — without both, data cannot be recovered.
How to use
- 1
Switch to Decrypt mode
The AES tool opens in Encrypt mode by default. Click the 'Decrypt' tab to switch.
- 2
Select the matching algorithm
Choose the same AES algorithm used during encryption (e.g. AES-256-GCM). Using the wrong mode or key size will cause decryption to fail.
- 3
Enter your password
Type the same passphrase used during encryption. The key is re-derived using PBKDF2 with the salt stored inside the ciphertext.
- 4
Paste the Base64 ciphertext
Paste the full Base64-encoded ciphertext into the input panel.
- 5
Copy the plaintext
The decrypted plaintext appears in the output panel. Click Copy to copy it.
Frequently asked questions
What do I need to decrypt AES ciphertext?
Is this tool safe? Is my password sent to a server?
Are inputs sent to a server?
Why does decryption fail with the correct password?
Can I decrypt OpenSSL AES output here?
What is AES-GCM authentication?
What is the difference between AES-GCM and AES-CBC?
Does this tool support file decryption?
How is the key derived from my password?
Decrypt AES-encrypted ciphertext directly in your browser using the
WebCrypto API. All cryptographic operations run on your device — no
data is transmitted.
**This tool reverses AES encryption** produced by the AES Encrypt tool on
this site. Paste the Base64 ciphertext, select the same algorithm used
during encryption, enter the passphrase, and your plaintext is recovered.
**Supported modes:**
- **AES-256-GCM / AES-192-GCM / AES-128-GCM** — authenticated encryption.
GCM decryption verifies integrity automatically; if the ciphertext was
tampered with, decryption fails with an authentication error.
- **AES-256-CBC / AES-128-CBC** — classic block cipher mode with PKCS7 padding.
- **AES-256-CTR / AES-128-CTR** — stream cipher mode, no padding required.
- **AES-128-ECB / AES-256-ECB** — no IV; not recommended but supported for
compatibility.
**Key derivation:** The passphrase is derived using PBKDF2 (SHA-256,
100,000 iterations) with the random salt embedded in the ciphertext. You
only need the ciphertext and your original password.
**Privacy:** Your key never leaves your browser. Nothing is transmitted.
Related tools
AES Encrypt
Encrypt text with AES-256-GCM, AES-CBC, AES-CTR, or AES-ECB in your browser. PBKDF2 key derivation, random IV, zero uploads.
RSA Decrypt
Decrypt RSA-OAEP ciphertext with your PEM private key in the browser. Supports RSA-2048 and RSA-4096. Private key never transmitted.
Base64 Decoder
Decode Base64 or Base64URL strings to plain text or download as a binary file. Handles MIME line-wrapping and PEM certificates automatically.
SHA-256 Hash Generator
Generate SHA-256 hashes from text instantly. WebCrypto hardware-accelerated, real-time output. Used in Bitcoin, TLS, and digital signatures. Zero uploads.
Bcrypt Hash Generator
Generate bcrypt hashes with configurable cost factor (4–31). Auto-salted, rainbow-table resistant, fully browser-based. Recommended for secure password storage.