Encryption Showcase

Explore modern encryption techniques

Text to Encrypt

Encryption Method

Advanced Encryption Standard - Symmetric encryption using 256-bit key. Used in: Banking systems, HTTPS websites, Password managers, Full disk encryption (BitLocker, FileVault), Military communications
Rivest-Shamir-Adleman - Asymmetric encryption with public/private keys. Used in: SSL/TLS certificates, Secure email (PGP/GPG), Digital signatures, Banking systems, Secure communications
NaCl/libsodium authenticated encryption combining XSalsa20 stream cipher with Poly1305 authenticator. Extended nonce (24 bytes) for safe random generation. Used in: Signal Protocol, libsodium applications, Keybase, MiniLock, Secure messaging apps, Password managers
AES in Galois/Counter Mode - Provides authenticated encryption with high performance. Combines AES with Galois Field. Used in: TLS 1.3/1.2 web encryption, IPsec VPNs, Google Cloud encryption, AWS encryption, Apple iMessage, Zoom, Banking applications, SSH secure connections, NATO communications, Electronic payment systems
Triple Data Encryption Standard - Applies DES cipher three times with different keys. Legacy but still used. Used in: ATM machines, Payment card industry (PCI), Legacy banking systems, EMV chip cards, Microsoft Office encryption
Rabbit Stream Cipher - High-speed stream cipher designed for software. Uses 128-bit key with optional IV. Used in: High-speed encryption, Embedded systems, Real-time communications, eSTREAM portfolio cipher

Encryption Process These bubbles represent the key steps in the encryption algorithm. Watch how data flows through the process!

Encrypt some text to see the process visualization

Encryption Results

Encrypted Text

Encrypted output will appear here

Decrypted Text

Decrypted output will appear here

Encryption Time: -
Decryption Time: -
Original Size: -
Encrypted Size: -