password strength: 0.0/5
Encrypted Text:
Decrypted Text:
Symmetro uses AES-256-GCM for encryption
The password is transformed into a hash using PBKDF2 with 100,000 iterations
A random salt is generated for each encryption process to prevent attacks using generic rainbow tables. While still vulnerable to targeted rainbow table attacks, the computational effort required makes it impractical. Note that the salt is not meant to be secret.
An initialization vector (IV) is also randomly generated and combined with the ciphertext to ensure additional entropy. Similar to the salt, the IV is not meant to be secret.
Never trust a random project on the internet. Symmetro uses the Web Crypto API to perform all cryptographic functions in the browser, standing on the shoulders of giants and benefiting from native-code performance.
There is zero data in/out of this page; you SHOULD use this page offline for safety purposes, as an internet connection is not required. Download a release here.
The entire codebase is available and is distributed under a license that permits free use, modification, and distribution.