Text Encryptor

The text encryptor encrypts any text with a secret key using XOR cipher combined with Base64 encoding, entirely in your browser. The encrypted output is a Base64 string that decrypts only with the same key. Nothing is sent to any server. Free, no account required.

Secret key
INPUT — Plain text
OUTPUT — Encrypted Base64
How it works
CipherXOR cipher — each byte XORed with the cycling key
EncodingBase64 — output is a safe printable string
SymmetricSame key encrypts and decrypts
Client-sideNo data leaves your browser

How to encrypt text online free

Enter your secret key in the key field, this can be any string and its length and complexity determine the strength of the encryption. Type or paste the text you want to encrypt into the input field. Click Encrypt. The output is a Base64-encoded XOR-ciphered string. Copy the output and share it through any channel, email, messaging, document, with confidence that it is unreadable without the key.

To encrypt text online free with this tool, the key is applied to the input byte by byte using the XOR operation: each byte of the input is XORed with the corresponding byte of the key, cycling through the key if the input is longer. The result is then Base64-encoded to produce a clean text output with no special characters. The same process in reverse performs decryption: Base64-decode, then XOR with the same key.

Decrypt text online: reversing encrypted output

To decrypt text online, paste the encrypted Base64 string into the input field, enter the same key that was used to encrypt it, and click Decrypt. The tool Base64-decodes the string and XORs each byte with the key to recover the original text. The key must be identical to the one used during encryption, a different key produces garbled output, not an error, because XOR decryption always produces some output.

XOR cipher is a symmetric cipher: the same key and the same operation both encrypts and decrypts. This makes the online text encryption tool symmetric by design. Keep the key secret and share it only through a separate, trusted channel from the encrypted message. The security of this encryption depends entirely on the secrecy and length of the key, a short, guessable key significantly weakens the protection. This tool is suitable for lightweight obfuscation, not for protecting high-value secrets, which require AES or similar industry-standard encryption.

Frequently asked questions

The tool uses XOR cipher combined with Base64 encoding. XOR cipher applies the bitwise XOR operation between each byte of the input and the corresponding byte of the key, cycling through the key for inputs longer than the key. The result is Base64-encoded to produce a readable output string. XOR is a symmetric cipher, the same key and operation are used for both encryption and decryption.

With a strong, long key, XOR cipher is extremely difficult to break without the key. With a short or guessable key, frequency analysis or brute force can recover the plaintext. A key that is as long as or longer than the message (a one-time pad) makes XOR mathematically unbreakable. For practical use, use a key of at least 20 random characters. Do not reuse the same key for multiple messages if maximum security is required.

This tool is suitable for lightweight obfuscation, hiding text from casual observation and passing it through insecure channels with minimal friction. It is not suitable for protecting high-value secrets, financial data, health records, or any information where a motivated attacker with cryptographic expertise might attempt decryption. For sensitive data, use tools that implement AES-GCM, ChaCha20-Poly1305, or other modern authenticated encryption standards.

Share the key through a different channel from the encrypted message. If you send the encrypted text by email, share the key by phone, in person, or through a separate messaging service. Never send the key and the encrypted message through the same channel. If an attacker can read your email and you send both in the same thread, the encryption provides no protection. The security of symmetric encryption depends on keeping the key confidential.

Related tools