PBE File Encryption/Decryption
Upload file and click on Submit

Choose Rounds
rounds password
Encrypt/Decrypt Encrypt Decrypt

PBEWITHMD5ANDDES
PBEWITHMD5ANDRC2
PBEWITHSHA1ANDRC2
PBEWITHSHA1ANDDES
PBEWITHSHA1ANDRC2_128
PBEWITHSHA1ANDRC2_40
PBEWITHSHA1ANDRC4_128
PBEWITHSHA1ANDRC4_40
PBEWITHSHA1ANDDESEDE
PBEWITHSHAANDIDEA-CBC
PBEWITHSHAAND128BITRC4
PBEWITHMD5ANDTRIPLEDES
PBEWITHSHAAND40BITRC4
PBEWITHMD5AND128BITAES-CBC-OPENSSL
PBEWITHMD5AND192BITAES-CBC-OPENSSL
PBEWITHMD5AND256BITAES-CBC-OPENSSL
PBEWITHSHA256AND128BITAES-CBC-BC
PBEWITHSHA256AND192BITAES-CBC-BC
PBEWITHSHAAND128BITAES-CBC-BC
PBEWITHSHAAND128BITRC2-CBC
PBEWITHSHAAND192BITAES-CBC-BC
PBEWITHSHAAND2-KEYTRIPLEDES-CBC
PBEWITHSHAAND2-KEYTRIPLEDES-CBC
PBEWITHSHAAND256BITAES-CBC-BC
PBEWITHSHAAND3-KEYTRIPLEDES-CBC
PBEWITHSHAAND40BITRC2-CBC


Any private key value that you enter or we generate is not stored on this site, this tool is provided via an HTTPS URL to ensure that private keys cannot be stolen, for extra security run this software on your network, no cloud dependency
Reader Offer The Modern Cryptography CookBook for Just $9 Avail Discount coupon first 100 reader. No hurry read the sample chapters here first



Password Based Encryption (PBE) is specified in e.g. RFC 2898 which specifies the "PKCS #5: Password-Based Cryptography Specification Version 2.0".

PBKDF1 PBKDF1 applies a hash function, which shall be MD2,MD5,SHA-1 to derive keys. The length of the derived key is bounded by the length of the hash function output, which is 16 octets for MD2 and MD5 and 20 octets for SHA-1. PBKDF1 is compatible with the key derivation process in PKCS #5

PBKDF2 applies a pseudorandom function to derive keys. The length of the derived key is essentially unbounded.

How PBE Works?

  • A user supplied password which is remembered by the user.
  • A long with that password text, a random number which is called salt is added and hashed.
  • Using this a AES or a DES encryption key is derived and encrypted.
  • The password text is shared between the two parties exchanging the encrypted content in a secure manner.
  • The receiver, uses the same password and salt and decrypts the content.