🔒 AES-256-GCM
Very Strong Needs Password Reversible
Industry-standard symmetric encryption. Uses PBKDF2 key derivation with 100,000 iterations. The only truly secure option here — safe for sensitive data.
📦 Base64
Encoding only No Key Reversible
Not encryption — just encoding. Converts text to a safe ASCII format. Widely used in email, data URIs, and APIs. Anyone can decode it instantly.
🔄 ROT13
Very Weak No Key Reversible
Rotates each letter by 13 positions. Encrypt and decrypt are the same operation. Used for hiding spoilers, not for security.
🏛️ Caesar Cipher
Very Weak Shift Key Reversible
Shifts each letter by a fixed amount (1–25). Used by Julius Caesar for military messages. Trivial to break by brute force (only 25 possibilities).
🔃 Atbash
Very Weak No Key Reversible
Reverses the alphabet: A↔Z, B↔Y, etc. Ancient Hebrew cipher. Encrypt and decrypt are the same operation. No security value.
🗝️ Vigenère
Weak Text Key Reversible
Polyalphabetic substitution using a keyword. Much stronger than Caesar but broken by frequency analysis. Historical fun only — not for real security.
📡 Morse Code
Encoding No Key Reversible
Converts text to dots and dashes. Developed in the 1830s for telegraph communication. Not encryption — purely encoding. Widely recognizable.
💻 Binary
Encoding No Key Reversible
Converts each character to its 8-bit binary representation (0s and 1s). Not encryption — just a different way to represent text. Fully reversible.
🧮 Hexadecimal
Encoding No Key Reversible
Converts each character to its hex representation (base-16). Used in programming, color codes, and low-level data representation.
🌐 URL Encode
Encoding No Key Reversible
Encodes special characters for safe use in URLs (e.g. spaces become %20). Not encryption. Standard in web development for query strings and form data.