AES-256 Encryption API - Free Text Encryption
Send plaintext and a password to receive AES-256-GCM encrypted ciphertext. The encryption uses a unique IV for every request, ensuring identical inputs produce different outputs. Your plaintext and password are processed in memory and never stored or logged.
Code examples
curl -X POST https://api.botoi.com/v1/encrypt/encrypt \
-H "Content-Type: application/json" \
-d '{"plaintext":"secret message","password":"my-strong-password-2026"}'When to use this API
Encrypt sensitive config values before storing in a database
Encrypt API keys, tokens, or connection strings before writing them to your config table. Decrypt them at runtime with the paired decrypt endpoint. This adds a layer of protection if your database is compromised.
Encrypt data in transit between microservices
When passing sensitive payloads (PII, payment tokens) between services over internal networks, encrypt the payload at the sender and decrypt at the receiver. Protects against packet sniffing on shared infrastructure.
Build a client-side secrets manager prototype
Encrypt user-provided secrets (passwords, notes) server-side and return the ciphertext for the client to store locally. The server never persists the data; the user controls where the encrypted blob lives.
Frequently asked questions
Are my plaintext and password stored or logged?
Why does encrypting the same text twice produce different results?
How is the encryption key derived from my password?
Can I decrypt the output with my own code instead of the decrypt endpoint?
Is AES-256-GCM secure enough for production use?
Get your API key
Free tier includes 5 requests per minute with no credit card required. Upgrade for higher limits.