Developer Documentation & Technical Information
This page offers insights into the technical implementation, cryptographic methods, and development aspects of the Encrypti0n.com Web App , supporting transparency and encouraging open collaboration.
This developer documentation highlights the browser-based cryptography behind Encrypti0n.com , focusing on AES-GCM , and the Web Crypto API .
Cryptographic Libraries & APIs Used
Encrypti0n.com uses modern browser-native cryptographic libraries:
window.crypto
: Secure random number generation and cryptographic operations.window.crypto.subtle
: Provides essential cryptographic primitives like AES-GCM encryption/decryption and key imports.antelle/argon2-browser
: Provides the Argon2id key derivation implementation for browsers (GitHub).
Some APIs are part of the Web Crypto API specification , offering robust, secure cryptographic functions directly within supported browsers.
Other Libraries Used
Bootstrap v5
: Custom Bootstrap 5 template for the pages design (Official Page).jQuery v3.6.0
: Used for all DOM manipulation (Official Page).SweetAlert2
: For the informational popups (Official Page).HighlightJS v11.9
: For code highlighting (Official Page).
Open Source Code Availability
Encrypti0n.com strongly believes in transparency, which is why the complete source code is openly available on GitHub:
Encrypti0n.com GitHub Repository
Developers, researchers, and privacy enthusiasts are encouraged to inspect, review, and contribute to enhance the project's reliability and security.
Internal Error Handling Mechanism
Encrypti0n.com uses precise and secure error handling aligned with the tamper-proof nature of AES-GCM encryption:
- AES-GCM Decryption Errors: When decrypting data, the Web Crypto API returns explicit errors if the provided key, nonce, or ciphertext is incorrect, indicating potential tampering or incorrect passwords.
- Tamper-proof Encryption: AES-GCM inherently provides authentication, meaning any alteration to the encrypted data will result in failed decryption, immediately alerting the user.
This ensures reliable security by always returning an error (e.g., wrong passwords) or potential data corruption or attacks. Read more here, in the Official Web Crypto API "Decrypt Method" Docs .
For a step-by-step breakdown of encryption and decryption processes , visit our How Encrypti0n.com Works page.
Example-Code:
try {
decryptedData = await window.crypto.subtle.decrypt(
{ name: "AES-GCM", iv: iv },
derivedKey,
encryptedData
);
} catch (error) {
displayError("Decryption failed: Incorrect password or data integrity compromised.");
}
Browser Compatibility Notes
Encrypti0n.com depends on the Web Crypto API , widely supported by modern browsers. The following browsers are confirmed to support necessary cryptographic APIs:
- Google Chrome: Supported since version 37 (August 2014)
- Mozilla Firefox: Supported since version 34 (December 2014)
- Microsoft Edge: Supported since initial release (EdgeHTML) and fully in Edge Chromium (January 2020)
- Apple Safari: Supported since version 11 (September 2017)
- Opera: Supported since version 24 (September 2014)
Older or legacy browsers (such as Internet Explorer or significantly outdated browser versions) might lack proper Web Crypto API implementation, causing compatibility issues. Users are advised to update their browsers for full functionality and security.
Encrypti0n.com continues to embrace open standards and transparency, fostering a secure and reliable encryption solution available directly in your browser.