Encrypt Your Data
Enter the recipient's ML-KEM public key and your data below. You can paste text (up to 1KB) or upload a file (up to 5MB). The tool will automatically detect the ML-KEM variant based on the public key.
How to Use This Tool
Use Scenario: Alice wants to receive encrypted data from Bob. Bob uses Alice's public key to encrypt the data with this tool (generate ML-KEM encryption), then sends the encrypted data to Alice. Alice can decrypt it with her private key using our decryption tool.
Security Assurance
Your data is processed in memory and not stored. For details, see our Privacy Policy.