Simple Python-based messaging tool for secure communications. It leverages military-grade AES-256-GCM encryption. Please note, this tool is provided mainly for demonstration and testing purposes; you should not rely on it if you don't fully understand the code.
The application has four main tabs:
- Recipients - Manage your encryption partners
- Encrypt Message - Create messages to send
- Decrypt Message - Decrypt messages you receive
- Configuration - Application settings
- Click the Recipients tab
- Click "Add New Recipient"
- Enter the recipient's name (avoid special characters)
- Either:
- Click "Generate Key" to create a new AES-256 key
- Paste an existing Base64-encoded key shared by your contact
You must share encryption keys securely with your contacts through a separate, secure channel such as:
- In-person exchange
- Secure file sharing service
- Encrypted email
- Signal/WhatsApp/Telegram
Never share keys through:
- Regular email
- SMS/text messages
- Social media
- Go to the Encrypt Message tab
- Select your recipient from the dropdown menu
- Click "Load Key" - the status should show green checkmark
- Type your message in the text area
- Click "Encrypt Message"
- Click "Copy to Clipboard"
- Send the encrypted message through any communication channel
- Go to the Decrypt Message tab
- Select the sender from the dropdown (must match who sent the message)
- Click "Load Key"
- Paste the encrypted message in the input area
- Click "Decrypt Message"
- Read the decrypted message in the output area
"Invalid key format" error:
- Ensure the key is exactly 32 bytes when Base64 decoded
- Check for extra spaces or characters in the key
- Regenerate the key if corrupted
"Failed to decrypt" error:
- Verify you're using the correct recipient/sender pairing
- Ensure the encrypted message wasn't modified during transmission
- Check that you're using the same key that was used for encryption
✅ Message interception during transmission
✅ Unauthorized access to message content
✅ Message tampering/modification
✅ Passive surveillance of communications
❌ Keyloggers on compromised computers
❌ Screen recording malware
❌ Physical access to unlocked devices
❌ Social engineering attacks
❌ Metadata analysis (who/when you're messaging)
nonce (12 bytes) + ciphertext (variable) + authentication_tag (16 bytes)
Encoded in Base64 with header markers for easy identification.
Strong encryption may be subject to export control regulations in some countries.
Remember that the security of your communications depends not just on tools, but on your overall security practices and OPSEC.