Password-Protect PDFs
Add a password to your PDF to protect it
Drop your PDF file here or
Upload from your device
Upload from Google Drive
Upload from DropBox
Upload from Web address (URL)
Max file size: 128 MB
Powered by GdPicture PDF SDK | Find out more here - PSPDFKit GdPicture.NET PDF
Your files are safe !
We use the best encryption methods to protect your data.
All documents are automatically deleted from our servers after 30 minutes.
If you prefer, you can delete your file manually right after processing by clicking the bin icon.
How to add password protection to protect a PDF online:
- To start, drop your PDF file or upload it from your device or your cloud storage service.
- Enter a password of your choice and confirm it.
- Click on the Lock button to save the password.
- Download the locked PDF file to your computer or save it directly to your cloud storage service.
Blog posts
Did you know?
The art of cryptography is as old as writing since its purpose is to hide the meaning of a text from unwanted eyes. The first testimony can be traced back to 1900 B.C, in Egypt, where a message was encrypted with a system of hieroglyphics replacement. Ciphers are common in the military since Antiquity and the famous Caesar cipher.
During WW2, the Enigma machine played an essential role in protecting the Germans’ private communications.
In computer science, data encryption is the process of encoding unencrypted information (plaintext) into encrypted data (ciphertext) thanks to an encryption algorithm. A password (decryption key) is necessary to decode the text.
With quantum computers, cryptography is rising to another level in the nearest future. Those machines could even break the most sophisticated cryptography systems!
During WW2, the Enigma machine played an essential role in protecting the Germans’ private communications.
In computer science, data encryption is the process of encoding unencrypted information (plaintext) into encrypted data (ciphertext) thanks to an encryption algorithm. A password (decryption key) is necessary to decode the text.
With quantum computers, cryptography is rising to another level in the nearest future. Those machines could even break the most sophisticated cryptography systems!
RC4 and AES are two encryption algorithms used in PDF encryption. They both use symmetric cryptography, a method of encryption that uses the same key to encrypt and decrypt.
Versions 1.5 of PDF and below use RC4 encryption. However, this algorithm no longer offers adequate security and has even been deprecated in PDF 2.0. It was known for its remarkable speed in software, but critical vulnerabilities are making it unsafe. This is where the AES comes in.
AES (Advanced Encryption Standard) is a specification for encrypting electronic data specified in the standard FIPS-197. It is a modern block cipher found in a variety of applications. The only encryption algorithm approved by the NSA, AES-256, has been adopted by the U.S. government and organizations worldwide.
Versions 1.5 of PDF and below use RC4 encryption. However, this algorithm no longer offers adequate security and has even been deprecated in PDF 2.0. It was known for its remarkable speed in software, but critical vulnerabilities are making it unsafe. This is where the AES comes in.
AES (Advanced Encryption Standard) is a specification for encrypting electronic data specified in the standard FIPS-197. It is a modern block cipher found in a variety of applications. The only encryption algorithm approved by the NSA, AES-256, has been adopted by the U.S. government and organizations worldwide.
The length of a password and its encoding constraints depend on the algorithm used by the encryption tool. For instance, RC4 40, RC4 128, and AES-128 only allow the 32 Latin characters in the password, while AES-256 uses the UTF-8 table and Unicode. The goal is to provide a greater choice of symbols and generate a much more complex password.
Keep in mind that you can choose the tools with the most advanced encryption technology in the world, they will become useless if your password is easy to break!
Not only the length of the password matter, but its quality is also essential. Avoid using names and words because the most simple hacking technique is the dictionary attack
Keep in mind that you can choose the tools with the most advanced encryption technology in the world, they will become useless if your password is easy to break!
Not only the length of the password matter, but its quality is also essential. Avoid using names and words because the most simple hacking technique is the dictionary attack