Password Protect PDF: AES Encryption That Stays in Your Browser
A free PDF password protector that runs entirely in your browser. Encrypt with AES-128 (universally compatible) or AES-256 (wider security margin), set granular permissions for printing, copying, editing, annotating, and more. The password never leaves your device. Every other free tool (iLovePDF, Smallpdf, PDF24, Sejda) uploads your file and password to their servers; we do not. No signup, no daily limits, no file size cap, no watermark on the output.
Drop your PDF here, or click to choose
Encryption happens in your browser. Your password never leaves your device.
🔒 The PDF and password are processed in your browser. Verify zero uploads in Developer Tools → Network.
Six reasons people choose Gizmoop's PDF protector
What separates browser-side encryption from competitors that send your password to a server.
Password never leaves your device
Encryption uses @cantoo/pdf-lib running locally. Your password is used to derive the key in browser memory and is never sent to any server. iLovePDF, Smallpdf, and PDF24 all process passwords server-side.
AES-128 or AES-256 your choice
Smallpdf only offers AES-128. PDF24 only offers AES-256. We give both. Default AES-128 for universal compatibility; AES-256 for modern readers needing the wider security margin.
Every permission flag, free
Block printing, copying, editing, annotating, form filling, screen-reader access, or document assembly. iLovePDF gates granular permissions behind Premium upsell prompts; we ship them all free.
Owner password vs user password
Set one password to open the document and a separate one to change permissions. Most consumer tools hide this distinction.
Password strength meter
Live feedback as you type. The meter checks length, character mix, and basic patterns to nudge you toward a password actually worth using.
No upload, no signup, no limits
Smallpdf caps free use at 2 tasks per day. Sejda caps at 3 tasks per hour. Gizmoop has no caps because the file never leaves your browser.
When you should password-protect a PDF
Real workflows where encryption is the right answer, not optional polish.
Sharing tax returns and financial PDFs
Email a password-protected tax return to your accountant. Share the password by a different channel (SMS or phone). The PDF cannot be opened by someone who only intercepts the email.
Sending contracts to clients
Protect draft contracts before sending so they cannot be forwarded and opened by unintended recipients. Add a separate owner password to block edits.
Locking down medical records
Patients sometimes need to send health records to other providers. AES encryption protects the data in transit and at rest on the recipient's machine.
Internal HR documents
Performance reviews, salary letters, and termination paperwork all benefit from password protection so they are not opened in a shared inbox by someone who should not see them.
Legal exhibits and discovery
Confidential legal documents being shared between parties need protection. AES-256 plus owner-password permission lockdown matches typical legal-protocol expectations.
Student records and report cards
Schools sharing report cards or transcripts with parents over email can password-protect them so a misaddressed email does not expose grades.
About password-protecting PDFs
How encryption actually works inside a PDF, why the password should never leave your device, and how Gizmoop compares to the alternatives.
How PDF encryption actually works
PDF encryption follows the PDF specification (ISO 32000) and uses one of three algorithms depending on the PDF version. RC4 was the original, used in PDF 1.4 and earlier; it is now considered obsolete and is no longer the default in any reputable tool. AES-128 (PDF 1.6) is the modern default: a symmetric block cipher with a 128-bit key. AES-256 (PDF 1.7 Extension Level 3) is the newer option with a 256-bit key. Both AES variants are considered secure against brute force; the difference is mostly a wider security margin for AES-256 and slightly stricter password handling.
When you protect a PDF, the tool generates a random encryption key, encrypts the page content streams with that key, and then encrypts the key itself using a value derived from your password. To open the file later, a reader takes the password you type, derives the same value, decrypts the key, and uses the key to decrypt the pages. The PDF stores the security dictionary (algorithm, parameters, encrypted key) but does not store your password directly; that means once you lose the password, the file cannot be opened by anyone.
Why a browser-based tool is safer for this
Every other free PDF protection tool requires uploading both the file and the password to their server. The server encrypts the file and then (according to the tool's privacy policy) deletes both. Smallpdf says one hour. iLovePDF says two hours. PDF24 says one hour. Even with strong transport encryption and a stated deletion policy, this is more exposure than necessary. A password that ever leaves your device, even briefly, is a password that could be logged, intercepted, or leaked.
Gizmoop's protector uses @cantoo/pdf-lib (the maintained MIT-licensed fork of pdf-lib with encryption support). All cryptographic operations run in your browser tab, using your browser's built-in crypto primitives. The password is read from the input box into a JavaScript string, used to derive the key, and then dropped from memory when the operation finishes. No part of it reaches our infrastructure. You can verify this by opening Developer Tools, switching to the Network tab, and watching what happens when you click Protect: no requests carrying your file or password go out.
User password vs. owner password
PDF encryption supports two distinct passwords. The user password (sometimes called the "open password") is required to open the document. Without it, the reader cannot decrypt any page. The owner password (sometimes called the "permissions password") controls who can change permissions like enabling printing or copying. A user who knows only the user password can open and read the file but cannot bypass any restrictions the owner set.
For most simple use cases, both passwords are the same. Set one password, share it with the recipient, and that recipient can both open and (if they really need to) change permissions. For advanced use cases like sending a document to a client who should view it but never edit it, set distinct user and owner passwords. The client gets only the user password.
Choosing AES-128 vs. AES-256
AES-128 is the default in our tool because every PDF reader from 2006 onward supports it. Adobe Reader, Preview, Chrome's PDF viewer, Edge, Foxit, Sumatra, Okular, and every modern mobile reader all open AES-128 encrypted PDFs without complaint. The 128-bit key has no known practical attacks; brute-forcing it would take billions of years with current computers.
AES-256 (PDF 1.7 Extension Level 3) is supported by Adobe Reader 9 (2008) and later, modern Preview, recent Chrome and Edge, Foxit, and most current readers. Older readers or specialized PDF tools may fail to open AES-256 files. The wider security margin of AES-256 is unlikely to matter for any threat model that does not already justify enterprise-grade key management. Default to AES-128; switch to AES-256 only if your environment requires it.
Permissions you can lock down
The PDF spec defines several permission flags. Printing can be allowed (high resolution or low resolution only) or blocked. Copying text and images can be allowed or blocked. Modifying the document (adding pages, editing text, repositioning content) can be allowed or blocked. Annotating (highlights, comments, sticky notes) can be allowed or blocked separately. Filling form fields can be allowed even when modifying is blocked. Content access for screen readers can be allowed (recommended for accessibility) or blocked. Document assembly (insert, delete, rotate pages) can be allowed or blocked.
Important caveat: permissions are an honor-system signal. Most reputable readers respect them, but specialized tools can bypass them if the owner password is unknown. They are not a substitute for encryption when you actually want to control who can see content; they are a way to discourage casual misuse by people who can already open the file.
What encryption does not protect against
Encryption protects the file. It does not protect against a recipient who has the password from then using the content however they like. Once someone opens the PDF, they can read it, screenshot it, retype it, photograph the screen, or rebuild it page by page. PDF encryption is not DRM. If your threat model includes a recipient with intent to leak, no PDF tool will help you; you need contractual or technical controls outside the document itself.
Password strength matters more than algorithm
AES-128 and AES-256 are equally vulnerable to one thing: a weak password. The encryption key is derived from your password, so guessing the password is equivalent to having the key. Use a long password (12+ characters), mix uppercase, lowercase, digits, and symbols, and never reuse a password from another account. The strength meter in our tool gives a quick read but ultimately your password is your responsibility. Tools like Bitwarden or 1Password can generate genuinely strong unique passwords.
Sharing the password safely
Send the password via a different channel than the file. If you email the PDF, send the password by SMS, phone call, or in a separate encrypted messenger like Signal. Never send the password in the same email as the file (an attacker who reads the email gets both). For organizational use, share passwords through a password manager's sharing feature.
Working with already-protected PDFs
The tool can re-protect a PDF that you have already opened with a known password. Use our Unlock PDF tool first to remove the existing protection (you must know the password; the tool does not crack passwords), then run the unlocked file through Protect PDF with a new password. If you need to change the permissions on a protected PDF without changing the user password, the same unlock-then-reprotect workflow applies.
Comparison with iLovePDF, Smallpdf, PDF24, Sejda
iLovePDF: requires upload; gates granular permissions behind Premium prompts; 100 MB free file cap. Smallpdf: requires upload; only AES-128; caps free at 2 tasks/day. PDF24: requires upload; only AES-256; otherwise the most generous free tier among server-based tools. Sejda: requires upload; capped at 50 MB and 3 tasks per hour on free. Gizmoop: no upload, both AES-128 and AES-256, every permission flag, no quota, no signup, no file size cap. The combination is unique among free PDF tools.
What if you forget the password?
You will not be able to open the file. We cannot recover it because the password was never sent to us. No reputable tool can crack a properly chosen AES password in reasonable time. Save the password in a password manager before sharing the encrypted file. If you forget the password on a PDF you encrypted with a weak password, dictionary attacks may eventually succeed, but the time investment is significant and unreliable. Treat the password as the single point of failure that it actually is.
Frequently asked questions
If you don't find your question here, ask us directly.
Drop your PDF into the tool, enter a password, optionally adjust the encryption strength (AES-128 default) and permissions, then click Protect PDF. Download the encrypted file. Everything runs in your browser; your password never leaves your device.
No. Encryption uses @cantoo/pdf-lib running in your browser. The password is used to derive the encryption key locally and is never sent to any server. iLovePDF, Smallpdf, and PDF24 all process passwords on their servers; we do not.
The user password is required to open and view the PDF. The owner password is required to change permissions like enabling printing or copying. By default we use the same password for both. Toggle "Use a separate owner password" if you want viewers to open the file but be unable to modify permissions.
Yes. AES-128 has no known practical attacks. Breaking it by brute force would take billions of years with current computing. AES-256 offers a wider security margin but is overkill for most documents. We default to AES-128 because every PDF reader supports it; AES-256 (PDF 1.7 Extension Level 3) needs a modern reader.
Printing (high res / low res / blocked), copying text or images, editing/modifying, adding annotations, filling forms, screen-reader access, and document assembly (insert/delete/rotate pages). Each is independent. iLovePDF gates granular permissions behind upsell prompts; we ship every flag free.
Yes. AES-128 (PDF 1.6) is universally supported. AES-256 (PDF 1.7 Ext. Level 3) is supported by Acrobat Reader 9+ (2008+), modern Preview, recent Chrome/Edge, Foxit, and most other current readers. For maximum compatibility use AES-128.
Most PDF readers honor the permission flags. However, the permissions are an honor-system signal in the PDF format. Dedicated PDF tools can ignore them if the owner password is unknown. For absolute content security against a determined adversary, password protection is not enough; treat PDFs the way you treat any document, not as DRM.
No. No PDF tool can prevent screenshots; the content has to render on screen to be read, and rendered pixels can always be captured. PDF password protection protects against opening the file and against bulk extraction of text or images by software respecting the permissions. It does not protect against a person taking a picture.
Currently the tool handles one PDF at a time. For batch protection of multiple PDFs that share a password, repeat the drop-protect-download flow per file. Since there are no quotas, you can run as many as you need. A future version may add batch mode.
You will not be able to open the PDF, and we cannot recover it. Encryption is one-way: the password is needed to derive the decryption key. Save the password in a password manager (Bitwarden, 1Password, LastPass) before sharing the encrypted file.
All four upload your file and password to their servers. Smallpdf claims AES-128 only. PDF24 offers AES-256. iLovePDF gates granular permissions behind a Premium upsell. Sejda caps free use at 50 MB / 3 tasks per hour. Gizmoop offers both AES-128 and AES-256, all permissions, no quota, no upload.
Roughly. Encryption adds a small overhead (a few hundred bytes for the security dictionary). For typical documents the difference is under 1%. Compression of the actual content does not change; for size reduction, run the file through our Compress PDF tool first, then protect.
Yes. Use at least 12 characters mixing uppercase, lowercase, digits, and symbols. The strength meter in the tool gives a quick check. Even strong PDF encryption is only as strong as the password chosen. Avoid reuse: never use a password you have used elsewhere.
Related tools
Try our other free PDF tools
Unlock, compress, watermark, page numbers. All browser-based, all unlimited.