Skip to content

Instantly share code, notes, and snippets.

@adrianlzt
Last active March 8, 2024 05:02
Show Gist options
  • Save adrianlzt/d5c9657e205b57f687f528a5ac59fe0e to your computer and use it in GitHub Desktop.
Save adrianlzt/d5c9657e205b57f687f528a5ac59fe0e to your computer and use it in GitHub Desktop.
Interoperable CryptoJS (defaults) <-> PyCrypto
/*
* CryptoJS by default:
* - uses CBC mode
* - pkcs7 for padding
* - evpKDF to extract key
* - part of the key is used as IV
* - before converting to base64 it makes "Salt__"+salt+encrypted_text
*/
var CryptoJS = require('crypto-js');
var key = 'mysecretkey';
var plaintext = 'secret text';
var encrypted_b64 = CryptoJS.AES.encrypt(plaintext, key);
console.log("encrypted_text (base64) = "+encrypted_b64);
//output_plaintext = CryptoJS.AES.decrypt(encrypted_b64, key);
var bytes = CryptoJS.AES.decrypt("U2FsdGVkX1+9Wl/biuWHpFKFWo1af8aF14CW/zJjw8c=", key);
var output_plaintext = bytes.toString(CryptoJS.enc.Utf8);
console.log("decrypted text = "+output_plaintext);
#
# Encryption with AES-CBC
# Adapted to work with CryptoJS (crypto-js@3.1.9) with default configuration
#
# Python 2.7.13
# pkcs7==0.1.0
# pycrypto==2.6.1
#
import binascii
import struct
import hashlib
from pkcs7 import PKCS7Encoder
from Crypto.Cipher import AES
from Crypto import Random
MODE = AES.MODE_CBC
def evpKDF(passwd, salt, key_size=8, iv_size=4, iterations=1, hash_algorithm="md5"):
"""
https://github.com/Shani-08/ShaniXBMCWork2/blob/master/plugin.video.serialzone/jscrypto.py
"""
target_key_size = key_size + iv_size
derived_bytes = ""
number_of_derived_words = 0
block = None
hasher = hashlib.new(hash_algorithm)
while number_of_derived_words < target_key_size:
if block is not None:
hasher.update(block)
hasher.update(passwd)
hasher.update(salt)
block = hasher.digest()
hasher = hashlib.new(hash_algorithm)
for i in range(1, iterations):
hasher.update(block)
block = hasher.digest()
hasher = hashlib.new(hash_algorithm)
derived_bytes += block[0: min(len(block), (target_key_size - number_of_derived_words) * 4)]
number_of_derived_words += len(block)/4
return {
"key": derived_bytes[0: key_size * 4],
"iv": derived_bytes[key_size * 4:]
}
def encrypt(passphrase, plaintext):
print("passphrase = %s" % passphrase)
print("passphrase = %s" % binascii.b2a_hex(passphrase))
print("plaintext = %s" % plaintext)
print("plaintext = %s" % binascii.b2a_hex(plaintext))
salt = Random.new().read(8)
print("salt = %s" % binascii.b2a_hex(salt))
resp = evpKDF(passphrase, salt, key_size=12)
key = resp.get("key")
iv = key[len(key)-16:]
key = key[:len(key)-16]
print("iv = %s" % binascii.b2a_hex(iv))
print("key = %s" % binascii.b2a_hex(key))
aes = AES.new(key, MODE, iv)
encoder = PKCS7Encoder()
pad_text = encoder.encode(plaintext)
print("pad text = %s" % pad_text)
print("pad text = %s" % binascii.b2a_hex(pad_text))
encrypted_text = aes.encrypt(pad_text)
print("encrypted text = %s" % binascii.b2a_hex(encrypted_text))
concat = "Salted__"+salt+encrypted_text
print("concat=%s" % binascii.b2a_hex(concat))
return binascii.b2a_base64(concat).rstrip()
def decrypt(passphrase, encrypted_text):
encrypted_text_bytes = binascii.a2b_base64(encrypted_text)
print("Original encrypted message = %s" % binascii.b2a_hex(encrypted_text_bytes))
# Remove "Salt__"
encrypted_text_bytes = encrypted_text_bytes[8:]
# Get and remove salt
salt = encrypted_text_bytes[:8]
print("salt = %s" % binascii.b2a_hex(salt))
encrypted_text_bytes = encrypted_text_bytes[8:]
print("encrypted_text_bytes = %s" % binascii.b2a_hex(encrypted_text_bytes))
resp = evpKDF(passphrase, salt, key_size=12)
key = resp.get("key")
iv = key[len(key)-16:]
key = key[:len(key)-16]
print("iv = %s" % binascii.b2a_hex(iv))
print("key = %s" % binascii.b2a_hex(key))
aes = AES.new(key, MODE, iv)
decrypted_text = aes.decrypt(encrypted_text_bytes)
encoder = PKCS7Encoder()
unpad_text = encoder.decode(decrypted_text)
print("unpad_text = %s" % binascii.b2a_hex(unpad_text))
return unpad_text
if __name__ == '__main__':
KEY = 'mysecretkey'
PLAINTEXT = 'secret text'
encrypted_text = encrypt(KEY, PLAINTEXT)
print("encrypted_text (base64)= %s" % encrypted_text)
print("\n\nDECRYPT")
decrypted_text = decrypt(KEY, encrypted_text)
print("decrypted text = %s" % decrypted_text)
@rishabhc32
Copy link

god-bless-you-man-cameo

@Choiyos
Copy link

Choiyos commented Jun 17, 2022

u r my angel bro

@danbailo
Copy link

danbailo commented Feb 17, 2024

tks a lot bro!!!

I've converted it to python 3.11.3 using same libs that u have installed.

Follow the code:

https://gist.github.com/danbailo/4c761a282dc565ef62139a6ec370602c

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment