Last active
October 11, 2024 11:31
-
-
Save jumoog/44387fe0c125ca2b1a48431d0da3abe4 to your computer and use it in GitHub Desktop.
aes256Decrypt in different languages
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
using System; | |
using System.IO; | |
using System.Security.Cryptography; | |
using System.Text; | |
namespace ConsoleApp | |
{ | |
internal class Program | |
{ | |
static void Main(string[] args) | |
{ | |
Console.WriteLine(Decrypt(new byte[] { 0x37, 0x21, 0xa5, 0xd1, 0xd2, 0x26, 0x78, 0x48, 0x89, 0xd6, 0xe3, 0x42, 0x33, 0x7c, 0x12, 0x9a }, "MYSUPERSECRECTKEYDONTLEAKIT!!!!!")); | |
Console.WriteLine(Encrypt("my secrect code", "MYSUPERSECRECTKEYDONTLEAKIT!!!!!")); | |
} | |
public static string Encrypt(string plainText, string keyString) | |
{ | |
byte[] cipherData; | |
byte[] key = Encoding.UTF8.GetBytes(keyString); | |
// resize like WinCC OA | |
Array.Resize(ref key, 32); | |
Aes aes = Aes.Create(); | |
aes.Mode = CipherMode.CBC; | |
aes.Padding = PaddingMode.Zeros; | |
aes.Key = key; | |
aes.IV = new byte[16]; | |
ICryptoTransform cipher = aes.CreateEncryptor(aes.Key, aes.IV); | |
using (MemoryStream ms = new MemoryStream()) | |
{ | |
using (CryptoStream cs = new CryptoStream(ms, cipher, CryptoStreamMode.Write)) | |
{ | |
using (StreamWriter sw = new StreamWriter(cs)) | |
{ | |
sw.Write(plainText); | |
} | |
} | |
cipherData = ms.ToArray(); | |
} | |
return Convert.ToHexString(cipherData); | |
} | |
public static string Decrypt(byte[] combinedData, string keyString) | |
{ | |
string plainText; | |
byte[] key = Encoding.UTF8.GetBytes(keyString); | |
// resize like WinCC OA | |
Array.Resize(ref key, 32); | |
Aes aes = Aes.Create(); | |
aes.Mode = CipherMode.CBC; | |
aes.Padding = PaddingMode.Zeros; | |
aes.Key = key; | |
aes.IV = new byte[16]; | |
ICryptoTransform decipher = aes.CreateDecryptor(aes.Key, aes.IV); | |
using (MemoryStream ms = new MemoryStream(combinedData)) | |
{ | |
using (CryptoStream cs = new CryptoStream(ms, decipher, CryptoStreamMode.Read)) | |
{ | |
using (StreamReader sr = new StreamReader(cs)) | |
{ | |
plainText = sr.ReadToEnd(); | |
} | |
} | |
return plainText; | |
} | |
} | |
} | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package main | |
import ( | |
"bytes" | |
"crypto/aes" | |
"crypto/cipher" | |
"encoding/hex" | |
"fmt" | |
) | |
func main() { | |
// Example decryption using the given byte array and key | |
decrypted, _ := Decrypt([]byte{0x37, 0x21, 0xa5, 0xd1, 0xd2, 0x26, 0x78, 0x48, 0x89, 0xd6, 0xe3, 0x42, 0x33, 0x7c, 0x12, 0x9a}, "MYSUPERSECRECTKEYDONTLEAKIT!!!!!") | |
fmt.Println("Decrypted:", decrypted) | |
// Example encryption using a plain text and key | |
encrypted := Encrypt("my secrect code", "MYSUPERSECRECTKEYDONTLEAKIT!!!!!") | |
fmt.Println("Encrypted:", encrypted) | |
} | |
func Encrypt(plainText, keyString string) string { | |
// Resize key to 32 bytes (AES-256) | |
key := []byte(keyString) | |
if len(key) > 32 { | |
key = key[:32] | |
} else { | |
key = append(key, make([]byte, 32-len(key))...) | |
} | |
// Create AES cipher with the key | |
block, err := aes.NewCipher(key) | |
if err != nil { | |
panic(err) | |
} | |
// Initialize the IV (set to 0s, as in the original code) | |
iv := make([]byte, aes.BlockSize) | |
// Use AES in CBC mode | |
mode := cipher.NewCBCEncrypter(block, iv) | |
// Apply zero padding to the plain text | |
paddingLength := aes.BlockSize - (len(plainText) % aes.BlockSize) | |
paddedText := append([]byte(plainText), bytes.Repeat([]byte{0}, paddingLength)...) | |
// Allocate space for the encrypted data | |
cipherText := make([]byte, len(paddedText)) | |
// Perform encryption | |
mode.CryptBlocks(cipherText, paddedText) | |
// Convert the encrypted data to a hex string | |
return hex.EncodeToString(cipherText) | |
} | |
func Decrypt(cipherData []byte, keyString string) (string, error) { | |
// Resize key to 32 bytes (AES-256) | |
key := []byte(keyString) | |
if len(key) > 32 { | |
key = key[:32] | |
} else { | |
key = append(key, make([]byte, 32-len(key))...) | |
} | |
// Create AES cipher with the key | |
block, err := aes.NewCipher(key) | |
if err != nil { | |
return "", err | |
} | |
// Initialize the IV (set to 0s, as in the original code) | |
iv := make([]byte, aes.BlockSize) | |
// Use AES in CBC mode | |
mode := cipher.NewCBCDecrypter(block, iv) | |
// Allocate space for the decrypted data | |
plainText := make([]byte, len(cipherData)) | |
// Perform decryption | |
mode.CryptBlocks(plainText, cipherData) | |
// Trim zero padding from the decrypted plain text | |
plainText = bytes.TrimRight(plainText, "\x00") | |
return string(plainText), nil | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
main() | |
{ | |
string password; | |
string enc = "3721A5D1D226784889D6E342337C129A"; | |
aes256Decrypt((blob)enc, "MYSUPERSECRECTKEYDONTLEAKIT!!!!!", password); | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment