I used golang to implement file encryption and decryption, but I don’t know how to use nodejs to implement golang’s decryption.
golang code:
package main
import (
"bytes"
"crypto/aes"
"crypto/cipher"
"crypto/rand"
"io"
"io/ioutil"
"os"
)
func encrypt(aeskey string, filename string) {
plaintext, err := ioutil.ReadFile(filename)
if err != nil {
panic(err.Error())
}
// Byte array of the string
key := []byte(aeskey)
// Create the AES cipher
block, err := aes.NewCipher(key)
if err != nil {
panic(err)
}
// The IV needs to be unique, but not secure. Therefore it's common to
// include it at the beginning of the ciphertext.
ciphertext := make([]byte, aes.BlockSize+len(plaintext))
iv := ciphertext[:aes.BlockSize]
if _, err := io.ReadFull(rand.Reader, iv); err != nil {
panic(err)
}
stream := cipher.NewCFBEncrypter(block, iv)
stream.XORKeyStream(ciphertext[aes.BlockSize:], plaintext)
// create a new file for saving the encrypted data.
f, err := os.Create(filename + ".aes")
if err != nil {
panic(err.Error())
}
_, err = io.Copy(f, bytes.NewReader(ciphertext))
if err != nil {
panic(err.Error())
}
}
func main() {
key := "0123456789123456"
encrypt(key, "1.ts")
}
How can the files encrypted by the above golang code be parsed using nodejs?
I don’t know how to switch to nodejs. It mainly focuses on a few bytes of golang processing. I wrote this myself, but it was wrong. .
var fs = require('fs');
var crypto = require('crypto');
function decrypt(aseKey, inputFile){
var fileBody = fs.readFileSync(inputFile)
var cipher = crypto.createDecipheriv("aes128", Buffer.from(aseKey), fileBody.slice(0,16))
var result = cipher.update(fileBody.slice(16))
fs.writeFileSync(inputFile+".n.ts", result)
}
decrypt("0123456789123456", "1.ts.aes")
Attached is the golang function to decrypt this file
func decrypt(aesKey string, inputFile string) {
ciphertext, err := ioutil.ReadFile(inputFile)
if err != nil {
panic(err.Error())
}
// Key
key := []byte(aesKey)
// Create the AES cipher
block, err := aes.NewCipher(key)
if err != nil {
panic(err)
}
// Before even testing the decryption,
// if the text is too small, then it is incorrect
if len(ciphertext) < aes.BlockSize {
panic("Text is too short")
}
// Get the 16 byte IV
iv := ciphertext[:aes.BlockSize]
// Remove the IV from the ciphertext
ciphertext = ciphertext[aes.BlockSize:]
// Return a decrypted stream
stream := cipher.NewCFBDecrypter(block, iv)
// Decrypt bytes from ciphertext
stream.XORKeyStream(ciphertext, ciphertext)
// create a new file for saving the encrypted data.
f, err := os.Create(inputFile + ".ts")
if err != nil {
panic(err.Error())
}
_, err = io.Copy(f, bytes.NewReader(ciphertext))
if err != nil {
panic(err.Error())
}
}
func main() {
key := "0123456789123456"
decrypt(key, "1.ts.aes")
}
https://github.com/danielecr/aes128encrypter
The following code uses AES192, similar to 128. You can click to view the source code source.