我用golang實作了檔案加密解密,但我不知道如何使用nodejs來實作golang的揭密。
golang程式碼:
package main
import (
"bytes"
"crypto/aes"
"crypto/cipher"
"crypto/rand"
"io"
"io/ioutil"
"os"
)
func encrypt(aeskey string, filename string) {
plaintext, err := ioutil.ReadFile(filename)
if err != nil {
panic(err.Error())
}
// Byte array of the string
key := []byte(aeskey)
// Create the AES cipher
block, err := aes.NewCipher(key)
if err != nil {
panic(err)
}
// The IV needs to be unique, but not secure. Therefore it's common to
// include it at the beginning of the ciphertext.
ciphertext := make([]byte, aes.BlockSize+len(plaintext))
iv := ciphertext[:aes.BlockSize]
if _, err := io.ReadFull(rand.Reader, iv); err != nil {
panic(err)
}
stream := cipher.NewCFBEncrypter(block, iv)
stream.XORKeyStream(ciphertext[aes.BlockSize:], plaintext)
// create a new file for saving the encrypted data.
f, err := os.Create(filename + ".aes")
if err != nil {
panic(err.Error())
}
_, err = io.Copy(f, bytes.NewReader(ciphertext))
if err != nil {
panic(err.Error())
}
}
func main() {
key := "0123456789123456"
encrypt(key, "1.ts")
}
透過以上golang程式碼加密的文件,如果用nodejs解析出來?
不知道轉nodejs 主要集中 golang的幾個byte處理。這是自己寫的,但是是錯誤的。 。
var fs = require('fs');
var crypto = require('crypto');
function decrypt(aseKey, inputFile){
var fileBody = fs.readFileSync(inputFile)
var cipher = crypto.createDecipheriv("aes128", Buffer.from(aseKey), fileBody.slice(0,16))
var result = cipher.update(fileBody.slice(16))
fs.writeFileSync(inputFile+".n.ts", result)
}
decrypt("0123456789123456", "1.ts.aes")
附golang解密這個檔案的函數
func decrypt(aesKey string, inputFile string) {
ciphertext, err := ioutil.ReadFile(inputFile)
if err != nil {
panic(err.Error())
}
// Key
key := []byte(aesKey)
// Create the AES cipher
block, err := aes.NewCipher(key)
if err != nil {
panic(err)
}
// Before even testing the decryption,
// if the text is too small, then it is incorrect
if len(ciphertext) < aes.BlockSize {
panic("Text is too short")
}
// Get the 16 byte IV
iv := ciphertext[:aes.BlockSize]
// Remove the IV from the ciphertext
ciphertext = ciphertext[aes.BlockSize:]
// Return a decrypted stream
stream := cipher.NewCFBDecrypter(block, iv)
// Decrypt bytes from ciphertext
stream.XORKeyStream(ciphertext, ciphertext)
// create a new file for saving the encrypted data.
f, err := os.Create(inputFile + ".ts")
if err != nil {
panic(err.Error())
}
_, err = io.Copy(f, bytes.NewReader(ciphertext))
if err != nil {
panic(err.Error())
}
}
func main() {
key := "0123456789123456"
decrypt(key, "1.ts.aes")
}
https://github.com/danielecr/aes128crypter
以下程式碼採用AES192,128的類似,原始碼出處可點選查看。
雷雷