Note that there are some explanatory texts on larger screens.

plurals
  1. POEncryption method for iPhone and Android
    primarykey
    data
    text
    <p>I have tried to generate an encrypted text using AES algorithm In both ( Android and IPhone ) platforms but the problem is even we use the same encryption decryption library (AES-128) and with the same fixed variables ( Key , IV ,mode) but I get two different result for them.</p> <p>I appreciate any help . :(</p> <p>The below code presents the used encryption and decryption methods ,</p> <p><strong>Code version for Android:</strong></p> <ul> <li>Key = “123456789abcdefg” ; <ul> <li>IV = “1111111111111111” ;</li> <li>Plain text = “HelloThere”;</li> <li>Mode = “AES/CBC/NoPadding” ;</li> </ul></li> </ul> <p>Code :</p> <pre><code> public class Crypto { public static String encrypt(String seed, String cleartext) throws Exception { byte[] rawKey = getRawKey(seed.getBytes()); byte[] result = encrypt(rawKey, cleartext.getBytes()); return toHex(result); } public static String decrypt(String seed, String encrypted) throws Exception { byte[] rawKey = getRawKey(seed.getBytes()); byte[] enc = toByte(encrypted); byte[] result = decrypt(rawKey, enc); return new String(result); } private static byte[] getRawKey(byte[] seed) throws Exception { KeyGenerator kgen = KeyGenerator.getInstance(“CBC”); SecureRandom sr = SecureRandom.getInstance(“SHA1PRNG”); sr.setSeed(seed); kgen.init(128, sr); // 192 and 256 bits may not be available SecretKey skey = kgen.generateKey(); byte[] raw = skey.getEncoded(); return raw; } private static byte[] encrypt(byte[] raw, byte[] clear) throws Exception { SecretKeySpec skeySpec = new SecretKeySpec(raw, “AES”); Cipher cipher = Cipher.getInstance(“AES”); cipher.init(Cipher.ENCRYPT_MODE, skeySpec); byte[] encrypted = cipher.doFinal(clear); return encrypted; } private static byte[] decrypt(byte[] raw, byte[] encrypted) throws Exception { SecretKeySpec skeySpec = new SecretKeySpec(raw, “AES”); Cipher cipher = Cipher.getInstance(“AES”); cipher.init(Cipher.DECRYPT_MODE, skeySpec); byte[] decrypted = cipher.doFinal(encrypted); return decrypted; } public static String toHex(String txt) { return toHex(txt.getBytes()); } public static String fromHex(String hex) { return new String(toByte(hex)); } public static byte[] toByte(String hexString) { int len = hexString.length()/2; byte[] result = new byte[len]; for (int i = 0; i &lt; len; i++) result[i] = Integer.valueOf(hexString.substring(2*i, 2*i+2), 16).byteValue(); return result; } public static String toHex(byte[] buf) { if (buf == null) return “”; StringBuffer result = new StringBuffer(2*buf.length); for (int i = 0; i &lt; buf.length; i++) { appendHex(result, buf[i]); } return result.toString(); } private final static String HEX = “0123456789ABCDEF”; private static void appendHex(StringBuffer sb, byte b) { sb.append(HEX.charAt((b»4)&amp;0x0f)).append(HEX.charAt(b&amp;0x0f)); } </code></pre> <p>}</p> <p><strong>Code version for IPhone:</strong></p> <pre><code>- (NSData *) transform:(CCOperation) encryptOrDecrypt data:(NSData *) inputData { NSData* secretKey = [Cipher md5:cipherKey]; CCCryptorRef cryptor = NULL; CCCryptorStatus status = kCCSuccess; uint8_t iv[kCCBlockSizeAES128]; memset((void *) iv, 0x0, (size_t) sizeof(iv)); status = CCCryptorCreate(encryptOrDecrypt, kCCAlgorithmAES128, kCCOptionPKCS7Padding, [secretKey bytes], kCCKeySizeAES128, iv, &amp;cryptor); if (status != kCCSuccess) { return nil; } size_t bufsize = CCCryptorGetOutputLength(cryptor, (size_t)[inputData length], true); void * buf = malloc(bufsize * sizeof(uint8_t)); memset(buf, 0x0, bufsize); size_t bufused = 0; size_t bytesTotal = 0; status = CCCryptorUpdate(cryptor, [inputData bytes], (size_t)[inputData length], buf, bufsize, &amp;bufused); if (status != kCCSuccess) { free(buf); CCCryptorRelease(cryptor); return nil; } bytesTotal += bufused; status = CCCryptorFinal(cryptor, buf + bufused, bufsize - bufused, &amp;bufused); if (status != kCCSuccess) { free(buf); CCCryptorRelease(cryptor); return nil; } bytesTotal += bufused; CCCryptorRelease(cryptor); return [NSData dataWithBytesNoCopy:buf length:bytesTotal]; </code></pre> <p>}</p> <pre><code> + (NSData *) md5:(NSString *) stringToHash { const char *src = [stringToHash UTF8String]; unsigned char result[CC_MD5_DIGEST_LENGTH]; CC_MD5(src, strlen(src), result); return [NSData dataWithBytes:result length:CC_MD5_DIGEST_LENGTH]; </code></pre> <p>}</p> <p><strong>Some of my references :</strong></p> <ul> <li><p><a href="http://automagical.rationalmind.net/2009/02/12/aes-interoperability-between-net-and-iphone/" rel="nofollow">http://automagical.rationalmind.net/2009/02/12/aes-interoperability-between-net-and-iphone/</a></p></li> <li><p><a href="http://code.google.com/p/aes-encryption-samples/wiki/HowToEncryptWithJava" rel="nofollow">http://code.google.com/p/aes-encryption-samples/wiki/HowToEncryptWithJava</a></p></li> </ul>
    singulars
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    plurals
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload