Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Node.js) AES GCM Encrypt and Decrypt a FileSee more Encryption ExamplesDemonstrates how to AES GCM encrypt and decrypt a file.
var os = require('os'); if (os.platform() == 'win32') { if (os.arch() == 'ia32') { var chilkat = require('@chilkat/ck-node21-win-ia32'); } else { var chilkat = require('@chilkat/ck-node21-win64'); } } else if (os.platform() == 'linux') { if (os.arch() == 'arm') { var chilkat = require('@chilkat/ck-node21-arm'); } else if (os.arch() == 'x86') { var chilkat = require('@chilkat/ck-node21-linux32'); } else { var chilkat = require('@chilkat/ck-node21-linux64'); } } else if (os.platform() == 'darwin') { if (os.arch() == 'arm64') { var chilkat = require('@chilkat/ck-node21-mac-m1'); } else { var chilkat = require('@chilkat/ck-node21-macosx'); } } function chilkatExample() { // This example assumes the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. var crypt = new chilkat.Crypt2(); // Set the encryption algorithm to "AES" crypt.CryptAlgorithm = "aes"; // Indicate that the Galois/Counter Mode (GCM) should be used: crypt.CipherMode = "gcm"; // KeyLength may be 128, 192, 256 crypt.KeyLength = 256; // This is the 256-bit AES secret key (in hex format) var K = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F"; // This is the 16-byte initialization vector (in hex format) var IV = "000102030405060708090A0B0C0D0E0F"; // This is the OPTIONAL additional data (in hex format) to be used as input to the GCM AEAD algorithm, // but is not included in the output. It plays a role in the computation of the // resulting authenticated tag. var AAD = "feedfacedeadbeeffeedfacedeadbeefabaddad2"; // Set the secret key and IV crypt.SetEncodedIV(IV,"hex"); crypt.SetEncodedKey(K,"hex"); // Set the additional authenticated data (AAD) var success = crypt.SetEncodedAad(AAD,"hex"); // Encrypt a file. var inFile = "qa_data/hamlet.xml"; var outFile = "c:/temp/qa_output/hamlet_aes_gcm.enc"; success = crypt.CkEncryptFile(inFile,outFile); if (success == false) { console.log(crypt.LastErrorText); return; } // Get the authentication tag in hex format var authTag = crypt.GetEncodedAuthTag("hex"); console.log("authentication tag = " + authTag); // Decrypt.. // Before decrypting, you must provide the expected authentication tag. // The decrypt will fail if the resulting authentication tag computed while decrypting is not equal to the // expected authentication tag. crypt.SetEncodedAuthTag(authTag,"hex"); inFile = outFile; outFile = "c:/temp/qa_output/hamlet_restored.xml"; success = crypt.CkDecryptFile(inFile,outFile); if (success == false) { console.log(crypt.LastErrorText); return; } console.log("Success."); // -------------------------------------------------------------------------------------------- // About AES-GCM: // AES-GCM (Advanced Encryption Standard - Galois/Counter Mode) is a widely-used // encryption mode that provides both confidentiality (encryption) and // integrity/authentication (data integrity verification) in one operation. It is // commonly used in secure communications due to its efficiency and strong security // properties. // // Key Concepts: // // AES (Advanced Encryption Standard): // // AES is a symmetric encryption algorithm, meaning the same key is used // for both encryption and decryption. // // It operates on fixed-size blocks of data (128 bits) using key sizes of // 128, 192, or 256 bits. // // In AES-GCM, AES is used to perform the actual data encryption. // // GCM (Galois/Counter Mode): // // Counter Mode (CTR): GCM uses counter mode for encryption. In this mode, // a nonce (or initialization vector, IV) and a counter are combined and encrypted // with AES. The result is XORed with the plaintext to produce the ciphertext. // // Galois Mode (GMAC): GCM also includes an authentication mechanism based // on a Galois field. It generates an authentication tag, which ensures the // integrity of both the ciphertext and any additional data (called AAD - // Additional Authenticated Data). This tag is verified during decryption to ensure // that the data hasn't been tampered with. // // Key Features: // // Confidentiality (Encryption): // // The plaintext is encrypted using AES in counter mode. Each block of // plaintext is XORed with the output of AES applied to a combination of the IV and // an incremented counter. // // Integrity (Authentication): // // In addition to encryption, GCM provides authentication for both the // encrypted data (ciphertext) and any Additional Authenticated Data (AAD), such as // headers or metadata that need to be protected but not encrypted. // // The authentication tag is generated using a Galois field multiplication // of the ciphertext and AAD. This ensures that any changes to the encrypted // message or the AAD will be detected during decryption. // // Key Components: // // - Plaintext: The data you want to encrypt. // - Ciphertext: The encrypted data. // - Key: A symmetric key used for both encryption and decryption. // - Nonce/IV: A unique value used for each encryption to ensure security. It is not secret but should never be reused with the same key. // - AAD (Additional Authenticated Data): Optional data that is not encrypted but needs to be authenticated (e.g., headers). // - Authentication Tag: A tag generated to verify the integrity and authenticity of the ciphertext and AAD } chilkatExample(); |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.