# AES128 CIPHERS FOR WINDOWS 7® Just some light AES128 ciphers solen on net... oO 👽 ## USAGE & EXAMPLES [DISU@DISU☆1950] [D:\TOOLS\aes] * aesxam.exe # by dr.Brian Gladman his demo * aesy.exe # uses the AES-Rijndael * aes_crypt.exe # by Hazera aes_usage.txt aes_usage.txt.e aes_usage_test1.enc aes_usage_test1.txt * An [img](https://gitea.dmz.rs/disu1950/AES-CIPHERS-FOR-WIN7--/raw/commit/4414a6930f8a125888dcbf909ef39e02f1e99995/assets/aes_scrambled_files_ss.jpg.png) showing how files looks scrambled when encrypted.. --- ## EXAMPLES --- ENKRYPT ``` aes_crypt.exe "D:\TOOLS\aes\aes_usage_test1.txt" "D:\TOOLS\aes\aes_usage_test1.enc" -e 73fc3288b9f1784720de6afa700f5299 Key: 73fc3288b9f1784720de6afa700f5299 Key len: 0x20 Key size: 0x40 Input File: D:\TOOLS\aes\aes_usage_test1.txt Output File: D:\TOOLS\aes\aes_usage_test1.enc ---- ENCRYPTING [+] CryptHashData Success [+] CryptDeriveKey Success Final chunk set, len: 105 = 69 Finished. Processed 0x69 bytes. ``` ---- D3KRYPT ``` >aes_crypt.exe "aes_usage_test1.enc" aes_usage_test1.txt -d 73fc3288b9f1784720de6afa700f5299 Key: 73fc3288b9f1784720de6afa700f5299 Key len: 0x20 Key size: 0x40 Input File: aes_usage_test1.enc Output File: aes_usage_test1.txt ---- ENCRYPTING [+] CryptHashData Success [+] CryptDeriveKey Success Final chunk set, len: 112 = 70 Finished. Processed 0x70 bytes. ``` --- EXAMPLE ``` >aesxam.exe usage: aesxam in_filename out_filename [d/e] key_in_hex aesxam.exe "aes_usage_test11.txt" "aes_usage_test12.enc" -e 73fc3288b9f1784720de6afa700f5299 ``` * U need AES128 KEY IN HEX. U can gen keys using openssl or in powershell. --- EXAMPLE ``` >aesy.exe aesy: input-file required. Usage: aesy [-v] [-e] [-k String] input-file Options/Arguments: -v AESY v. 0.1, use with caution Copyright Karl M. Syring 2000 (syring@email.com) This code uses the AES-Rijndael implementation of Dr Brian Gladman (http://www.btinternet.com/~brian.gladman/cryptography_tech nology/rijndael/index.html). -e encrypt file, default is decrypt. -k String your secret key, don't forget it! input-file input file to process. ``` ## CHECKSUMS ``` aesxam.exe 1105AE823D97F88020142D08D8EF44A491519A6E67DDC310B6197D9E25EE11B7 SHA256 103,5 KiB CRC-32: 8A0C429F MD5: 193F77C89D3D9324029E1C0BD1F6D9C4 SHA-1: D0BBE83ED79CB4CAB9AC8951650588EA483177A4 SHA-256: 1105AE823D97F88020142D08D8EF44A491519A6E67DDC310B6197D9E25EE11B7 SHA-384: 2AE426B393E2BA768F929AA559B344EA5F98310E2C3479CBF6D9876614DD5FCECEDB119A31B6506B971821E93E545FAD SHA-512: DED7DA23E023D2AE5913556157834BA1D6853612F7A497B34177A4A4D6EDCEBF4D90CA82ACA0F91DEB25D82E540806CBBA2C8604C3DB3849383D07B34699E781 QuickXor: D910303A622B55E2D21971BAD03FCEB17B8EF74D DropBoxHash: CB035D382D08386DD4D4DB48E4E1A4E107D71DF407E60D7C654592DC6C525CB0 ---------- aesy.exe 95FEA1D2A80BB319C370CEDAFA70DF36DAD2DE20B49B497CF1EED05DF1C243 SHA256 6D,56 KiB CRC-32: F720505B MD5: D0EE78028F4510053DC41D6F8FF012F9 SHA-1: 46E57A2891C77ABE2F3463585DA21D8A4B8B2168 SHA-256: 95FEA1D2A80BB319C370CEDAFA70DF36DAD2DE20B49B497CF1EED05DF1C2436D SHA-384: 28C72EF57C347DB32A06A9A42DB3AE4D8263EB625155A583387EF85490350FF44C9C473C52EF7C3A6164C0E3684CD8E4 SHA-512: D09D40624B712B7E00011ABA7B4F0504D642FBA2D3997A0816B958DE2A498C307A2988ACC27B8A3817E9B677DB508B97F660858329C62A82F804149873AE57E3 QuickXor: 85DDF799A0C0986B942436611BD4A0A85DC0332A DropBoxHash: FBDDC226E128C992AA64D30B86723C23C3D705B00E75770055037CCF0ADA8BA8 ---------- aes_crypt.exe 607DB0DCDBA15A8F147F7D987AD736067D44DDF3B11161702ED375D330A3D01F SHA256 59,5 KiB CRC-32: 4A8B4B31 MD5: E7274DE4BBEFA9D17E7965E0D03602DD SHA-1: DB3D777FD231438C0FD518F3128A15987A68C53C SHA-256: 607DB0DCDBA15A8F147F7D987AD736067D44DDF3B11161702ED375D330A3D01F SHA-384: C19A248DCE450E40CFE66F552BA818D4AA8CD21D80D94876E4EAFE225D2AF65B1033DFEEDF319ACB96923AE5690E75B4 SHA-512: 38D41BA97599F2E351FC92C0822856382F1F7152CCC19B44F78C5D3BB0C66103A0F834BD0D576B63E67A541107DEA339B4D1E805F6BFDB0E8DD8E75C41F2AB1D QuickXor: F97E690EF6E14DF909B74CE9BC14A56E88B74802 DropBoxHash: 0BD914F6319A8B018102D9042DCC5A615BFC6B451C84F34C058E3EC45BF2D6CA ```