globalscape/python/EFTAESCrypto/Readme.txt

84 lines
5.4 KiB
Plaintext

Verbs supported
DecryptFile Decrypt file.
Decrypt Decrypt message.
EncryptFile Encrypt file.
Encrypt Encrypt message.
help Display more information on a specific command.
version Display version information.
DecryptFile options
-s, --SourceFile Required. Source file to be processed.
-d, --DestinationFile Required. Destination file to be processed..
-k, --encodedKey Secret Key (Hex) 256-bit encryption e.g.
D39D03583CAA566C6F136620D76D6C6CC8850A4751DBFF01FED1B363B2A88B43
-i, --encodedIV Initialization vector e.g. A0F025B23A5B4F3330B055D2FA534C31
--keyEncodeMode (Default: hex) Encoding mode for key . Use hex or base64. The default value is hex
--ivEncodeMode (Default: hex) Encoding mode for IV. Use hex or base64. The default value is hex
-e, --EncodingMode (Default: hex) Encoding mode for message. Use hex or base64. The default value is hex
-c, --CipherMode (Default: ctr) Cipher mode for block encryption algorithms. CBC, ECB, CTR, CFB, OFB. The
default value is CTR
-l, --KeyLength (Default: 256) The key length in bits for symmetric encryption algorithms. The default
value is 256
Decrypt Options
-m, --message Required. Message to be decrypted.
-k, --encodedKey Secret Key (Hex) 256-bit encryption e.g.
D39D03583CAA566C6F136620D76D6C6CC8850A4751DBFF01FED1B363B2A88B43
-i, --encodedIV Initialization vector e.g. A0F025B23A5B4F3330B055D2FA534C31
--keyEncodeMode (Default: hex) Encoding mode for key . Use hex or base64. The default value is hex
--ivEncodeMode (Default: hex) Encoding mode for IV. Use hex or base64. The default value is hex
-e, --EncodingMode (Default: hex) Encoding mode for message. Use hex or base64. The default value is hex
-c, --CipherMode (Default: ctr) Cipher mode for block encryption algorithms. CBC, ECB, CTR, CFB, OFB. The
default value is CTR
-l, --KeyLength (Default: 256) The key length in bits for symmetric encryption algorithms. The default value
is 256
EncryptFile Options
-s, --SourceFile Required. Source file to be processed.
-d, --DestinationFile Required. Destination file to be processed..
-k, --encodedKey Secret Key (Hex) 256-bit encryption e.g.
D39D03583CAA566C6F136620D76D6C6CC8850A4751DBFF01FED1B363B2A88B43
-i, --encodedIV Initialization vector e.g. A0F025B23A5B4F3330B055D2FA534C31
--keyEncodeMode (Default: hex) Encoding mode for key . Use hex or base64. The default value is hex
--ivEncodeMode (Default: hex) Encoding mode for IV. Use hex or base64. The default value is hex
-e, --EncodingMode (Default: hex) Encoding mode for message. Use hex or base64. The default value is hex
-c, --CipherMode (Default: ctr) Cipher mode for block encryption algorithms. CBC, ECB, CTR, CFB, OFB. The
default value is CTR
-l, --KeyLength (Default: 256) The key length in bits for symmetric encryption algorithms. The default
value is 256
Encrypt Options
-m, --message Required. Message to be encrypted.
-k, --encodedKey Secret Key (Hex) 256-bit encryption e.g.
D39D03583CAA566C6F136620D76D6C6CC8850A4751DBFF01FED1B363B2A88B43
-i, --encodedIV Initialization vector e.g. A0F025B23A5B4F3330B055D2FA534C31
--keyEncodeMode (Default: hex) Encoding mode for key . Use hex or base64. The default value is hex
--ivEncodeMode (Default: hex) Encoding mode for IV. Use hex or base64. The default value is hex
-e, --EncodingMode (Default: hex) Encoding mode for message. Use hex or base64. The default value is hex
-c, --CipherMode (Default: ctr) Cipher mode for block encryption algorithms. CBC, ECB, CTR, CFB, OFB. The
default value is CTR
-l, --KeyLength (Default: 256) The key length in bits for symmetric encryption algorithms. The default value
is 256
NOTE: by default EFT uses an internal default key, it is recommended that customers change their secret key
Examples
C:\EFTAESCrypto> EFTAESCrypto.exe EncryptFile -s test.txt -d test.txt.aes -k D39D03583CAA566C6F136620D76D6C6CC8850A4751DBFF01FED1B363B2A88B43 -i E0FB25F23ACC4F7A
test.txt.aes (11ms)
C:\EFTAESCrypto> EFTAESCrypto.exe DecryptFile -s test.txt.aes -d test2.txt -k D39D03583CAA566C6F136620D76D6C6CC8850A4751DBFF01FED1B363B2A88B43 -i E0FB25F23ACC4F7A
test2.txt (12ms)
C:\EFTAESCrypto>EFTAESCrypto.exe Encrypt -m "Hello" -k D39D03583CAA566C6F136620D76D6C6CC8850A4751DBFF01FED1B363B2A88B43 -i E0FB25F23ACC4F7A
66aim1s=
C:\EFTAESCrypto>EFTAESCrypto.exe Decrypt -m "66aim1s=" -k D39D03583CAA566C6F136620D76D6C6CC8850A4751DBFF01FED1B363B2A88B43 -i E0FB25F23ACC4F7A
Hello
Example on how to decrypt SSH Passphrase used by EFT v8 using default EFT key
C:\EFTAESCrypto>EFTAESCrypto.exe Decrypt -m gd6C0mAuli4rw9wxhpOLyw== -e base64 -i L7RqOi/v31JZsg9Nt6IgsA== --ivEncodeMode base64 -k E97D235BDC02002568874BB69E6D8DD2BF4D2BDD34BCBEE476C84C23AE93A9D6 -c CBC
Example on how to decrypt files encrypted by EFT v8 using default EFT key
C:\EFTAESCrypto> EFTAESCrypto.exe DecryptFile -s test2.txt.aes -d test2.txt -k E97D235BDC02002568874BB69E6D8DD2BF4D2BDD34BCBEE476C84C23AE93A9D6 -i E0FB25F23ACC4F7A
test2.txt (12ms)