-
-
Save btxtiger/e8eaee70d6e46729d127f1e384e755d6 to your computer and use it in GitHub Desktop.
Node.js - AES Encryption/Decryption with AES-256-GCM using random Initialization Vector + Salt
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/** | |
* Cryptography Functions | |
* | |
* Forked from AndiDittrich/AesUtil.js | |
* https://gist.github.com/AndiDittrich/4629e7db04819244e843 | |
*/ | |
import crypto, { CipherGCM, CipherGCMTypes, DecipherGCM } from 'crypto'; | |
import { Password } from './types'; | |
/** | |
* Get encryption/decryption algorithm | |
*/ | |
function getAlgorithm(): CipherGCMTypes { | |
return 'aes-256-gcm'; | |
} | |
/** | |
* Get encrypted string prefix | |
*/ | |
function getEncryptedPrefix(): string { | |
return 'enc::'; | |
} | |
/** | |
* Derive 256 bit encryption key from password, using salt and iterations -> 32 bytes | |
* @param password | |
* @param salt | |
* @param iterations | |
*/ | |
function deriveKeyFromPassword(password: Password, salt: Buffer, iterations: number): Buffer { | |
return crypto.pbkdf2Sync(password, salt, iterations, 32, 'sha512'); | |
} | |
/** | |
* Encrypt AES 256 GCM | |
* @param plainText | |
* @param password | |
*/ | |
export function encryptAesGcm(plainText: string | object, password: Password): string | undefined { | |
try { | |
if (typeof plainText === 'object') { | |
plainText = JSON.stringify(plainText); | |
} else { | |
plainText = String(plainText); | |
} | |
const algorithm: CipherGCMTypes = getAlgorithm(); | |
// Generate random salt -> 64 bytes | |
const salt = crypto.randomBytes(64); | |
// Generate random initialization vector -> 16 bytes | |
const iv = crypto.randomBytes(16); | |
// Generate random count of iterations between 10.000 - 99.999 -> 5 bytes | |
const iterations = Math.floor(Math.random() * (99999 - 10000 + 1)) + 10000; | |
// Derive encryption key | |
const encryptionKey = deriveKeyFromPassword(password, salt, Math.floor(iterations * 0.47 + 1337)); | |
// Create cipher | |
// @ts-ignore: TS expects the wrong createCipher return type here | |
const cipher: CipherGCM = crypto.createCipheriv(algorithm, encryptionKey, iv); | |
// Update the cipher with data to be encrypted and close cipher | |
const encryptedData = Buffer.concat([cipher.update(plainText, 'utf8'), cipher.final()]); | |
// Get authTag from cipher for decryption // 16 bytes | |
const authTag = cipher.getAuthTag(); | |
// Join all data into single string, include requirements for decryption | |
const output = Buffer.concat([salt, iv, authTag, Buffer.from(iterations.toString()), encryptedData]).toString('hex'); | |
return getEncryptedPrefix() + output; | |
} catch (error) { | |
console.error('Encryption failed!'); | |
console.error(error); | |
return void 0; | |
} | |
} | |
/** | |
* Decrypt AES 256 GCM | |
* @param cipherText | |
* @param password | |
*/ | |
export function decryptAesGcm(cipherText: string, password: Password): string | undefined { | |
try { | |
const algorithm: CipherGCMTypes = getAlgorithm(); | |
const cipherTextParts = cipherText.split(getEncryptedPrefix()); | |
// If it's not encrypted by this, reject with undefined | |
if (cipherTextParts.length !== 2) { | |
console.error('Could not determine the beginning of the cipherText. Maybe not encrypted by this method.'); | |
return void 0; | |
} else { | |
cipherText = cipherTextParts[1]; | |
} | |
const inputData: Buffer = Buffer.from(cipherText, 'hex'); | |
// Split cipherText into partials | |
const salt: Buffer = inputData.slice(0, 64); | |
const iv: Buffer = inputData.slice(64, 80); | |
const authTag: Buffer = inputData.slice(80, 96); | |
const iterations: number = parseInt(inputData.slice(96, 101).toString('utf-8'), 10); | |
const encryptedData: Buffer = inputData.slice(101); | |
// Derive key | |
const decryptionKey = deriveKeyFromPassword(password, salt, Math.floor(iterations * 0.47 + 1337)); | |
// Create decipher | |
// @ts-ignore: TS expects the wrong createDecipher return type here | |
const decipher: DecipherGCM = crypto.createDecipheriv(algorithm, decryptionKey, iv); | |
decipher.setAuthTag(authTag); | |
// Decrypt data | |
// @ts-ignore: TS expects the wrong createDecipher return type here | |
const decrypted = decipher.update(encryptedData, 'binary', 'utf-8') + decipher.final('utf-8'); | |
try { | |
return JSON.parse(decrypted); | |
} catch (error) { | |
return decrypted; | |
} | |
} catch (error) { | |
console.error('Decryption failed!'); | |
console.error(error); | |
return void 0; | |
} | |
} |
export type Password = string | Buffer | NodeJS.TypedArray | DataView;
- nodejs/node#50624 you might use
buffer.subarray
instead, soinputData.subarray
@btxtiger Thank you, i am on it, i'll let you know
Hi there, I've resolve it, no error but i haven't tested it yet. I'm trying to encrypt a json from request.body api request, the body must be encrypted and as that code shows it might be viable for the encrypting to failed, what do you think i ought to do. thanks you.
@btxtiger Thank you, my man, both the Encryption and Decryption work like a charm
Here's a strictly typed and lint cleared version for 2024,
/**
* Cryptography Functions
*
* Forked from AndiDittrich/AesUtil.js by [btxtiger](https://gist.github.com/btxtiger)
* https://gist.github.com/AndiDittrich/4629e7db04819244e843
* Edited by [RajeshPandey057](https://gist.github.com/RajeshPandey057)
*/
import crypto, { CipherGCM, CipherGCMTypes, DecipherGCM } from "crypto";
type Password = string | Buffer | NodeJS.TypedArray | DataView;
/**
* Get encryption/decryption algorithm
*/
function getAlgorithm(): CipherGCMTypes {
return "aes-256-gcm";
}
/**
* Get encrypted string prefix
*/
function getEncryptedPrefix(): string {
return "enc::";
}
/**
* Derive 256 bit encryption key from password, using salt and iterations -> 32 bytes
* @param password
* @param salt
* @param iterations
*/
function deriveKeyFromPassword(
password: Password,
salt: Buffer,
iterations: number,
): Buffer {
return crypto.pbkdf2Sync(password, salt, iterations, 32, "sha512");
}
/**
* Encrypt AES 256 GCM
* @param plainText
* @param password
*/
export function encryptAesGcm(
text: string | object,
password: Password,
): string | undefined {
try {
const plainText =
typeof text === "object" ? JSON.stringify(text) : String(text);
const algorithm: CipherGCMTypes = getAlgorithm();
// Generate random salt -> 64 bytes
const salt = crypto.randomBytes(64);
// Generate random initialization vector -> 16 bytes
const iv = crypto.randomBytes(16);
// Generate random count of iterations between 10.000 - 99.999 -> 5 bytes
const iterations = Math.floor(Math.random() * (99999 - 10000 + 1)) + 10000;
// Derive encryption key
const encryptionKey = deriveKeyFromPassword(
password,
salt,
Math.floor(iterations * 0.47 + 1337),
);
// Create cipher
const cipher: CipherGCM = crypto.createCipheriv(
algorithm,
encryptionKey,
iv,
);
// Update the cipher with data to be encrypted and close cipher
const encryptedData = Buffer.concat([
cipher.update(plainText, "utf8"),
cipher.final(),
]);
// Get authTag from cipher for decryption // 16 bytes
const authTag = cipher.getAuthTag();
// Join all data into single string, include requirements for decryption
const output = Buffer.concat([
salt,
iv,
authTag,
Buffer.from(iterations.toString()),
encryptedData,
]).toString("hex");
return getEncryptedPrefix() + output;
} catch (error) {
console.error("Encryption failed!");
console.error(error);
return undefined;
}
}
/**
* Decrypt AES 256 GCM
* @param cipherText
* @param password
*/
export function decryptAesGcm(inputText: string, password: Password): unknown {
try {
const algorithm: CipherGCMTypes = getAlgorithm();
const cipherTextParts = inputText.split(getEncryptedPrefix());
// If it's not encrypted by this, reject with undefined
if (cipherTextParts.length !== 2) {
console.error(
"Could not determine the beginning of the cipherText. Maybe not encrypted by this method.",
);
return undefined;
}
const [, cipherText] = cipherTextParts;
const inputData: Buffer = Buffer.from(cipherText, "hex");
// Split cipherText into partials
const salt: Buffer = inputData.subarray(0, 64);
const iv: Buffer = inputData.subarray(64, 80);
const authTag: Buffer = inputData.subarray(80, 96);
const iterations: number = parseInt(
inputData.subarray(96, 101).toString("utf-8"),
10,
);
const encryptedData: Buffer = inputData.subarray(101);
// Derive key
const decryptionKey = deriveKeyFromPassword(
password,
salt,
Math.floor(iterations * 0.47 + 1337),
);
// Create decipher
const decipher: DecipherGCM = crypto.createDecipheriv(
algorithm,
decryptionKey,
iv,
);
decipher.setAuthTag(authTag);
// Decrypt data
const decrypted =
decipher.update(encryptedData, undefined, "utf-8") +
decipher.final("utf-8");
try {
return JSON.parse(decrypted) as unknown;
} catch (error) {
return decrypted;
}
} catch (error) {
console.error("Decryption failed!");
console.error(error);
return undefined;
}
}
Here's a strictly typed and lint cleared version for 2024,
/** * Cryptography Functions * * Forked from AndiDittrich/AesUtil.js by [btxtiger](https://gist.github.com/btxtiger) * https://gist.github.com/AndiDittrich/4629e7db04819244e843 * Edited by [RajeshPandey057](https://gist.github.com/RajeshPandey057) */ import crypto, { CipherGCM, CipherGCMTypes, DecipherGCM } from "crypto"; type Password = string | Buffer | NodeJS.TypedArray | DataView; /** * Get encryption/decryption algorithm */ function getAlgorithm(): CipherGCMTypes { return "aes-256-gcm"; } /** * Get encrypted string prefix */ function getEncryptedPrefix(): string { return "enc::"; } /** * Derive 256 bit encryption key from password, using salt and iterations -> 32 bytes * @param password * @param salt * @param iterations */ function deriveKeyFromPassword( password: Password, salt: Buffer, iterations: number, ): Buffer { return crypto.pbkdf2Sync(password, salt, iterations, 32, "sha512"); } /** * Encrypt AES 256 GCM * @param plainText * @param password */ export function encryptAesGcm( text: string | object, password: Password, ): string | undefined { try { const plainText = typeof text === "object" ? JSON.stringify(text) : String(text); const algorithm: CipherGCMTypes = getAlgorithm(); // Generate random salt -> 64 bytes const salt = crypto.randomBytes(64); // Generate random initialization vector -> 16 bytes const iv = crypto.randomBytes(16); // Generate random count of iterations between 10.000 - 99.999 -> 5 bytes const iterations = Math.floor(Math.random() * (99999 - 10000 + 1)) + 10000; // Derive encryption key const encryptionKey = deriveKeyFromPassword( password, salt, Math.floor(iterations * 0.47 + 1337), ); // Create cipher const cipher: CipherGCM = crypto.createCipheriv( algorithm, encryptionKey, iv, ); // Update the cipher with data to be encrypted and close cipher const encryptedData = Buffer.concat([ cipher.update(plainText, "utf8"), cipher.final(), ]); // Get authTag from cipher for decryption // 16 bytes const authTag = cipher.getAuthTag(); // Join all data into single string, include requirements for decryption const output = Buffer.concat([ salt, iv, authTag, Buffer.from(iterations.toString()), encryptedData, ]).toString("hex"); return getEncryptedPrefix() + output; } catch (error) { console.error("Encryption failed!"); console.error(error); return undefined; } } /** * Decrypt AES 256 GCM * @param cipherText * @param password */ export function decryptAesGcm(inputText: string, password: Password): unknown { try { const algorithm: CipherGCMTypes = getAlgorithm(); const cipherTextParts = inputText.split(getEncryptedPrefix()); // If it's not encrypted by this, reject with undefined if (cipherTextParts.length !== 2) { console.error( "Could not determine the beginning of the cipherText. Maybe not encrypted by this method.", ); return undefined; } const [, cipherText] = cipherTextParts; const inputData: Buffer = Buffer.from(cipherText, "hex"); // Split cipherText into partials const salt: Buffer = inputData.subarray(0, 64); const iv: Buffer = inputData.subarray(64, 80); const authTag: Buffer = inputData.subarray(80, 96); const iterations: number = parseInt( inputData.subarray(96, 101).toString("utf-8"), 10, ); const encryptedData: Buffer = inputData.subarray(101); // Derive key const decryptionKey = deriveKeyFromPassword( password, salt, Math.floor(iterations * 0.47 + 1337), ); // Create decipher const decipher: DecipherGCM = crypto.createDecipheriv( algorithm, decryptionKey, iv, ); decipher.setAuthTag(authTag); // Decrypt data const decrypted = decipher.update(encryptedData, undefined, "utf-8") + decipher.final("utf-8"); try { return JSON.parse(decrypted) as unknown; } catch (error) { return decrypted; } } catch (error) { console.error("Decryption failed!"); console.error(error); return undefined; } }
well done, keep it up.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Hi there, i am having some issue here
import { Password } from './types';
inputData.slice()
is deprecatedPlease i need this ASAP, thank you, GOD BLESS