Sujet : Re: AES-256-GCM
De : fgrsna.pynnf (at) *nospam* vagrearg.eh (Stefan Claas)
Groupes : sci.cryptDate : 05. Apr 2025, 13:53:22
Autres entêtes
Organisation : i2pn2 (i2pn.org)
Message-ID : <3ac40395aff3f2c1b509b23850696e93a579edbb@i2pn2.org>
References : 1 2 3 4 5
User-Agent : flnews/1.3.0pre29 (for GNU/Linux)
Stefan Claas wrote:
Stefan Claas wrote:
Stefan Claas wrote:
Stefan Claas wrote:
Mmmmhhh, maybe my OpenSSL version is too old or I do something wrong. :-(
$ openssl enc -aes-256-gcm -d -in message.txt -out decrypted.txt -K d33572d668cb7b8f5323bf160309c98d85a9668e26f6df9c667a50982de40123
enc: AEAD ciphers not supported
enc: Use -help for summary.
$ openssl version
OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024)
LibreSSL can't handle it either. I guess no problem because who
uses them, when there are easier tools, like mine, available. ;-)
Ok. C version done, which uses OpenSSL library ... :-)
Works quite good with larger data. :-)
$ time openssl rand 100000000 > bin
real 0m4.266s
user 0m0.139s
sys 0m0.140s
$ time aes key < bin > bin2
real 0m2.998s
user 0m0.388s
sys 0m0.537s
$ time aes -d key < bin2 > bin3
real 0m2.579s
user 0m0.436s
sys 0m0.252s
$ time diff bin bin3
real 0m5.868s
user 0m0.055s
sys 0m0.212s
Wanted to know how yas (Yet Another SCOS) performs and it ain't so bad.
$ time openssl rand 100000000 > bin
real 0m4.721s
user 0m0.153s
sys 0m0.152s
$ time yas e 47 11 < bin > bin2
real 0m14.093s
user 0m3.136s
sys 0m0.400s
$ time yas d 47 11 < bin2 > bin3
real 0m15.880s
user 0m5.839s
sys 0m0.280s
$ time diff bin bin3
real 0m8.521s
user 0m0.010s
sys 0m0.377s
Regards
Stefan
-- Onion Courier Home Server Mon-Fri 15:00-21:00 UTC Sat-Sun 11:00-21:00 UTCohpmsq5ypuw5nagt2jidfyq72jvgw3fdvq37txhnm5rfbhwuosftzuyd.onion:8080 inbox