| Deutsch English Français Italiano |
|
<68ff9d583cf8c7299196622fa9acddaa12096257@i2pn2.org> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder9.news.weretis.net!i2pn.org!i2pn2.org!.POSTED!not-for-mail From: Stefan Claas <fgrsna.pynnf@vagrearg.eh> Newsgroups: sci.crypt Subject: Re: AES-256-GCM Date: Fri, 4 Apr 2025 12:43:56 +0200 Organization: i2pn2 (i2pn.org) Message-ID: <68ff9d583cf8c7299196622fa9acddaa12096257@i2pn2.org> References: <a7ef4110589aeba52bc317beb3214d929b37e876@i2pn2.org> <1b3c9e45133d8cbf3b403e1724997e70f03b0bf6@i2pn2.org> <e30c0d0aad3b9cc7efd4ead82f5a72b4dde009b6@i2pn2.org> <f10b55b3943a8deb7389175eb3515c3789275dc7@i2pn2.org> MIME-Version: 1.0 Injection-Date: Fri, 4 Apr 2025 10:43:58 -0000 (UTC) Injection-Info: i2pn2.org; logging-data="3078912"; mail-complaints-to="usenet@i2pn2.org"; posting-account="ieSrCjSDShpZNyqIW52mlwIkg76Hsp+TOOO6KTdfCN8"; User-Agent: flnews/1.3.0pre29 (for GNU/Linux) Cancel-Lock: sha1:a/fEQIImypeSpgbtRiDQP83IT1U= X-Spam-Checker-Version: SpamAssassin 4.0.0 X-Ed25519-Sig: fc039a45704b46e693dae0d58a4303e10a474973ee95903effcc1980eb62b046 3e0c3a0d9a1888305dd3aeddacc0e5c0fdcf207d313042d2d65724c37d722f0d X-Date: It's Fri Sep 11539 12:43:56 PM CEST 1993, the September that never ends. X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a Bytes: 2526 Lines: 46 Stefan Claas wrote: > Stefan Claas wrote: > > Stefan Claas wrote: > > > > > Mmmmhhh, maybe my OpenSSL version is too old or I do something wrong. :-( > > > > > > $ openssl enc -aes-256-gcm -d -in message.txt -out decrypted.txt -K d33572d668cb7b8f5323bf160309c98d85a9668e26f6df9c667a50982de40123 > > > enc: AEAD ciphers not supported > > > enc: Use -help for summary. > > > > > > $ openssl version > > > OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) > > > > LibreSSL can't handle it either. I guess no problem because who > > uses them, when there are easier tools, like mine, available. ;-) > > Ok. C version done, which uses OpenSSL library ... :-) Works quite good with larger data. :-) $ time openssl rand 100000000 > bin real 0m4.266s user 0m0.139s sys 0m0.140s $ time aes key < bin > bin2 real 0m2.998s user 0m0.388s sys 0m0.537s $ time aes -d key < bin2 > bin3 real 0m2.579s user 0m0.436s sys 0m0.252s $ time diff bin bin3 real 0m5.868s user 0m0.055s sys 0m0.212s Regards Stefan -- Onion Courier Home Server Mon-Fri 15:00-21:00 UTC Sat-Sun 11:00-21:00 UTC ohpmsq5ypuw5nagt2jidfyq72jvgw3fdvq37txhnm5rfbhwuosftzuyd.onion:8080 inbox