PoshCode Archive  Artifact [bf4f3def0f]

Artifact bf4f3def0feeb86d7a0dd4738ab52c61e5ae64cb264ec5e3c9ce789170c5ead1:

  • File AES-CTR-mode-decryptor.ps1 — part of check-in [0566cebbac] at 2018-06-10 14:03:20 on branch trunk — Port of Chris Veness’ JavaScript AES CTR (AES Counter Mode) Aes.Ctr.decrypt to PowerShell. It will decrypt text encrypted with the Aes.Ctr.encrypt function from http://www.movable-type.co.uk/scripts/aes.html which is used by many websites. .NET doesn’t support AES CTR mode natively so you have to do it manually with a little fudging. (user: Public Domain size: 3255)

# encoding: ascii
# api: powershell
# title: AES CTR mode decryptor
# description: Port of Chris Veness’ JavaScript AES CTR (AES Counter Mode) Aes.Ctr.decrypt to PowerShell. It will decrypt text encrypted with the Aes.Ctr.encrypt function from http://www.movable-type.co.uk/scripts/aes.html which is used by many websites. .NET doesn’t support AES CTR mode natively so you have to do it manually with a little fudging.
# version: 0.1
# type: script
# author: Public Domain
# license: CC0
# function: ConvertFrom-AesCtr
# x-poshcode-id: 5881
# x-archived: 2016-09-06T03:58:04
# x-published: 2016-06-02T20:26:00
#
#
#.Synopsis
#  Port of Chris Veness' AES CTR (AES Counter Mode) Aes.Ctr.decrypt
#.Description
#  This cmdlet will decrypt text encypted with Aes.Ctr.encrypt from:
#  http://www.movable-type.co.uk/scripts/aes.html
#
#  Useful for web scraping since that library is popular on websites.
#
#.Example
#  ConvertFrom-AesCtr 'dQMbtNJqolJkPwoC7sejtg==' 'asdf' 256
#.Parameter Cypher
#  Message you want to decrypt.
#.Parameter Password
#  Password to use to decrypt the $Cypher.
#.Parameter Size
#  Block size to use.
#.Parameter InRaw
#  If set, $Cypher is assumed to be a [byte[]] blob. Otherwise, it is
#  assumed to be a [byte[]] blob converted to a base64 encoded [string].
#.Parameter OutRaw
#  If set, the return value is outputted as a binary blob. Otherwise, it
#  is assumed to be a utf-8 encoded str converted to a [string].
function ConvertFrom-AesCtr {
	[OutputType([string], [System.ArraySegment[byte]])]
	param(
		[Parameter(Mandatory)]
		$Cypher
,
		[Parameter(Mandatory)]
		[string]$Password
,
		[ValidateSet(128, 192, 256)]
		[int]$Size = 256
,
		[switch]$InRaw
,
		[switch]$OutRaw
	)
	try {
		[int]$Size = $Size -shr 3

		if ($InRaw) {
			[byte[]]$Cypher = $Cypher
		} else {
			[byte[]]$Cypher = [System.Convert]::FromBase64String($Cypher)
		}

		[byte[]]$Password = [System.Text.Encoding]::UTF8.GetBytes($Password)
		[array]::Resize([ref]$password, $Size)

		$aes = [System.Security.Cryptography.Aes]::Create()
		$aes.Mode = [System.Security.Cryptography.CipherMode]::ECB
		$aes.Padding = [System.Security.Cryptography.PaddingMode]::Zeros
		$aes.Key = $Password
		$enc = $aes.CreateEncryptor()
		[byte[]]$Password = $enc.TransformFinalBlock($Password, 0, $Password.Length)

		[array]::Resize([ref]$Password, $Size)
		[array]::Copy($Password, 0, $Password, 16, $Size - 16)

		$aes.Key = $Password
		$enc = $aes.CreateEncryptor()

		$Password = New-Object byte[] 16
		[array]::Copy($Cypher, $Password, 8)

		foreach ($i in 0..[Math]::Floor(($Cypher.Length - 9) / 16)) {
			$Password[15] = $i -band 255
			$Password[14] = ($i -shr 8) -band 255
			$Password[13] = ($i -shr 16) -band 255
			$Password[12] = $i -shr 24

			$aes = $enc.TransformFinalBlock($Password, 0, 16)
			$i = $i * 16 + 8
			foreach ($b in 0..[Math]::Min(15, $Cypher.Length - $i - 1)) {
				$Cypher[$i+$b] = $Cypher[$i+$b] -bxor $aes[$b]
			}
		}

		if ($OutRaw) {
			,(New-Object System.ArraySegment[byte] @($Cypher, 8, ($Cypher.Length - 8)))
		} else {
			[System.Text.Encoding]::UTF8.GetString($Cypher, 8, $Cypher.Length - 8)
		}
	} catch {
		throw
	}
}