/// <summary> /// Encrypts the files generated /// </summary> /// <param name="C">Crypto engine</param> private static void EncryptFiles(Cryptic C) { Console.Clear(); int i = 0; Console.Error.Write("Encrypting the fake documents we made earlier..."); while (true) { var FN = $"Document_{i++}.txt"; if (File.Exists(FN)) { File.WriteAllBytes($"{FN}.crytest", C.Crypt(File.ReadAllBytes(FN))); File.Delete(FN); } else { //We are done break; } } SC((int)ConsoleColor.Green); Console.Error.WriteLine("[DONE]"); RC(); }
/// <summary> /// Creates an encryption key and ensures we can't access the decryption key /// </summary> /// <returns>Crypto engine</returns> private static Cryptic CreateEncryptKey() { Console.Clear(); Console.Error.Write("Create new encryption key..."); Cryptic C = new Cryptic(); C.CreateKey(); //Export public as-is. You can't decrypt with this File.WriteAllBytes("public.bin", C.ExportKey(false)); Cryptic Temp = new Cryptic(); Temp.ImportKey(File.ReadAllBytes("master.bin")); //Export the private key encrypted. You can't decrypt with this either because the key itself is encrypted. File.WriteAllBytes("private.bin", Temp.Crypt(C.ExportKey(true))); SC((int)ConsoleColor.Green); Console.Error.WriteLine("[DONE]"); RC(); return(C); }
protected void Page_Load(object sender, EventArgs e) { var Res = new ApiResponse() { Success = false, Message = "Unspecified Error" }; Response.ContentType = "application/json"; Cryptic C = new Cryptic(); if (!File.Exists(KeyFile)) { C.CreateKey(); File.WriteAllBytes(KeyFile, C.ExportKey(true)); } else { C.ImportKey(File.ReadAllBytes(KeyFile)); } byte[] Test = new byte[100]; C.Decrypt(C.Crypt(Test)); if (!string.IsNullOrEmpty(Request["get"])) { if (Request["get"] == "key") { var UserKey = new Cryptic(); UserKey.CreateKey(); //Encrypt private data byte[] PrivateData = C.Crypt(UserKey.ExportKey(true)); //Public data for user byte[] PublicData = UserKey.ExportKey(false); File.WriteAllBytes(MP("App_Data/" + Cryptic.Hash(PublicData) + ".bin"), PrivateData); Res.Success = true; Res.Message = Cryptic.Hash(PublicData); Res.Data = PublicData; Response.Write(Res.ToJson()); Response.End(); } else if (Request["get"].IsAlphaNum()) { if (Request["get"] == "master") { Res.Message = "master key (public part only)"; Res.Data = C.ExportKey(false); Res.Success = true; Response.Write(Res.ToJson()); Response.End(); } else { var keyfile = MP("App_Data/" + Request["get"] + ".bin"); if (File.Exists(keyfile)) { Cryptic KeyRequest = new Cryptic(); KeyRequest.ImportKey(C.Decrypt(File.ReadAllBytes(keyfile))); Res.Success = true; Res.Message = "Key found"; Res.Data = KeyRequest.ExportKey(false); Response.Write(Res.ToJson()); Response.End(); } Res.Message = "Key not found"; Response.Write(Res.ToJson()); Response.End(); } } else { Res.Message = "Invalid request"; } } else if (!string.IsNullOrEmpty(Request["decrypt"])) { var s = Request["decrypt"]; var keyfile = ""; byte[] body = new byte[0]; if (Request.HttpMethod.ToLower() == "post") { using (var str = Request.GetBufferlessInputStream()) { body = str.ReadToEnd(); } } if (body.Length == 0) { Res.Message = "No data to decrypt"; Response.Write(Res.ToJson()); Response.End(); } else { if (s.IsAlphaNum()) { if (File.Exists(keyfile = MP("App_Data/" + s + ".bin"))) { var Decryptor = new Cryptic(); Decryptor.ImportKey(C.Decrypt(File.ReadAllBytes(keyfile))); Res.Data = Decryptor.Decrypt(body); Res.Success = true; Res.Message = "Decrypted file"; Response.Write(Res.ToJson()); Response.End(); } else { Res.Message = "Invalid decrypt operation"; Response.Write(Res.ToJson()); Response.End(); } } } } Response.Write(Res.ToJson()); }