I just bought the full version of AEScrypt and the first thing I tested, was to decrypt a file that I encrypted with AEScrypt.
The normal way to this, is OpenSSL.
In short, this does not work:
bad magic number
This is very bad

What can I do?
Not sure how it is made somehow more difficult to use than the next one.Thanks for your fast reply.
But, to be honest, this makes it a bit difficult to use the app
Sure there is: the source code is available. No matter if I'm dead, Packetizer is gone, etc. you will have the source in hand. Source is also posted to GitHub.I mean, there is no guarantee that AESCrypt will always exist or may be installable on whatever platform i use in 10 or 20 years.
AES is a standard that defines how to encrypt a 16-octet block of plaintext. To produce a tool that encrypts a file, one needs more than just the cipher itself. For example, let's say you have a file with 96 octets of zeros on the front followed by 16 octets of non-zero values. If you run that through AES as-is, nobody can tell what the data is, but cryptonalysis on the file would likely suggest much of the file is the same. I could definitively tell you that the first 6 blocks are repeated values. I can't tell they're all zeros, but I can tell the blocks are identical. That's bad, so we need a block cipher mode that does not reveal such information. There are several from which to chose (we use CBC in AES Crypt).Still, i surely would like to decrypt any file ...
I mean, it is AES - there is lots´s of software that can handle AES encryption.
So you can see immediately that the OpenSSL and AES Crypt file formats are different. Neither are wrong, but each employs AES in a way to produce a secure output. I will assume you created that file by not using ECB mode with OpenSSL, because that would be horribly insecure. And if that doesn't make sense (and it doesn't to most people), that's why AES Crypt doesn't offer options: it does encryption in one of the most secure modes available, and with the strongest key possible for AES. The average user cannot and should not be expected to know or understand that. It should just work.Or to ask this in a different way:
Is there a way to modify the binary output, so that some other app can decrypt them?
I see this:
$ od -a test.jpg.aes | head -4
0000000 A E S stx nul nul em C R E A T E D _ B
0000020 Y nul a e s c r y p t sp 3 . 0 . 9
0000040 nul nul nul nul nul nul nul nul nul nul nul nul nul nul nul nul
0000060 nul nul nul nul nul nul nul nul nul nul nul nul nul nul nul nul
On a OpenSSL file that:
$ od -a test.jpg.aes
0000000 S a l t e d _ _ $ % ~ nul Z fs c b
Some part of the file needs to be "pure AES", so that any other app should be able to decrypt ... i hope
And you can do that with AES Crypt. There are tools written by several different people in a number of different languages. There is C code on Linux, C++ on Windows, Java code for several platforms, at least two PHP implementations, and at least one in python. That's certainly more freedom, but I don't understand the argument of more security. If one employs AES with a 256-bit key properly, the security is the same regardless of the tool.When i can encrypt and decrypt on different platforms with different tools, i have more freedom and more security.
Given the AES Crypt file format is documented and the source is entirely open, you can also see that.Also, i can see that things are compatible and, when the size of the files is close enough, i can be sure that neither software added some own keys to be able to decrypt my content!
The fellow who wrote the iOS version created his. You could do the same. Not sure how this is an argument, either.I could possible check this myself, when compiling for Linux or Windows, but i cannot create my own version on an iOS app!
And even if, this is not the same version as from the App store.
I really don't understand the issue. You can encrypt with any one of the various AES Crypt-compatible tools and decrypt with the others to see that the file format is correct. Even without taking that step, even before you encrypt the file you can figure out exactly how large the file will be if size gives you any kind of comfort. But, that's definitely no way to measure security.So, the only way to be sure that everything is fine, is to compare encryption and decryption by different tools and compare the resulting size of files.
Indeed, but that's because that version to which you refer is a commercial product. Because one person created commercial software that is compatible with AES Crypt, you are unhappy with AES Crypt? It is free open source software, after all. People can do whatever they wish with it, including creating commercial products.And no, there is no other way - for no other person, only if you are able to compile yourself and manually check the source.
But i cannot check the source of the binary from the App store.
You can never what? I'm guessing you're concerned that when we update the file format (which I would like to do), the commercial versions will be not be updated, too. I would be reaching out to all those I know who have created AES Crypt-compatible versions to coordinate a major release. But, even if some didn't want to update, the Linux and Windows code will always maintain backward compatibility with any older file format. The Java version, for example, does not support version 0 of the file format. It would be easy to add, but it has apparently just not been important to users of that software. But, it does support the latest version.So, i can never now, if some additional decryption method was added.
The Linux version and Windows versions produce a file that is exactly 292 octets larger than the original file. If the original file is 2 octets, yes that would be "much larger." However, when encrypting a 600K file, for example, that footprint is insignificant. As for what is in those 292 octets, that is all specified here: https://www.aescrypt.com/aes_file_format.html.In seeing that the resulting files are much larger than those from OpenSSL, i just got more suspicious, to be honest.
I am still trying to understand the file-layout of AESCrypt output and seek ways to make sure that no other key was added - but so far, i was not able to extract the pure encrypted data and decrypt it with something else.
I don't take it personal. However, I am truly baffled how you can be worried about the security of AES Crypt merely due to the fact you cannot understand why the file size varies. Hopefully the above extended explanation helps a bit. I also don't have a solution to the fact that the iOS and Android versions are both closed source. I've interacted with both developers and they both seem like very honest people. And it's not hard to see that they're producing correct products, because you can take the output those versions produce and decrypt them on Linux or Windows. And, you could modify that software to inspect things like the inner-encryption IV and key, look at the tags, etc. You'd have to modify the code to do that, but it's certainly something one can do since the file format and code are all open source.Please don´t take this personal!!!