The main issue here is that you're using different key-size. PHP's openssl_encrypt
determines the key size from the encryption algorithm string ("aes-256-cbc"
in this case) so it expects a 256 bit key. If the key is shorter it is padded with zero bytes, so the actual key used by openssl_encrypt
is:
"akshayakshayaksh\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"
Pycryptodome determines the key size from the actual size of the key, so your Python code uses AES-128-CBC. Also, as mentioned in the coments by kelalaka, the ciphertext is base64 encoded (openssl_encrypt
base64-encodes the ciphertext by default - we can get raw bytes if we use OPENSSL_RAW_DATA
in $options
). Pycryptodome doesn't decode the ciphertext, so we must use b64decode()
.
key = b'akshayakshayaksh\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0'
obj2 = AES.new(key, AES.MODE_CBC, b'0123456789012345')
ciphertext = b"cUXDhOEGz19QEo9XDvMzXkGFmg/YQUnXEqKVpfYtUGo="
print(obj2.decrypt(b64decode(ciphertext)))
#b'message to be encrypted\t\t\t\t\t\t\t\t\t'
The extra \t
characters at the end is the padding - CBC requires padding. Pycryptodome doesn't remove padding automatically but it provides padding functions in Crypto.Util.Padding
.
from Crypto.Cipher import AES
from Crypto.Util.Padding import unpad
from base64 import b64decode
key = b'akshayakshayaksh\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0'
obj2 = AES.new(key, AES.MODE_CBC, b'0123456789012345')
ciphertext = b"cUXDhOEGz19QEo9XDvMzXkGFmg/YQUnXEqKVpfYtUGo="
plaintext = obj2.decrypt(b64decode(ciphertext))
plaintext = unpad(plaintext, AES.block_size)
Although PHP's openssl accepts arbitrary sized keys, it's best to use key size specified in the algorithm string, to prevent confusion at the very least. Also the key bytes should be as random as possible.
As noted by Maarten Bodewes in the comments this key uses a limited range of bytes and so it's very weak. Furthermore it is created by repeating a word and that makes it vulnerable to dictionary attacks (which are much faster than bruteforce attacks).
In PHP we can get cryptographically secure random bytes with random_bytes()
,
$key = random_bytes(32);
and in Python with os.urandom()
key = os.urandom(32)
(You can use the same functions to create the IV; you shouldn't use a static IV, the IV must be unpredictable)
You could also derive a key from your password with a KDF. In this case it is important to use a random salt and a high enough number of iterations. PHP provies a PBKDF2 algorithm with the hash_pbkdf2
function, and Python with hashlib.pbkdf2_hmac
.