Mcrypt 函数
在线手册:中文 英文
PHP手册

mcrypt_encrypt

(PHP 4 >= 4.0.2, PHP 5)

mcrypt_encryptEncrypts plaintext with given parameters

说明

string mcrypt_encrypt ( string $cipher , string $key , string $data , string $mode [, string $iv ] )

Encrypts the data and returns it.

参数

cipher

One of the MCRYPT_ciphername constants, or the name of the algorithm as string.

key

The key with which the data will be encrypted. If it's smaller than the required keysize, it is padded with '\0'. It is better not to use ASCII strings for keys.

It is recommended to use the mhash functions to create a key from a string.

data

The data that will be encrypted with the given cipher and mode. If the size of the data is not n * blocksize, the data will be padded with '\0'.

The returned crypttext can be larger than the size of the data that was given by data.

mode

One of the MCRYPT_MODE_modename constants, or one of the following strings: "ecb", "cbc", "cfb", "ofb", "nofb" or "stream".

iv

Used for the initialization in CBC, CFB, OFB modes, and in some algorithms in STREAM mode. If you do not supply an IV, while it is needed for an algorithm, the function issues a warning and uses an IV with all its bytes set to '\0'.

返回值

Returns the encrypted data, as a string.

范例

Example #1 mcrypt_encrypt() Example

<?php
    $iv_size 
mcrypt_get_iv_size(MCRYPT_RIJNDAEL_256MCRYPT_MODE_ECB);
    
$iv mcrypt_create_iv($iv_sizeMCRYPT_RAND);
    
$key "This is a very secret key";
    
$text "Meet me at 11 o'clock behind the monument.";
    echo 
strlen($text) . "\n";

    
$crypttext mcrypt_encrypt(MCRYPT_RIJNDAEL_256$key$textMCRYPT_MODE_ECB$iv);
    echo 
strlen($crypttext) . "\n";
?>

以上例程会输出:

42
64

See also mcrypt_module_open() for a more advanced API and an example.


Mcrypt 函数
在线手册:中文 英文
PHP手册
PHP手册 - N: Encrypts plaintext with given parameters

用户评论:

michelerosica at gmail dot com (07-Apr-2012 11:24)

antonio dot daeliminare dot bonifati at gmail dot com (01-Aug-2011 01:57)

If you want to be interoperable with other PKCS #7 padding implementations, like the Legion of the Bouncy Castle Java cryptography APIs, you should always pad, that is a 8-byte (block size) padding should be added, even if not necessary:

<?php

function encrypt($str, $key)
{
   
$block = mcrypt_get_block_size('des', 'ecb');
   
$pad = $block - (strlen($str) % $block);
   
$str .= str_repeat(chr($pad), $pad);

    return
mcrypt_encrypt(MCRYPT_DES, $key, $str, MCRYPT_MODE_ECB);
}

function
decrypt($str, $key)
{  
   
$str = mcrypt_decrypt(MCRYPT_DES, $key, $str, MCRYPT_MODE_ECB);

   
$block = mcrypt_get_block_size('des', 'ecb');
   
$pad = ord($str[($len = strlen($str)) - 1]);
    return
substr($str, 0, strlen($str) - $pad);
}

?>

antonio dot daeliminare dot bonifati at gmail dot com (01-Aug-2011 11:24)

Simple DES-ECB binary string encryption/decryption (no initialization vector). I implement PKCS7-padding the right way. This is better than Mcrypt default zero-padding.

<?php

function encrypt($str, $key)
{
   
# Add PKCS7 padding.
   
$block = mcrypt_get_block_size('des', 'ecb');
    if ((
$pad = $block - (strlen($str) % $block)) < $block) {
     
$str .= str_repeat(chr($pad), $pad);
    }

    return
mcrypt_encrypt(MCRYPT_DES, $key, $str, MCRYPT_MODE_ECB);
}

function
decrypt($str, $key)
{
   
$str = mcrypt_decrypt(MCRYPT_DES, $key, $str, MCRYPT_MODE_ECB);

   
# Strip padding out.
   
$block = mcrypt_get_block_size('des', 'ecb');
   
$pad = ord($str[($len = strlen($str)) - 1]);
    if (
$pad && $pad < $block && preg_match(
         
'/' . chr($pad) . '{' . $pad . '}$/', $str
                                           
)
       ) {
      return
substr($str, 0, strlen($str) - $pad);
    }
    return
$str;
}
?>

I am using these functions to encrypt query strings:

<?php
const KEY = "\xc8\xd9\xb9\x06\xd9\xe8\xc9\xd2"; # Change this

# Send encrypted GET query string
$query = encrypt('field1=value1&field2=value2', KEY);
echo
'<a href="script.php?' . urlencode($query) . '">link</a>';

# Receive encrypted GET query string
$query = decrypt(urldecode($_SERVER['QUERY_STRING']), KEY);
parse_str($query, $query);
$query = filter_var_array($query, array(...));

?>

Anonymous (13-May-2011 03:03)

In the other notes there are some misconceptions about crypto and the IV, especially for CBC mode.

The most important point: Encryption DOES NOT provide any proof of data integrity or authentication WHATSOEVER. If you need to be sure that the data is secret and not tampered with, you need to encrypt THEN use a keyed HMAC.

For CBC mode, the IV DOES NOT need to be secret. It can be sent along with the plaintext. It needs to be UNIQUE and RANDOM. So that every message is encrypted with a different IV.

The best way to generate an IV is to use mcrypt_create_iv().

Keys must be binary, not ASCII. To create a key from a password:

<?php
$password
= "MyPassword!1!";
$aes256Key = hash("SHA256", $password, true); //we want a 32 byte binary blob
?>

das700 at gmail dot com (14-Feb-2011 03:58)

For anyone that wants PKCS7 compatibility (since PHP default is to use Zeros padding) I've found this to work rather well (and seems binary compatible)
<?php
header
("Content-type: text/plain");
function
addpadding($string, $blocksize = 32){
   
$len = strlen($string);
   
$pad = $blocksize - ($len % $blocksize);
   
$string .= str_repeat(chr($pad), $pad);
    return
$string;
}
function
strippadding($string){
   
$slast = ord(substr($string, -1));
   
$slastc = chr($slast);
   
$pcheck = substr($string, -$slast);
    if(
preg_match("/$slastc{".$slast."}/", $string)){
       
$string = substr($string, 0, strlen($string)-$slast);
        return
$string;
    } else {
        return
false;
    }
}
function
keytest($keyfile = "key.key"){
   
$keyfile = file($keyfile);
   
$key = base64_decode($keyfile[0]);
   
$iv = base64_decode($keyfile[1]);
   
$enc = mcrypt_encrypt(MCRYPT_RIJNDAEL_256, $key, addpadding("Hello World"), MCRYPT_MODE_CBC, $iv);
   
$dec = strippadding(mcrypt_decrypt(MCRYPT_RIJNDAEL_256, $key, $enc, MCRYPT_MODE_CBC, $iv));
    echo
"Encrypted:".base64_encode($enc)."\n";
    echo
"Decrypted:$dec";
}
keytest();
?>

The key.key file basically just looks like this

jZjneNba78tqCuB8l8eQrXo4nCs6LmlRMflfjEdnnLg=
Uty9weAigmbjIwwng3532FJbeXxGJzhl4Ymw9ry6Slc=

And from this it is entirely compatible with C#'s PaddingMode.PKCS7 which I needed for an application I wrote, I hope this helps!

Anonymous (16-Jan-2011 07:40)

I've noticed some people using a-z, A-Z and 0-9 for keys and stating things like "16 characters is a 128-bit key". This isn't true. Using only these characters, you will get at most 6 bits of entropy per chartacter:

log2(26 + 26 + 10) = 5.954196310386876

So you're actually only getting 95 bits of entropy in 16 characters, which is 0.0000000117% of the keyspace you would get if you were using the full range.

In order to get the full entropy from a key using just a-z, A-Z and 0-9 you should multiply your key length by 1.3333 to account for the 2 bits of lost entropy per byte.

Robin Leffmann (09-Mar-2010 01:58)

Contrary to what is implied in the mcrypt_encrypt() manual page, as well as the info given regarding the CBC vs CFB modes, mcrypt_encrypt() works just fine for encrypting binary data as well.
 
A simple example verifies that the decrypted output is binary identical once cut to its original length:
 
<?php

// 448-bit key (56 bytes) - the only size that mcrypt/php uses for the Blowfish cipher
// (using a smaller key works just fine, as mcrypt appends \0 to reach proper key-size)
$key = 'SADFo92jzVnzSj39IUYGvi6eL8v6RvJH8Cytuiouh547vCytdyUFl76R';

// Blowfish/CBC uses an 8-byte IV
$iv = substr( md5(mt_rand(),true), 0, 8 );

// do 50 encrypt/decrypt operations on some random data, and verify integrity with md5()
for( $i = 0; $i < 50; $i++ )
{
   
// create a random, binary string of random length
   
$size = mt_rand( 25000, 500000 );
   
$c = 0; $data = null;
    while(
$c++ * 16 < $size )
       
$data .= md5( mt_rand(), true );
   
$data = substr( $data, 0, $size );
   
$cksum = md5( $data );

   
// encrypt using Blowfish/CBC
   
$enc = mcrypt_encrypt( MCRYPT_BLOWFISH, $key, $data, MCRYPT_MODE_CBC, $iv );

    echo
$size . ' -> ' . strlen( $enc ) . ' -> ';

   
// decrypt (using same IV - a must for the CBC mode)
   
$dec = mcrypt_decrypt( MCRYPT_BLOWFISH, $key, $enc, MCRYPT_MODE_CBC, $iv );

   
// cut the output with substr(), NOT by using rtrim() as is suggested in some of
    // the mcrypt manual pages - this is binary data, not plaintext
   
echo ( md5(substr($dec, 0, $size)) == $cksum ? 'ok' : 'bad' ) . PHP_EOL;
}

?>

jamesthome at yahoo dot com (22-Feb-2010 06:05)

If you are encrypting a password and saving it into a MySQL blob field, be aware that MySQL will trim the encoded password while doing the insert.  If your encoded password has a trailing space, it will be removed on insert and decrypt will not work correctly.  However you use the encrypt function, make sure your encrypted password does not have a trailing space.

MiroBasha (14-Feb-2010 05:04)

For anyone using bouncycastle lite (J2ME), don't forget to use "ZeroBytePadding".

I.e,

cipher = new PaddedBufferedBlockCipher (new CBCBlockCipher(new BlowfishEngine()), new ZeroBytePadding());

Roman Solomatin (12-Feb-2010 04:58)

Keep in mind, that when you use MCRYPT_MODE_CBC then the key and IV must be the same when encrypting and decrypting data. Randomising IV does not work with MCRYPT_MODE_CBC.

Jon (29-May-2009 07:42)

ECB mode has weaknesses. Use CBC mode instead.

Kai Sellgren (13-Mar-2009 11:03)

There are a couple of things to remember when encrypting data.

1) For CBC, the IV must be random, but not unique. It also must not be known.
2) For CTR, the IV must be unique and not known, but does not need to be random.
3) The key of the encryption is really important.
4) The random used in the previous example of mine is not that great. The post was a response to earlier post saying "for those that just want some simple encryption/decryption". Use better random functions. MCRYPT_RAND just uses the built-in linear congruential generator, which is poor.
5) You may consider using RIJNDAEL-512 or even -1024.
6) If you want to be able to have NULL bytes in your plaintext, then you should store the plaintext length within the encrypted text to strip out padded NULL bytes.

bantam at banime dot com (09-Dec-2008 05:06)

There's a lot of old information on this page, for those that just want some simple encryption/decryption try this out.

<?php
    define
('SALT', 'whateveryouwant');
   
    function
encrypt($text)
    {
        return
trim(base64_encode(mcrypt_encrypt(MCRYPT_RIJNDAEL_256, SALT, $text, MCRYPT_MODE_ECB, mcrypt_create_iv(mcrypt_get_iv_size(MCRYPT_RIJNDAEL_256, MCRYPT_MODE_ECB), MCRYPT_RAND))));
    }

    function
decrypt($text)
    {
        return
trim(mcrypt_decrypt(MCRYPT_RIJNDAEL_256, SALT, base64_decode($text), MCRYPT_MODE_ECB, mcrypt_create_iv(mcrypt_get_iv_size(MCRYPT_RIJNDAEL_256, MCRYPT_MODE_ECB), MCRYPT_RAND)));
    }
?>

then try out something like:

<?php
$encryptedmessage
= encrypt("You're my only hope!");
echo
decrypt($encryptedmessage);
?>

It should return your original message. You can remove the base64_encode and base64_decode from the functions if you want to save space on the encoded string, I use it to simplify database storage.

Anonymous (17-Oct-2007 12:15)

I should mention that ECB mode ignores the IV, so it is misleading to show an example using both MCRYPT_MODE_ECB and an IV (the example in the manual shows the same thing).  Also, it's important to know that ECB is useful for random data, but structured data should use a stronger mode like MCRYPT_MODE_CBC

Also, rtrim($decryptedtext, "\0") would be a better option to remove NULL padding than my lazy trim()...

dylan at wedefy dot com (16-Oct-2007 04:27)

I wasn't too impressed with the suggested functions/classes for using mcrypt, so I wrote my own class.  The encypted output is base64 encoded so it can be used in URLs, emails, etc.  MCRYPT_RIJNDAEL_256 is probably too secure for most uses, using a less secure algorithm should mean that the encryption will be faster and the encrypted output shorter (make sure to update iv_size in mcrypt_create_iv() and key length to match the new algorithm).  If you are going to use only 1 passphrase, you should define it inside __construct($this->securekey) instead of when creating the object. Keep the class in a separate include file which is only readable by your webserver (or whatever needs it) for added security.

<?php
class Cipher {
    private
$securekey, $iv;
    function
__construct($textkey) {
       
$this->securekey = hash('sha256',$textkey,TRUE);
       
$this->iv = mcrypt_create_iv(32);
    }
    function
encrypt($input) {
        return
base64_encode(mcrypt_encrypt(MCRYPT_RIJNDAEL_256, $this->securekey, $input, MCRYPT_MODE_ECB, $this->iv));
    }
    function
decrypt($input) {
        return
trim(mcrypt_decrypt(MCRYPT_RIJNDAEL_256, $this->securekey, base64_decode($input), MCRYPT_MODE_ECB, $this->iv));
    }
}

$cipher = new Cipher('secret passphrase');

$encryptedtext = $cipher->encrypt("hide me");
echo
"->encrypt = $encryptedtext<br />";

$decryptedtext = $cipher->decrypt($encryptedtext);
echo
"->decrypt = $decryptedtext<br />";

var_dump($cipher);
?>

davidwhthomas at gmail (01-Dec-2006 02:52)

I forgot to add the sample usage for encrypting and decrypting cookies:

Set encrypted cookie:
<?php

$time
= time()+60*60*24*30*12; //store cookie for one year
setcookie('cookie_name', encryptCookie('cookie_value'),$time,'/');

?>

Get encrypted cookie value:

<?php

$cookie_value
= decryptCookie($_COOKIE['cookie_name']);

?>

hope it helps.

davidwhthomas at gmail (29-Nov-2006 08:41)

And two more similar functions for encrypting and decrypting cookies:

<?php

function encryptCookie($value){
   if(!
$value){return false;}
  
$key = 'The Line Secret Key';
  
$text = $value;
  
$iv_size = mcrypt_get_iv_size(MCRYPT_RIJNDAEL_256, MCRYPT_MODE_ECB);
  
$iv = mcrypt_create_iv($iv_size, MCRYPT_RAND);
  
$crypttext = mcrypt_encrypt(MCRYPT_RIJNDAEL_256, $key, $text, MCRYPT_MODE_ECB, $iv);
   return
trim(base64_encode($crypttext)); //encode for cookie
}

function
decryptCookie($value){
   if(!
$value){return false;}
  
$key = 'The Line Secret Key';
  
$crypttext = base64_decode($value); //decode cookie
  
$iv_size = mcrypt_get_iv_size(MCRYPT_RIJNDAEL_256, MCRYPT_MODE_ECB);
  
$iv = mcrypt_create_iv($iv_size, MCRYPT_RAND);
  
$decrypttext = mcrypt_decrypt(MCRYPT_RIJNDAEL_256, $key, $crypttext, MCRYPT_MODE_ECB, $iv);
   return
trim($decrypttext);
}

?>

d a v i d w h t h o m a s @ g m a i l (28-Nov-2006 01:37)

Here's two simple functions to encrypt and decrypt a string:

<?php
function encryptData($value){
  
$key = "top secret key";
  
$text = $value;
  
$iv_size = mcrypt_get_iv_size(MCRYPT_RIJNDAEL_256, MCRYPT_MODE_ECB);
  
$iv = mcrypt_create_iv($iv_size, MCRYPT_RAND);
  
$crypttext = mcrypt_encrypt(MCRYPT_RIJNDAEL_256, $key, $text, MCRYPT_MODE_ECB, $iv);
   return
$crypttext;
}

function
decryptData($value){
  
$key = "top secret key";
  
$crypttext = $value;
  
$iv_size = mcrypt_get_iv_size(MCRYPT_RIJNDAEL_256, MCRYPT_MODE_ECB);
  
$iv = mcrypt_create_iv($iv_size, MCRYPT_RAND);
  
$decrypttext = mcrypt_decrypt(MCRYPT_RIJNDAEL_256, $key, $crypttext, MCRYPT_MODE_ECB, $iv);
   return
trim($decrypttext);
}
?>

stonecypher at gmail dot com (11-Sep-2006 09:11)

Most of the user-written cipher examples here are badly broken, and there are a few cases where the manual says things that are outright incorrect, such as that it's "safe to transmit the initialization vector in plaintext" (this is incorrect: see Ciphers By Ritter, http://www.ciphersbyritter.com/GLOSSARY.HTM#IV ,  for details.)

mcrypt itself is perfectly safe, but correct and therefore safe usage is inobvious.  It is important to use a cryptographic library correctly; a simple usage error, even when it produces results that can be unpacked at the other side, can render a strong algorithm completely useless.

The initialization vector must be permuted with a recoverable noise source (an arbitrary md5 hash is acceptable, since it's just a fake OTP and its origin contents are wholly unimportant.)

Passwords should be remade with a salted one-way hash (md5 is again acceptable even though it's been damaged, since the only thing you could recover from a cracked md5 hash is the source data to generate the password, which is useless.)

It's important to use a sane block mode (OFB is unsafe for almost all algorithms; never use it.  Prefer CBC in all cases except where you need to deal with a degraded signal and cannot retransmit.)

A correct usage example is actually pretty long and needs a lot of explanation, so I developed a safe wrapper library which doesn't constrain usage and which comments itself very heavily.  It's appropriate for use or for learning.  Please see my blog for details on Stone PHP SafeCrypt:

http://blog.sc.tri-bit.com/archives/101

ale_ferrer at yahoo dot com (24-Jul-2006 10:35)

Mcript - Dot NET - 3DES problem.

This is a solution for the 3DES algorithm's problem in his interaction with .NET TripleDESCryptoServiceProvider (System.Security.Cryptography), CBC mode,  because the key is completed to 192bits and the text is padded.

So, we has two problems:
           - The key's completion  was posted by "jesse at pctest dot com".
           - The text padding also posted by him, but the completion is a little different. The padding bytes are 0x01 to 0x08 because completed to 8 bytes blocks. If your text have a whole number of 8 bytes blocks, the algorithm add other block with padded bytes (0x08).

This is a function to encrypt a text in a equal form that the Dot NET algorithm:

<?PHP
function encryptNET3DES($key, $vector, $text){
   
$td = mcrypt_module_open (MCRYPT_3DES, '', MCRYPT_MODE_CBC, '');

   
// Complete the key
   
$key_add = 24-strlen($key);
   
$key .= substr($key,0,$key_add);

   
// Padding the text
   
$text_add = strlen($text)%8;
    for(
$i=$text_add; $i<8; $i++){
       
$text .= chr(8-$text_add);
    }

   
mcrypt_generic_init ($td, $key, $vector);
   
$encrypt64 = mcrypt_generic ($td, $text);
   
mcrypt_generic_deinit($td);
   
mcrypt_module_close($td);

    
// Return the encrypt text in 64 bits code
   
return $encrypt64;
}
?>

alexandrub83 at yahoo dot com (25-Sep-2005 02:53)

A class to encrypt, decrypt data! if you have problems with using it please visit my site http://www.alexandrub.tk and mail me using Contact section! I use it to encrypt POST and GET data! I don't remember his name but thanks to how recognize his code in the binFromHex function!

<?php
//copyright www.alexandrub.tk
//ver 1.00
class cript
{
var
$key;
var
$td;
var
$time4keyToChange;
var
$iv;

function
cript($aKey='time',$aTime4keyToChange=3600)
 {
 
$this->time4keyToChange=$aTime4keyToChange;
 if(
$aKey!='time')
   {
  
$this->key=$aKey."&".intval(time()/$this->time4keyToChange);
   }
   else
   {
  
$this->key=intval(time()/$this->time4keyToChange);
   }
 
$this->td = MCRYPT_RIJNDAEL_256;
 
$this->iv = "qe3jigneqfrgnqw2egfmas4qetjkn5lg";
 }

function
hexFromBin($data)
{
return
bin2hex($data);
}

function
binFromHex($data)
 {
 
$len = strlen($data);
 return
pack("H" . $len, $data);
 }

function
criptData($data)
 {
 return
$this->hexFromBin(mcrypt_encrypt($this->td, $this->key, $data, MCRYPT_MODE_CBC, $this->iv));
 }
function
decriptData($eData)
 {
 return
trim(mcrypt_decrypt($this->td, $this->key, $this->binFromHex($eData), MCRYPT_MODE_CBC, $this->iv));
 }
}
return
true;
?>

jesse at pctest dot com (07-Dec-2004 10:43)

Solving 3DES incompatibilities with .NET's TripleDESCryptoServiceProvider

mcrypt's 3DES only accepts 192 bit keys, but Microsoft's .NET and many other tools accept both 128 and 192 bit keys.
If your key is too short, mcrypt will 'helpfully' pad null characters onto the end, but .NET refuses to use a key where the last third is all null (this is a Bad Key). This prevents you from emulating mcrypt's "short key" behaviour in .NET.

How to reconcile this? A little DES theory is in order
3DES runs the DES algorithm three times, using each third of your 192 bit key as the 64 bit DES key

Encrypt Key1 -> Decrypt Key2 -> Encrypt Key3

and both .NET and PHP's mcrypt do this the same way.
The problem arises in short key mode on .NET, since 128 bits is only two 64 bit DES keys
The algorithm that they use then is:

Encrypt Key1 -> Decrypt Key2 -> Encrypt Key1

mcrypt does not have this mode of operation natively.
but before you go and start running DES three times yourself, here's a Quick Fix
<?php
$my_key
= "12345678abcdefgh"; // a 128 bit (16 byte) key
$my_key .= substr($my_key,0,8); // append the first 8 bytes onto the end
$secret = mcrypt_encrypt(MCRYPT_3DES, $my_key, $data, MCRYPT_MODE_CBC, $iv);  //CBC is the default mode in .NET
?>

And, like magic, it works.

There's one more caveat: Data padding
mcrypt always pads data will the null character
but .NET has two padding modes: "Zeros" and "PKCS7"
Zeros is identical to the mcrypt scheme, but PKCS7 is the default.
PKCS7 isn't much more complex, though:
instead of nulls, it appends the total number of padding bytes (which means, for 3DES, it can be a value from 0x01 to 0x07)
if your plaintext is "ABC", it will be padded into:
0x41 0x42 0x43 0x05 0x05 0x05 0x05 0x05

You can remove these from a decrypted string in PHP by counting the number of times that last character appears, and if it matches it's ordinal value, truncating the string by that many characters:
<?php
    $block
= mcrypt_get_block_size('tripledes', 'cbc');
   
$packing = ord($text{strlen($text) - 1});
    if(
$packing and ($packing < $block)){
      for(
$P = strlen($text) - 1; $P >= strlen($text) - $packing; $P--){
    if(
ord($text{$P}) != $packing){
     
$packing = 0;
    }
      }
    }
   
$text = substr($text,0,strlen($text) - $packing);
?>

And to pad a string that you intend to decrypt with .NET, just add the chr() value of the number of padding bytes:
<?php
    $block
= mcrypt_get_block_size('tripledes', 'cbc');
   
$len = strlen($dat);
   
$padding = $block - ($len % $block);
   
$dat .= str_repeat(chr($padding),$padding);
?>

That's all there is to it.
Knowing this, you can encrypt, decrypt, and duplicate exactly any .NET 3DES behaviour in PHP.

cleong at nflc dot org (03-Dec-2004 10:04)

Note that the key need to be a binary string--not a hex string. A 128-bit key would be 16 characters long, for example.

Use the pack() function to quickly convert a hex string into the actual binary data:

<?php
$key_hex
= '66e94bd4ef8a2c3b884cfa59ca342b2e';
$key_bin = pack('H*', $key_hex);
$pt = mcrypt_decrypt(MCRYPT_RIJNDAEL_128, $key_bin, $et, MCRYPT_MODE_ECB);
?>

chris at TRIMTHIS dot chriscodes dot com (14-Aug-2004 03:31)

[Editor's note: original script posted by
andrewcare at execulink dot com
07-Jul-2004 04:45]

I needed to add
trim($data)
to andrew's example for it to remove some leftover hex garbage from the decrypted string.

Here's the working example:
<?php
$data
= "Plaintext"; // Data to encrypt (http://www.ciphersbyritter.com/glossary.htm#Encryption)
$key = "Secret"; // Encryption key (http://www.ciphersbyritter.com/glossary.htm#Key)
$td = MCRYPT_RIJNDAEL_256; // Encryption cipher (http://www.ciphersbyritter.com/glossary.htm#Cipher)

$iv_size = mcrypt_get_iv_size($td, MCRYPT_MODE_ECB); // Dependant on cipher/mode combination (http://www.php.net/manual/en/function.mcrypt-get-iv-size.php)
$iv = mcrypt_create_iv($iv_size, MCRYPT_RAND); // Creates an IV (http://www.ciphersbyritter.com/glossary.htm#IV)

echo "Original data: $data<br />";

$encrypted_data = mcrypt_encrypt($td, $key, $data, MCRYPT_MODE_CBC, $iv); // Encrypts data (http://www.php.net/manual/en/function.mcrypt-encrypt.php)

echo "Encrypted data: " . bin2hex($encrypted_data)  . "<br />"; // bin2hex to compensate for random character values

$data = mcrypt_decrypt($td, $key, $encrypted_data, MCRYPT_MODE_CBC, $iv); // Decrypts data (http://www.php.net/manual/en/function.mcrypt-decrypt.php)

echo trim($data);
?>

Thanks andrew, you saved me some time! Hope this saves someone else!