Here is a PHP demo script that encrypts and decrypts data:
$encryptionkey = \'h8y2p9d1\';
$card_nbr = \"1234\";
echo \"original card_nbr: $card_nbr &
I think the problem is that you are using binary data when:
mcrypt_encrypt — Encrypts plaintext with given parameters
You can use base64_encode($text) for use plaintext.
The returned string is padded out to fill n * blocksize
bytes using the null character \0
so that is why you are seeing the extra data.
If you run $card_nbr_decrypted= rtrim($card_nbr_decrypted, "\0");
it should return the actual data.
You're receiving null bytes because you're using Electronic Code Block (ECB) for your block cipher mode of operation, which pads the end of your plaintext to fit into the block size. In your case the block size is 256 bits because you're using MCRYPT_RIJNDAEL_256
.
You can avoid this padding problem all together if you use Cipher Feedback (CFB) mode — MCRYPT_MODE_CFB
— no null bytes, no need to trim. But, with CFB you should HMAC your encrypted data, to verify it hasn't been tampered with (see "Mallet"). You can find an example of a working implementation at: Cryptography For The Average Developer.
Also of note, ECB mode is considered less secure because it can reveal data patterns. Plus, ECB (and CBC since it also pads) can be vulnerable to padding oracle attack.
It seems to be a known problem. Use rtrim()
after decoding to remove the excess NULs.