AES Command - Arguments



Usage
  • aescommand.exe Help
  • aescommand.exe Protect Command Input Output [Overwrite] *Passphrase*
  • aescommand.exe Metal Command Key-Size Mode IV Key Input Output [Overwrite]
  • aescommand.exe PRNG Size Output [Overwrite]

Argument rules
  • All arguments should be in the order given above
  • Filenames containing spaces should be enclosed in "quotes"
  • Arguments are not case sensitive


1st argument (Function as...)
  • Help
  • Metal
  • Protect
  • PRNG


Command (Protect / Metal)
  • E or Encrypt
  • D or Decrypt


Key-Size (Metal)
  • 128
  • 192
  • 256


Mode (Metal)
  • CTR
  • GCM
  • OFB
  • CFB
  • CBC
  • ECB
  • PCBC


Initialization Vector (Metal)

Three formats are available
  • Binary read from a file. You can use a file created with the Save button under the IV tools in AES Metal
  • Hexadecimal given in ASCII 0-9 A-F
  • Hexadecimal given in ASCII 0-9 A-F with separators

CBC, OFB, CFB, CTR and PCBC use 16 bytes
  • "d:\IV File" (File should contain 16 bytes of binary data)
  • 000102030405060708090A0B0C0D0E0F
  • 00:01:02:03:04:05:06:07:08:09:0A:0B:0C:0D:0E:0F

GCM uses 12 bytes
  • "d:\IV File" (File should contain 12 bytes of binary data)
  • 000102030405060708090A0B
  • 00:01:02:03:04:05:06:07:08:09:0A:0B

ECB does not use an Initialization Vector


Key (Metal)

Three formats are available
  • Binary read from a file. You can use a file created with the Save button under the key tools in AES Metal
  • Hexadecimal given in ASCII 0-9 A-F
  • Hexadecimal given in ASCII 0-9 A-F with separators

128 Bit Key
  • "d:\Key File" (File should contain 16 bytes of binary data)
  • 000102030405060708090A0B0C0D0E0F
  • 00:01:02:03:04:05:06:07:08:09:0A:0B:0C:0D:0E:0F

192 Bit Key
  • "d:\Key File" (File should contain 24 bytes of binary data)
  • 000102030405060708090A0B0C0D0E0F1011121314151617
  • 0:01:02:03:04:05:06:07:08:09:0A:0B:0C:0D:0E:0F:10:11:12:13:14:15:16:17

256 Bit Key
  • "d:\Key File" (File should contain 32 bytes of binary data)
  • 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F
  • 00:01:02:03:04:05:06:07:08:09:0A:0B:0C:0D:0E:0F:10:11:12:13:14:15:16:17:18:19:1A:1B:1C:1D:1E:1F


Size (PRNG)
  • 64MB
  • 128MB
  • 256MB
  • 512MB
  • 1GB
  • 2GB
  • 4GB
  • 8GB
  • 16GB


Input (Protect / Metal)
  • "d:\example filename.txt"


Output (Protect / Metal / PRNG)
  • "d:\backup\example filename.txt.aes"


Overwrite [Optional] (Protect / Metal / PRNG)
  • Overwrite explicitly allows an existing output file to be overwritten
  • This should be given immediately after the output file


*Passphrase* (Protect)
  • The passphrase is BETWEEN the FIRST and LAST asterisks
  • 1 - 512 characters
  • If *aBc1*23* is given, the actual passphrase would be aBc1*23


Command Line Examples


Encrypt / Decrypt using the passphrase, Example Passphrase
  • aescommand.exe Protect E d:\Accounts.txt d:\Accounts.txt.aes Overwrite *Example Passphrase*
  • aescommand.exe Protect D d:\Accounts.txt.aes d:\Accounts.txt Overwrite *Example Passphrase*

Encrypt / Decrypt using a 128 bit key in ECB mode. ECB does not use an IV
  • aescommand.exe Metal Encrypt 128 ECB d:\KeyFile d:\Accounts.txt d:\Accounts.txt.aes Overwrite
  • aescommand.exe Metal Decrypt 128 ECB d:\KeyFile d:\Accounts.txt.aes d:\Accounts.txt Overwrite

Encrypt / Decrypt using a 256 bit key in GCM mode
  • aescommand.exe Metal E 256 GCM d:\IVFile d:\KeyFile d:\Accounts.txt d:\Accounts.txt.aes Overwrite
  • aescommand.exe Metal D 256 GCM d:\IVFile d:\KeyFile d:\Accounts.txt.aes d:\Accounts.txt Overwrite

Encrypt / Decrypt using a 128 bit key in CTR mode, with a command line IV. Do not overwrite an existing file
  • aescommand.exe Metal E 128 CTR 00:01:02:03:04:05:06:07:08:09:0A:0B:0C:0D:0E:0F d:\KeyFile d:\Accounts.txt d:\Accounts.txt.aes
  • aescommand.exe Metal D 128 CTR 00:01:02:03:04:05:06:07:08:09:0A:0B:0C:0D:0E:0F d:\KeyFile d:\Accounts.txt.aes d:\Accounts.txt

Generate 8GB of Pseudo Random
  • aescommand.exe PRNG 8GB d:\PRNGFile Overwrite