technically should work though i've never tested it, both methods uses same ad-hoc format.
encrypt using authenticated encryption example.
//use secret data want encrypt instead. string secretmessage = "message"; var rncryptorheader = new byte[]{ 2, //rncryptor format version 2 0 //rncryptor uses password }; //encryptedstring base64 encoded var encryptedstring = aesthenhmac.simpleencryptwithpassword(secretmessage, password:"1234567891011", nonsecretpayload:rncryptorheader);
then decrypt using rncryptor , nsdata+base64 ios
//this encrypted data passed .net nsstring *encryptedstring = @"age8c9e7gsfyoamsotiogylq0o6mdcumxxjn/iza3azym4kvwzakfykip6mqmt/qkpfftdb3xqhmkoxtqem+ra0ihxovzinlma2kjtg6bonmlg=="; nsdata *encrypteddata = [nsdata datafrombase64string: encryptedstring]; nserror *error; nsdata *decrypteddata = [rndecryptor decryptdata:encrypteddata withpassword:@"1234567891011" error:&error]; nsstring *secretmessage = [[[nsstring alloc] initwithdata:decrypteddata encoding:nsutf8stringencoding] autorelease];
since aren't dealing strings , dealing bytes directly, remove base64 , utf8 encoding/decoding objective-c example , linked c# example, once sure working.
12345678encryption key. aes takes 16, 24 or 32 byte sequence, string. – codesinchaos may 6 '13 @ 15:58