Examples

STILL TO BE FINISHED

  • Encrypt and decrypt a byte[]
import java.util.Arrays;
import static com.creoart.Ema.*;
import com.creoart.CustomReturn;

public class Main {

public static void main(String[] args) {

// Populate a byte array
String string = "Vienna early next morning; should have arrived at 6:46, but train was an hour late. Buda-Pesth seems a wonderful" +
" place, from the glimpse which I got of it from the train and the little I could walk through the streets." +
" I feared to go very far from the station, as we had arrived late and would start as near the correct time as" +
" possible. The impression I had was that we were leaving the West and entering the East; the most western of" +
" splendid bridges over the Danube, which is here of noble width and depth, took us among the traditions of" +
" Turkish rule.";
byte[] byteArray = string.getBytes();
System.out.println();

// Print the origin byte array
System.out.println("Original byte array -> bytes");
System.out.println(".............................");
System.out.println(Arrays.toString(Arrays.copyOfRange(byteArray, 0, byteArray.length))); // print bytes
System.out.println();
System.out.println("Original byte array - > chars");
System.out.println(".............................");
for (byte value : Arrays.copyOfRange(byteArray, 0, byteArray.length)) {
System.out.print((char) value); // print chars
}
System.out.println("\n");

// Set key directory and file
setKeyFilesDirectory("C:\\Users\\guest\\ema\\key\\");
setKeyFilename("1713795503342556300_RiwfKN66ufGX2LV267ld5U8iDLaDLyaR.key");

// Encryption
CustomReturn encryption = byteArrayEncryption(byteArray);

byte[] encryptedData = new byte[0];
if (encryption.getResult()) {
encryptedData = encryption.getData();
System.out.println();

// Print first 200 encrypted bytes of byte array
System.out.println("Encrypted byte array -> first and last 200 bytes");
System.out.println("................................................");
System.out.println(Arrays.toString(Arrays.copyOfRange(encryptedData, 0, 200))); // print as bytes
System.out.println("...");
System.out.println("...");

// Print last 200 encrypted bytes of byte array
System.out.println(Arrays.toString(Arrays.copyOfRange(encryptedData,
encryptedData.length - 200, encryptedData.length))); // print as bytes
System.out.println();

// Print first 200 encrypted chars of byte array
System.out.println("Encrypted byte array -> first and last 200 chars");
System.out.println("................................................");
for (byte value : Arrays.copyOfRange(encryptedData, 0, 200)) {
System.out.print((char) value); // print as chars
}
System.out.println();
System.out.println("...");
System.out.println("...");

// Print last 200 encrypted chars of byte array
for (byte value : Arrays.copyOfRange(encryptedData, encryptedData.length - 200, encryptedData.length)) {
System.out.print((char) value); // print as chars
}
System.out.println("\n");
}

// Decryption
CustomReturn decryption = byteArrayDecryption(getEncryptedByteArray());

if (decryption.getResult()) {
byte[] decryptedData = decryptedData = new byte[decryption.getData().length];
if (decryption.getResult()) {
decryptedData = decryption.getData();
}
System.out.println();

// Print the decrypted byte array
System.out.println("Decrypted byte array -> bytes");
System.out.println(".............................");
System.out.println(Arrays.toString(Arrays.copyOfRange(decryptedData, 0, decryptedData.length))); // print as bytes
System.out.println();
System.out.println("Decrypted byte array -> chars");
System.out.println(".............................");
for (byte value : Arrays.copyOfRange(decryptedData, 0, decryptedData.length)) {
System.out.print((char) value); // print as chars
}
System.out.println("\n");
}
}

Output to terminal

Copyright 2021-2024 EMA (Encryption by Masking)
Program: Ema.jar (static, not instantiatable) Version 1.24.0512.0 (2024.05.12)
Developer: Stefano Fazzino - Udine (Italy)
***
For info and documentation visit https://www.creoart.com
***
1. EMA (Encryption by Masking) is free to use for personal non-profit purposes.
2. Public and private companies, universities, colleges, schools, research
institutes, hospitals, governmental and non-governmental agencies and the
military are only allowed to test and try it freely. For all other purposes
they have to ask for permission to use it.
3. You may not copy and/or include parts of this software in your own code
without the explicit permission of the developer.
4. Before running the program:
- check its checksum and if it does not match to the one signed, DO NOT RUN
- also check the program Ema.jar (static, not instantiatable)
by sites like https://www.virustotal.com
5. For bugs, suggestions, vulnerabilities or anything else send an email:
i n f o @ c r e o a r t . c o m
6. The developer cannot be held responsible in any way for any damages,
malfunctions or any other consequence related to the use of this software.
7. If you do not agree, please do not use this software.
***
***
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
This program 'Ema.jar' ver.Version 1.24.0512.0 - 2024.05.12, is running on Windows 11
Java vendor: Amazon.com Inc.
Java vendor URL: https://aws.amazon.com/corretto/
Java version: 1.8.0_412
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

Original byte array -> bytes
.............................
[86, 105, 101, 110, 110, 97, 32, 101, 97, 114, 108, 121, 32, 110, 101, 120, 116, 32, 109, 111, 114, 110, 105, 110, 103, 59, 32, 115, 104, 111, 117, 108, 100, 32, 104, 97, 118, 101, 32, 97, 114, 114, 105, 118, 101, 100, 32, 97, 116, 32, 54, 58, 52, 54, 44, 32, 98, 117, 116, 32, 116, 114, 97, 105, 110, 32, 119, 97, 115, 32, 97, 110, 32, 104, 111, 117, 114, 32, 108, 97, 116, 101, 46, 32, 66, 117, 100, 97, 45, 80, 101, 115, 116, 104, 32, 115, 101, 101, 109, 115, 32, 97, 32, 119, 111, 110, 100, 101, 114, 102, 117, 108, 32, 112, 108, 97, 99, 101, 44, 32, 102, 114, 111, 109, 32, 116, 104, 101, 32, 103, 108, 105, 109, 112, 115, 101, 32, 119, 104, 105, 99, 104, 32, 73, 32, 103, 111, 116, 32, 111, 102, 32, 105, 116, 32, 102, 114, 111, 109, 32, 116, 104, 101, 32, 116, 114, 97, 105, 110, 32, 97, 110, 100, 32, 116, 104, 101, 32, 108, 105, 116, 116, 108, 101, 32, 73, 32, 99, 111, 117, 108, 100, 32, 119, 97, 108, 107, 32, 116, 104, 114, 111, 117, 103, 104, 32, 116, 104, 101, 32, 115, 116, 114, 101, 101, 116, 115, 46, 32, 73, 32, 102, 101, 97, 114, 101, 100, 32, 116, 111, 32, 103, 111, 32, 118, 101, 114, 121, 32, 102, 97, 114, 32, 102, 114, 111, 109, 32, 116, 104, 101, 32, 115, 116, 97, 116, 105, 111, 110, 44, 32, 97, 115, 32, 119, 101, 32, 104, 97, 100, 32, 97, 114, 114, 105, 118, 101, 100, 32, 108, 97, 116, 101, 32, 97, 110, 100, 32, 119, 111, 117, 108, 100, 32, 115, 116, 97, 114, 116, 32, 97, 115, 32, 110, 101, 97, 114, 32, 116, 104, 101, 32, 99, 111, 114, 114, 101, 99, 116, 32, 116, 105, 109, 101, 32, 97, 115, 32, 112, 111, 115, 115, 105, 98, 108, 101, 46, 32, 84, 104, 101, 32, 105, 109, 112, 114, 101, 115, 115, 105, 111, 110, 32, 73, 32, 104, 97, 100, 32, 119, 97, 115, 32, 116, 104, 97, 116, 32, 119, 101, 32, 119, 101, 114, 101, 32, 108, 101, 97, 118, 105, 110, 103, 32, 116, 104, 101, 32, 87, 101, 115, 116, 32, 97, 110, 100, 32, 101, 110, 116, 101, 114, 105, 110, 103, 32, 116, 104, 101, 32, 69, 97, 115, 116, 59, 32, 116, 104, 101, 32, 109, 111, 115, 116, 32, 119, 101, 115, 116, 101, 114, 110, 32, 111, 102, 32, 115, 112, 108, 101, 110, 100, 105, 100, 32, 98, 114, 105, 100, 103, 101, 115, 32, 111, 118, 101, 114, 32, 116, 104, 101, 32, 68, 97, 110, 117, 98, 101, 44, 32, 119, 104, 105, 99, 104, 32, 105, 115, 32, 104, 101, 114, 101, 32, 111, 102, 32, 110, 111, 98, 108, 101, 32, 119, 105, 100, 116, 104, 32, 97, 110, 100, 32, 100, 101, 112, 116, 104, 44, 32, 116, 111, 111, 107, 32, 117, 115, 32, 97, 109, 111, 110, 103, 32, 116, 104, 101, 32, 116, 114, 97, 100, 105, 116, 105, 111, 110, 115, 32, 111, 102, 32, 84, 117, 114, 107, 105, 115, 104, 32, 114, 117, 108, 101, 46]

Original byte array - > chars
.............................
Vienna early next morning; should have arrived at 6:46, but train was an hour late. Buda-Pesth seems a wonderful place, from the glimpse which I got of it from the train and the little I could walk through the streets. I feared to go very far from the station, as we had arrived late and would start as near the correct time as possible. The impression I had was that we were leaving the West and entering the East; the most western of splendid bridges over the Danube, which is here of noble width and depth, took us among the traditions of Turkish rule.

2024.05.19 06:09:16.102 RUNNING setKeyFilesDirectory() ::
2024.05.19 06:09:16.106 SETTING 'C:\Users\guest\ema\key\' as input/output keys files directory
2024.05.19 06:09:16.106
2024.05.19 06:09:16.106 ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
2024.05.19 06:09:16.106 RUNNING setKeyFilename() ::
2024.05.19 06:09:16.107 SETTING the key
2024.05.19 06:09:16.107 C:\Users\guest\ema\key\1713795503342556300_RiwfKN66ufGX2LV267ld5U8iDLaDLyaR.key 4.194.304-byte
2024.05.19 06:09:16.107 sub-key_1: from index '0' to index '2.097.151'
2024.05.19 06:09:16.107 sub-key_2: from index '2.097.152' to index '4.194.304'
2024.05.19 06:09:16.175
2024.05.19 06:09:16.176 This key adds 30890 random bytes to the top of pre-encryption data if origin data is a file
2024.05.19 06:09:16.176 and 965 random bytes to the top of pre-encryption data if origin data is a byte array
2024.05.19 06:09:16.176
2024.05.19 06:09:16.176 ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
2024.05.19 06:09:16.177 RUNNING byteArrayEncryption() ::
2024.05.19 06:09:16.199 ENCRYPTING A BYTE ARRAY
2024.05.19 06:09:16.200 Size = 555-byte
2024.05.19 06:09:16.200 ..................................................................................................
2024.05.19 06:09:16.200 ENCRYPTION KEY
2024.05.19 06:09:16.200 C:\Users\guest\ema\key\\1713795503342556300_RiwfKN66ufGX2LV267ld5U8iDLaDLyaR.key 4.194.304-byte
2024.05.19 06:09:16.200 sub-key_1: from index '0' to index '2.097.151'
2024.05.19 06:09:16.200 sub-key_2: from index '2.097.152' to index '4.194.304'
2024.05.19 06:09:16.201
2024.05.19 06:09:16.201 This key adds 30890 random bytes to the top of pre-encryption data if origin data is a file
2024.05.19 06:09:16.201 and 965 random bytes to the top of pre-encryption data if origin data is a byte array
2024.05.19 06:09:16.201 ..................................................................................................
2024.05.19 06:09:16.202 ENCRYPTION SETTINGS
2024.05.19 06:09:16.202 Encryption execution core: ENABLED
2024.05.19 06:09:16.202 Checksum calculation: ENABLED with SHA-256 algorithm
2024.05.19 06:09:16.202 Encryption details: ENABLED
2024.05.19 06:09:16.202 ..................................................................................................
2024.05.19 06:09:16.202 STARTING THE CORE EXECUTION IN ENCRYPTION MODE
2024.05.19 06:09:16.203 Reading the prepared byte array 00000336µs 555-byte
2024.05.19 06:09:16.206 Encrypting the byte array 00002878µs
2024.05.19 06:09:16.206 Return the encrypted byte array 00000005µs 65.536-byte
2024.05.19 06:09:16.206 FINISHED THE CORE EXECUTION IN ENCRYPTION MODE
2024.05.19 06:09:16.206 ..................................................................................................
2024.05.19 06:09:16.206 The checksum SHA-256 was calculated
2024.05.19 06:09:16.207 Encryption performed successfully
2024.05.19 06:09:16.207
2024.05.19 06:09:16.207 FINISHED byteArrayEncryption() ::
2024.05.19 06:09:16.207
2024.05.19 06:09:16.207 ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

Encrypted byte array -> first and last 200 bytes
................................................
[59, 123, 6, -122, 3, -42, -78, 23, -59, -86, -125, 6, 4, 93, -56, 90, -66, -18, 80, -127, -17, 14, -75, -21, -24, -122, -36, 51, 85, -48, -112, -99, -22, -53, 8, 34, 82, -80, -70, -13, -74, 65, 96, -58, -83, -118, 85, -58, -20, 33, -57, 66, -33, 47, 35, 123, -66, -42, 57, 96, 13, 10, -47, 9, -73, -124, -7, 80, -114, 22, 51, -7, -118, 63, 72, 87, -14, 81, -8, -51, -42, 68, -112, -127, 46, -78, 112, 124, -56, -8, -108, -6, -125, -124, -23, 95, 104, -49, 93, -115, 115, -115, 15, -51, -101, 92, 82, 83, -64, -8, 29, 91, 61, 85, 8, 62, 80, 28, -87, -108, -39, -115, 83, -96, 54, -59, 30, -58, 20, -1, 83, 56, -103, 85, -61, 65, -23, 49, -38, -10, 46, -58, -106, 67, 76, 18, -86, -115, -17, -65, 58, 88, -55, 123, -115, 37, -38, -59, -104, 115, 3, 92, 51, -31, -95, -70, -16, 80, 30, 110, -72, 32, 55, -105, -98, -47, 57, -18, 34, 101, -35, 118, 55, 105, -66, -9, -127, -91, 113, -113, -85, 113, 93, 79, 48, -125, -28, 28, 2, 84, 63, 11, -86, -93, -68, -58, 55, -32, 63, 34, 76, 21, 24, -112, -10, -108, -5, -56, -16, 81, -28, -8, -53, -86, -73, -115, 44, 76, 12, -120, 125, -98, 84, -126, 6, -60, -34, -97, 42, -106, 58, 56, 34, -100, 50, 89, -1, -102, 65, -95, 47, 87, -69, -46, 76, -8, 33, -77, 99, 34, -98, -122, 0, -7, 66, -103, -83, 55, -21, -104, -23, 75, 18, 81, -2, -87, 59, 109, 102, -13, 111, 110, 20, 116, 11, 119, 122, 121, -14, 17, -124, -32, 98, -61, -21, -69, 125, -72, 109, -29, -71, -92, 81, 53, 49, -111, 36, 35, -34, -18, 44, -23, -57, -19, 72, -112, 44, 20, 45, 4, 58, 26, 64, 118, -29, -44, 54, 101, 122, -47, -112, -65, -1, -30, -79, 87, 74, 24, 93, -101, 116, -11, -6, 76, -108, 46, -4, 101, -45, -13, 30, -6, 32, -16, -35, -35, 110, -40, 27, -91, 57, -55, -120, 19, -48, 106, 45, -70, -90, 8, -4, -79, -100, 107, -110, -14, -118, 109, 31, -12, 44, -88, 125, -114, 91, -108, 89, 61, -74, -93, 21, -67, 24, -19, -106, 62, 82, 126, -128, 125, 105, -90, 16, 11, 0, 56, 93, -70, 111, 75, -115, 10, 103, -85, -56, -124, -64, -69, 64, 82, -34, -33, -6, -18, -69, 79, 2, -39, -100, -64, -23, 93, 38, 106, 35, -39, -98, 39, 24, 33, 126, 120, 70, -109, -114, -40, 95, 103, 43, -55, 20, 4, -92, -24, -79, -71, 6, 17, -57, -54, -116, -11, 58, 94, 119, 46, -11, -56, -73, 77, 1, 100, -97, 47, 41, -78, -11, -55, -61, 23, 115, -62, 97, 64, 52, 95, 20, -119, 98, 41, 19, 60, 1, 108, 51, -112, 127, 62, -58, 127, 108, 24, 111, -13, -8, 102, 42, 80, 59, 31, -103, -107, 5, -49, 84, -34, 18, -73, 124, 87, -116, 127, -107, 45, -118, 107, -72, 106, 56, -55, -32, -105, -104, -124, -46, -114, 116, -42, 107, 44, 62, 53, 104, 40, -18, -78, -87, 16, 38, -99, 107, -43, 69, -60, -109]
...
...
[101, 2, 83, -34, -97, -44, 120, 101, 41, -52, -101, 58, 41, -105, 56, 93, -99, 15, 72, 11, 3, 6, -72, 19, -15, 64, -58, 75, -58, -8, -89, -100, 32, -2, -124, -65, -22, 120, 30, -68, -42, -119, -1, 8, 49, -99, -92, -97, 50, 110, -24, -98, -29, -101, 20, -108, 126, 72, 54, -58, -115, 120, 99, -55, -104, -92, 110, 42, -37, 117, -87, -57, 80, -49, 100, -24, 62, 99, -20, -85, 73, -97, -8, -32, -102, 51, 122, 63, 63, -52, 112, 82, -113, 105, 121, -87, 65, -127, -122, -18, -87, 16, 7, -28, 35, -128, -70, 59, 72, -13, 97, -49, -125, -82, 96, 96, -43, 4, -85, -97, -120, -75, 17, 9, 124, -40, 43, -66, 69, -40, 122, 86, 86, -53, -127, -39, 48, -48, 94, 77, 96, -80, 43, 100, 117, -26, 46, 117, -47, 26, -7, -97, 97, 21, -36, -112, -71, 43, 64, 122, 12, 74, 61, -14, -18, 118, 52, 43, -13, 28, -76, 34, -30, 80, 74, 88, 64, 14, -36, 24, -8, -72, 30, -2, -122, -96, -15, 69, 66, -89, -49, 12, 63, 25, -3, -34, 24, 80, 90, 81, -21, 76, 62, -42, -21, 76, 63, -51, -118, -49, -23, -17, 49, -79, 81, 79, 120, 11, -5, -118, 74, 57, 104, 81, 117, -56, -92, -4, -116, 113, 73, -120, 32, -85, 101, 95, 59, 75, -111, -68, -26, -83, -80, 0, 53, -59, -2, -86, 119, 52, 76, 106, 25, -106, -63, -7, -103, 24, 107, -10, 115, 95, -117, 37, 23, 2, 92, -94, -125, -50, -114, 18, -35, -83, 26, 88, 123, 120, 78, 45, -18, 81, 100, 26, 102, -64, 51, -125, -39, 118, 20, 66, 41, -25, 37, -63, -76, -11, 25, 24, 77, 11, -121, 22, -41, -103, -101, 72, -81, -51, -121, 12, 40, 76, 54, 31, -67, -24, 113, -86, -51, -69, -45, -79, 89, -73, 56, -60, 69, -77, 110, 65, 122, -103, -45, -126, -87, 65, -54, -86, -73, 22, 64, -82, 84, -13, -122, -103, 42, -46, -2, -122, 105, 81, -118, -105, 4, 3, -30, -101, -25, 102, -6, -32, 93, 39, 0, -76, 103, -106, 74, 101, -38, -33, 10, -70, -108, 123, -45, -94, 3, 84, 69, 91, -110, -16, 99, -98, -101, 91, -20, -97, -114, 52, 75, 53, -13, 89, 80, 39, -51, 63, 53, 35, 89, -93, -76, 59, 85, 51, 109, 92, 56, -16, -108, -93, -90, -22, 50, -4, 8, -118, -38, -121, 73, 118, 41, 4, -7, 1, -23, 7, -27, 22, 2, -66, -104, 86, 127, 7, -58, -2, -26, -50, -108, 125, 41, -104, -9, -90, 121, 34, 17, 35, -52, -52, -54, -109, -79, 83, 117, 79, 1, 75, 125, 106, -25, -35, 127, 126, -92, 93, -2, 7, 80, 82, -125, -60, 85, 25, -64, -38, -96, 98, 17, -58, -42, -49, 101, 20, -43, 42, 95, 63, -31, -86, -125, 107, 25, -39, 111, 30, -14, 126, 26, -117, -12, -107, -111, 8, 38, 35, -86, 22, -66, -2, -127, -39, 57, -80, -86, 84, -27, 47, 49, -64, -48, -2, 94, 73, -80, -126, -49, 105, -53, -11, -20, 122, 10, -97, -40, -95, -34, 42, -82, -11, 113, 4, -43, 79, 24, -87, 4, 8, 20]

Encrypted byte array -> first and last 200 chars
................................................
;{ニᅱ뱱テ]￈Zᄒ○Pチ￯ᄉ→│ニᅵ3U￐ミン↑"Rᄚᄎ￳ᄊA`ᅥᆳハUᅥ↓!ᅦB￟/#{휘9`
￑ ᄋトPホ3ハ?HW￲Q￸ᅪᅱDミチ.ᄇp|￈￸ヤテト←_hᅬ]ヘsヘᅪロ\RS￀￸[=>Pᄅヤ￙ヘSᅠ6ᅤᅥ￿S8ルUᅢA←1ᅳ￶.ᅥヨCLᆰヘ￯﾿:X￉{ヘ%ᅳᅤリs\3£ᄀᄎ￰Pnᄌ 7ラ゙￑9○"e￝v7iᄒ￷チᆬqマᆱq]O0テ¦T? ᆰᆪ터7¢?"Lミ￶ヤ￈￰Q¦￸ᅨᆰᄋヘ,L ネ}゙Tツᅣ￞゚*ヨ:8"ワ2Y￿レAᄀ/W쿄L￸!ᄈc"゙ニ Bルᆳ7→リ←KQ￾ᄅ;mf￳ont wzy￲ト¢bᅢ→ᄏ}ᄌm ̄ᄍᄂQ51ム$#￞○,←ᅦ■Hミ,-:@v ̄ᅯ6ez￑ミ﾿￿¬ᄆWJ]ロt￵Lヤ.eᅮ￳ ￰￝￝n￘ᆬ9￉ネ￐j-ᄎᄆワkメ￲ハm￴,ᄄ}ホ[ヤY=ᄊᆪᄑ■ヨ>R~タ}iᆭ 8]ᄎoKヘ
gᆱ￈ト￀ᄏ@R￞￟○ᄏO￙ワ￀←]&j#￙゙'!~xFモホ￘_g+￉ᄂ│ᄆ쩨ᅧフ￵:^w.￵￈ᄋMd゚/)ᄇ￵￉ᅢsᅡa@4_ノb)<l3ミ>ᅥlo￳￸f*P;ルユᅬT￞ᄋ|Wフユ-ハkᄌj8￉¢ラリトᅭホtᅱk,>5h(○ᄇᄅ&ンkᅰEᅣモ
...
...
eS￞゚ᅯxe)ᅩロ:)ラ8]ンH ᄌ￱@ᅥKᅥ￸ᄃワ ￾ト﾿↑x튀ノ1ンᄂ゚2n│゙ ̄ロヤ~H6ᅥヘxc￉リᄂn*ᅴu레Pᅬd│>c↓ᆱI゚￸¢レ3z??ᅩpRマiyᄅAチニ○ᄅ¦#タᄎ;H￳aᅬテᆴ``ᅰᆱ゚ネᄉ |￘+ᄒE￘zVVᅨチ￙0￐^M`ᄚ+du₩.u￑゚aᅵミᄍ+@z J=￲○v4+￳ᄡ"¬PJX@ᅵ￸ᄌ￾ニᅠ￱EB되 ?�￞PZQ→L>ᅱ→L?ᅪハᅬ←￯1ᄆQOx ハJ9hQu￈ᄂフqIネ ᆱe_;Kムᄐ₩ᆳᄚ 5ᅤ￾ᆰw4Ljヨ￁ルk￶s_ヒ%\ᄁテᅫホ￝ᆳX{xN-○Qdf￀3テ￙vB)￧%￁ᄡ￵M ヌᅲルロHᆵᅪヌ (L6ᄑ│qᆰᅪ쿠ᄆYᄋ8ᅣEᄈnAzルᅮツᄅAᅧᆰᄋ@ᆴT￳ニル*ᅭ￾ニiQハラ¬ロ￧f¢]' ᄡgヨJeᅳ￟
ᄎヤ{ᅮᄁTE[メ￰c゙ロ[↓゚ホ4K5￳YP'ᅪ?5#Yᆪᄡ;U3m\8￰ヤᆪᆭ↑2ハᅳヌIv)←¥ᄒリVᅥ￾₩ᅫヤ})リ￷ᆭy"#ᅩᅩᅧモᄆSuOK}j￧￝~ᄂ]￾PRテᅣU￀ᅳᅠbᅥᅱᅬeᅰ*_?£ᆰテk￙o￲~ヒ￴ユ&#ᆰᄒ￾チ￙9ᄚᆰT¥/1￀￐￾^Iᄚツᅬiᅨ￵↓z
゚￘ᄀ￞*ᆴ￵qᅰOᄅ

2024.05.19 06:09:16.210 RUNNING byteArrayDecryption() ::
2024.05.19 06:09:16.210 DECRYPTING A BYTE ARRAY
2024.05.19 06:09:16.210 Size = 65.536-byte
2024.05.19 06:09:16.210 ..................................................................................................
2024.05.19 06:09:16.211 DECRYPTION KEY
2024.05.19 06:09:16.211 C:\Users\guest\ema\key\\1713795503342556300_RiwfKN66ufGX2LV267ld5U8iDLaDLyaR.key 4.194.304-byte
2024.05.19 06:09:16.211 sub-key_1: from index '0' to index '2.097.151'
2024.05.19 06:09:16.211 sub-key_2: from index '2.097.152' to index '4.194.304'
2024.05.19 06:09:16.234 Decrypting the byte array 00002239µs
2024.05.19 06:09:16.234
2024.05.19 06:09:16.234 This key adds 30890 random bytes to the top of pre-encryption data if origin data is a file
2024.05.19 06:09:16.235 and 965 random bytes to the top of pre-encryption data if origin data is a byte array
2024.05.19 06:09:16.236 ..................................................................................................
2024.05.19 06:09:16.236 DECRYPTION SETTINGS
2024.05.19 06:09:16.236 Decryption details: ENABLED
2024.05.19 06:09:16.236 ..................................................................................................
2024.05.19 06:09:16.236 STARTING THE CORE EXECUTION IN DECRYPTION MODE
2024.05.19 06:09:16.236 Reading the prepared byte array 00025857µs 65.536-byte
2024.05.19 06:09:16.236 Checksum SHA-256 algorithm found
2024.05.19 06:09:16.237 Calculating SHA-256 checksum 00000000µs
2024.05.19 06:09:16.237 Return the decrypted byte array 00000003µs 555-byte
2024.05.19 06:09:16.237 FINISHED THE CORE EXECUTION IN DECRYPTION MODE
2024.05.19 06:09:16.237 ..................................................................................................
2024.05.19 06:09:16.237 CHECKSUM SHA-256 was verified and is correct
2024.05.19 06:09:16.237 Decryption performed successfully
2024.05.19 06:09:16.238
2024.05.19 06:09:16.238 FINISHED byteArrayDecryption() ::
2024.05.19 06:09:16.238
2024.05.19 06:09:16.238 ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

Decrypted byte array -> bytes
.............................
[86, 105, 101, 110, 110, 97, 32, 101, 97, 114, 108, 121, 32, 110, 101, 120, 116, 32, 109, 111, 114, 110, 105, 110, 103, 59, 32, 115, 104, 111, 117, 108, 100, 32, 104, 97, 118, 101, 32, 97, 114, 114, 105, 118, 101, 100, 32, 97, 116, 32, 54, 58, 52, 54, 44, 32, 98, 117, 116, 32, 116, 114, 97, 105, 110, 32, 119, 97, 115, 32, 97, 110, 32, 104, 111, 117, 114, 32, 108, 97, 116, 101, 46, 32, 66, 117, 100, 97, 45, 80, 101, 115, 116, 104, 32, 115, 101, 101, 109, 115, 32, 97, 32, 119, 111, 110, 100, 101, 114, 102, 117, 108, 32, 112, 108, 97, 99, 101, 44, 32, 102, 114, 111, 109, 32, 116, 104, 101, 32, 103, 108, 105, 109, 112, 115, 101, 32, 119, 104, 105, 99, 104, 32, 73, 32, 103, 111, 116, 32, 111, 102, 32, 105, 116, 32, 102, 114, 111, 109, 32, 116, 104, 101, 32, 116, 114, 97, 105, 110, 32, 97, 110, 100, 32, 116, 104, 101, 32, 108, 105, 116, 116, 108, 101, 32, 73, 32, 99, 111, 117, 108, 100, 32, 119, 97, 108, 107, 32, 116, 104, 114, 111, 117, 103, 104, 32, 116, 104, 101, 32, 115, 116, 114, 101, 101, 116, 115, 46, 32, 73, 32, 102, 101, 97, 114, 101, 100, 32, 116, 111, 32, 103, 111, 32, 118, 101, 114, 121, 32, 102, 97, 114, 32, 102, 114, 111, 109, 32, 116, 104, 101, 32, 115, 116, 97, 116, 105, 111, 110, 44, 32, 97, 115, 32, 119, 101, 32, 104, 97, 100, 32, 97, 114, 114, 105, 118, 101, 100, 32, 108, 97, 116, 101, 32, 97, 110, 100, 32, 119, 111, 117, 108, 100, 32, 115, 116, 97, 114, 116, 32, 97, 115, 32, 110, 101, 97, 114, 32, 116, 104, 101, 32, 99, 111, 114, 114, 101, 99, 116, 32, 116, 105, 109, 101, 32, 97, 115, 32, 112, 111, 115, 115, 105, 98, 108, 101, 46, 32, 84, 104, 101, 32, 105, 109, 112, 114, 101, 115, 115, 105, 111, 110, 32, 73, 32, 104, 97, 100, 32, 119, 97, 115, 32, 116, 104, 97, 116, 32, 119, 101, 32, 119, 101, 114, 101, 32, 108, 101, 97, 118, 105, 110, 103, 32, 116, 104, 101, 32, 87, 101, 115, 116, 32, 97, 110, 100, 32, 101, 110, 116, 101, 114, 105, 110, 103, 32, 116, 104, 101, 32, 69, 97, 115, 116, 59, 32, 116, 104, 101, 32, 109, 111, 115, 116, 32, 119, 101, 115, 116, 101, 114, 110, 32, 111, 102, 32, 115, 112, 108, 101, 110, 100, 105, 100, 32, 98, 114, 105, 100, 103, 101, 115, 32, 111, 118, 101, 114, 32, 116, 104, 101, 32, 68, 97, 110, 117, 98, 101, 44, 32, 119, 104, 105, 99, 104, 32, 105, 115, 32, 104, 101, 114, 101, 32, 111, 102, 32, 110, 111, 98, 108, 101, 32, 119, 105, 100, 116, 104, 32, 97, 110, 100, 32, 100, 101, 112, 116, 104, 44, 32, 116, 111, 111, 107, 32, 117, 115, 32, 97, 109, 111, 110, 103, 32, 116, 104, 101, 32, 116, 114, 97, 100, 105, 116, 105, 111, 110, 115, 32, 111, 102, 32, 84, 117, 114, 107, 105, 115, 104, 32, 114, 117, 108, 101, 46]

Decrypted byte array -> chars
.............................
Vienna early next morning; should have arrived at 6:46, but train was an hour late. Buda-Pesth seems a wonderful place, from the glimpse which I got of it from the train and the little I could walk through the streets. I feared to go very far from the station, as we had arrived late and would start as near the correct time as possible. The impression I had was that we were leaving the West and entering the East; the most western of splendid bridges over the Danube, which is here of noble width and depth, took us among the traditions of Turkish rule.


Process finished with exit code 0
Scroll to Top