Skip to content

Cryptography

This example shows how to encrypt/decrypt a text.

App presentation

Hardware

No hardware is needed for this example. You can run it without being logged in.

Dashboard components

The dashboard allows you to enter the key (password) and the text to be encrypted. The entered password is optionally hashed to generate the key that will be used for encryption. The algorithm is selectable from ECB, CTR, CBC, GCM and CFB.

💡 Note:

  • When no hash requested, the key must be 16 bytes long

  • Depending on the algorithm, options (IV, ...) must be set.

Dataflow graph

The dataflow shows how to use the cryptographic nodes (SHA, Encrypt and Decrypt). CRC16-CCITT calculation is also performed (into an inline node) and displayed. However, this value is not inserted into the data to be encrypted.

Back to top