CryptoCode: DES Encryption & Decryption using SHA1 Hash Key

In previous posts, I wrote example code for generating MD5 Hash & SHA1 Hash using Windows Cryptography Functions. Here I am going to write about DES encryption/decryption algorithm with SHA1 based Hash key generated using Password.  This is most common way of generating password where in unique data is used to generate a Hash Key which is then used for encryption of the source data.

Below is the code example for the same,

//  Encrypt Data using DES algorithm with SHA1 based hash key derived from password 
BOOL EncryptDataUsingSHA1_DES(char *strPassword, BYTE *byteData, DWORD dwDataLen, DWORD dwBufferSize) 

 BOOL bResult = FALSE;
 HCRYPTPROV hProv = 0;
 HCRYPTHASH hHash = 0;
 HCRYPTKEY hCryptKey = 0;

 // Get handle to the crypto provider
	 printf("\nCryptAcquireContext failed,  Error=0x%.8x", GetLastError());
	 goto Encrypt_End;

 //Create SHA1 Hash 
 if (CryptCreateHash(hProv, CALG_SHA1, 0, 0, &hHash) == FALSE)
	 printf("\n CryptCreateHash failed,  Error=0x%.8x", GetLastError());
	 goto Encrypt_End;

 //Generate SHA1 Hash using password 
 if( CryptHashData(hHash, (const BYTE*) strPassword, strlen(strPassword), 0) == FALSE)
	 printf("\n CryptHashData failed,  Error=0x%.8x", GetLastError());
	 goto Encrypt_End;

 //Now derive key using SHA1 hash for DES encryption     
 if( CryptDeriveKey(hProv, CALG_DES, hHash, CRYPT_EXPORTABLE, &hCryptKey) == FALSE )
	 printf("\n CryptDeriveKey failed,  Error=0x%.8x", GetLastError());
	 goto Encrypt_End;

 printf("\n********** Performing Encryption of data of length = %d", dwDataLen);

 //Finally encrypt the source data using DES encryption

 if( CryptEncrypt(hCryptKey, NULL, TRUE, 0, byteData,  &dwDataLen, dwBufferSize) == FALSE )
	 printf("\n CryptEncrypt failed,  Error=0x%.8x", __FUNCTION__, GetLastError());
	 goto Encrypt_End;

 printf("\n********** Encryption Successful,  Final encrypted data size %d", dwDataLen);

 bResult = TRUE;


 if( hCryptKey )

 if( hHash )

 if( hProv )
	 CryptReleaseContext(hProv, 0);

 return bResult; 


Above example uses following 3 steps to perform the encryption

  1. Generate the SHA1 Hash using the input password
  2. Derive the Key using SHA1 Hash for encryption
  3. Finally Encrypt the source data using the above key

The decryption code is almost identical except that we need to replace CryptEncrypt code section with CryptDecrypt function as shown below

 //Finally encrypt the source data using DES encryption
 if( CryptDecrypt(hCryptKey, NULL, TRUE, 0, byteData,  &dwDataLen) == FALSE )
	 printf("\n CryptDecrypt failed,  Error=0x%.8x", __FUNCTION__, GetLastError());
	 goto Encrypt_End;

Place the above function anywhere in your project and  invoke it using following code snippet

 char strPassword[]="securityxploded";
 char strSourceData[1024]="secret string";
 DWORD dwDataLen = strlen(strSourceData);

 EncryptDataUsingSHA1_DES(strPassword, (BYTE*) strSourceData, dwDataLen, 1024);

Here we use DES algorithm for encryption/decryption. We can also use other popular algorithms such as RC4 (CALG_RC4) and with different Hash generation algorithms such as SHA256, MD5 etc in place of SHA1.

See Also

CryptoCode: Index of All Crypto Articles

Similar posts
  • Computer Security Tips: Stay Safe Onl... In recent times cyber security has raised the level of awareness and public consciousness as never before. Both large corporations and big organizations try to take care of online security as much as they can. That’s why cyber criminals and hackers have focused more on smaller companies and single entrepreneurs. This awful tendency leads to [...]
  • SecurityXploded Mentorship Programme ... I am writing this blog to share my SecurityXploded Student Mentorship Programme experience with the future students of this programme. My mentorship programme started last year in August when I was in 2nd year of MS at IIIT-Allahabad. I knew about SecurityXploded community since I used to follow their blogs, training programmes and security tools [...]
  • Code Injection and API Hooking Techni... Hooking covers a range of techniques used for many purposes like debugging, monitoring, intercepting messages, extending functionality etc. Hooking is also used by a lot of rootkits to camouflage themselves on the system. Rootkits use various hooking techniques when they have to hide a process, hide a network port, redirect file writes to some different [...]
  • Announcement – SecurityXploded ... From the past two years we are working actively on couple of projects to support the security community. As you all may already know that we have successfully completed our reversing and malware analysis training programme and we are very glad that it was very helpful for everyone. In my opinion the success of any [...]
  • Advanced Malware Analysis Training Se... Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on (Part 2) Dissecting the HeartBeat  RAT Functionalities   This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.       In this extended session, I explained “Decrypting various Communications Of HeartBeat [...]

Leave a Reply

Our Company

Follow us on Facebook

Join Mailing List

Get direct access to our expert trainers or mingle with like minded security folks in our mailing list