我已使用以下命令对文件进行加密
openssl rand 32> test.key
openssl enc -aes-256-cbc -iter 10000 -pbkdf2 -salt -in test.txt -out test.txt.enc -pass file:test.key
现在,我正在尝试使用Java对其进行解密。最近几天一直在努力,但没有成功。
任何人都可以帮忙吗?
我的代码
package test;
import java.io.BufferedReader;
import java.io.File;
import java.io.FileInputStream;
import java.io.FileReader;
import java.io.IOException;
import java.io.InputStream;
import java.io.OutputStream;
import java.nio.charset.Charset;
import java.security.GeneralSecurityException;
import java.security.InvalidAlgorithmParameterException;
import java.security.InvalidKeyException;
import java.security.MessageDigest;
import java.security.NoSuchAlgorithmException;
import java.security.spec.InvalidKeySpecException;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.List;
import java.util.stream.Collectors;
import javax.crypto.BadPaddingException;
import javax.crypto.Cipher;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.NoSuchPaddingException;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
import org.apache.commons.io.IOUtils;
public class OpenSSlDecryptor {
private static final Charset ASCII = Charset.forName("ASCII");
private static final int INDEX_KEY = 0;
private static final int INDEX_IV = 1;
private static final int ITERATIONS = 10000;
private static final int ARG_INDEX_FILENAME = 0;
private static final int ARG_INDEX_PASSWORD = 1;
private static final int SALT_OFFSET = 8;
private static final int SALT_SIZE = 8;
private static final int CIPHERTEXT_OFFSET = SALT_OFFSET + SALT_SIZE;
private static final int KEY_SIZE_BITS = 256;
/**
* Thanks go to Ola Bini for releasing this source on his blog.
* The source was obtained from <a href="http://olabini.com/blog/tag/evp_bytestokey/">here</a> .
*/
public static byte[][] EVP_BytesToKey(final int key_len, final int iv_len, final MessageDigest md,
final byte[] salt, final byte[] data, final int count) {
final byte[][] both = new byte[2][];
final byte[] key = new byte[key_len];
int key_ix = 0;
final byte[] iv = new byte[iv_len];
int iv_ix = 0;
both[0] = key;
both[1] = iv;
byte[] md_buf = null;
int nkey = key_len;
int niv = iv_len;
int i = 0;
if (data == null) {
return both;
}
int addmd = 0;
for (;;) {
md.reset();
if (addmd++ > 0) {
md.update(md_buf);
}
md.update(data);
if (null != salt) {
md.update(salt, 0, 8);
}
md_buf = md.digest();
for (i = 1; i < count; i++) {
md.reset();
md.update(md_buf);
md_buf = md.digest();
}
i = 0;
if (nkey > 0) {
for (;;) {
if (nkey == 0) {
break;
}
if (i == md_buf.length) {
break;
}
key[key_ix++] = md_buf[i];
nkey--;
i++;
}
}
if (niv > 0 && i != md_buf.length) {
for (;;) {
if (niv == 0) {
break;
}
if (i == md_buf.length) {
break;
}
iv[iv_ix++] = md_buf[i];
niv--;
i++;
}
}
if (nkey == 0 && niv == 0) {
break;
}
}
for (i = 0; i < md_buf.length; i++) {
md_buf[i] = 0;
}
return both;
}
public static void main(final String[] args) throws IOException, NoSuchAlgorithmException, InvalidKeySpecException, NoSuchPaddingException, InvalidKeyException, InvalidAlgorithmParameterException {
final String fileName = "test.txt.enc";
final File f = new File(fileName );
try {
// --- read base 64 encoded file ---
List<String> lines = new ArrayList<>();
try (BufferedReader br = new BufferedReader(new FileReader(f))) {
//br returns as stream and convert it into a List
lines = br.lines().collect(Collectors.toList());
} catch (final IOException e) {
e.printStackTrace();
}
final StringBuilder sb = new StringBuilder();
for (final String line : lines) {
sb.append(line.trim());
}
final String random_bin_key = "test.key";
final byte[] passwordKey = IOUtils.toByteArray(new FileInputStream(random_bin_key));
// --- extract salt & encrypted ---
final byte[] headerSaltAndCipherText = sb.toString().getBytes();
// header is "Salted__", ASCII encoded, if salt is being used (the default)
final byte[] salt = Arrays.copyOfRange(
headerSaltAndCipherText, SALT_OFFSET, SALT_OFFSET + SALT_SIZE);
final byte[] encrypted = Arrays.copyOfRange(
headerSaltAndCipherText, CIPHERTEXT_OFFSET, headerSaltAndCipherText.length);
// --- specify cipher and digest for EVP_BytesToKey method ---
final Cipher aesCBC = Cipher.getInstance("AES/CBC/PKCS5Padding");
final MessageDigest md5 = MessageDigest.getInstance("MD5");
// --- create key and IV ---
// the IV is useless, OpenSSL might as well have use zero's
final byte[][] keyAndIV = EVP_BytesToKey(
KEY_SIZE_BITS / Byte.SIZE,
aesCBC.getBlockSize(),
md5,
salt,
passwordKey,
ITERATIONS);
final SecretKeySpec key = new SecretKeySpec(keyAndIV[INDEX_KEY], "AES");
final IvParameterSpec iv = new IvParameterSpec(keyAndIV[INDEX_IV]);
// --- initialize cipher instance and decrypt ---
aesCBC.init(Cipher.DECRYPT_MODE, key, iv);
final byte[] decrypted = aesCBC.doFinal(encrypted);
final String answer = new String(decrypted);
System.out.println(answer);
} catch (final BadPaddingException e) {
System.out.println(e.getMessage());
} catch (final IllegalBlockSizeException e) {
System.out.println(e.getMessage());
} catch (final GeneralSecurityException e) {
System.out.println(e.getMessage());
} catch (final IOException e) {
System.out.println(e.getMessage());
}
}
我得到的错误
Given final block not properly padded. Such issues can arise if a bad key is used during decryption.
我参考了以下链接
尝试过
` final Cipher cipher = Cipher.getInstance("AES/CBC/PKCS7Padding");
// strip off the salt and iv
final ByteBuffer buffer = ByteBuffer.wrap(encryptedText);
byte[] saltBytes = new byte[16];
buffer.get(saltBytes, 0, saltBytes.length);
saltBytes = Arrays.copyOfRange(saltBytes, 8, 16);
final byte[] ivBytes1 = new byte[cipher.getBlockSize()];
buffer.get(ivBytes1, 0, ivBytes1.length);
final int length = buffer.capacity() - 16 - ivBytes1.length;
// length = length+ 16 -(length%16);
final byte[] encryptedTextBytes = new byte[length];
buffer.get(encryptedTextBytes);
// Deriving the key
final SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1");
final PBEKeySpec spec = new PBEKeySpec(new String(password).toCharArray(), saltBytes, 10000,
256);
final SecretKey secretKey = factory.generateSecret(spec);
final SecretKeySpec secret = new SecretKeySpec(secretKey.getEncoded(), "AES");
cipher.init(Cipher.DECRYPT_MODE, secret, new IvParameterSpec(ivBytes1));
byte[] decryptedTextBytes = null;
try {
decryptedTextBytes = cipher.doFinal(encryptedTextBytes);
} catch (final IllegalBlockSizeException e) {
e.printStackTrace();
} catch (final BadPaddingException e) {
e.printStackTrace();
}
获取badpadding异常
尝试过PBKDF2WithHmacSHA256
仍然出现错误
您有几个问题。最明显的是您正在尝试从文件读取IV,但是openssl enc
在其默认的基于密码的模式下,即使从PBKDF2使用,也从密码和salt中导出了密钥和IV。但是,Java中的标准(Sun / Oracle / OpenJDK)提供程序和BouncyCastle提供程序都实现PBKDF2来仅导出密钥-在PBES2中使用密钥的方式。
即使没有,您生成随机字节的“密码”的方法也不起作用。 PKCS5 standard实际上将PBKDF2定义为使用密码>]
-Java中的一个八位位组任意长度的字符串,其解释为文本字符串为未指定。但是为了互操作性,它是建议应用程序遵循一些常见的文本编码规则。ASCII和UTF-8 [RFC3629]是两种可能。 (ASCII是一个子集的UTF-8。)
[许多系统更加重视可互操作的编码,特别是Java(从一开始就被设计为在全球范围内设计)定义
PBEKeySpec
包含characters
char[]
是UTF-16-在执行PBKDF2时被编码为UTF-8。相反,openssl
是一个C世纪的程序,它始于世纪之交,当时C开始承认存在除美国以外的其他国家,因此它只知道字节,即might为ASCII的字节,或某些字节。其他单字节代码(如EBCDIC),但也许根本就不是字符,当然也不是那些不能容纳在字节中的怪异外来字符。 32个随机字节序列为有效UTF-8的可能性非常低;对我而言,要进行分析,需要进行大量工作,但是我对1亿个随机值进行了测试,结果发现只有一个适用于您的方案。 (我本来打算测试十亿,但已经厌倦了等待。)此外,由于密码应该是文本,所以openssl
将-pass file:
读取为text
这提出了一个要点:为什么您完全使用基于密码的加密?如果您的“密钥”是来自一个体面的安全RNG的32个字节(即openssl rand
),则您无需对其进行增强,它已作为密钥有效。您可以使用openssl enc
进行基于密钥
因此,无论如何,这是一个相当简单的Java程序,可以处理以下两种情况:pdbkf2的openssl形式带有“口令”,实际上不是密码,也不是UTF-8,或者是更明智的基于密钥的形式(但对于此演示,IV为零):
//nopackage import java.nio.charset.StandardCharsets; import java.nio.file.*; import java.security.*; import java.util.*; import javax.crypto.*; import javax.crypto.spec.*; public class SO61613286 { static public void main (String[] args) throws Exception /* let JVM give error */{ // arguments: P/K, filename output from openssl enc, filename of text pw or binary key byte[] file = Files.readAllBytes(Paths.get(args[1])); byte[] fil2 = Files.readAllBytes(Paths.get(args[2])); Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); if( args[0].startsWith("P") ){ // possibly truncate 'password' in fil2 int n = 0; for( ; n < fil2.length; n++ ) if( fil2[n]==0 || fil2[n]=='\n' ) break; if( n < fil2.length ) fil2 = Arrays.copyOf(fil2, n); // extract salt and derive ... byte[] salt = Arrays.copyOfRange(file, 8, 16); byte[] derive = PBKDF2 ("HmacSHA256", fil2, salt, 10000, 48); // ... key is first 32, IV is last 16 cipher.init(Cipher.DECRYPT_MODE, new SecretKeySpec(derive,0,32,"AES"), new IvParameterSpec(derive,32,16)); // remainder of file is ciphertext System.out.write( cipher.doFinal(file,16,file.length-16) ); }else{ // just use fil2 as key and zeros for IV ... cipher.init(Cipher.DECRYPT_MODE, new SecretKeySpec(fil2,"AES"), new IvParameterSpec(new byte[16])); // ... all of file is ciphertext System.out.write( cipher.doFinal(file,0,file.length) ); // !!!if key will be reused, must use better IVs and transmit with the data!!! } } public static byte[] PBKDF2 (String prf, byte[] pass, byte[] salt, int iter, int len) throws NoSuchProviderException, NoSuchAlgorithmException, InvalidKeyException { byte[] result = new byte[len]; Mac mac = Mac.getInstance(prf); mac.init (new SecretKeySpec (pass,prf)); byte[] saltcnt = Arrays.copyOf (salt, salt.length+4); while( /*remaining*/len>0 ){ for( int o = saltcnt.length; --o>=saltcnt.length-4; ) if( ++saltcnt[o] != 0 ) break; byte[] u = saltcnt, x = new byte[mac.getMacLength()]; for( int i = 1; i <= iter; i++ ){ u = mac.doFinal (u); for( int o = 0; o < x.length; o++ ) x[o] ^= u[o]; } int len2 = Math.min (len, x.length); System.arraycopy (x,0, result,result.length-len, len2); len -= len2; } return result; } public static void testutf8 (){ Random r = new Random(); byte[] t = new byte[32]; for( int i = 0; i < 1000000000; i++ ){ r.nextBytes(t); if( Arrays.equals(new String (t, StandardCharsets.UTF_8).getBytes(StandardCharsets.UTF_8), t) ) System.out.println(i+" "+Arrays.toString(t)); if( i % 1000000 == 999999 ) System.out.println (i); } } }
和演示:
$ openssl rand 32 >SO61613286.rnd # repeated several times until I got this:
$ xxd SO61613286.rnd # notice the null byte
0000000: ab1a 1384 9238 0900 c947 6b9a c23d 5ee0 .....8...Gk..=^.
0000010: 32f0 6b2f 91ec 2dd9 a69d eb7d e00e 37ff 2.k/..-....}..7.
$
$ echo the name of the cat >SO61613286.in
$
$ openssl aes-256-cbc -in SO61613286.in -out SO61613286.enc1 -pass file:SO61613286.rnd -pbkdf2 -iter 10000
$ java8 -cp . SO61613286 P SO61613286.enc1 SO61613286.rnd
the name of the cat
$
$ openssl aes-256-cbc -in SO61613286.in -out SO61613286.enc2 -K $(xxd -p -c32 SO61613286.rnd) -iv 00
hex string is too short, padding with zero bytes to length
$ # that's a warning and can be ignored, as long as we don't need real IVs (see above)
$ java8 -cp . SO61613286 K SO61613286.enc2 SO61613286.rnd
the name of the cat
$