无法从AES-128-GCM获得正确的输出

时间:2015-05-13 08:50:52

标签: c++ encryption cryptography aes-gcm polarssl

以下测试代码理论上应该给我NIST测试套件58e2fccefa7e3061367f1d57a4e7455a的结果,但是输出的hexdump会产生9eeaed13b5f591104e2cda197fb99eeaed13b5f591104e2cda197fb9吗?

#include <iostream>
#include <cstdio>
#include <polarssl/md.h>
#include <polarssl/entropy.h>
#include <polarssl/ctr_drbg.h>
#include <polarssl/cipher.h>
#include <cstdlib>
#include <fstream>


int main(int argc, char** argv) {
const cipher_info_t *cipher_info;
        cipher_info = cipher_info_from_string( "AES-128-GCM" );
        cipher_context_t cipher_ctx;
    cipher_init_ctx (&cipher_ctx,cipher_info);
        std::cout<<"KEYLEN"<<std::endl;
        std::cout<<cipher_info->key_length<<std::endl;
    std::cout<<"IVLEN"<<std::endl;
    std::cout<<cipher_info->iv_size<<std::endl;
unsigned char key[cipher_info->key_length/8];
    unsigned char iv[cipher_info->iv_size];
    memset(key,0x00,cipher_info->key_length/8);
    memset(iv,0x00,cipher_info->iv_size);
    unsigned char iBuffer[10];
    unsigned char oBuffer[1024];
    size_t ilen, olen;


std::ofstream oFile2;
    oFile2.open("testOut",std::ofstream::out | std::ofstream::trunc | std::ofstream::binary);

        cipher_setkey( &cipher_ctx,key,cipher_info->key_length,POLARSSL_ENCRYPT);
        cipher_set_iv( &cipher_ctx, iv, 16 );
        cipher_reset( &cipher_ctx );
    cipher_update( &cipher_ctx, iBuffer, sizeof(iBuffer), oBuffer, &olen );
    oFile2 << oBuffer;
    cipher_finish( &cipher_ctx, oBuffer, &olen );
    oFile2 << oBuffer;
    oFile2.close();
}

这是nIST测试:

Variable 
Value 
K  00000000000000000000000000000000
P
IV 000000000000000000000000
H 66e94bd4ef8a2c3b884cfa59ca342b2e
Yo 00000000000000000000000000000001
E ( K,Yo) 58e2fccefa7e3061367f1d57a4e7455a
len(A)||len(C)  00000000000000000000000000000000
GHASH (H,A,C) 00000000000000000000000000000000    
C
T 58e2fccefa7e3061367f1d57a4e7455a

(测试案例1 http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/gcm-revised-spec.pdf

1 个答案:

答案 0 :(得分:2)

我可以看到两个直接的错误:

  1. 纯文本大小设置为10个字节而不是没有字节 - 这使得密文过大而且身份验证标记不正确;
  2. IV是12个字节设置为0而不是16个字节设置为0 - 12是GCM模式的默认值 - 这使得密文(如果有)和身份验证标签不正确。
  3. 这些问题如下:

    unsigned char iBuffer[10];
    ...
    cipher_update( &cipher_ctx, iBuffer, sizeof(iBuffer), oBuffer, &olen );
    

    cipher_set_iv( &cipher_ctx, iv, 16 );
    

    此外,似乎API要求您使用...write_tag... method单独检索标记。目前,您只能看到CTR密文,而不是身份验证标记。