如何使用JavaCard中的现有密钥对初始化EC密钥对?

时间:2015-12-22 07:57:10

标签: java key javacard

我已经有一个二进制格式的EC密钥对(secp256r1),它存储在一个字节数组中,如下所示:

// private key, 32 bytes
byte[] privKey = {0x4c, (byte)0xc7, (byte)0xcf, 0x68, (byte)0x91, 0x18, (byte)0x96, (byte)0xc8, (byte)0xe2, (byte)0xf9, (byte)0xc8, (byte)0xcc, 0x2f, 0x7f, 0x0a, (byte)0xa2, 0x1c, 0x6a, (byte)0xcb, (byte)0xba, 0x38, 0x1c, 0x10, (byte)0x9a, (byte)0xfe, (byte)0x91, 0x18, (byte)0xf6, (byte)0xca, (byte)0xd9, 0x0f, 0x0b};
//public key, 65 bytes, which is contained in a X.509 certificate
byte[] pubKey = {0x04, 0x72, (byte)0x9a, 0x71, (byte)0xd0, (byte)0x81, 0x62, 0x42, (byte)0x84, (byte)0x92, (byte)0xf2, (byte)0xd9, 0x61, (byte)0x92, 0x4d, 0x37, 0x44, 0x3a, 0x4f, 0x1b, (byte)0xda, 0x58, 0x0f, (byte)0x8a, (byte)0xea, 0x29, 0x20, (byte)0xd2, (byte)0x99, 0x7c, (byte)0xbe, (byte)0xa4, 0x39, 0x60, (byte)0xce, 0x72, (byte)0x9e, 0x35, (byte)0xc1, (byte)0xf7, 0x40, (byte)0x92, (byte)0xf2, 0x25, 0x0e, 0x60, 0x74, (byte)0x82, 0x3f, (byte)0xc5, 0x7f, 0x33, 0x60, (byte)0xb7, (byte)0xcd, 0x39, 0x69, (byte)0xc3, (byte)0xc3, 0x12, 0x5e, (byte)0xce, 0x26, 0x5c, 0x29};

此EC密钥对由openssl生成。我想将这个EC密钥对存储在我的javacard applet中,这样我每次都可以用这个EC私钥签名消息。

但我在javacard 3中找不到任何适当的API来设置EC密钥对。

我使用此项目https://github.com/Yubico/ykneo-curves/blob/master/applet/src/com/yubico/ykneo/curves/SecP256r1.java在secp256r1中设置参数。

更新
我确实在ECPublicKey中设置了参数setW,在ECPrivateKey中设置了setS,并根据https://github.com/Yubico/ykneo-curves/blob/master/applet/src/com/yubico/ykneo/curves/SecP256r1.java设置了其他参数。像这样:

    privKey.setFieldFP(p, (short) 0, (short) p.length);
    privKey.setA(a, (short) 0, (short) a.length);
    privKey.setB(b, (short) 0, (short) b.length);
    privKey.setG(G, (short) 0, (short) G.length);
    privKey.setR(r, (short) 0, (short) r.length);

    byte[] privData = {(byte)0x25, (byte)0xc9, (byte)0xec, (byte)0xdc, (byte)0x4c, (byte)0x59, (byte)0xa3, (byte)0xe0, (byte)0x4f, (byte)0x01, (byte)0x56, (byte)0x97, (byte)0xf3, (byte)0xcb, (byte)0x60, (byte)0x5b, (byte)0x84, (byte)0x49, (byte)0x45, (byte)0x3a, (byte)0xe2, (byte)0x0e, (byte)0xd1, (byte)0xbd, (byte)0xc0, (byte)0xa7, (byte)0xe1, (byte)0xfa, (byte)0x82, (byte)0xee, (byte)0x3c, (byte)0x73};
    privKey.setS(privData, (short) 0, (short) privData.length);

    pubKey.setFieldFP(p, (short) 0, (short) p.length);
    pubKey.setA(a, (short) 0, (short) a.length);
    pubKey.setB(b, (short) 0, (short) b.length);
    pubKey.setG(G, (short) 0, (short) G.length);
    pubKey.setR(r, (short) 0, (short) r.length);

    byte[] pubData = {0x04, 0x00, (byte)0xb9, (byte)0x8f, (byte)0xcf, (byte)0xc3, (byte)0xc0, (byte)0xae, (byte)0x95, 0x6a, 0x5b, 0x12, 0x6d, (byte)0xbe, 0x43, (byte)0xe4, 0x7f, 0x09, 0x0d, (byte)0xde, 0x02, (byte)0xd2, 0x6b, 0x28, (byte)0x86, (byte)0xed, 0x2b, (byte)0xd7, (byte)0xe2, (byte)0xc2, 0x69, (byte)0xc1, (byte)0x89, (byte)0xb2, 0x53, (byte)0x96, (byte)0xc1, 0x2d, (byte)0xbf, 0x4c, 0x30, (byte)0xae, (byte)0xd5, (byte)0xd5, 0x3c, (byte)0xb5, (byte)0xf9, 0x3b, 0x20, 0x37, (byte)0x83, (byte)0x88, (byte)0x9f, 0x34, 0x74, (byte)0xf5, 0x6c, (byte)0x97, 0x1e, 0x0a, (byte)0xa9, (byte)0xe7, (byte)0xfa, (byte)0xa6, 0x69};
    pubKey.setW(pubData, (short) 0, (short)pubData.length);

现在我签署了这条消息:

    // the class Secp256r1 can be found in above link
    pair = SecP256r1.newKeyPair();

    ECPublicKey pubKey = (ECPublicKey) pair.getPublic();
    ECPrivateKey privKey = (ECPrivateKey) pair.getPrivate();


    byte[] data = {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f};


    signature = Signature.getInstance(Signature.ALG_ECDSA_SHA, false);
    signature.init(pair.getPrivate(), Signature.MODE_SIGN);

    byte[] signData = new byte[127];
    short sendLen = signature.sign(data, (short) 0, (short) data.length, buffer, (short) 0);
    apdu.setOutgoingAndSend((short) 0, sendLen);

我发送了几个APDU来调用这段代码。但每次我收到不同的签名消息。为什么会发生这种情况?

1 个答案:

答案 0 :(得分:4)

setW(...)上的方法ECPublicKeysetS(...)上的ECPrivateKey。{/ p>

棘手的部分是您的keyPair.getPublic()keyPair.getPrivate()返回常规接口。你必须施展它们:

KeyPair keyPair = new KeyPair(KeyPair.ALG_EC_FP, KeyBuilder.LENGTH_EC_FP_256);
ECPublicKey pub = (ECPublicKey) keyPair.getPublic();
ECPrivateKey priv = (ECPrivateKey) keyPair.getPrivate();
pub.setW(pubBytes, (short) 0, (short) pubBytes.length);
priv.setS(privBytes, (short) 0, (short) privBytes.length);
//do not forget to set parameters of your curve to both private and public key HERE!!!

https://docs.oracle.com/javacard/3.0.5/api/javacard/security/ECPublicKey.html

  

void setW(byte [] buffer,           短补偿,           短长度)             抛出CryptoException

     

设置包含公钥的曲线的点。关键点   应根据ANSI X9.62指定为八位字符串。一个具体的   实现不需要支持压缩形式,但必须支持   点的未压缩形式。纯文本数据格式是   big-endian和right-aligned(最不重要的位是最少的   最后一个字节的重要位)。输入参数数据被复制到   内部代表。

https://docs.oracle.com/javacard/3.0.5/api/javacard/security/ECPrivateKey.html

  

void setS(byte [] buffer,           短补偿,           短长度)             抛出CryptoException

     

设置密钥的值。纯文本数据格式是   big-endian和right-aligned(最不重要的位是最少的   最后一个字节的重要位)。输入参数数据被复制到   内部代表。

解答更新:

基于椭圆曲线的签名包含随机数,这就是每次计算签名时获得不同结果的原因。这是一个功能,而不是一个bug。