使用非默认的AlgorithmIdentifier解密EnvelopedCms

时间:2017-06-27 08:57:58

标签: c# .net encryption cryptography

我正在尝试解密使用非默认EnvelopedCms加密的AlgorithmIdentifier,如下所示:

ContentInfo contentInfo = new ContentInfo(data);
EnvelopedCms envelopedCms = new EnvelopedCms(contentInfo, new AlgorithmIdentifier(new System.Security.Cryptography.Oid("2.16.840.1.101.3.4.1.42")));
CmsRecipientCollection recipients = new CmsRecipientCollection(SubjectIdentifierType.IssuerAndSerialNumber, certificates);
envelopedCms.Encrypt(recipients);
byte[] encryptedData = envelopedCms.Encode();

加密按预期工作。现在,当我尝试使用类似的东西解密envelopedCms时:

EnvelopedCms envelopedCms = new EnvelopedCms();
envelopedCms.Decode(encryptedData );
envelopedCms.Decrypt(certificates);
byte[] decryptedData = envelopedCms.ContentInfo.Content;

我注意到。)对证书的访问需要很长时间(使用默认的AlgorithmIdentifier时更长)和b。)我收到此错误消息:

System.Security.Cryptography.CryptographicException: Access was denied because of a security violation.

其中,查看此失败的来源可能不是问题。任何人都可以使用智能卡获得上述解密代码吗?

// EDIT1 请注意,只有在使用的证书放在智能卡上并且如果指定了默认值(3DES)之外的AlgorithmIdentifier时,才会出现此问题,如示例代码中所示。如果使用默认的AlgorithmIdentifier或者未将证书放在智能卡上,一切正常。它本身似乎不是SC问题,因为它使用默认的AlgorithmIdentifier。更确切地说,SC和AES AlgorithmIdentifier的组合引起了问题,但我无法找到可行的解决方案。

// EDIT2 一个演示该问题的完整示例,请阅读详细信息的评论:

using System;
using System.Collections.Generic;
using System.Linq;
using System.Security.Cryptography.X509Certificates;
using System.Text;
using System.Threading.Tasks;
using System.Security.Cryptography;
using System.IO;
using System.Reflection;
using System.Diagnostics;
using System.Runtime.Serialization;
using System.Security.Cryptography.Pkcs;

namespace ConsoleApp
{

    class Program
    {
        static void Main(string[] args)
        {
            // Select the (smartcard) certificate to use it for encryption
            X509Store store = new X509Store(StoreName.My, StoreLocation.CurrentUser);
            store.Open(OpenFlags.ReadOnly | OpenFlags.OpenExistingOnly);
            X509Certificate2Collection collection = (X509Certificate2Collection)store.Certificates;
            X509Certificate2Collection fcollection = (X509Certificate2Collection)collection.Find(X509FindType.FindByTimeValid, DateTime.Now, false);
            X509Certificate2Collection scollection = X509Certificate2UI.SelectFromCollection(fcollection, "Certificate Select", "Select your smartcard certificate", X509SelectionFlag.MultiSelection);

            // Output which certificate will be used
            Console.WriteLine("Using Certificate:");
            int i = 0;
            foreach (X509Certificate2 x509 in scollection)
            {
                byte[] rawdata = x509.RawData;
                Console.WriteLine("---------------------------------------------------------------------");
                Console.WriteLine("1.\tFull DN: {0}", x509.Subject);
                Console.WriteLine("\tThumbprint: {0}", x509.Thumbprint);
                Console.WriteLine("---------------------------------------------------------------------");
                i++;
            }
            store.Close();

            // Wait
            Console.WriteLine("Press any key to continue...");
            Console.ReadKey(true);

            // Create data for encryption
            string message = "THIS IS OUR SECRET MESSAGE";
            byte[] data = System.Text.Encoding.ASCII.GetBytes(message);

            // Encrypt
            Console.WriteLine("Encrypting message...");

            // ContentInfo contentInfo = new ContentInfo(data); // will use default ContentInfo Oid, which is "DATA"
            // Explicitly use ContentInfo Oid 1.2.840.113549.1.7.1, "DATA", which is the default.
            ContentInfo contentInfo = new ContentInfo(new System.Security.Cryptography.Oid("1.2.840.113549.1.7.1"), data);

            // If using OID 1.2.840.113549.3.7 (the default one used if empty constructor is used) or 1.2.840.113549.1.9.16.3.6  everything works
            // If using OID 2.16.840.1.101.3.4.1.42 (AES CBC) it breaks
            AlgorithmIdentifier encryptionAlgorithm = new AlgorithmIdentifier(new System.Security.Cryptography.Oid("1.2.840.113549.3.7"));
            // EnvelopedCms envelopedCms = new EnvelopedCms(contentInfo); // this will use default encryption algorithm (3DES)
            EnvelopedCms envelopedCms = new EnvelopedCms(contentInfo, encryptionAlgorithm);
            Console.WriteLine("Encyption Algorithm:" + envelopedCms.ContentEncryptionAlgorithm.Oid.FriendlyName);
            Console.WriteLine("Encyption Algorithm:" + envelopedCms.ContentEncryptionAlgorithm.Oid.Value);
            CmsRecipientCollection recipients = new CmsRecipientCollection(SubjectIdentifierType.IssuerAndSerialNumber, scollection);
            /*Console.WriteLine("Receipientinfo count: " + encryptionEnvelopedCms.RecipientInfos.Count.ToString());
            foreach (var i in encryptionEnvelopedCms.RecipientInfos)
            {
                Console.Write("RecipientInfo Encryption Oid: " + i.KeyEncryptionAlgorithm.Oid);
            }
            */
            envelopedCms.Encrypt(recipients);
            byte[] encryptedData = envelopedCms.Encode();
            Console.WriteLine("Message encrypted!");

            // Decrypt
            envelopedCms.Decode(encryptedData);
            Console.WriteLine("Decryption Algorithm:" + envelopedCms.ContentEncryptionAlgorithm.Oid.FriendlyName);
            Console.WriteLine("Decryption Algorithm:" + envelopedCms.ContentEncryptionAlgorithm.Oid.Value);
            // Next line will fail if both conditions are true: 
            // 1. A non-default AlgorithmIdentifier was used for encryption, in our case AES
            // 2. The private key required for decryption is placed on a smartcard that requires a manual action, such as entering a PIN code, before releasing the private key
            // Note that everything works just fine when the default AlgorithmIdentifier is used (3DES) or the private key is available in the X509Store
            envelopedCms.Decrypt(scollection);
            byte[] decryptedData = envelopedCms.ContentInfo.Content;
            Console.WriteLine("Message decrypted!");
            Console.WriteLine("Decrypted message: " + System.Text.Encoding.ASCII.GetString(decryptedData));
            Console.WriteLine("Press any key to exit.");
            Console.ReadKey(true);
        }
    }
}

2 个答案:

答案 0 :(得分:1)

虽然我的答案可能导致一些不完整的切线,但我相信它会让你得到我所说的相同的断言。事实是我使用X509Store允许我找到我的机器所拥有的证书。然后,我将集合传递给CmsReceipientCollection,其中包含从store.Certificates中找到的X509Certificate2Collection。此方法需要128ms才能执行。 HTH!

 [TestMethod]
    public void TestEnvelopedCMS()
    {
        X509Store store = new X509Store("MY", StoreLocation.CurrentUser);
        store.Open(OpenFlags.ReadOnly | OpenFlags.OpenExistingOnly);

        X509Certificate2Collection collection = (X509Certificate2Collection)store.Certificates;
        X509Certificate2Collection fcollection = (X509Certificate2Collection)collection.Find(X509FindType.FindByTimeValid, DateTime.Now, false);

        byte[] data = new byte[256];
        //lets change data before we encrypt
        data[2] = 1;

        ContentInfo contentInfo = new ContentInfo(data);
        EnvelopedCms envelopedCms = new EnvelopedCms(contentInfo, new AlgorithmIdentifier(new System.Security.Cryptography.Oid("2.16.840.1.101.3.4.1.42")));
        CmsRecipientCollection recipients = new CmsRecipientCollection(SubjectIdentifierType.IssuerAndSerialNumber, fcollection);
        envelopedCms.Encrypt(recipients);
        byte[] encryptedData = envelopedCms.Encode();

        //lets decrypt now
        envelopedCms.Decode(encryptedData);
        envelopedCms.Decrypt(fcollection);
        byte[] decryptedData = envelopedCms.ContentInfo.Content;

         //grab index from byte[]
        var item = decryptedData.Skip(2).Take(1).FirstOrDefault();
        var item2 = data.Skip(2).Take(1).FirstOrDefault();

        Assert.IsTrue(item == item2);
    }

答案 1 :(得分:0)

好的,所以最后我找到了为什么这不起作用的原因。它真的依赖于我使用的SC(Yubikey 4)。在我的情况下,我使用openssl创建了我的RSA密钥,然后使用官方Yubico PIV管理器/ PIV工具将它们转移到SC。 Yubico(YubiKey智能卡微型驱动器(YKMD))的官方SC驱动程序似乎还不支持此功能。然而,官方驱动程序似乎是唯一支持Yubikey的所有高级功能的驱动程序,如果您想使用AES作为加密算法,目前似乎是必需的。我之前使用的是OpenSC驱动程序,它可以很好地用于3DES,但是对于更高级的功能会失败。因此,如果有人遇到Yubikey这个问题:

  1. 确保您使用官方驱动程序(YubiKey Smart Card Minidriver(YKMD))而不是Windows基本驱动程序或OpenSC驱动程序
  2. 要使官方驱动程序正常工作,您必须使用Windows上的certutil like shown in this article导入证书。
  3. 如果你遇到错误" NTE_BAD_KEYSET"尝试使用certutil导入时,这可能是因为您使用Yubico工具(PIV工具和/或PIV管理器)初始化了PIV功能。在这种情况下也不支持这种情况,因此,您必须首先重置Yubikey PIV配置(基本上输入错误的PIN x次,然后输入错误的PUK x次,然后您可以重置PIV配置-all这是使用Yubico as shown here at the bottom of the page
  4. 中的PIV工具完成的
  5. 现在,您可以使用Yubico工具设置自定义PIN,PUK,管理密钥等。似乎"只有"不允许使用此工具完成PIV配置的初始化。另请注意,您可以找到更多详细信息,例如"如何设置触摸政策" (默认关闭,有点su ***)in the SC deployment guide from Yubico