AES初始化向量随机化

时间:2018-05-06 11:28:23

标签: java php android encryption aes

我正在尝试使用Initialization Vector重用AES实现。到目前为止,我只实现了在android应用程序上加密数据并在php服务器上解密的部分。然而,该算法有一个主要的漏洞,初始化向量是常量,我刚才发现这是一个主要的安全漏洞。不幸的是,我已经在我的应用程序的每个活动和服务器端的所有脚本上实现了它。 我想知道是否有办法修改此代码,以便初始化向量是随机的,并且有一些方法将该向量发送到服务器(反之亦然),这样每次加密消息时模式都会不断变化。以下是我的Android和PHP代码:

机器人:

package com.fyp.merchantapp;

// This file and its contents have been taken from http://www.androidsnippets.com/encrypt-decrypt-between-android-and-php.html 
//Ownership has been acknowledged

import java.security.NoSuchAlgorithmException;

import javax.crypto.Cipher;
import javax.crypto.NoSuchPaddingException;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;

public class MCrypt {
static char[] HEX_CHARS = {'0','1','2','3','4','5','6','7','8','9','a','b','c','d','e','f'};

private String iv = "MyNameIsHamza100";//(IV)
private IvParameterSpec ivspec;
private SecretKeySpec keyspec;
private Cipher cipher;

private String SecretKey = "MyNameIsBilal100";//(SECRETKEY)

public MCrypt()
{
    ivspec = new IvParameterSpec(iv.getBytes());

    keyspec = new SecretKeySpec(SecretKey.getBytes(), "AES");
    try {
        cipher = Cipher.getInstance("AES/CBC/NoPadding");
    } catch (NoSuchAlgorithmException e) {
        // TODO Auto-generated catch block
        e.printStackTrace();
    } catch (NoSuchPaddingException e) {
        // TODO Auto-generated catch block
        e.printStackTrace();
    }
}

public byte[] encrypt(String text) throws Exception
{
    if(text == null || text.length() == 0)
        throw new Exception("Empty string");

    byte[] encrypted = null;

    try {
        cipher.init(Cipher.ENCRYPT_MODE, keyspec, ivspec);

        encrypted = cipher.doFinal(padString(text).getBytes());
    } catch (Exception e)
    {
        throw new Exception("[encrypt] " + e.getMessage());
    }

    return encrypted;
}

public byte[] decrypt(String code) throws Exception
{
    if(code == null || code.length() == 0)
        throw new Exception("Empty string");

    byte[] decrypted = null;

    try {
        cipher.init(Cipher.DECRYPT_MODE, keyspec, ivspec);

        decrypted = cipher.doFinal(hexToBytes(code));
        //Remove trailing zeroes
        if( decrypted.length > 0)
        {
            int trim = 0;
            for( int i = decrypted.length - 1; i >= 0; i-- ) if( decrypted[i] == 0 ) trim++;

            if( trim > 0 )
            {
                byte[] newArray = new byte[decrypted.length - trim];
                System.arraycopy(decrypted, 0, newArray, 0, decrypted.length - trim);
                decrypted = newArray;
            }
        }
    } catch (Exception e)
    {
        throw new Exception("[decrypt] " + e.getMessage());
    }
    return decrypted;
}


public static String bytesToHex(byte[] buf)
{
    char[] chars = new char[2 * buf.length];
    for (int i = 0; i < buf.length; ++i)
    {
        chars[2 * i] = HEX_CHARS[(buf[i] & 0xF0) >>> 4];
        chars[2 * i + 1] = HEX_CHARS[buf[i] & 0x0F];
    }
    return new String(chars);
}


public static byte[] hexToBytes(String str) {
    if (str==null) {
        return null;
    } else if (str.length() < 2) {
        return null;
    } else {
        int len = str.length() / 2;
        byte[] buffer = new byte[len];
        for (int i=0; i<len; i++) {
            buffer[i] = (byte) Integer.parseInt(str.substring(i*2,i*2+2),16);
        }
        return buffer;
    }
}



private static String padString(String source)
{
    char paddingChar = 0;
    int size = 16;
    int x = source.length() % size;
    int padLength = size - x;

    for (int i = 0; i < padLength; i++)
    {
        source += paddingChar;
    }

    return source;
}
}

PHP:

<?php
class MCrypt
{
    private $iv = 'MyNameIsHamza100'; #Same as in JAVA
    private $key = 'MyNameIsBilal100'; #Same as in JAVA
    function __construct()
    {
    }
    /**
     * @param string $str
     * @param bool $isBinary whether to encrypt as binary or not. Default is: false
     * @return string Encrypted data
     */
    function encrypt($str, $isBinary = false)
    {
        $iv = $this->iv;
        $str = $isBinary ? $str : utf8_decode($str);
        $td = mcrypt_module_open('rijndael-128', ' ', 'cbc', $iv);
        mcrypt_generic_init($td, $this->key, $iv);
        $encrypted = mcrypt_generic($td, $str);
        mcrypt_generic_deinit($td);
        mcrypt_module_close($td);
        return $isBinary ? $encrypted : bin2hex($encrypted);
    }
    /**
     * @param string $code
     * @param bool $isBinary whether to decrypt as binary or not. Default is: false
     * @return string Decrypted data
     */
    function decrypt($code, $isBinary = false)
    {
        $code = $isBinary ? $code : $this->hex2bin($code);
        $iv = $this->iv;
        $td = mcrypt_module_open('rijndael-128', ' ', 'cbc', $iv);
        mcrypt_generic_init($td, $this->key, $iv);
        $decrypted = mdecrypt_generic($td, $code);
        mcrypt_generic_deinit($td);
        mcrypt_module_close($td);
        return $isBinary ? trim($decrypted) : utf8_encode(trim($decrypted));
    }
    protected function hex2bin($hexdata)
    {
        $bindata = '';
        for ($i = 0; $i < strlen($hexdata); $i += 2) {
            $bindata .= chr(hexdec(substr($hexdata, $i, 2)));
        }
        return $bindata;
    }
}
?>

1 个答案:

答案 0 :(得分:1)

直接回答你的问题:你可以简单地生成一个随机的IV和前缀到密文。在将密文编码为十六进制之前,您需要执行此操作。然后在解密期间首先解码,然后“删除”IV字节,初始化IV并最终解密密文以获得明文。

请注意,在CBC模式下,对于AES,IV总是16个字节,因此不需要在任何地方直接包含IV长度。我使用“remove”周围的引号,因为IvParameterSpecCipher.doFinal接受具有偏移和长度的缓冲区;没有必要将字节复制到不同的数组。

注意:

  • 键不应该是字符串;查找PBKDF,例如PBKDF2,以从密码或密码短语中导出密钥;
  • CBC通常容易受到填充oracle攻击;但是,通过保持PHP的零填充,您可能会意外地避免攻击;
  • CBC不提供完整性保护,因此请注意,攻击者可能会在不解密失败的情况下更改密文;
  • 如果使用该文本的底层代码生成错误,那么您可能容易受到明文oracle攻击(填充oracle攻击只是较大一组明文神谕的一部分);
  • 您的Java代码不平衡;加密和解密模式应该执行十六进制编码/解码,否则它们不应该;
  • 异常处理当然不好(虽然这可能仅仅是为了示例);
  • String#getBytes()将在Android上使用UTF-8,但它可能在Windows上的Java SE上使用W​​indows-1252,因此如果您不小心,这很容易生成错误的密钥 - 始终定义字符集使用。

要使用共享密钥进行通信,请尝试使用其中一个PSK_密码套件定义的预共享密钥模式下的TLS。