为了使Libsodium.js正常工作,我花费了令人尴尬的时间。
See my fiddle demo (以及下面粘贴的代码)。
我不断收到Error: wrong secret key for the given ciphertext
。
我首选是将这个PHP example of function simpleEncrypt($message, $key)
复制到Libsodium.js中。
但是作为一个入门者,我甚至很高兴能使用基本的sample from the Libsodium.js repo。
有任何提示吗?
以下是代码(也显示在工作小提琴中):
const _sodium = require("libsodium-wrappers");
const concatTypedArray = require("concat-typed-array");
(async () => {
await _sodium.ready;
const sodium = _sodium;
const utf8 = "utf-8";
const td = new TextDecoder(utf8);
const te = new TextEncoder(utf8);
const nonceBytes = sodium.crypto_secretbox_NONCEBYTES;
const macBytes = sodium.crypto_secretbox_MACBYTES;
let key = sodium.from_hex("724b092810ec86d7e35c9d067702b31ef90bc43a7b598626749914d6a3e033ed");
function encrypt_and_prepend_nonce(message, key) {
let nonce = sodium.randombytes_buf(nonceBytes);
var encrypted = sodium.crypto_secretbox_easy(message, nonce, key);
var combined2 = concatTypedArray(Uint8Array, nonce, encrypted);
return combined2;
}
function decrypt_after_extracting_nonce(nonce_and_ciphertext, key) {
if (nonce_and_ciphertext.length < nonceBytes + macBytes) {
throw "Short message";
}
let nonce = nonce_and_ciphertext.slice(0, nonceBytes);
let ciphertext = nonce_and_ciphertext.slice(nonceBytes);
return sodium.crypto_secretbox_open_easy(ciphertext, nonce, key);
}
function encrypt(message, key) {
var x = encrypt_and_prepend_nonce(message, key);
return td.decode(x);
}
function decrypt(nonce_and_ciphertext_str, key) {
var nonce_and_ciphertext = te.encode(nonce_and_ciphertext_str);
return decrypt_after_extracting_nonce(nonce_and_ciphertext, key);
}
var inputStr = "shhh this is a secret";
var garbledStr = encrypt(inputStr, key);
try {
var decryptedStr = decrypt(garbledStr, key);
console.log("Recovered input string:", decryptedStr);
console.log("Check whether the following text matches the original:", decryptedStr === inputStr);
} catch (e) {
console.error(e);
}
})();
答案 0 :(得分:1)
这就是我在https://emberclear.io中所做的:
实施摘要(使用打字稿):
import libsodiumWrapper, { ISodium } from 'libsodium-wrappers';
import { concat } from 'emberclear/src/utils/arrays/utils';
export async function libsodium(): Promise<ISodium> {
const sodium = libsodiumWrapper.sodium;
await sodium.ready;
return sodium;
}
export async function encryptFor(
message: Uint8Array,
recipientPublicKey: Uint8Array,
senderPrivateKey: Uint8Array): Promise<Uint8Array> {
const sodium = await libsodium();
const nonce = await generateNonce();
const ciphertext = sodium.crypto_box_easy(
message, nonce,
recipientPublicKey, senderPrivateKey
);
return concat(nonce, ciphertext);
}
export async function decryptFrom(
ciphertextWithNonce: Uint8Array,
senderPublicKey: Uint8Array,
recipientPrivateKey: Uint8Array): Promise<Uint8Array> {
const sodium = await libsodium();
const [nonce, ciphertext] = await splitNonceFromMessage(ciphertextWithNonce);
const decrypted = sodium.crypto_box_open_easy(
ciphertext, nonce,
senderPublicKey, recipientPrivateKey
);
return decrypted;
}
export async function splitNonceFromMessage(messageWithNonce: Uint8Array): Promise<[Uint8Array, Uint8Array]> {
const sodium = await libsodium();
const bytes = sodium.crypto_box_NONCEBYTES;
const nonce = messageWithNonce.slice(0, bytes);
const message = messageWithNonce.slice(bytes, messageWithNonce.length);
return [nonce, message];
}
export async function generateNonce(): Promise<Uint8Array> {
const sodium = await libsodium();
return await randomBytes(sodium.crypto_box_NONCEBYTES);
}
export async function randomBytes(length: number): Promise<Uint8Array> {
const sodium = await libsodium();
return sodium.randombytes_buf(length);
}
测试摘要:
import * as nacl from './utils';
import { module, test } from 'qunit';
module('Unit | Utility | nacl', function() {
test('libsodium uses wasm', async function(assert) {
const sodium = await nacl.libsodium();
const isUsingWasm = sodium.libsodium.usingWasm;
assert.ok(isUsingWasm);
});
test('generateAsymmetricKeys | works', async function(assert) {
const boxKeys = await nacl.generateAsymmetricKeys();
assert.ok(boxKeys.publicKey);
assert.ok(boxKeys.privateKey);
});
test('encryptFor/decryptFrom | works with Uint8Array', async function(assert) {
const receiver = await nacl.generateAsymmetricKeys();
const sender = await nacl.generateAsymmetricKeys();
const msgAsUint8 = Uint8Array.from([104, 101, 108, 108, 111]); // hello
const ciphertext = await nacl.encryptFor(msgAsUint8, receiver.publicKey, sender.privateKey);
const decrypted = await nacl.decryptFrom(ciphertext, sender.publicKey, receiver.privateKey);
assert.deepEqual(msgAsUint8, decrypted);
});
答案 1 :(得分:1)
真正帮助我的部分是:
function u_atob(ascii)
)const concatTypedArray = require("concat-typed-array");
require("babel-core/register");
和require("babel-polyfill");
,我仍然不理解(https://stackoverflow.com/a/33527883/470749)这是工作中的fiddle sandbox。
万一消失了,以下是重要部分:
const nonceBytes = sodium.crypto_aead_xchacha20poly1305_ietf_NPUBBYTES;
let key = sodium.from_hex("724b092810ec86d7e35c9d067702b31ef90bc43a7b598626749914d6a3e033ed");
var nonceTest;
/**
* @param {string} message
* @param {string} key
* @returns {Uint8Array}
*/
function encrypt_and_prepend_nonce(message, key) {
let nonce = sodium.randombytes_buf(nonceBytes);
nonceTest = nonce.toString();
var encrypted = sodium.crypto_aead_xchacha20poly1305_ietf_encrypt(message, null, nonce, nonce, key);
var nonce_and_ciphertext = concatTypedArray(Uint8Array, nonce, encrypted); //https://github.com/jedisct1/libsodium.js/issues/130#issuecomment-361399594
return nonce_and_ciphertext;
}
/**
* @param {Uint8Array} nonce_and_ciphertext
* @param {string} key
* @returns {string}
*/
function decrypt_after_extracting_nonce(nonce_and_ciphertext, key) {
let nonce = nonce_and_ciphertext.slice(0, nonceBytes); //https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/TypedArray/slice
let ciphertext = nonce_and_ciphertext.slice(nonceBytes);
var result = sodium.crypto_aead_xchacha20poly1305_ietf_decrypt(nonce, ciphertext, null, nonce, key, "text");
return result;
}
/**
* @param {string} message
* @param {string} key
* @returns {string}
*/
function encrypt(message, key) {
var uint8ArrayMsg = encrypt_and_prepend_nonce(message, key);
return u_btoa(uint8ArrayMsg); //returns ascii string of garbled text
}
/**
* @param {string} nonce_and_ciphertext_str
* @param {string} key
* @returns {string}
*/
function decrypt(nonce_and_ciphertext_str, key) {
var nonce_and_ciphertext = u_atob(nonce_and_ciphertext_str); //converts ascii string of garbled text into binary
return decrypt_after_extracting_nonce(nonce_and_ciphertext, key);
}
function u_atob(ascii) { //https://stackoverflow.com/a/43271130/
return Uint8Array.from(atob(ascii), c => c.charCodeAt(0));
}
function u_btoa(buffer) { //https://stackoverflow.com/a/43271130/
var binary = [];
var bytes = new Uint8Array(buffer);
for (var i = 0, il = bytes.byteLength; i < il; i++) {
binary.push(String.fromCharCode(bytes[i]));
}
return btoa(binary.join(""));
}
答案 2 :(得分:1)
我一直在尝试@Ryan的答案,发现在运行时,一种更简单的解决方案是使用sodium-plus。可以找到{+3}作为钠盐脚本的示例。简而言之,加密方面看起来像这样:
<script type='text/javascript' src='sodium-plus.min.js'></script>
<script>
async function encryptString(clearText) {
if (!window.sodium) window.sodium = await SodiumPlus.auto();
let publicKey = await X25519PublicKey.from('[Place your 64-char public key hex or variable name here]','hex');
let cipherText = await sodium.crypto_box_seal(clearText, publicKey);
return cipherText.toString('hex');
}
(async function () {
let clearText = "String that contains secret.";
console.log(await encryptString(clearText));
})();
</script>
简单得多。在PHP方面,您所需要做的就是使用here方法来处理字符串的加密/解密。
sodium-plus的唯一缺点是我还没有为浏览器版本找到CDN。
答案 3 :(得分:0)
我认为您正在使这项工作变得比实际需要的还要困难。例如,对于您的打字稿加密,您所需要做的就是:
private async encrypt(obj: any): Promise<string> {
await Sodium.ready;
const json = JSON.stringify(obj);
const key = Sodium.from_hex(this.hexKey);
const nonce = Sodium.randombytes_buf(Sodium.crypto_aead_chacha20poly1305_ietf_NPUBBYTES);
const encrypted = Sodium.crypto_aead_chacha20poly1305_ietf_encrypt(json, '', null, nonce, key);
// Merge the two together
const nonceAndCipherText = new Uint8Array(Sodium.crypto_aead_chacha20poly1305_ietf_NPUBBYTES + encrypted.byteLength);
nonceAndCipherText.set(nonce);
nonceAndCipherText.set(encrypted, Sodium.crypto_aead_chacha20poly1305_ietf_NPUBBYTES);
return btoa(String.fromCharCode(...nonceAndCipherText));
}
您不需要所有正在使用的额外库。在您的PHP方面,只需执行以下操作即可解密:
function decode($encrypted, $key)
{
$decoded = base64_decode($encrypted); // Should be using sodium_base642bin?
if ($decoded === false) {
throw new Exception('Scream bloody murder, the decoding failed');
}
$nonce = mb_substr($decoded, 0, SODIUM_CRYPTO_AEAD_CHACHA20POLY1305_IETF_NPUBBYTES, '8bit');
$ciphertext = mb_substr($decoded, SODIUM_CRYPTO_AEAD_CHACHA20POLY1305_IETF_NPUBBYTES, null, '8bit');
$plain = sodium_crypto_aead_chacha20poly1305_ietf_decrypt($ciphertext, '', $nonce, sodium_hex2bin($key));
sodium_memzero($ciphertext);
sodium_memzero($key);
if ($plain === false) {
throw new Exception('the message was tampered with in transit');
}
return $plain;
}
您无需多次设置随机数。加密的第二个参数是“附加数据”参数,如果在解密端也是空字符串,则它也可以是空字符串。