我有一个在PHP中使用的加密功能
function Encrypt(?string $Content, string $Key): string {
return openssl_encrypt($Content, 'aes-256-gcm', $Key, OPENSSL_RAW_DATA, $IV = random_bytes(16), $Tag, '', 16) . $IV . $Tag;
}
具有解密功能
function Decrypt(?string $Ciphertext, string $Key): ?string {
if (strlen($Ciphertext) < 32)
return null;
$Content = substr($Ciphertext, 0, -32);
$IV = substr($Ciphertext, -32, -16);
$Tag = substr($Ciphertext, -16);
try {
return openssl_decrypt($Content, 'aes-256-gcm', $Key, OPENSSL_RAW_DATA, $IV, $Tag);
} catch (Exception $e) {
return null;
}
}
我将通过加密功能加密的数据存储到我的数据库中,现在我试图在Go中解密这些相同的值,但是我得到了cipher: message authentication failed
,但我不知道自己在做什么。丢失。
c := []byte(`encrypted bytes of sorts`) // the bytes from the db
content := c[:len(c)-32]
iv := c[len(c)-32 : len(c)-16]
tag := c[len(c)-16:]
block, err := aes.NewCipher(key[:32])
if err != nil {
panic(err.Error())
}
aesgcm, err := cipher.NewGCMWithNonceSize(block, 16)
if err != nil {
panic(err.Error())
}
fmt.Println(aesgcm.NonceSize(), aesgcm.Overhead()) // making sure iv and tag are both 16 bytes
plaintext, err := aesgcm.Open(nil, iv, append(content, tag...), nil)
if err != nil {
panic(err.Error())
}
值得注意的是,我正在使用的密钥不是32字节(更大),因为我不知道所需的密钥/应该是32字节,所以我不确定PHP在做什么使用它(例如将其截断为32或使用具有32字节输出的内容与其他内容进行哈希处理)。
从Go源代码中查看Open
函数,标签似乎是文本的最后“标签大小”字节,因此这就是为什么我在解析完标签后将标签附加到密文的原因件。
// copied from C:\Go\src\crypto\cipher\gcm.go, Go version 1.11
func (g *gcm) Open(dst, nonce, ciphertext, data []byte) ([]byte, error) {
if len(nonce) != g.nonceSize {
panic("cipher: incorrect nonce length given to GCM")
}
if len(ciphertext) < gcmTagSize {
return nil, errOpen
}
if uint64(len(ciphertext)) > ((1<<32)-2)*uint64(g.cipher.BlockSize())+gcmTagSize {
return nil, errOpen
}
tag := ciphertext[len(ciphertext)-gcmTagSize:]
ciphertext = ciphertext[:len(ciphertext)-gcmTagSize]
var counter, tagMask [gcmBlockSize]byte
g.deriveCounter(&counter, nonce)
g.cipher.Encrypt(tagMask[:], counter[:])
gcmInc32(&counter)
var expectedTag [gcmTagSize]byte
g.auth(expectedTag[:], ciphertext, data, &tagMask)
ret, out := sliceForAppend(dst, len(ciphertext))
if subtle.ConstantTimeCompare(expectedTag[:], tag) != 1 {
// The AESNI code decrypts and authenticates concurrently, and
// so overwrites dst in the event of a tag mismatch. That
// behavior is mimicked here in order to be consistent across
// platforms.
for i := range out {
out[i] = 0
}
return nil, errOpen
}
g.counterCrypt(out, ciphertext, &counter)
return ret, nil
}
使用上述功能的PHP示例
$Key = 'outspoken outburst treading cramp cringing';
echo bin2hex($Enc = Encrypt('yeet', $Key)), '<br>'; // 924b3ba418f49edc1757f3fe88adcaa7ec4c1e7d15811fd0b712b0b091433073f6a38d7b
var_export(Decrypt($Enc, $Key)); // 'yeet'
开始
c, err := hex.DecodeString(`924b3ba418f49edc1757f3fe88adcaa7ec4c1e7d15811fd0b712b0b091433073f6a38d7b`)
if err != nil {
panic(err.Error())
}
key := []byte(`outspoken outburst treading cramp cringing`)
content := c[:len(c)-32]
iv := c[len(c)-32 : len(c)-16]
tag := c[len(c)-16:]
block, err := aes.NewCipher(key[:32])
if err != nil {
panic(err.Error())
}
aesgcm, err := cipher.NewGCMWithNonceSize(block, 16)
if err != nil {
panic(err.Error())
}
ciphertext := append(content, tag...) // or `ciphertext := content`, same error
plaintext, err := aesgcm.Open(nil, iv, ciphertext, nil)
if err != nil {
panic(err.Error()) // panic: cipher: message authentication failed
}
答案 0 :(得分:1)
通常,加密的邮件看起来像IV+ciphertext+tag
,而不是ciphertext+IV+tag
。当人们偏离公约时,就会遇到各种各样的问题:-)
您是否看到iv
通话后append(ciphertext, tag...)
切片发生了什么?
您实际上是用iv
覆盖tag
:
Before:
924b3ba4 18f49edc1757f3fe88adcaa7ec4c1e7d 15811fd0b712b0b091433073f6a38d7b
After:
924b3ba4 15811fd0b712b0b091433073f6a38d7b 15811fd0b712b0b091433073f6a38d7b
作为快速解决方案,请在致电iv
之前制作append()
的副本:
iv := make([]byte, 16)
copy(iv, c[len(c)-32 : len(c)-16])
有关切片的更多信息,请参见here。