Java解密的openssl aes-256-ctr加密文件

时间:2019-09-19 13:51:58

标签: java algorithm encryption cryptography aes

我尝试在Java中解密通过openssl加密的文件:

openssl enc -aes-256-ctr -in raw.zip -out encrypted.zip.enc -pass stdin

我的实现目前看起来很糟糕,因为这只是一个临时步骤。

 public static void main(String[] args)
    throws IOException, NoSuchAlgorithmException, InvalidKeySpecException, NoSuchPaddingException, InvalidKeyException, InvalidAlgorithmParameterException {

    FileInputStream fis = new FileInputStream(new File("/tmp/encrypted.zip.enc"));
    /* Derive the key, given password and salt. */
    SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1");
    byte[] salt = new byte[8];
    fis.read(salt, 0, 8);// Salted__
    fis.read(salt, 0, 8);// real Salt

    KeySpec spec = new PBEKeySpec("myPassphrase".toCharArray(), salt, 65536, 256);
    SecretKey secret = new SecretKeySpec(factory.generateSecret(spec).getEncoded(), "AES"); 

    // build the initialization vector.  This example is all zeros, but it
    // could be any value or generated using a random number generator.
    byte[] iv = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
    IvParameterSpec ivspec = new IvParameterSpec(iv);
    Cipher cipher = Cipher.getInstance("AES/CTR/PKCS5PADDING");
    cipher.init(Cipher.DECRYPT_MODE, secret, ivspec);
    CipherInputStream inputStream = new CipherInputStream(fis, cipher);
    FileOutputStream fos = new FileOutputStream(new File("/tmp/decrypted.zip"));

    byte[] buffer = new byte[1024];
    int len;
    while ((len = inputStream.read(buffer)) != -1) {
        fos.write(buffer, 0, len);
    }
}

文件与以前不同。哈希值不同。我猜想,密钥有问题。这样对吗?我应该使用其他实例吗?

1 个答案:

答案 0 :(得分:0)

如果您使用openssl enc而不使用-pbkdf2,它将使用一些内部密钥派生功能。我的例子:

openssl命令:

openssl enc -aes-256-ctr -in 1.txt -out 1.enc -pbkdf2 -iter 1000 -pass pass:qwerty -p

参数-p输出生成的密钥。就我而言,是:

salt=063C06BA16675384
key=45743B02A171425197014D80A08D1024CD97587272BAEBE1F1F0FC3AC0164AB2
iv =9DF736227817CBEC9DF5397F1C05F31A

Java代码:

public static void main(String[] args) throws Exception {

    FileInputStream fis = new FileInputStream(new File("1.enc"));

    fis.skip(8);
    byte[] salt = new byte[8];
    fis.read(salt);

    System.out.println("salt=" + byteArrayToHex(salt));

    // you used PBKDF2 with SHA1, but openssl uses SHA256
    SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA256");
    // you should generate 48 bytes, key and IV
    KeySpec spec = new PBEKeySpec("qwerty".toCharArray(), salt, 1000, 48 * 8);
    byte[] bytes = factory.generateSecret(spec).getEncoded();

    byte[] key = Arrays.copyOfRange(bytes, 0, 32);
    byte[] nonce = Arrays.copyOfRange(bytes, 32, 48);

    System.out.println("key=" + byteArrayToHex(key));
    System.out.println("nonce=" + byteArrayToHex(nonce));

    IvParameterSpec iv = new IvParameterSpec(nonce);
    SecretKey secret = new SecretKeySpec(key, "AES"); 
    Cipher cipher = Cipher.getInstance("AES/CTR/PKCS5PADDING");
    cipher.init(Cipher.DECRYPT_MODE, secret, iv);
    CipherInputStream cis = new CipherInputStream(fis, cipher);
    System.out.println(new String(cis.readAllBytes()));
}

public static String byteArrayToHex(byte[] a) {
    StringBuilder sb = new StringBuilder(a.length * 2);
    for (byte b: a)
       sb.append(String.format("%02x", b));
    return sb.toString();
}

它输出key和IV,因此可以与openssl输出进行比较。我正在使用openssl 1.1.1