我尝试在Java中解密通过openssl加密的文件:
openssl enc -aes-256-ctr -in raw.zip -out encrypted.zip.enc -pass stdin
我的实现目前看起来很糟糕,因为这只是一个临时步骤。
public static void main(String[] args)
throws IOException, NoSuchAlgorithmException, InvalidKeySpecException, NoSuchPaddingException, InvalidKeyException, InvalidAlgorithmParameterException {
FileInputStream fis = new FileInputStream(new File("/tmp/encrypted.zip.enc"));
/* Derive the key, given password and salt. */
SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1");
byte[] salt = new byte[8];
fis.read(salt, 0, 8);// Salted__
fis.read(salt, 0, 8);// real Salt
KeySpec spec = new PBEKeySpec("myPassphrase".toCharArray(), salt, 65536, 256);
SecretKey secret = new SecretKeySpec(factory.generateSecret(spec).getEncoded(), "AES");
// build the initialization vector. This example is all zeros, but it
// could be any value or generated using a random number generator.
byte[] iv = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
IvParameterSpec ivspec = new IvParameterSpec(iv);
Cipher cipher = Cipher.getInstance("AES/CTR/PKCS5PADDING");
cipher.init(Cipher.DECRYPT_MODE, secret, ivspec);
CipherInputStream inputStream = new CipherInputStream(fis, cipher);
FileOutputStream fos = new FileOutputStream(new File("/tmp/decrypted.zip"));
byte[] buffer = new byte[1024];
int len;
while ((len = inputStream.read(buffer)) != -1) {
fos.write(buffer, 0, len);
}
}
文件与以前不同。哈希值不同。我猜想,密钥有问题。这样对吗?我应该使用其他实例吗?
答案 0 :(得分:0)
如果您使用openssl enc
而不使用-pbkdf2
,它将使用一些内部密钥派生功能。我的例子:
openssl命令:
openssl enc -aes-256-ctr -in 1.txt -out 1.enc -pbkdf2 -iter 1000 -pass pass:qwerty -p
参数-p
输出生成的密钥。就我而言,是:
salt=063C06BA16675384
key=45743B02A171425197014D80A08D1024CD97587272BAEBE1F1F0FC3AC0164AB2
iv =9DF736227817CBEC9DF5397F1C05F31A
Java代码:
public static void main(String[] args) throws Exception {
FileInputStream fis = new FileInputStream(new File("1.enc"));
fis.skip(8);
byte[] salt = new byte[8];
fis.read(salt);
System.out.println("salt=" + byteArrayToHex(salt));
// you used PBKDF2 with SHA1, but openssl uses SHA256
SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA256");
// you should generate 48 bytes, key and IV
KeySpec spec = new PBEKeySpec("qwerty".toCharArray(), salt, 1000, 48 * 8);
byte[] bytes = factory.generateSecret(spec).getEncoded();
byte[] key = Arrays.copyOfRange(bytes, 0, 32);
byte[] nonce = Arrays.copyOfRange(bytes, 32, 48);
System.out.println("key=" + byteArrayToHex(key));
System.out.println("nonce=" + byteArrayToHex(nonce));
IvParameterSpec iv = new IvParameterSpec(nonce);
SecretKey secret = new SecretKeySpec(key, "AES");
Cipher cipher = Cipher.getInstance("AES/CTR/PKCS5PADDING");
cipher.init(Cipher.DECRYPT_MODE, secret, iv);
CipherInputStream cis = new CipherInputStream(fis, cipher);
System.out.println(new String(cis.readAllBytes()));
}
public static String byteArrayToHex(byte[] a) {
StringBuilder sb = new StringBuilder(a.length * 2);
for (byte b: a)
sb.append(String.format("%02x", b));
return sb.toString();
}
它输出key和IV,因此可以与openssl输出进行比较。我正在使用openssl 1.1.1