Improved AES implementation #450

This commit is contained in:
MaxXor 2016-05-16 22:04:20 +02:00
parent 28e0cf5cdf
commit d58cc00156
2 changed files with 160 additions and 28 deletions

View File

@ -5,17 +5,25 @@ using System.Text;
namespace xClient.Core.Cryptography namespace xClient.Core.Cryptography
{ {
// ReSharper disable once InconsistentNaming
public static class AES public static class AES
{ {
private const int IVLENGTH = 16; private const int IvLength = 16;
private const int HmacSha256Length = 32;
private static byte[] _defaultKey; private static byte[] _defaultKey;
private static byte[] _defaultAuthKey;
private static readonly byte[] Salt =
{
0xBF, 0xEB, 0x1E, 0x56, 0xFB, 0xCD, 0x97, 0x3B, 0xB2, 0x19, 0x2, 0x24, 0x30, 0xA5, 0x78, 0x43, 0x0, 0x3D, 0x56,
0x44, 0xD2, 0x1E, 0x62, 0xB9, 0xD4, 0xF1, 0x80, 0xE7, 0xE6, 0xC3, 0x39, 0x41
};
public static void SetDefaultKey(string key) public static void SetDefaultKey(string key)
{ {
using (var md5 = new MD5CryptoServiceProvider()) using (Rfc2898DeriveBytes derive = new Rfc2898DeriveBytes(key, Salt, 2000))
{ {
_defaultKey = md5.ComputeHash(Encoding.UTF8.GetBytes(key)); _defaultKey = derive.GetBytes(16);
_defaultAuthKey = derive.GetBytes(64);
} }
} }
@ -29,6 +37,12 @@ namespace xClient.Core.Cryptography
return Convert.ToBase64String(Encrypt(Encoding.UTF8.GetBytes(input))); return Convert.ToBase64String(Encrypt(Encoding.UTF8.GetBytes(input)));
} }
/* FORMAT
* ----------------------------------------
* | HMAC | IV | CIPHERTEXT |
* ----------------------------------------
* 32 bytes 16 bytes
*/
public static byte[] Encrypt(byte[] input) public static byte[] Encrypt(byte[] input)
{ {
if (_defaultKey == null || _defaultKey.Length == 0) throw new Exception("Key can not be empty."); if (_defaultKey == null || _defaultKey.Length == 0) throw new Exception("Key can not be empty.");
@ -40,14 +54,28 @@ namespace xClient.Core.Cryptography
{ {
using (var ms = new MemoryStream()) using (var ms = new MemoryStream())
{ {
using (var aesProvider = new AesCryptoServiceProvider() { Key = _defaultKey }) ms.Position = HmacSha256Length; // reserve first 32 bytes for HMAC
using (var aesProvider = new AesCryptoServiceProvider())
{ {
aesProvider.KeySize = 128;
aesProvider.BlockSize = 128;
aesProvider.Mode = CipherMode.CBC;
aesProvider.Padding = PaddingMode.PKCS7;
aesProvider.Key = _defaultKey;
aesProvider.GenerateIV(); aesProvider.GenerateIV();
using (var cs = new CryptoStream(ms, aesProvider.CreateEncryptor(), CryptoStreamMode.Write)) using (var cs = new CryptoStream(ms, aesProvider.CreateEncryptor(), CryptoStreamMode.Write))
{ {
ms.Write(aesProvider.IV, 0, aesProvider.IV.Length); // write first 16 bytes IV, followed by encrypted message ms.Write(aesProvider.IV, 0, aesProvider.IV.Length); // write next 16 bytes the IV, followed by ciphertext
cs.Write(data, 0, data.Length); cs.Write(data, 0, data.Length);
cs.FlushFinalBlock();
using (var hmac = new HMACSHA256(_defaultAuthKey))
{
byte[] hash = hmac.ComputeHash(ms.ToArray(), HmacSha256Length, ms.ToArray().Length - HmacSha256Length); // compute the HMAC of IV and ciphertext
ms.Position = 0; // write hash at beginning
ms.Write(hash, 0, hash.Length);
}
} }
} }
@ -64,9 +92,11 @@ namespace xClient.Core.Cryptography
{ {
if (key == null || key.Length == 0) throw new Exception("Key can not be empty."); if (key == null || key.Length == 0) throw new Exception("Key can not be empty.");
using (var md5 = new MD5CryptoServiceProvider()) byte[] authKey;
using (Rfc2898DeriveBytes derive = new Rfc2898DeriveBytes(key, Salt, 2000))
{ {
key = md5.ComputeHash(key); key = derive.GetBytes(16);
authKey = derive.GetBytes(64);
} }
byte[] data = input, encdata = new byte[0]; byte[] data = input, encdata = new byte[0];
@ -75,14 +105,28 @@ namespace xClient.Core.Cryptography
{ {
using (var ms = new MemoryStream()) using (var ms = new MemoryStream())
{ {
using (var aesProvider = new AesCryptoServiceProvider() { Key = key }) ms.Position = HmacSha256Length; // reserve first 32 bytes for HMAC
using (var aesProvider = new AesCryptoServiceProvider())
{ {
aesProvider.KeySize = 128;
aesProvider.BlockSize = 128;
aesProvider.Mode = CipherMode.CBC;
aesProvider.Padding = PaddingMode.PKCS7;
aesProvider.Key = key;
aesProvider.GenerateIV(); aesProvider.GenerateIV();
using (var cs = new CryptoStream(ms, aesProvider.CreateEncryptor(), CryptoStreamMode.Write)) using (var cs = new CryptoStream(ms, aesProvider.CreateEncryptor(), CryptoStreamMode.Write))
{ {
ms.Write(aesProvider.IV, 0, aesProvider.IV.Length); // write first 16 bytes IV, followed by encrypted message ms.Write(aesProvider.IV, 0, aesProvider.IV.Length); // write next 16 bytes the IV, followed by ciphertext
cs.Write(data, 0, data.Length); cs.Write(data, 0, data.Length);
cs.FlushFinalBlock();
using (var hmac = new HMACSHA256(authKey))
{
byte[] hash = hmac.ComputeHash(ms.ToArray(), HmacSha256Length, ms.ToArray().Length - HmacSha256Length); // compute the HMAC of IV and ciphertext
ms.Position = 0; // write hash at beginning
ms.Write(hash, 0, hash.Length);
}
} }
} }
@ -111,15 +155,37 @@ namespace xClient.Core.Cryptography
{ {
using (var ms = new MemoryStream(input)) using (var ms = new MemoryStream(input))
{ {
using (var aesProvider = new AesCryptoServiceProvider() { Key = _defaultKey }) using (var aesProvider = new AesCryptoServiceProvider())
{ {
byte[] iv = new byte[IVLENGTH]; aesProvider.KeySize = 128;
ms.Read(iv, 0, IVLENGTH); // read first 16 bytes for IV, followed by encrypted message aesProvider.BlockSize = 128;
aesProvider.Mode = CipherMode.CBC;
aesProvider.Padding = PaddingMode.PKCS7;
aesProvider.Key = _defaultKey;
// read first 32 bytes for HMAC
using (var hmac = new HMACSHA256(_defaultAuthKey))
{
var hash = hmac.ComputeHash(ms.ToArray(), HmacSha256Length, ms.ToArray().Length - HmacSha256Length);
byte[] receivedHash = new byte[HmacSha256Length];
ms.Read(receivedHash, 0, receivedHash.Length);
for (int i = 0; i < hash.Length; i++)
{
if (receivedHash[i] != hash[i])
{
return data;
}
}
}
byte[] iv = new byte[IvLength];
ms.Read(iv, 0, IvLength); // read next 16 bytes for IV, followed by ciphertext
aesProvider.IV = iv; aesProvider.IV = iv;
using (var cs = new CryptoStream(ms, aesProvider.CreateDecryptor(), CryptoStreamMode.Read)) using (var cs = new CryptoStream(ms, aesProvider.CreateDecryptor(), CryptoStreamMode.Read))
{ {
byte[] temp = new byte[ms.Length - IVLENGTH + 1]; byte[] temp = new byte[ms.Length - IvLength + 1];
data = new byte[cs.Read(temp, 0, temp.Length)]; data = new byte[cs.Read(temp, 0, temp.Length)];
Buffer.BlockCopy(temp, 0, data, 0, data.Length); Buffer.BlockCopy(temp, 0, data, 0, data.Length);
} }

View File

@ -5,17 +5,25 @@ using System.Text;
namespace xServer.Core.Cryptography namespace xServer.Core.Cryptography
{ {
// ReSharper disable once InconsistentNaming
public static class AES public static class AES
{ {
private const int IVLENGTH = 16; private const int IvLength = 16;
private const int HmacSha256Length = 32;
private static byte[] _defaultKey; private static byte[] _defaultKey;
private static byte[] _defaultAuthKey;
private static readonly byte[] Salt =
{
0xBF, 0xEB, 0x1E, 0x56, 0xFB, 0xCD, 0x97, 0x3B, 0xB2, 0x19, 0x2, 0x24, 0x30, 0xA5, 0x78, 0x43, 0x0, 0x3D, 0x56,
0x44, 0xD2, 0x1E, 0x62, 0xB9, 0xD4, 0xF1, 0x80, 0xE7, 0xE6, 0xC3, 0x39, 0x41
};
public static void SetDefaultKey(string key) public static void SetDefaultKey(string key)
{ {
using (var md5 = new MD5CryptoServiceProvider()) using (Rfc2898DeriveBytes derive = new Rfc2898DeriveBytes(key, Salt, 2000))
{ {
_defaultKey = md5.ComputeHash(Encoding.UTF8.GetBytes(key)); _defaultKey = derive.GetBytes(16);
_defaultAuthKey = derive.GetBytes(64);
} }
} }
@ -29,6 +37,12 @@ namespace xServer.Core.Cryptography
return Convert.ToBase64String(Encrypt(Encoding.UTF8.GetBytes(input))); return Convert.ToBase64String(Encrypt(Encoding.UTF8.GetBytes(input)));
} }
/* FORMAT
* ----------------------------------------
* | HMAC | IV | CIPHERTEXT |
* ----------------------------------------
* 32 bytes 16 bytes
*/
public static byte[] Encrypt(byte[] input) public static byte[] Encrypt(byte[] input)
{ {
if (_defaultKey == null || _defaultKey.Length == 0) throw new Exception("Key can not be empty."); if (_defaultKey == null || _defaultKey.Length == 0) throw new Exception("Key can not be empty.");
@ -40,14 +54,28 @@ namespace xServer.Core.Cryptography
{ {
using (var ms = new MemoryStream()) using (var ms = new MemoryStream())
{ {
using (var aesProvider = new AesCryptoServiceProvider() { Key = _defaultKey }) ms.Position = HmacSha256Length; // reserve first 32 bytes for HMAC
using (var aesProvider = new AesCryptoServiceProvider())
{ {
aesProvider.KeySize = 128;
aesProvider.BlockSize = 128;
aesProvider.Mode = CipherMode.CBC;
aesProvider.Padding = PaddingMode.PKCS7;
aesProvider.Key = _defaultKey;
aesProvider.GenerateIV(); aesProvider.GenerateIV();
using (var cs = new CryptoStream(ms, aesProvider.CreateEncryptor(), CryptoStreamMode.Write)) using (var cs = new CryptoStream(ms, aesProvider.CreateEncryptor(), CryptoStreamMode.Write))
{ {
ms.Write(aesProvider.IV, 0, aesProvider.IV.Length); // write first 16 bytes IV, followed by encrypted message ms.Write(aesProvider.IV, 0, aesProvider.IV.Length); // write next 16 bytes the IV, followed by ciphertext
cs.Write(data, 0, data.Length); cs.Write(data, 0, data.Length);
cs.FlushFinalBlock();
using (var hmac = new HMACSHA256(_defaultAuthKey))
{
byte[] hash = hmac.ComputeHash(ms.ToArray(), HmacSha256Length, ms.ToArray().Length - HmacSha256Length); // compute the HMAC of IV and ciphertext
ms.Position = 0; // write hash at beginning
ms.Write(hash, 0, hash.Length);
}
} }
} }
@ -64,9 +92,11 @@ namespace xServer.Core.Cryptography
{ {
if (key == null || key.Length == 0) throw new Exception("Key can not be empty."); if (key == null || key.Length == 0) throw new Exception("Key can not be empty.");
using (var md5 = new MD5CryptoServiceProvider()) byte[] authKey;
using (Rfc2898DeriveBytes derive = new Rfc2898DeriveBytes(key, Salt, 2000))
{ {
key = md5.ComputeHash(key); key = derive.GetBytes(16);
authKey = derive.GetBytes(64);
} }
byte[] data = input, encdata = new byte[0]; byte[] data = input, encdata = new byte[0];
@ -75,14 +105,28 @@ namespace xServer.Core.Cryptography
{ {
using (var ms = new MemoryStream()) using (var ms = new MemoryStream())
{ {
using (var aesProvider = new AesCryptoServiceProvider() { Key = key }) ms.Position = HmacSha256Length; // reserve first 32 bytes for HMAC
using (var aesProvider = new AesCryptoServiceProvider())
{ {
aesProvider.KeySize = 128;
aesProvider.BlockSize = 128;
aesProvider.Mode = CipherMode.CBC;
aesProvider.Padding = PaddingMode.PKCS7;
aesProvider.Key = key;
aesProvider.GenerateIV(); aesProvider.GenerateIV();
using (var cs = new CryptoStream(ms, aesProvider.CreateEncryptor(), CryptoStreamMode.Write)) using (var cs = new CryptoStream(ms, aesProvider.CreateEncryptor(), CryptoStreamMode.Write))
{ {
ms.Write(aesProvider.IV, 0, aesProvider.IV.Length); // write first 16 bytes IV, followed by encrypted message ms.Write(aesProvider.IV, 0, aesProvider.IV.Length); // write next 16 bytes the IV, followed by ciphertext
cs.Write(data, 0, data.Length); cs.Write(data, 0, data.Length);
cs.FlushFinalBlock();
using (var hmac = new HMACSHA256(authKey))
{
byte[] hash = hmac.ComputeHash(ms.ToArray(), HmacSha256Length, ms.ToArray().Length - HmacSha256Length); // compute the HMAC of IV and ciphertext
ms.Position = 0; // write hash at beginning
ms.Write(hash, 0, hash.Length);
}
} }
} }
@ -111,15 +155,37 @@ namespace xServer.Core.Cryptography
{ {
using (var ms = new MemoryStream(input)) using (var ms = new MemoryStream(input))
{ {
using (var aesProvider = new AesCryptoServiceProvider() { Key = _defaultKey }) using (var aesProvider = new AesCryptoServiceProvider())
{ {
byte[] iv = new byte[IVLENGTH]; aesProvider.KeySize = 128;
ms.Read(iv, 0, IVLENGTH); // read first 16 bytes for IV, followed by encrypted message aesProvider.BlockSize = 128;
aesProvider.Mode = CipherMode.CBC;
aesProvider.Padding = PaddingMode.PKCS7;
aesProvider.Key = _defaultKey;
// read first 32 bytes for HMAC
using (var hmac = new HMACSHA256(_defaultAuthKey))
{
var hash = hmac.ComputeHash(ms.ToArray(), HmacSha256Length, ms.ToArray().Length - HmacSha256Length);
byte[] receivedHash = new byte[HmacSha256Length];
ms.Read(receivedHash, 0, receivedHash.Length);
for (int i = 0; i < hash.Length; i++)
{
if (receivedHash[i] != hash[i])
{
return data;
}
}
}
byte[] iv = new byte[IvLength];
ms.Read(iv, 0, IvLength); // read next 16 bytes for IV, followed by ciphertext
aesProvider.IV = iv; aesProvider.IV = iv;
using (var cs = new CryptoStream(ms, aesProvider.CreateDecryptor(), CryptoStreamMode.Read)) using (var cs = new CryptoStream(ms, aesProvider.CreateDecryptor(), CryptoStreamMode.Read))
{ {
byte[] temp = new byte[ms.Length - IVLENGTH + 1]; byte[] temp = new byte[ms.Length - IvLength + 1];
data = new byte[cs.Read(temp, 0, temp.Length)]; data = new byte[cs.Read(temp, 0, temp.Length)];
Buffer.BlockCopy(temp, 0, data, 0, data.Length); Buffer.BlockCopy(temp, 0, data, 0, data.Length);
} }