AES / CFB / NOPADDING(128位),带密码输入

时间:2015-12-29 15:30:32

标签: java encryption aes

我已经尝试运行代码约3天了,但我无法弄清楚我已经做过的错误。

我正在使用带有密码腌制的128位AES / CFB / NOPadding Salt_Len = 8 bytesIV_Len = 16 bytes

package Firstage;

import java.io.File;
import java.io.FileInputStream;
import java.io.FileOutputStream;
import java.security.SecureRandom;
import java.security.spec.KeySpec;
import java.util.Random;
import java.util.Scanner;

import javax.crypto.Cipher;
import javax.crypto.SecretKey;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.PBEKeySpec;
import javax.crypto.spec.SecretKeySpec;

public class Thealgorithm1 
{

    static Scanner get = new Scanner(System.in);
    private static final String ALGORITHM = "AES";
    private static final String ALGORITHM_MODE ="AES/CFB/NoPadding";
    private static String password;

    public static void encrypt(File inputFile, File outputFile)
            throws Exception
    {
        System.out.println("Enetr passprhase");
        password=get.nextLine();

        final Random ivspc = new SecureRandom();
        byte[] ivspec = new byte[16];
        ivspc.nextBytes(ivspec);
        IvParameterSpec enciv = new IvParameterSpec(ivspec);

        FileOutputStream outputstrm = new FileOutputStream(outputFile);
        byte[] outputBytes = doCrypto(Cipher.ENCRYPT_MODE, inputFile,password,enciv);
        System.arraycopy(ivspec, 0,outputBytes , 0, 16);
        outputstrm.write(outputBytes);
        outputstrm.close();
        System.out.println("File encrypted successfully!");
    }

    public static void decrypt(File inputFile, File outputFile)
            throws Exception
    {

        System.out.println("Enter password");
        password=get.nextLine();
        IvParameterSpec hj = null;
        byte[]outpytBytes=doCrypto(Cipher.DECRYPT_MODE, inputFile,password,hj);
        FileOutputStream outputstrm = new FileOutputStream(outputFile);
        outputstrm.write(outpytBytes);
        outputstrm.close();
        System.out.println("File decrypted successfully!");
    }

    private static byte[] doCrypto(int cipherMode, File inputFile,String keyo ,IvParameterSpec ivespec)
            throws Exception {
    /* Derive the key, given password and salt. */
        final Random slt = new SecureRandom();
        byte[] salt = new byte[8];
        slt.nextBytes(salt);


        char[] passkeyo = keyo.toCharArray();
        SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA256");
        KeySpec spec = new PBEKeySpec(passkeyo, salt, 65536, 128);
        SecretKey tmp = factory.generateSecret(spec);

        SecretKey secret = new SecretKeySpec(tmp.getEncoded(), ALGORITHM);

        FileInputStream fylin = new FileInputStream(inputFile);
        byte[] inputBytes = new byte[(int)inputFile.length()];
        fylin.read(inputBytes);
        fylin.close();

        Cipher cipher = Cipher.getInstance(ALGORITHM_MODE);

        byte[] outputBytes;
        if(cipherMode==2)
        {
            IvParameterSpec ivdec = new IvParameterSpec(inputBytes,0,16);
            cipher.init(cipherMode, secret,ivdec);
        }
        else
        {
            cipher.init(cipherMode, secret, ivespec);
        }


        if(cipherMode==2)
        {
            outputBytes = cipher.doFinal(inputBytes, 16,(inputBytes.length-16));
        }
        else
        {
            outputBytes=cipher.doFinal(inputBytes);
        }


        return outputBytes;

    }

    public static void main(String[] args)
    {

        File inputFile = new File("C:/temp/File.txt");
        File encryptedFile = new File("C:/temp/encryaes.enc");
        File decryptedFile = new File("C:/temp/mydr.txt");


        try {

            Thealgorithm1.encrypt(inputFile, encryptedFile);
            Thealgorithm1.decrypt(encryptedFile, decryptedFile);
        }
        catch (Exception e)
        {
            e.printStackTrace();
        }

    }

}

代码正确加密并对其进行解密,但问题是它解密的内容不正确,即代码中存在错误。

2 个答案:

答案 0 :(得分:2)

您的代码中有两个主要问题:

  1. 密钥必须与加密和解密完全相同。当您解密时,您正在生成不同的(随机)盐值,因此,即使您输入相同的密码,解密密钥也会有所不同。您可以通过将salt设置为class属性并仅将其初始化一次来对此进行测试。
  2. 在加密方法中执行此操作时:

    System.arraycopy(ivspec, 0,outputBytes , 0, 16);
    
  3. 您正在写入加密输出的前16个字节。 我的简单建议是做这样的事情:

    byte[] outputBytes = doCrypto(Cipher.ENCRYPT_MODE, inputFile, password, enciv);
    byte[] outputBytesWithIV = new byte[outputBytes.length + 16];
    System.arraycopy(ivspec, 0, outputBytesWithIV, 0, 16);
    System.arraycopy(outputBytes, 0, outputBytesWithIV, 16, outputBytes.length);
    outputstrm.write(outputBytesWithIV);
    

答案 1 :(得分:2)

你有两个问题:

  • 在加密过程中,您将使用IV覆盖密文的前16个字节。一个简单的解决方法是将IV写入流而不是使用System.arraycopy()。变化

    System.arraycopy(ivspec, 0,outputBytes , 0, 16);
    

    outputstrm.write(ivspec);
    
  • 您在加密和解密期间使用不同的盐,因为您始终会生成新的盐。您还应该在IV旁边的密文前面写盐,并在解密过程中将其读回 您也可以使用以下两种方法之一:生成16字节的盐并在密文前面写入。然后你可以使用静态IV,因为语义属性是从随机盐中实现的。

相关问题