You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
363 lines
10 KiB
363 lines
10 KiB
11 months ago
|
#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
|
||
|
#pragma warning disable
|
||
|
using System;
|
||
|
using System.Collections;
|
||
|
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters;
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Math;
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities;
|
||
|
|
||
|
namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines
|
||
|
{
|
||
|
/**
|
||
|
* NaccacheStern Engine. For details on this cipher, please see
|
||
|
* http://www.gemplus.com/smart/rd/publications/pdf/NS98pkcs.pdf
|
||
|
*/
|
||
|
public class NaccacheSternEngine
|
||
|
: IAsymmetricBlockCipher
|
||
|
{
|
||
|
private bool forEncryption;
|
||
|
|
||
|
private NaccacheSternKeyParameters key;
|
||
|
|
||
|
private IList[] lookup = null;
|
||
|
|
||
|
public string AlgorithmName
|
||
|
{
|
||
|
get { return "NaccacheStern"; }
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Initializes this algorithm. Must be called before all other Functions.
|
||
|
*
|
||
|
* @see org.bouncycastle.crypto.AsymmetricBlockCipher#init(bool,
|
||
|
* org.bouncycastle.crypto.CipherParameters)
|
||
|
*/
|
||
|
public virtual void Init(
|
||
|
bool forEncryption,
|
||
|
ICipherParameters parameters)
|
||
|
{
|
||
|
this.forEncryption = forEncryption;
|
||
|
|
||
|
if (parameters is ParametersWithRandom)
|
||
|
{
|
||
|
parameters = ((ParametersWithRandom) parameters).Parameters;
|
||
|
}
|
||
|
|
||
|
key = (NaccacheSternKeyParameters)parameters;
|
||
|
|
||
|
// construct lookup table for faster decryption if necessary
|
||
|
if (!this.forEncryption)
|
||
|
{
|
||
|
NaccacheSternPrivateKeyParameters priv = (NaccacheSternPrivateKeyParameters)key;
|
||
|
IList primes = priv.SmallPrimesList;
|
||
|
lookup = new IList[primes.Count];
|
||
|
for (int i = 0; i < primes.Count; i++)
|
||
|
{
|
||
|
BigInteger actualPrime = (BigInteger) primes[i];
|
||
|
int actualPrimeValue = actualPrime.IntValue;
|
||
|
|
||
|
lookup[i] = BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities.Platform.CreateArrayList(actualPrimeValue);
|
||
|
lookup[i].Add(BigInteger.One);
|
||
|
|
||
|
BigInteger accJ = BigInteger.Zero;
|
||
|
|
||
|
for (int j = 1; j < actualPrimeValue; j++)
|
||
|
{
|
||
|
// BigInteger bigJ = BigInteger.ValueOf(j);
|
||
|
// accJ = priv.PhiN.Multiply(bigJ);
|
||
|
accJ = accJ.Add(priv.PhiN);
|
||
|
BigInteger comp = accJ.Divide(actualPrime);
|
||
|
lookup[i].Add(priv.G.ModPow(comp, priv.Modulus));
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
|
||
|
public virtual bool Debug
|
||
|
{
|
||
|
set {}
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Returns the input block size of this algorithm.
|
||
|
*
|
||
|
* @see org.bouncycastle.crypto.AsymmetricBlockCipher#GetInputBlockSize()
|
||
|
*/
|
||
|
public virtual int GetInputBlockSize()
|
||
|
{
|
||
|
if (forEncryption)
|
||
|
{
|
||
|
// We can only encrypt values up to lowerSigmaBound
|
||
|
return (key.LowerSigmaBound + 7) / 8 - 1;
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
// We pad to modulus-size bytes for easier decryption.
|
||
|
// return key.Modulus.ToByteArray().Length;
|
||
|
return key.Modulus.BitLength / 8 + 1;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Returns the output block size of this algorithm.
|
||
|
*
|
||
|
* @see org.bouncycastle.crypto.AsymmetricBlockCipher#GetOutputBlockSize()
|
||
|
*/
|
||
|
public virtual int GetOutputBlockSize()
|
||
|
{
|
||
|
if (forEncryption)
|
||
|
{
|
||
|
// encrypted Data is always padded up to modulus size
|
||
|
// return key.Modulus.ToByteArray().Length;
|
||
|
return key.Modulus.BitLength / 8 + 1;
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
// decrypted Data has upper limit lowerSigmaBound
|
||
|
return (key.LowerSigmaBound + 7) / 8 - 1;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Process a single Block using the Naccache-Stern algorithm.
|
||
|
*
|
||
|
* @see org.bouncycastle.crypto.AsymmetricBlockCipher#ProcessBlock(byte[],
|
||
|
* int, int)
|
||
|
*/
|
||
|
public virtual byte[] ProcessBlock(
|
||
|
byte[] inBytes,
|
||
|
int inOff,
|
||
|
int length)
|
||
|
{
|
||
|
if (key == null)
|
||
|
throw new InvalidOperationException("NaccacheStern engine not initialised");
|
||
|
if (length > (GetInputBlockSize() + 1))
|
||
|
throw new DataLengthException("input too large for Naccache-Stern cipher.\n");
|
||
|
|
||
|
if (!forEncryption)
|
||
|
{
|
||
|
// At decryption make sure that we receive padded data blocks
|
||
|
if (length < GetInputBlockSize())
|
||
|
{
|
||
|
throw new InvalidCipherTextException("BlockLength does not match modulus for Naccache-Stern cipher.\n");
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// transform input into BigInteger
|
||
|
BigInteger input = new BigInteger(1, inBytes, inOff, length);
|
||
|
|
||
|
byte[] output;
|
||
|
if (forEncryption)
|
||
|
{
|
||
|
output = Encrypt(input);
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
IList plain = BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities.Platform.CreateArrayList();
|
||
|
NaccacheSternPrivateKeyParameters priv = (NaccacheSternPrivateKeyParameters)key;
|
||
|
IList primes = priv.SmallPrimesList;
|
||
|
// Get Chinese Remainders of CipherText
|
||
|
for (int i = 0; i < primes.Count; i++)
|
||
|
{
|
||
|
BigInteger exp = input.ModPow(priv.PhiN.Divide((BigInteger)primes[i]), priv.Modulus);
|
||
|
IList al = lookup[i];
|
||
|
if (lookup[i].Count != ((BigInteger)primes[i]).IntValue)
|
||
|
{
|
||
|
throw new InvalidCipherTextException("Error in lookup Array for "
|
||
|
+ ((BigInteger)primes[i]).IntValue
|
||
|
+ ": Size mismatch. Expected ArrayList with length "
|
||
|
+ ((BigInteger)primes[i]).IntValue + " but found ArrayList of length "
|
||
|
+ lookup[i].Count);
|
||
|
}
|
||
|
int lookedup = al.IndexOf(exp);
|
||
|
|
||
|
if (lookedup == -1)
|
||
|
{
|
||
|
throw new InvalidCipherTextException("Lookup failed");
|
||
|
}
|
||
|
plain.Add(BigInteger.ValueOf(lookedup));
|
||
|
}
|
||
|
BigInteger test = chineseRemainder(plain, primes);
|
||
|
|
||
|
// Should not be used as an oracle, so reencrypt output to see
|
||
|
// if it corresponds to input
|
||
|
|
||
|
// this breaks probabilisic encryption, so disable it. Anyway, we do
|
||
|
// use the first n primes for key generation, so it is pretty easy
|
||
|
// to guess them. But as stated in the paper, this is not a security
|
||
|
// breach. So we can just work with the correct sigma.
|
||
|
|
||
|
// if ((key.G.ModPow(test, key.Modulus)).Equals(input)) {
|
||
|
// output = test.ToByteArray();
|
||
|
// } else {
|
||
|
// output = null;
|
||
|
// }
|
||
|
|
||
|
output = test.ToByteArray();
|
||
|
}
|
||
|
|
||
|
return output;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Encrypts a BigInteger aka Plaintext with the public key.
|
||
|
*
|
||
|
* @param plain
|
||
|
* The BigInteger to encrypt
|
||
|
* @return The byte[] representation of the encrypted BigInteger (i.e.
|
||
|
* crypted.toByteArray())
|
||
|
*/
|
||
|
public virtual byte[] Encrypt(
|
||
|
BigInteger plain)
|
||
|
{
|
||
|
// Always return modulus size values 0-padded at the beginning
|
||
|
// 0-padding at the beginning is correctly parsed by BigInteger :)
|
||
|
// byte[] output = key.Modulus.ToByteArray();
|
||
|
// Array.Clear(output, 0, output.Length);
|
||
|
byte[] output = new byte[key.Modulus.BitLength / 8 + 1];
|
||
|
|
||
|
byte[] tmp = key.G.ModPow(plain, key.Modulus).ToByteArray();
|
||
|
Array.Copy(tmp, 0, output, output.Length - tmp.Length, tmp.Length);
|
||
|
return output;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Adds the contents of two encrypted blocks mod sigma
|
||
|
*
|
||
|
* @param block1
|
||
|
* the first encrypted block
|
||
|
* @param block2
|
||
|
* the second encrypted block
|
||
|
* @return encrypt((block1 + block2) mod sigma)
|
||
|
* @throws InvalidCipherTextException
|
||
|
*/
|
||
|
public virtual byte[] AddCryptedBlocks(
|
||
|
byte[] block1,
|
||
|
byte[] block2)
|
||
|
{
|
||
|
// check for correct blocksize
|
||
|
if (forEncryption)
|
||
|
{
|
||
|
if ((block1.Length > GetOutputBlockSize())
|
||
|
|| (block2.Length > GetOutputBlockSize()))
|
||
|
{
|
||
|
throw new InvalidCipherTextException(
|
||
|
"BlockLength too large for simple addition.\n");
|
||
|
}
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
if ((block1.Length > GetInputBlockSize())
|
||
|
|| (block2.Length > GetInputBlockSize()))
|
||
|
{
|
||
|
throw new InvalidCipherTextException(
|
||
|
"BlockLength too large for simple addition.\n");
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// calculate resulting block
|
||
|
BigInteger m1Crypt = new BigInteger(1, block1);
|
||
|
BigInteger m2Crypt = new BigInteger(1, block2);
|
||
|
BigInteger m1m2Crypt = m1Crypt.Multiply(m2Crypt);
|
||
|
m1m2Crypt = m1m2Crypt.Mod(key.Modulus);
|
||
|
|
||
|
//byte[] output = key.Modulus.ToByteArray();
|
||
|
//Array.Clear(output, 0, output.Length);
|
||
|
byte[] output = new byte[key.Modulus.BitLength / 8 + 1];
|
||
|
|
||
|
byte[] m1m2CryptBytes = m1m2Crypt.ToByteArray();
|
||
|
Array.Copy(m1m2CryptBytes, 0, output,
|
||
|
output.Length - m1m2CryptBytes.Length, m1m2CryptBytes.Length);
|
||
|
|
||
|
return output;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Convenience Method for data exchange with the cipher.
|
||
|
*
|
||
|
* Determines blocksize and splits data to blocksize.
|
||
|
*
|
||
|
* @param data the data to be processed
|
||
|
* @return the data after it went through the NaccacheSternEngine.
|
||
|
* @throws InvalidCipherTextException
|
||
|
*/
|
||
|
public virtual byte[] ProcessData(
|
||
|
byte[] data)
|
||
|
{
|
||
|
if (data.Length > GetInputBlockSize())
|
||
|
{
|
||
|
int inBlocksize = GetInputBlockSize();
|
||
|
int outBlocksize = GetOutputBlockSize();
|
||
|
int datapos = 0;
|
||
|
int retpos = 0;
|
||
|
byte[] retval = new byte[(data.Length / inBlocksize + 1) * outBlocksize];
|
||
|
while (datapos < data.Length)
|
||
|
{
|
||
|
byte[] tmp;
|
||
|
if (datapos + inBlocksize < data.Length)
|
||
|
{
|
||
|
tmp = ProcessBlock(data, datapos, inBlocksize);
|
||
|
datapos += inBlocksize;
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
tmp = ProcessBlock(data, datapos, data.Length - datapos);
|
||
|
datapos += data.Length - datapos;
|
||
|
}
|
||
|
if (tmp != null)
|
||
|
{
|
||
|
tmp.CopyTo(retval, retpos);
|
||
|
retpos += tmp.Length;
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
throw new InvalidCipherTextException("cipher returned null");
|
||
|
}
|
||
|
}
|
||
|
byte[] ret = new byte[retpos];
|
||
|
Array.Copy(retval, 0, ret, 0, retpos);
|
||
|
return ret;
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
return ProcessBlock(data, 0, data.Length);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Computes the integer x that is expressed through the given primes and the
|
||
|
* congruences with the chinese remainder theorem (CRT).
|
||
|
*
|
||
|
* @param congruences
|
||
|
* the congruences c_i
|
||
|
* @param primes
|
||
|
* the primes p_i
|
||
|
* @return an integer x for that x % p_i == c_i
|
||
|
*/
|
||
|
private static BigInteger chineseRemainder(IList congruences, IList primes)
|
||
|
{
|
||
|
BigInteger retval = BigInteger.Zero;
|
||
|
BigInteger all = BigInteger.One;
|
||
|
for (int i = 0; i < primes.Count; i++)
|
||
|
{
|
||
|
all = all.Multiply((BigInteger)primes[i]);
|
||
|
}
|
||
|
for (int i = 0; i < primes.Count; i++)
|
||
|
{
|
||
|
BigInteger a = (BigInteger)primes[i];
|
||
|
BigInteger b = all.Divide(a);
|
||
|
BigInteger b2 = b.ModInverse(a);
|
||
|
BigInteger tmp = b.Multiply(b2);
|
||
|
tmp = tmp.Multiply((BigInteger)congruences[i]);
|
||
|
retval = retval.Add(tmp);
|
||
|
}
|
||
|
|
||
|
return retval.Mod(all);
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
#pragma warning restore
|
||
|
#endif
|