All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.jd.blockchain.crypto.utils.classic.AESUtils Maven / Gradle / Ivy

There is a newer version: 1.6.5.RELEASE
Show newest version
package com.jd.blockchain.crypto.utils.classic;

import com.jd.blockchain.crypto.CryptoException;
import org.bouncycastle.crypto.CipherKeyGenerator;
import org.bouncycastle.crypto.KeyGenerationParameters;
import org.bouncycastle.crypto.engines.AESEngine;
import org.bouncycastle.crypto.modes.CBCBlockCipher;
import org.bouncycastle.crypto.paddings.PKCS7Padding;
import org.bouncycastle.crypto.params.KeyParameter;
import org.bouncycastle.crypto.params.ParametersWithIV;

import java.security.SecureRandom;
import java.util.Arrays;

/**
 * @author zhanglin33
 * @title: AESUtils
 * @description: AES128/CBC/PKCS7Padding symmetric encryption algorithm
 * @date 2019-04-22, 09:37
 */
public class AESUtils {

    // AES128 supports 128-bit(16 bytes) secret key
    private static final int KEY_SIZE = 128 / 8;
    // One block contains 16 bytes
    private static final int BLOCK_SIZE = 16;
    // Initial vector's size is 16 bytes
    private static final int IV_SIZE = 16;

    /**
     * key generation
     *
     * @return secret key
     */
    public static byte[] generateKey(){

        CipherKeyGenerator keyGenerator = new CipherKeyGenerator();

        // To provide secure randomness and key length as input
        // to prepare generate private key
        keyGenerator.init(new KeyGenerationParameters(new SecureRandom(), KEY_SIZE * 8));

        // To generate key
        return keyGenerator.generateKey();
    }

    public static byte[] generateKey(byte[] seed){
        byte[] hash  = SHA256Utils.hash(seed);
        return Arrays.copyOf(hash, KEY_SIZE);
    }


    /**
     * encryption
     *
     * @param plainBytes plaintext
     * @param secretKey symmetric key
     * @param iv initial vector
     * @return ciphertext
     */
    public static byte[] encrypt(byte[] plainBytes, byte[] secretKey, byte[] iv){

        // To ensure that plaintext is not null
        if (plainBytes == null)
        {
            throw new CryptoException("plaintext is null!");
        }

        if (secretKey.length != KEY_SIZE)
        {
            throw new CryptoException("secretKey's length is wrong!");
        }

        if (iv.length != IV_SIZE)
        {
            throw new CryptoException("iv's length is wrong!");
        }

        // To get the value padded into input
        int padding = 16 - plainBytes.length % BLOCK_SIZE;
        // The plaintext with padding value
        byte[] plainBytesWithPadding = new byte[plainBytes.length + padding];
        System.arraycopy(plainBytes,0,plainBytesWithPadding,0,plainBytes.length);
        // The padder adds PKCS7 padding to the input, which makes its length to
        // become an integral multiple of 16 bytes
        PKCS7Padding padder = new PKCS7Padding();
        // To add padding
        padder.addPadding(plainBytesWithPadding, plainBytes.length);

        CBCBlockCipher encryptor = new CBCBlockCipher(new AESEngine());
        // To provide key and initialisation vector as input
        encryptor.init(true,new ParametersWithIV(new KeyParameter(secretKey),iv));
        byte[] output = new byte[plainBytesWithPadding.length + IV_SIZE];
        // To encrypt the input_p in CBC mode
        for(int i = 0 ; i < plainBytesWithPadding.length/BLOCK_SIZE; i++) {
            encryptor.processBlock(plainBytesWithPadding, i * BLOCK_SIZE, output, (i + 1) * BLOCK_SIZE);
        }

        // The IV locates on the first block of ciphertext
        System.arraycopy(iv,0,output,0,BLOCK_SIZE);
        return output;
    }

    public static byte[] encrypt(byte[] plainBytes, byte[] secretKey){

        byte[] iv = new byte[IV_SIZE];
        SecureRandom random = new SecureRandom();
        random.nextBytes(iv);
        return encrypt(plainBytes,secretKey,iv);
    }

    /**
     * decryption
     *
     * @param cipherBytes ciphertext
     * @param secretKey symmetric key
     * @return plaintext
     */
    public static byte[] decrypt(byte[] cipherBytes, byte[] secretKey){

        // To ensure that the ciphertext is not null
        if (cipherBytes == null)
        {
            throw new CryptoException("ciphertext is null!");
        }

        // To ensure that the ciphertext's length is integral multiples of 16 bytes
        if (cipherBytes.length % BLOCK_SIZE != 0)
        {
            throw new CryptoException("ciphertext's length is wrong!");
        }

        if (secretKey.length != KEY_SIZE)
        {
            throw new CryptoException("secretKey's length is wrong!");
        }

        byte[] iv = new byte[IV_SIZE];
        System.arraycopy(cipherBytes,0,iv,0,BLOCK_SIZE);

        CBCBlockCipher decryptor = new CBCBlockCipher(new AESEngine());
        // To prepare the decryption
        decryptor.init(false,new ParametersWithIV(new KeyParameter(secretKey),iv));
        byte[] outputWithPadding = new byte[cipherBytes.length-BLOCK_SIZE];
        // To decrypt the input in CBC mode
        for(int i = 1 ; i < cipherBytes.length/BLOCK_SIZE ; i++) {
            decryptor.processBlock(cipherBytes, i * BLOCK_SIZE, outputWithPadding, (i - 1) * BLOCK_SIZE);
        }

        int p = outputWithPadding[outputWithPadding.length-1];
        // To ensure that the padding of output_p is valid
        if(p > BLOCK_SIZE || p < 0x01)
        {
            throw new CryptoException("There no exists such padding!");

        }
        for(int i = 0 ; i < p ; i++)
        {
            if(outputWithPadding[outputWithPadding.length - i -1] != p)
            {
                throw new CryptoException("Padding is invalid!");
            }
        }

        // To remove the padding from output and obtain plaintext
        byte[] output = new byte[outputWithPadding.length - p];
        System.arraycopy(outputWithPadding, 0, output, 0, output.length);
        return output;
    }
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy