com.nimbusds.jose.crypto.impl.ECDH Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of nimbus-jose-jwt Show documentation
Show all versions of nimbus-jose-jwt Show documentation
Java library for Javascript Object Signing and Encryption (JOSE) and
JSON Web Tokens (JWT)
/*
* nimbus-jose-jwt
*
* Copyright 2012-2016, Connect2id Ltd and contributors.
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use
* this file except in compliance with the License. You may obtain a copy of the
* License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed
* under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
* CONDITIONS OF ANY KIND, either express or implied. See the License for the
* specific language governing permissions and limitations under the License.
*/
package com.nimbusds.jose.crypto.impl;
import java.nio.charset.StandardCharsets;
import java.security.InvalidKeyException;
import java.security.NoSuchAlgorithmException;
import java.security.PrivateKey;
import java.security.Provider;
import java.security.interfaces.ECPublicKey;
import javax.crypto.KeyAgreement;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;
import com.google.crypto.tink.subtle.X25519;
import com.nimbusds.jose.EncryptionMethod;
import com.nimbusds.jose.JOSEException;
import com.nimbusds.jose.JWEAlgorithm;
import com.nimbusds.jose.JWEHeader;
import com.nimbusds.jose.jwk.Curve;
import com.nimbusds.jose.jwk.OctetKeyPair;
/**
* Elliptic Curve Diffie-Hellman key agreement functions and utilities.
*
* @author Vladimir Dzhuvinov
* @version 2018-12-12
*/
public class ECDH {
/**
* Enumeration of the Elliptic Curve Diffie-Hellman Ephemeral Static
* algorithm modes.
*/
public enum AlgorithmMode {
/**
* Direct key agreement mode.
*/
DIRECT,
/**
* Key wrapping mode.
*/
KW
}
/**
* Resolves the ECDH algorithm mode.
*
* @param alg The JWE algorithm. Must be supported and not
* {@code null}.
*
* @return The algorithm mode.
*
* @throws JOSEException If the JWE algorithm is not supported.
*/
public static AlgorithmMode resolveAlgorithmMode(final JWEAlgorithm alg)
throws JOSEException {
if (alg.equals(JWEAlgorithm.ECDH_ES)) {
return AlgorithmMode.DIRECT;
} else if (alg.equals(JWEAlgorithm.ECDH_ES_A128KW) ||
alg.equals(JWEAlgorithm.ECDH_ES_A192KW) ||
alg.equals(JWEAlgorithm.ECDH_ES_A256KW)) {
return AlgorithmMode.KW;
} else {
throw new JOSEException(AlgorithmSupportMessage.unsupportedJWEAlgorithm(
alg,
ECDHCryptoProvider.SUPPORTED_ALGORITHMS));
}
}
/**
* Returns the bit length of the shared key (derived via concat KDF)
* for the specified JWE ECDH algorithm.
*
* @param alg The JWE ECDH algorithm. Must be supported and not
* {@code null}.
* @param enc The encryption method. Must be supported} and not
* {@code null}.
*
* @return The bit length of the shared key.
*
* @throws JOSEException If the JWE algorithm or encryption method is
* not supported.
*/
public static int sharedKeyLength(final JWEAlgorithm alg, final EncryptionMethod enc)
throws JOSEException {
if (alg.equals(JWEAlgorithm.ECDH_ES)) {
int length = enc.cekBitLength();
if (length == 0) {
throw new JOSEException("Unsupported JWE encryption method " + enc);
}
return length;
} else if (alg.equals(JWEAlgorithm.ECDH_ES_A128KW)) {
return 128;
} else if (alg.equals(JWEAlgorithm.ECDH_ES_A192KW)) {
return 192;
} else if (alg.equals(JWEAlgorithm.ECDH_ES_A256KW)) {
return 256;
} else {
throw new JOSEException(AlgorithmSupportMessage.unsupportedJWEAlgorithm(
alg, ECDHCryptoProvider.SUPPORTED_ALGORITHMS));
}
}
/**
* Derives a shared secret (also called 'Z') from the specified ECDH
* key agreement.
*
* @param publicKey The public EC key, i.e. the consumer's public EC
* key on encryption, or the ephemeral public EC key
* on decryption. Must not be {@code null}.
* @param privateKey The private EC Key, i.e. the ephemeral private EC
* key on encryption, or the consumer's private EC
* key on decryption. Must not be {@code null}.
* @param provider The JCA provider for the ECDH key agreement,
* {@code null} to use the default.
*
* @return The derived shared secret ('Z'), with algorithm "AES".
*
* @throws JOSEException If derivation of the shared secret failed.
*/
public static SecretKey deriveSharedSecret(final ECPublicKey publicKey,
final PrivateKey privateKey,
final Provider provider)
throws JOSEException {
// Get an ECDH key agreement instance from the JCA provider
KeyAgreement keyAgreement;
try {
if (provider != null) {
keyAgreement = KeyAgreement.getInstance("ECDH", provider);
} else {
keyAgreement = KeyAgreement.getInstance("ECDH");
}
} catch (NoSuchAlgorithmException e) {
throw new JOSEException("Couldn't get an ECDH key agreement instance: " + e.getMessage(), e);
}
try {
keyAgreement.init(privateKey);
keyAgreement.doPhase(publicKey, true);
} catch (InvalidKeyException e) {
throw new JOSEException("Invalid key for ECDH key agreement: " + e.getMessage(), e);
}
return new SecretKeySpec(keyAgreement.generateSecret(), "AES");
}
/**
* Derives a shared secret (also called 'Z') from the specified ECDH
* key agreement.
*
* @param publicKey The public OKP key, i.e. the consumer's public EC
* key on encryption, or the ephemeral public EC key
* on decryption. Must not be {@code null}.
* @param privateKey The private OKP key, i.e. the ephemeral private EC
* key on encryption, or the consumer's private EC
* key on decryption. Must not be {@code null}.
*
* @return The derived shared secret ('Z'), with algorithm "AES".
*
* @throws JOSEException If derivation of the shared secret failed.
*/
public static SecretKey deriveSharedSecret(final OctetKeyPair publicKey, final OctetKeyPair privateKey)
throws JOSEException {
if (publicKey.isPrivate()) {
throw new JOSEException("Expected public key but received OKP with 'd' value");
}
if (! Curve.X25519.equals(publicKey.getCurve())) {
throw new JOSEException("Expected public key OKP with crv=X25519");
}
if (! privateKey.isPrivate()) {
throw new JOSEException("Expected private key but received OKP without 'd' value");
}
if (! Curve.X25519.equals(privateKey.getCurve())) {
throw new JOSEException("Expected private key OKP with crv=X25519");
}
final byte[] privateKeyBytes = privateKey.getDecodedD();
final byte[] publicKeyBytes = publicKey.getDecodedX();
final byte[] sharedSecretBytes;
try {
sharedSecretBytes = X25519.computeSharedSecret(privateKeyBytes, publicKeyBytes);
} catch (InvalidKeyException e) {
throw new JOSEException(e.getMessage(), e);
}
return new SecretKeySpec(sharedSecretBytes, "AES");
}
/**
* Derives a shared key (via concat KDF).
*
* @param header The JWE header. Its algorithm and encryption method
* must be supported. Must not be {@code null}.
* @param Z The derived shared secret ('Z'). Must not be
* {@code null}.
* @param concatKDF The concat KDF. Must be initialised and not
* {@code null}.
*
* @return The derived shared key.
*
* @throws JOSEException If derivation of the shared key failed.
*/
public static SecretKey deriveSharedKey(final JWEHeader header,
final SecretKey Z,
final ConcatKDF concatKDF)
throws JOSEException {
final int sharedKeyLength = sharedKeyLength(header.getAlgorithm(), header.getEncryptionMethod());
// Set the alg ID for the concat KDF
AlgorithmMode algMode = resolveAlgorithmMode(header.getAlgorithm());
final String algID;
if (algMode == AlgorithmMode.DIRECT) {
// algID = enc
algID = header.getEncryptionMethod().getName();
} else if (algMode == AlgorithmMode.KW) {
// algID = alg
algID = header.getAlgorithm().getName();
} else {
throw new JOSEException("Unsupported JWE ECDH algorithm mode: " + algMode);
}
return concatKDF.deriveKey(
Z,
sharedKeyLength,
ConcatKDF.encodeDataWithLength(algID.getBytes(StandardCharsets.US_ASCII)),
ConcatKDF.encodeDataWithLength(header.getAgreementPartyUInfo()),
ConcatKDF.encodeDataWithLength(header.getAgreementPartyVInfo()),
ConcatKDF.encodeIntData(sharedKeyLength),
ConcatKDF.encodeNoData());
}
/**
* Prevents public instantiation.
*/
private ECDH() {
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy