1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
|
/**
* Author: Sven Gothel <sgothel@jausoft.com>
* Copyright (c) 2022 Gothel Software e.K.
*
* Permission is hereby granted, free of charge, to any person obtaining
* a copy of this software and associated documentation files (the
* "Software"), to deal in the Software without restriction, including
* without limitation the rights to use, copy, modify, merge, publish,
* distribute, sublicense, and/or sell copies of the Software, and to
* permit persons to whom the Software is furnished to do so, subject to
* the following conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*/
package org.cipherpack;
import java.io.BufferedWriter;
import java.io.File;
import java.io.FileWriter;
import java.nio.ByteBuffer;
import java.util.List;
import org.jau.io.ByteInStream;
import org.jau.io.ByteInStream_Feed;
import org.jau.io.PrintUtil;
import org.jau.util.BasicTypes;
/**
* @anchor cipherpack_overview
* ### Cipherpack Overview
* *Cipherpack*, a secure stream processor utilizing public-key signatures to
* authenticate the sender and public-key encryption of a symmetric-key for multiple receiver
* ensuring their privacy and high-performance message encryption.
*
* *Cipherpack* securely streams messages through any media,
* via file using [ByteInStream_File](https://jausoft.com/projects/jaulib/build/documentation/java/html/classorg_1_1jau_1_1io_1_1ByteInStream__File.html)
* and via all [*libcurl* network protocols](https://curl.se/docs/url-syntax.html)
* using [ByteInStream_URL](https://jausoft.com/projects/jaulib/build/documentation/java/html/classorg_1_1jau_1_1io_1_1ByteInStream__URL.html)
* are *build-in* and supported. <br/>
* Note: *libcurl* must be enabled via `-DUSE_LIBCURL=ON` at build.
*
* A user may use the media agnostic
* [ByteInStream_Feed](https://jausoft.com/projects/jaulib/build/documentation/java/html/classorg_1_1jau_1_1io_1_1ByteInStream__Feed.html)
* to produce the input stream by injecting data off-thread and a CipherpackListener to receive the processed output stream.
*
* *Cipherpack* is implemented using C++17 and accessible via C++ and Java.
*
* ### Cipherpack Implementation
* #### Implementation Status
* READY TO USE
*
* #### Cipherpack Operations
* The following public-key signature and encryption, as well as symmetric-key message encryption operations are performed:
* - Writing a DER Header-1, containing the general message information and receiver count, see {@link PackHeader} details.
* - Writing a DER Header for each recevr, containing the fingerprint, encrypted symmetric-key and encrypted symmetric-nonce.
* - Writing a DER Header-2, containing the sender's signature over the whole header
* - Writing the symmetrically encrypted message, using the symmetric-key for encryption + MAC via AEAD `ChaCha20Poly1305`.
*
* Implementation performs all operation `in-place` without redundant copies, processing the stream.
*
* @anchor cipherpack_stream
* #### Cipherpack Data Stream
* The stream's header contains the sender's public-key fingerprint
* and its signature for authentication by the receiving parties.
*
* Further, the stream contains triples per receiver, its public-key fingerprint,
* the encrypted symmetric-key and the encrypted symmetric-nonce for each receiver,
* allowing a secure messaging between multiple parties:
* - Symmetric encryption of the plaintext message ensures high-performance processing.
* - Symmetric stream-key is unique for each message
*
* Implementation uses an Authenticated Encryption with Additional Data (AEAD) encryption+MAC cipher algo,
* i.e. {@link cipherpack::constants::aead_cipher_algo}.
*
* The random nonce, unique for one message and used for the symmetric encryption is not a secret and doesn't have to be confidential.
* However, since we already encrypt the symmetric-key for each receiver, we transmit the nonce with it, encrypted.
*
* The cipherpack stream will be produced as follows:
* ```
* DER Header 1 {
* ASN1_Type::OctetString stream_magic // simple stream identifier to be matched
* ASN1_Type::OctetString target_path // optional target path for the plaintext message, user application specific.
* ASN1_Type::Integer plaintext_size // size in bytes of plaintext message, zero if not determined at start of streaming
* ASN1_Type::Integer creation_timestamp_sec // message creation timestamp, second component
* ASN1_Type::Integer creation_timestamp_nsec // message creation timestamp, nanoseconds component
* ASN1_Type::OctetString subject // optional subject of message, user application specific.
* ASN1_Type::OctetString plaintext_version // version of this plaintext message, user application specific.
* ASN1_Type::OctetString plaintext_version_parent // version of this plaintext message's preceding message, user application specific.
* ASN1_Type::OctetString pk_type // public-key type. Default `RSA`.
* ASN1_Type::OctetString pk_fingerprt_hash_algo // public-key fingerprint hash. Default `SHA-256`.
* ASN1_Type::OctetString pk_enc_padding_algo // public-key encryption padding. Default `OAEP`.
* ASN1_Type::OctetString pk_enc_hash_algo // public-key encryption hash. Default `SHA-256`.
* ASN1_Type::OctetString pk_sign_algo // public-key signature algorithm. Default `EMSA1(SHA-256)`.
* ASN1_Type::ObjectId sym_enc_mac_oid // symmetric-key encryption+MAC algorithm. Default `ChaCha20Poly1305`.
* ASN1_Type::OctetString fingerprt_sender // fingerprint of public sender key used for header signature
* ASN1_Type::Integer receiver_count, // number of receiver triples { fingerprint, encrypted-symmetric-keys, encrypted-nonce }
* }
* DER Header recevr_1 {
* ASN1_Type::OctetString fingerprt_recevr_1, // fingerprint of receiver's public-key_1 used for encrypted_skey_recevr_1
* ASN1_Type::OctetString encrypted_skey_recevr_1, // encrypted symmetric-key with receiver's public-key_1
* ASN1_Type::OctetString encrypted_nonce_recevr_1, // encrypted symmetric-encryption nonce with receiver's public-key_1
* },
* DER Header recevr_2 {
* ASN1_Type::OctetString fingerprt_recevr_2, // fingerprint of receiver's public-key_1 used for encrypted_skey_recevr_2
* ASN1_Type::OctetString encrypted_skey_recevr_2, // encrypted symmetric-key with receiver's public-key_2
* ASN1_Type::OctetString encrypted_nonce_recevr_2, // encrypted symmetric-encryption nonce with receiver's public-key_2
* } ...
* DER Header 2 {
* ASN1_Type::OctetString sign_sender // sender's signature over whole header, matching fingerprt_sender
* },
* uint8_t encrypted_data[ciphertext_size] // the encrypted message, `ciphertext_size` bytes resulting to `plaintext_size` plaintext message
* ```
*
* @see encryptThenSign()
* @see checkSignThenDecrypt()
*/
public final class Cipherpack {
/**
* Name of default hash algo for the plaintext message,
* e.g. for {@link #encryptThenSign(CryptoConfig, List, String, ByteBuffer, ByteInStream, String, String, String, String, CipherpackListener, String, String) encryptThenSign()}
* and {@link #checkSignThenDecrypt(List, String, ByteBuffer, ByteInStream, CipherpackListener, String, String) checkSignThenDecrypt()}.
*
* Value is `BLAKE2b(512)`.
*
* Note:
* - SHA-256 performs 64 rounds over 512 bits (blocks size) at a time.
* - Often better optimized and hardware implemented.
* - SHA-512 performs 80 rounds over 1024 bits (blocks size) at a time.
* - Requires double storage size than SHA-256, i.e. 512/256 bits.
* - 25% more rounds, i.e. calculations than SHA-256
* - Operating on 64-bit words instead of SHA-256's 32-bit words
* - Theoretically shall outperform SHA-256 by 2 / 1.25 = 1.6 on 64-bit architectures,
* however, SHA-256 is often better optimized and hardware implemented.
* - BLAKE2b(512) usually beats both, SHA-256 and SHA-512 on 64-bit machines.
* - It even matches their performance if using hardware accelerated implementations.
*/
public static final String default_hash_algo() { return "BLAKE2b(512)"; }
/**
* Encrypt then sign the source producing a cipherpack stream passed to the CipherpackListener if opt-in and also optionally store into destination_fname.
*
* @param crypto_cfg Used CryptoConfig, consider using CryptoConfig::getDefault()
* @param enc_pub_keys Public keys of the receiver, used to encrypt the symmetric-key for multiple parties.
* @param sign_sec_key_fname Private key of the sender, used to sign the DER-Header-1 incl encrypted symmetric-key for authenticity.
* @param passphrase Passphrase for `sign_sec_key_fname`, may be null or empty for no passphrase.
* @param source The source ByteInStream of the plaintext message.
* @param target_path Optional target path for the message, user application specific.
* @param subject Optional subject of message from sender, user application specific.
* @param plaintext_version Version of this plaintext message, user application specific.
* @param plaintext_version_parent Version of this plaintext message's preceding message, user application specific.
* @param listener CipherpackListener listener used for notifications and optionally
* to send the ciphertext destination bytes via CipherpackListener::contentProcessed()
* @param plaintext_hash_algo Optional hash algorithm for the plaintext message, produced for convenience and not wired. See {@link Cipherpack#default_hash_algo()}.
* Pass an empty string to disable.
* @param destination_fname Optional filename of the plaintext destination file, not used if null or empty (default). If not empty and file already exists, file will be overwritten.
* @return PackHeader, where true == PackHeader::isValid() if successful, otherwise not.
*
* @see @ref cipherpack_overview "Cipherpack Overview"
* @see @ref cipherpack_stream "Cipherpack Data Stream"
* @see checkSignThenDecrypt()
* @see CipherpackListener
* @see ByteInStream_Feed
* @see ByteInStream_URL
* @see ByteInStream
*/
public static PackHeader encryptThenSign(final CryptoConfig crypto_cfg,
final List<String> enc_pub_keys,
final String sign_sec_key_fname, final ByteBuffer passphrase,
final ByteInStream source,
final String target_path, final String subject,
final String plaintext_version,
final String plaintext_version_parent,
final CipherpackListener listener,
final String plaintext_hash_algo,
final String destination_fname) {
return encryptThenSignImpl1(crypto_cfg,
enc_pub_keys,
sign_sec_key_fname, passphrase,
source,
target_path, subject,
plaintext_version,
plaintext_version_parent,
listener,
plaintext_hash_algo,
destination_fname);
}
private static native PackHeader encryptThenSignImpl1(final CryptoConfig crypto_cfg,
final List<String> enc_pub_keys,
final String sign_sec_key_fname,
final ByteBuffer passphrase,
final ByteInStream source,
final String target_path, final String subject,
final String plaintext_version,
final String plaintext_version_parent,
final CipherpackListener listener,
final String plaintext_hash_algo,
final String destination_fname);
/**
* Verify signature then decrypt the source passing to the CipherpackListener if opt-in and also optionally store into destination file.
*
* @param sign_pub_keys Authorized sender public-keys to verify the sender's signature
* and hence the authenticity of the message incl. encrypted symmetric-key and ciphertext message.
* @param dec_sec_key_fname Private key of the receiver, used to decrypt the symmetric-key.
* It shall match one of the keys used to encrypt.
* @param passphrase The passphrase for `dec_sec_key_fname`, may be null or empty for no passphrase.
* @param source The source ByteInStream of the cipherpack containing the encrypted message.
* @param listener The CipherpackListener listener used for notifications and optionally
* to send the plaintext destination bytes via CipherpackListener::contentProcessed()
* @param plaintext_hash_algo Optional hash algorithm for the plaintext message, produced for convenience and not wired. See {@link Cipherpack#default_hash_algo()}.
* Pass an empty string to disable.
* @param destination_fname Optional filename of the plaintext destination file, not used if empty (default). If not empty and file already exists, file will be overwritten.
* @return PackHeader, where true == PackHeader::isValid() if successful, otherwise not.
*
* @see @ref cipherpack_overview "Cipherpack Overview"
* @see @ref cipherpack_stream "Cipherpack Data Stream"
* @see encryptThenSign()
* @see CipherpackListener
* @see ByteInStream_Feed
* @see ByteInStream_URL
* @see ByteInStream
*/
public static PackHeader checkSignThenDecrypt(final List<String> sign_pub_keys,
final String dec_sec_key_fname, final ByteBuffer passphrase,
final ByteInStream source,
final CipherpackListener listener,
final String plaintext_hash_algo,
final String destination_fname) {
return checkSignThenDecrypt1(sign_pub_keys,
dec_sec_key_fname, passphrase,
source,
listener,
plaintext_hash_algo,
destination_fname);
}
private static native PackHeader checkSignThenDecrypt1(final List<String> sign_pub_keys,
final String dec_sec_key_fname, final ByteBuffer passphrase,
final ByteInStream source,
final CipherpackListener listener,
final String plaintext_hash_algo,
final String destination_fname);
/**
* Hash utility functions to produce a hash file compatible to `sha256sum`
* as well as to produce the hash value itself for validation.
*/
public static final class HashUtil {
/** Return a lower-case file suffix used to store a `sha256sum` compatible hash signature w/o dot and w/o dashes. */
public static String fileSuffix(final String algo) {
return algo.toLowerCase().replace("-", "");
}
/**
* Append the hash signature to the text file out_file
*
* The hash signature is composed as follows
* - hash algo name
* - space
* - hash value
* - space
* - `*` to denote binary processing
* - hashed file name
*
* The hash signature is similar to `sha256sum` output, but the added hash algo name upfront.
*
* @param outFileName the text file to append hash signature of hashed_file.
* @param hashedFile the file of the hash signature
* @param hashAlgo the hash algo name used
* @param hashValue the hash value of hashed_file
* @return true if successful, otherwise false
*/
public static boolean appendToFile(final String outFileName, final String hashedFile, final String hashAlgo, final byte[] hashValue) {
final String hash_str = BasicTypes.bytesHexString(hashValue, 0, hashValue.length, true /* lsbFirst */);
final String space = new String(" ");
final String seperator = new String(" *");
final File file = new File( outFileName );
try( BufferedWriter out = new BufferedWriter( new FileWriter(file, true) ); ) {
out.write(hashAlgo);
out.write(space);
out.write(hash_str);
out.write(seperator);
out.write(hashedFile);
out.newLine();
return true;
} catch (final Exception ex) {
PrintUtil.println(System.err, "Write hash to file failed: "+outFileName+": "+ex.getMessage());
ex.printStackTrace();
}
return false;
}
/**
* Return the calculated hash value using given algo name and byte input stream.
* @param algo the hash algo name
* @param source the byte input stream
* @return the calculated hash value or null in case of error
*/
public static byte[] calc(final String algo, final ByteInStream source) {
return calcImpl1(algo, source);
}
private static native byte[] calcImpl1(final String algo, final ByteInStream source);
/**
* Return the calculated hash value using given algo name and the bytes of a single file or all files if denoting a directory.
* @param algo the hash algo name
* @param path_or_uri given path or uri, either a URI denoting a single file, a single file path or directory path for which all files (not symbolic links) are considered
* @param bytes_hashed returns overall bytes hashed
* @param timeoutMS in case `path_or_uri` refers to an URI, timeout is being used as maximum duration in milliseconds to wait for next bytes. Defaults to 20_s.
* @return the calculated hash value or nullptr in case of error
* @see #calc(String, String, long[])
*/
public static byte[] calc(final String algo, final String path_or_uri, final long bytes_hashed[/*1*/], final long timeoutMS) {
return calcImpl2(algo, path_or_uri, bytes_hashed, timeoutMS);
}
/**
* Return the calculated hash value using given algo name and the bytes of a single file or all files if denoting a directory.
*
* This variant uses a 20_s timeout to wait for next bytes.
*
* @param algo the hash algo name
* @param path_or_uri given path or uri, either a URI denoting a single file, a single file path or directory path for which all files (not symbolic links) are considered
* @param bytes_hashed returns overall bytes hashed
* @return the calculated hash value or nullptr in case of error
* @see #calc(String, String, long[], long)
*/
public static byte[] calc(final String algo, final String path_or_uri, final long bytes_hashed[/*1*/]) {
return calcImpl2(algo, path_or_uri, bytes_hashed, 20000);
}
private static native byte[] calcImpl2(final String algo, final String path_or_uri, final long bytes_hashed[/*1*/], final long timeout);
}
}
|