安卓系统中的AES密钥生成[英] AES key generation in Android

本文是小编为大家收集整理的关于安卓系统中的AES密钥生成的处理/解决方法,可以参考本文帮助大家快速定位并解决问题,中文翻译不准确的可切换到English标签页查看源文。

问题描述

目前,我正在努力生成用于AES加密/解密的密钥.钥匙基于每个用户的密码和随机盐.我的第一个想法是用算法" PBKDF2WITHHMACSHA1"制作了SecretKeyFactory.问题是Android当前不支持它.

进行一些搜索,我发现Erickson的答案建议使用该算法出于相同的目的使用该算法(

推荐答案

顾名思义," pbewithsha256and256bitaes-cbc-bc"将使用SHA256作为HMAC,而不是使用SHA1.因为这是另一种算法,所以它将为所选密码生成不同的密钥.

如果您仅在Android上解密,则可以.

其他推荐答案

尝试以下方法:

public static String encrypt(String seed, String cleartext) throws Exception {
               byte[] rawKey = getRawKey(seed.getBytes("UTF-16"));
               byte[] result = encrypt(rawKey, cleartext.getBytes("UTF-16"));
               return toHex(result);
       }
       
       public static String decrypt(String seed, String encrypted) throws Exception {
               byte[] rawKey = getRawKey(seed.getBytes("UTF-16"));
               byte[] enc = toByte(encrypted);
               byte[] result = decrypt(rawKey, enc);
               return new String(result);
              }

       private static byte[] getRawKey(byte[] seed) throws Exception {
               KeyGenerator kgen = KeyGenerator.getInstance("AES");
               SecureRandom sr = SecureRandom.getInstance("SHA1PRNG");
               sr.setSeed(seed);
           kgen.init(128, sr); // 192 and 256 bits may not be available
           SecretKey skey = kgen.generateKey();
           byte[] raw = skey.getEncoded();
           return raw;
       }

       
       private static byte[] encrypt(byte[] raw, byte[] clear) throws Exception {
           SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");
               Cipher cipher = Cipher.getInstance("AES");
           cipher.init(Cipher.ENCRYPT_MODE, skeySpec);
           byte[] encrypted = cipher.doFinal(clear);
               return encrypted;
       }

       private static byte[] decrypt(byte[] raw, byte[] encrypted) throws Exception {
           SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");
               Cipher cipher = Cipher.getInstance("AES");
           cipher.init(Cipher.DECRYPT_MODE, skeySpec);
           byte[] decrypted = cipher.doFinal(encrypted);
               return decrypted;
       }

       public static String toHex(String txt) {
               return toHex(txt.getBytes());
       }
       public static String fromHex(String hex) {
               return new String(toByte(hex));
       }
       
       public static byte[] toByte(String hexString) {
               int len = hexString.length()/2;
               byte[] result = new byte[len];
               for (int i = 0; i < len; i++)
                       result[i] = Integer.valueOf(hexString.substring(2*i, 2*i+2), 16).byteValue();
               return result;
       }

       public static String toHex(byte[] buf) {
               if (buf == null)
                       return "";
               StringBuffer result = new StringBuffer(2*buf.length);
               for (int i = 0; i < buf.length; i++) {
                       appendHex(result, buf[i]);
               }
               return result.toString();
       }
       private final static String HEX = "0123456789ABCDEF";
       private static void appendHex(StringBuffer sb, byte b) {
               sb.append(HEX.charAt((b>>4)&0x0f)).append(HEX.charAt(b&0x0f));
       }
       

本文地址:https://www.itbaoku.cn/post/102722.html

问题描述

Currently I am working in generating a key for AES encryption/decryption. The key is based on a password an a random salt per user. My first idea was to made a SecretKeyFactory with the algorithm "PBKDF2WithHmacSHA1". The problem is that Android currently does not support it.

Doing some search I found the answer from erickson recommended the use of that algorithm for the same purpose (AES 256 bit encryption). My question is how diffent would be the encryption process if I use "PBEWITHSHA256AND256BITAES-CBC-BC" instead of having "PBKDF2WithHmacSHA1"? There are any other idea of how to generate a key for AES in android in a secure way and not not just hashing the password with the salt fro the key (I don't think that approach to follow).

推荐答案

As the name says, "PBEWITHSHA256AND256BITAES-CBC-BC" will use SHA256 as HMAC, instead if using SHA1. Because this is a different algorithm, it will generate a different Key for the chosen password.

If you en/decrypt only on android, this should be fine.

其他推荐答案

Try this:

public static String encrypt(String seed, String cleartext) throws Exception {
               byte[] rawKey = getRawKey(seed.getBytes("UTF-16"));
               byte[] result = encrypt(rawKey, cleartext.getBytes("UTF-16"));
               return toHex(result);
       }
       
       public static String decrypt(String seed, String encrypted) throws Exception {
               byte[] rawKey = getRawKey(seed.getBytes("UTF-16"));
               byte[] enc = toByte(encrypted);
               byte[] result = decrypt(rawKey, enc);
               return new String(result);
              }

       private static byte[] getRawKey(byte[] seed) throws Exception {
               KeyGenerator kgen = KeyGenerator.getInstance("AES");
               SecureRandom sr = SecureRandom.getInstance("SHA1PRNG");
               sr.setSeed(seed);
           kgen.init(128, sr); // 192 and 256 bits may not be available
           SecretKey skey = kgen.generateKey();
           byte[] raw = skey.getEncoded();
           return raw;
       }

       
       private static byte[] encrypt(byte[] raw, byte[] clear) throws Exception {
           SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");
               Cipher cipher = Cipher.getInstance("AES");
           cipher.init(Cipher.ENCRYPT_MODE, skeySpec);
           byte[] encrypted = cipher.doFinal(clear);
               return encrypted;
       }

       private static byte[] decrypt(byte[] raw, byte[] encrypted) throws Exception {
           SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");
               Cipher cipher = Cipher.getInstance("AES");
           cipher.init(Cipher.DECRYPT_MODE, skeySpec);
           byte[] decrypted = cipher.doFinal(encrypted);
               return decrypted;
       }

       public static String toHex(String txt) {
               return toHex(txt.getBytes());
       }
       public static String fromHex(String hex) {
               return new String(toByte(hex));
       }
       
       public static byte[] toByte(String hexString) {
               int len = hexString.length()/2;
               byte[] result = new byte[len];
               for (int i = 0; i < len; i++)
                       result[i] = Integer.valueOf(hexString.substring(2*i, 2*i+2), 16).byteValue();
               return result;
       }

       public static String toHex(byte[] buf) {
               if (buf == null)
                       return "";
               StringBuffer result = new StringBuffer(2*buf.length);
               for (int i = 0; i < buf.length; i++) {
                       appendHex(result, buf[i]);
               }
               return result.toString();
       }
       private final static String HEX = "0123456789ABCDEF";
       private static void appendHex(StringBuffer sb, byte b) {
               sb.append(HEX.charAt((b>>4)&0x0f)).append(HEX.charAt(b&0x0f));
       }