使用CCM操作模式和AES算法时,在Libgcrypt中加密/解密简单的16字节消息时遇到问题。在Libgcrypt的文档中,我找不到要为CCM设置的参数(我应该设置IV还是计数器?)。

我坚持下面的代码:

gcry_error_t     err;
gcry_cipher_hd_t hd;

char * key = "1234567890123456";
char * plainText = "VNiJkPzAWPFm1234";
size_t messageSize = strlen(plainText);
char * cipherText = malloc(messageSize);
char * recoveredText = malloc(messageSize);

err = gcry_cipher_open(
    &hd,
    GCRY_CIPHER_AES128,
    GCRY_CIPHER_MODE_CCM,
    0);

err = gcry_cipher_setkey(hd, key, 16);

/* What to do here? */

err = gcry_cipher_encrypt(
    hd,
    cipherText,
    messageSize,
    plainText,
    messageSize);

err = gcry_cipher_decrypt(
    hd,
    recoveredText,
    messageSize,
    cipherText,
    messageSize);


如何在Libgcrypt中使用AES128和CCM执行简单的加密/解密?

最佳答案



该示例没有其他未加密的数据,因此设置GCRYCTL_SET_CCM_LENGTHS的gcry_cipher_ctl的param [1]为0。但是,如果需要,可以很容易地对其进行调整。

功能分为三个部分:


准备(设置密钥,随机数(IV)和CCM长度)
加密功能
解密功能


如果运行它,它将向控制台输出以下文本:

decrypted result: 'VNiJkPzAWPFm1234'




#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <gcrypt.h>

void error(const char *what, gcry_error_t err) {
    fprintf(stderr, "%s failed: %s\n", what, gcry_strerror(err));
    exit(1);
}

typedef struct {
    const void *key;
    const void *nonce;
    size_t messageSize;
    int authTagLength;
} Config;

void prepare(Config config, gcry_cipher_hd_t *hd) {
    gcry_error_t err = gcry_cipher_open(hd, GCRY_CIPHER_AES128, GCRY_CIPHER_MODE_CCM, 0);
    if (err) { error("gcry_cipher_open", err); }

    err = gcry_cipher_setkey(*hd, config.key, strlen(config.key));
    if (err) { error("gcry_cipher_setkey", err); }

    err = gcry_cipher_setiv(*hd, config.nonce, strlen(config.nonce));
    if (err) { error("gcry_cipher_setiv", err); }

    uint64_t params[3];
    params[0] = config.messageSize;
    params[1] = 0;
    params[2] = config.authTagLength;
    err = gcry_cipher_ctl(*hd, GCRYCTL_SET_CCM_LENGTHS, params, sizeof(params));
    if (err) { error("gcry_cipher_ctl", err); }
}

void *encrypt(Config config, const void *plainText, void **tag) {
    gcry_cipher_hd_t hdEncrypt;
    prepare(config, &hdEncrypt);

    void *cipherText = malloc(config.messageSize);
    gcry_error_t err = gcry_cipher_encrypt(hdEncrypt, cipherText, config.messageSize, plainText, config.messageSize);
    if (err) { error("gcry_cipher_encrypt", err); }

    *tag = malloc(config.authTagLength);
    err = gcry_cipher_gettag(hdEncrypt, *tag, config.authTagLength);
    if (err) { error("gcry_cipher_encrypt", err); }

    gcry_cipher_close(hdEncrypt);

    return cipherText;
}

void *decrypt(Config config, void *cipherText, void *tag) {
    gcry_cipher_hd_t hdDecrypt;
    prepare(config, &hdDecrypt);

    void *recoveredText = malloc(config.messageSize);
    gcry_error_t err = gcry_cipher_decrypt(hdDecrypt, recoveredText, config.messageSize, cipherText, config.messageSize);
    if (err) { error("gcry_cipher_decrypt", err); }

    err = gcry_cipher_checktag(hdDecrypt, tag, config.authTagLength);
    if (gpg_err_code (err) == GPG_ERR_CHECKSUM) {
        error("Authentication", err);
    }

    gcry_cipher_close(hdDecrypt);
    return recoveredText;
}

int main() {
    const char *plainText = "VNiJkPzAWPFm1234";

    Config config;
    config.key = "1234567890123456";
    config.nonce = "0123456789012";
    config.messageSize = strlen(plainText) + 1;
    config.authTagLength = 10;

    void *tag;
    void *cipherText = encrypt(config, plainText, &tag);

    char *recoveredText = decrypt(config, cipherText, tag);
    printf("decrypted result: '%s'\n", recoveredText);

    free(tag);
    free(cipherText);
    free(recoveredText);

    return 0;
}

07-24 09:23