2017-02-02 21 views
-1

我在做c#的AES Decryption,解密後的數據在解密後的最後幾個字符處顯示一些垃圾數據。在Android上使用的iOS上的AES解密不起作用FBEncryptior Library

我使用下面的代碼進行解密

+ (NSData*)decryptData:(NSData*)data key:(NSData*)key iv:(NSData*)iv; 
{ 
    NSData* result = nil; 

// setup key 
unsigned char cKey[FBENCRYPT_KEY_SIZE]; 
bzero(cKey, sizeof(cKey)); 
[key getBytes:cKey length:FBENCRYPT_KEY_SIZE]; 

// setup iv 
char cIv[FBENCRYPT_BLOCK_SIZE]; 
bzero(cIv, FBENCRYPT_BLOCK_SIZE); 
NSLog(@"CIV2 : %s",cIv); 

if (iv) { 
    [iv getBytes:cIv length:FBENCRYPT_BLOCK_SIZE]; 
} 

// setup output buffer 
size_t bufferSize = [data length] + FBENCRYPT_BLOCK_SIZE; 
void *buffer = malloc(bufferSize); 

// do decrypt 
size_t decryptedSize = 0; 
CCCryptorStatus cryptStatus = CCCrypt(kCCDecrypt, 
             FBENCRYPT_ALGORITHM, //kCCAlgorithmAES128 
             kCCOptionPKCS7Padding, 
             cKey,     //16 
             FBENCRYPT_KEY_SIZE, //16 
             cKey, 
             [data bytes], 
             [data length], 
             buffer, 
             bufferSize, 
             &decryptedSize); 

if (cryptStatus == kCCSuccess) { 

    result = [NSData dataWithBytesNoCopy:buffer length:decryptedSize]; 
} else { 
    free(buffer); 
    NSLog(@"[ERROR] failed to decrypt| CCCryptoStatus: %d", cryptStatus); 
} 

return result; 

}

,如果你在結果中看到調試將持續顯示一些字符吃垃圾,但解密完整的內容。

NSData* data = [self decryptData:encryptedData 
          key:[keyString dataUsingEncoding:NSUTF8StringEncoding] 
           iv:nil]; 

if (data) { 
    return [[NSString alloc] initWithData:data 
            encoding:NSUTF8StringEncoding]; 

}

的數據被返回零值。

C#代碼如下。

public RijndaelManaged GetRijndaelManaged(String secretKey) 
{ 
    var keyBytes = new byte[16]; 
    var secretKeyBytes = Encoding.UTF8.GetBytes(secretKey); 
    Array.Copy(secretKeyBytes, keyBytes, Math.Min(keyBytes.Length, secretKeyBytes.Length)); 
    return new RijndaelManaged 
    { 
     Mode = CipherMode.CBC, 
     Padding = PaddingMode.PKCS7, 
     KeySize = 128, 
     BlockSize = 128, 
     Key = keyBytes, 
     IV = keyBytes 
    }; 
} 

public byte[] Encrypt(byte[] plainBytes, RijndaelManaged rijndaelManaged) 
{ 
    return rijndaelManaged.CreateEncryptor() 
     .TransformFinalBlock(plainBytes, 0, plainBytes.Length); 
} 

public byte[] Decrypt(byte[] encryptedData, RijndaelManaged rijndaelManaged) 
{ 
    return rijndaelManaged.CreateDecryptor() 
     .TransformFinalBlock(encryptedData, 0, encryptedData.Length); 
} 

/// <summary> 
/// Encrypts plaintext using AES 128bit key and a Chain Block Cipher and returns a base64 encoded string 
/// </summary> 
/// <param name="plainText">Plain text to encrypt</param> 
/// <param name="key">Secret key</param> 
/// <returns>Base64 encoded string</returns> 
public String Encrypt(String plainText, String key) 
{ 
    var plainBytes = Encoding.UTF8.GetBytes(plainText); 
    return Convert.ToBase64String(Encrypt(plainBytes, GetRijndaelManaged(key))); 
} 

/// <summary> 
/// Decrypts a base64 encoded string using the given key (AES 128bit key and a Chain Block Cipher) 
/// </summary> 
/// <param name="encryptedText">Base64 Encoded String</param> 
/// <param name="key">Secret Key</param> 
/// <returns>Decrypted String</returns> 
public String Decrypt(String encryptedText, String key) 
{ 
    var encryptedBytes = Convert.FromBase64String(encryptedText); 
    return Encoding.UTF8.GetString(Decrypt(encryptedBytes, GetRijndaelManaged(key))); 
} 

接收到的數據從C#: 0Nwr30kSkJxGCYiFg8TUrfW51587SUkS8lQ7Uno7gglxjVGW5gR4MA + isTknjXzK

Key uses for encryption : e64f9fa01f0418 
從iOS的

解密的數據:{ 「Successeed」: 「abcdefghijklmnopqrstuvwx ...``〜

預期解密數據:{「Successeed」 : 「ABCDEFGHIJKLMNOPQRSTUVWXYZ」}

+1

這是可怕的不安全。關鍵是IV不是祕密。既然你使用密鑰也作爲IV,那麼就沒有實際的安全性。 –

+0

哦謝謝,然後請建議我應該改變什麼代碼。 – SM18

+0

創建一個隨機IV,並將加密數據加上前綴以用於解密,但不需要保密。 – zaph

回答

1

包含十六進制227d的加密的數據。

數據十六進制表示:
7b22537563636565646564223a226162636465666768696a6b6c6d6e6f707172737475767778797a 227d

字符串表示:
{"Succeeded":"abcdefghijklmnopqrstuvwxyz"}

注:
最好是使用全長度密鑰,對於AES 16,24或32個字節,你的密鑰是14個字節,一些未定義的方法將用於擴展它。此外,IV必須是鎖定大小,AES爲16字節。你只是幸運的是,實現之間的填充似乎是相同的(0x00),不要依靠運氣。

測試代碼:

// Explicit null pad the key and IV to correct lengths 
NSData *ivData = [@"e64f9fa01f0418\x00\x00" dataUsingEncoding:NSUTF8StringEncoding]; 
NSData *keyData = [@"e64f9fa01f0418\x00\x00" dataUsingEncoding:NSUTF8StringEncoding]; 
NSString *base64EncryptedString = @"0Nwr30kSkJxGCYiFg8TUrfW51587SUkS8lQ7Uno7gglxjVGW5gR4MA+isTknjXzK"; 
NSData *encryptedData = [[NSData alloc] initWithBase64EncodedString:base64EncryptedString options:0]; 

NSMutableData *plainData = [NSMutableData dataWithLength: encryptedData.length]; 
size_t movedBytes = 0; 

CCCryptorStatus ccStatus; 
ccStatus = CCCrypt(kCCDecrypt, 
        kCCAlgorithmAES128, 
        kCCOptionPKCS7Padding, 
        keyData.bytes, kCCKeySizeAES128, 
        ivData.bytes, 
        encryptedData.bytes, encryptedData.length, 
        plainData.mutableBytes, plainData.length, 
        &movedBytes); 

plainData.length = movedBytes; 
NSLog(@"Data: %@",plainData); 
NSString *decryptedString = [[NSString alloc] initWithData:plainData encoding:NSUTF8StringEncoding]; 
NSLog(@"String: %@",decryptedString); 
+0

現在用你的代碼在解密數據的開始處取得〜ì¿ï‰‰ŸwÒ... e,這個字符串。 – SM18

+0

複製並粘貼代碼的起點。 「在解密數據獲取的開始」是什麼意思? – zaph

+0

謝謝Zaph謝謝你的幫助。 – SM18