| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135 |
- import struct
- from types import ModuleType
- from typing import Union
- from ._mode_kw import W, W_inverse
- class KWPMode(object):
- """Key Wrap with Padding (KWP) mode.
- This is a deterministic Authenticated Encryption (AE) mode
- for protecting cryptographic keys. See `NIST SP800-38F`_.
- It provides both confidentiality and authenticity, and it designed
- so that any bit of the ciphertext depends on all bits of the plaintext.
- This mode is only available for ciphers that operate on 128 bits blocks
- (e.g., AES).
- .. _`NIST SP800-38F`: http://csrc.nist.gov/publications/nistpubs/800-38F/SP-800-38F.pdf
- :undocumented: __init__
- """
- def __init__(self,
- factory: ModuleType,
- key: Union[bytes, bytearray]):
- self.block_size = factory.block_size
- if self.block_size != 16:
- raise ValueError("Key Wrap with Padding mode is only available for ciphers"
- " that operate on 128 bits blocks")
- self._factory = factory
- self._cipher = factory.new(key, factory.MODE_ECB)
- self._done = False
- def seal(self, plaintext: Union[bytes, bytearray]) -> bytes:
- """Encrypt and authenticate (wrap) a cryptographic key.
- Args:
- plaintext:
- The cryptographic key to wrap.
- Returns:
- The wrapped key.
- """
- if self._done:
- raise ValueError("The cipher cannot be used more than once")
- if len(plaintext) == 0:
- raise ValueError("The plaintext must be at least 1 byte")
- if len(plaintext) >= 2 ** 32:
- raise ValueError("The plaintext is too long")
- padlen = (8 - len(plaintext)) % 8
- padded = plaintext + b'\x00' * padlen
- AIV = b'\xA6\x59\x59\xA6' + struct.pack('>I', len(plaintext))
- if len(padded) == 8:
- res = self._cipher.encrypt(AIV + padded)
- else:
- res = W(self._cipher, AIV + padded)
- return res
- def unseal(self, ciphertext: Union[bytes, bytearray]) -> bytes:
- """Decrypt and authenticate (unwrap) a cryptographic key.
- Args:
- ciphertext:
- The cryptographic key to unwrap.
- It must be at least 16 bytes long, and its length
- must be a multiple of 8.
- Returns:
- The original key.
- Raises: ValueError
- If the ciphertext or the key are not valid.
- """
- if self._done:
- raise ValueError("The cipher cannot be used more than once")
- if len(ciphertext) % 8:
- raise ValueError("The ciphertext must have length multiple of 8 bytes")
- if len(ciphertext) < 16:
- raise ValueError("The ciphertext must be at least 24 bytes long")
- if len(ciphertext) == 16:
- S = self._cipher.decrypt(ciphertext)
- else:
- S = W_inverse(self._cipher, ciphertext)
- if S[:4] != b'\xA6\x59\x59\xA6':
- raise ValueError("Incorrect decryption")
- Plen = struct.unpack('>I', S[4:8])[0]
- padlen = len(S) - 8 - Plen
- if padlen < 0 or padlen > 7:
- raise ValueError("Incorrect decryption")
- if S[len(S) - padlen:] != b'\x00' * padlen:
- raise ValueError("Incorrect decryption")
- return S[8:len(S) - padlen]
- def _create_kwp_cipher(factory: ModuleType,
- **kwargs: Union[bytes, bytearray]) -> KWPMode:
- """Create a new block cipher in Key Wrap with Padding mode.
- Args:
- factory:
- A block cipher module, taken from `Crypto.Cipher`.
- The cipher must have block length of 16 bytes, such as AES.
- Keywords:
- key:
- The secret key to use to seal or unseal.
- """
- try:
- key = kwargs["key"]
- except KeyError as e:
- raise TypeError("Missing parameter:" + str(e))
- return KWPMode(factory, key)
|