PBKDF2 with bouncycastle in Java

后端 未结 3 1016
清酒与你
清酒与你 2020-12-04 10:56

I\'m trying to securely store a password in a database and for that I chose to store its hash generated using the PBKDF2 function. I want to do this using the bouncy castle

相关标签:
3条回答
  • 2020-12-04 11:30

    PBKDF2WithHmacSHA1 is already supported in BouncyCastle 1.60

    https://www.bouncycastle.org/specifications.html Password Hashing and PBE

    Test passed with OpenJDK Runtime Environment 18.9 (build 11.0.1+13):

        Security.addProvider(new BouncyCastleProvider());
    
        String password = "xrS7AJk+V6L8J?B%";
        SecureRandom rnd = new SecureRandom();
        int saltLength = 16;
        int keyLength = 128;
        int iterationCount = 10000;
    
        byte[] salt = new byte[saltLength];
        rnd.nextBytes(salt);
    
    //SunJCE
        SecretKeyFactory factorySun = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1", "SunJCE");
        KeySpec keyspecSun = new PBEKeySpec(password.toCharArray(), salt, iterationCount, keyLength);
        SecretKey keySun = factorySun.generateSecret(keyspecSun);
        System.out.println(keySun.getClass().getName());
        System.out.println(Hex.toHexString(keySun.getEncoded()));
    
    //BouncyCastle  
        SecretKeyFactory factoryBC = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1", "BC");
        KeySpec keyspecBC = new PBEKeySpec(password.toCharArray(), salt, iterationCount, keyLength);
        SecretKey keyBC = factoryBC.generateSecret(keyspecBC);
        System.out.println(keyBC.getClass().getName());
        System.out.println(Hex.toHexString(keyBC.getEncoded()));
    
        Assert.assertArrayEquals(keySun.getEncoded(), keyBC.getEncoded());
    

    The output is:

    com.sun.crypto.provider.PBKDF2KeyImpl
    e9b01389fa91a6172ed6e95e1e1a2611
    org.bouncycastle.jcajce.provider.symmetric.util.BCPBEKey
    e9b01389fa91a6172ed6e95e1e1a2611
    
    0 讨论(0)
  • 2020-12-04 11:45

    In short, the reason for the difference is that PBKDF2 algorithm in modes #1 and #2 uses PKCS #5 v2 scheme 2 (PKCS5S2) for iterative key generation, but the BouncyCastle provider for "PBEWITHHMACSHA1" in mode #3 uses the PKCS #12 v1 (PKCS12) algorithm instead. These are completely different key-generation algorithms, so you get different results.

    More detail on why this is so and why you get different sized results is explained below.

    First, when you're constructing a JCE KeySpec, the keyLength parameter only expresses "a preference" to the provider what key size you want. From the API docs:

    Note: this is used to indicate the preference on key length for variable-key-size ciphers. The actual key size depends on each provider's implementation.

    The Bouncy Castle providers don't appear to respect this parameter, judging from the source of JCEPBEKey, so you should expect to get a 160-bit key back from any BC provider which uses SHA-1 when using the JCE API.

    You can confirm this by programmatically accessing the getKeySize() method on the returned keybc variable in your test code:

    Key keybc = factorybc.generateSecret(keyspecbc);
    // ...
    Method getKeySize = JCEPBEKey.class.getDeclaredMethod("getKeySize");
    getKeySize.setAccessible(true);
    System.out.println(getKeySize.invoke(keybc)); // prints '160'
    

    Now, to understand what the "PBEWITHHMACSHA1" provider corresponds to, you can find the following in the source for BouncyCastleProvider:

    put("SecretKeyFactory.PBEWITHHMACSHA1", 
        "org.bouncycastle.jce.provider.JCESecretKeyFactory$PBEWithSHA");
    

    And the implementation of JCESecretKeyFactory.PBEWithSHA looks like this:

    public static class PBEWithSHA
        extends PBEKeyFactory
    {
        public PBEWithSHA()
        {
            super("PBEwithHmacSHA", null, false, PKCS12, SHA1, 160, 0);
        }
    }
    

    You can see above that this key factory uses the PKCS #12 v1 (PKCS12) algorithm for iterative key generation. But the PBKDF2 algorithm that you want to use for password hashing uses PKCS #5 v2 scheme 2 (PKCS5S2) instead. This is why you're getting different results.

    I had a quick look through the JCE providers registered in BouncyCastleProvider, but couldn't see any key generation algorithms that used PKCS5S2 at all, let alone one which also uses it with HMAC-SHA-1.

    So I guess you're stuck with either using the Sun implementation (mode #1 above) and losing portability on other JVMs, or using the Bouncy Castle classes directly (mode #2 above) and requiring the BC library at runtime.

    Either way, you should probably switch to 160-bit keys, so you aren't truncating the generated SHA-1 hash unnecessarily.

    0 讨论(0)
  • 2020-12-04 11:47

    I found a BC Crypto-Only method (actually from the cms package of BC) which works to produce a UTF-8 based password encoding. This way I can generate KDF output which is compatible to

    http://packages.python.org/passlib/lib/passlib.hash.cta_pbkdf2_sha1.html#passlib.hash.cta_pbkdf2_sha1

    private byte[] calculatePasswordDigest(char[] pass, byte[] salt, int iterations)
        throws PasswordProtectionException
    {
        try
        {
            /* JCE Version (does not work as BC uses PKCS12 encoding)
            SecretKeyFactory kf = SecretKeyFactory.getInstance("PBEWITHHMACSHA1","BC");
            PBEKeySpec ks = new PBEKeySpec(pass, salt, iterations,160);
            SecretKey digest = kf.generateSecret(ks);
            return digest.getEncoded();
            */
            PKCS5S2ParametersGenerator gen = new PKCS5S2ParametersGenerator();
            gen.init(PBEParametersGenerator.PKCS5PasswordToUTF8Bytes(pass), salt, iterations);
            byte[] derivedKey = ((KeyParameter)gen.generateDerivedParameters(160)).getKey();
            return derivedKey;
        }
        catch(Exception e)
        {
            LOG.error("Failed to strengthen the password with PBKDF2.",e);
            throw new PasswordProtectionException();
        }
    }
    
    0 讨论(0)
提交回复
热议问题