问题
I have some AES/GCM encrypted data and wanted to decrypt it. I want to decrypt it bypassing authentication as the data does not contain authentication information(Data is encrypted by a third party application). I tried decryption with javax.crypto package and it is always throwing tag mismatch error. Is there any way to bypass this tag checking and decrypt data. Data is encrypted with AES128 and it is using 12 byte initialization vector.
Edit: I got a temporary solution for this issue. Not sure if this is correct method.
Key key = new SecretKeySpec(hlsKey, "AES");
GCMParameterSpec gCMParameterSpec = new GCMParameterSpec(96, initialisationVector);
final Cipher c = Cipher.getInstance("AES/GCM/NoPadding", "BC");
c.init(Cipher.DECRYPT_MODE, key, gCMParameterSpec);
byte[] nodata = new byte[len * 2];
System.arraycopy(cipherText, 0, nodata, 0, len);
byte[] plaindata = new byte[len * 2];
try {
int decrypted_index = 0;
while (decrypted_index < len) {
int cp = c.update(nodata, decrypted_index, nodata.length - decrypted_index, plaindata, decrypted_index);//doFinal(nodata);
decrypted_index += cp;
}
if(decrypted_index>=len){
System.arraycopy(plaindata, 0, plainText, 0, len);
retvalue=1;
}
} catch (Exception e) {
e.printStackTrace();
}
回答1:
Yes, it is possible to decrypt the message without the authentication tag: if you read the GCM specification you can see that the IV for CTR is simply the IV, appended with four bytes 00000002
(i.e. a counter starting at zero, increased by one for calculating the authentication tag and again for the starting value of the counter for encryption).
So here's the code, where I do the inc
twice as I used it to validate my counter code; it is of course possible to simply set the last byte to value 0x02
as well.
package nl.owlstead.so;
import java.nio.charset.StandardCharsets;
import javax.crypto.Cipher;
import javax.crypto.SecretKey;
import javax.crypto.spec.GCMParameterSpec;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
import org.bouncycastle.util.Arrays;
public class DecryptGCMWithoutVerification {
private static final int TAG_SIZE = 128;
public DecryptGCMWithoutVerification() {
// TODO Auto-generated constructor stub
}
public static void main(String[] args) throws Exception {
// --- encryption using GCM
Cipher gcm = Cipher.getInstance("AES/GCM/NoPadding");
SecretKey key = new SecretKeySpec(new byte[16], "AES");
byte[] ivBytes = new byte[12];
GCMParameterSpec iv = new GCMParameterSpec(TAG_SIZE, ivBytes);
gcm.init(Cipher.ENCRYPT_MODE, key, iv);
byte[] ct = gcm.doFinal("owlstead".getBytes(StandardCharsets.US_ASCII));
// --- decryption using underlying CTR mode
Cipher ctr = Cipher.getInstance("AES/CTR/NoPadding");
// WARNING: this is only correct for a 12 byte IV in GCM mode
byte[] counter = Arrays.concatenate(ivBytes, new byte[4]);
inc(counter);
inc(counter);
IvParameterSpec ctrIV = new IvParameterSpec(counter);
ctr.init(Cipher.DECRYPT_MODE, key, ctrIV);
byte[] pt = ctr.doFinal(ct, 0, ct.length - TAG_SIZE / Byte.SIZE);
System.out.println(new String(pt, StandardCharsets.US_ASCII));
}
private static final byte inc(byte[] counter) {
for (int i = counter.length - 1; i >= 0; i--) {
if (++counter[i] != 0) {
return 0;
}
}
return 1;
}
}
EDIT: this code is for an invalid tag or a tag that cannot be recalculated (the AAD could be missing, for instance). Remove - TAG_SIZE / Byte.SIZE
from doFinal
if the tag is missing entirely.
来源:https://stackoverflow.com/questions/49228671/aes-gcm-decryption-bypassing-authentication-in-java