
Added more helper methods (they just never stop, do they?) Moved some stuff around because I want my chaos to be sorted Actually made the server and clients interactive in the way they're supposed to be Added CBC to NetClient to prevent ciphertexts from leaking info to malicious third parties Removed the old (built in) AES implementation in favour of my own Added a static salt to the AES implementation to heavily discrourage rainbowtables
187 lines
7.6 KiB
C#
187 lines
7.6 KiB
C#
using System;
|
|
using System.Collections.Generic;
|
|
using System.IO;
|
|
using System.Linq;
|
|
using System.Numerics;
|
|
using System.Text;
|
|
|
|
namespace Tofvesson.Crypto
|
|
{
|
|
public class RSA
|
|
{
|
|
private static readonly PassthroughPadding NO_PADDING = new PassthroughPadding();
|
|
private static readonly Encoding DEFAULT_ENCODING = Encoding.UTF8;
|
|
|
|
private readonly RandomProvider provider = new CryptoRandomProvider();
|
|
|
|
private readonly BigInteger e;
|
|
private readonly BigInteger n;
|
|
private readonly BigInteger d;
|
|
|
|
public bool CanEncrypt { get; private set; }
|
|
public bool CanDecrypt { get; private set; }
|
|
|
|
public RSA(int byteSize, int margin, int threads, int certainty)
|
|
{
|
|
// Choose primes
|
|
BigInteger p = Support.GeneratePrime(threads, byteSize, margin, certainty, provider);
|
|
BigInteger q = Support.GeneratePrime(threads, byteSize, margin, certainty, provider);
|
|
|
|
|
|
// For optimization
|
|
BigInteger p_1 = p - 1;
|
|
BigInteger q_1 = q - 1;
|
|
|
|
// Calculate needed values
|
|
n = p * q;
|
|
BigInteger lcm = (p_1 * q_1) / Support.GCD(p_1, q_1);
|
|
|
|
// Generate e such that is is less than and coprime to lcm
|
|
do
|
|
{
|
|
e = RandomSupport.GenerateBoundedRandom(lcm, provider);
|
|
} while (e == lcm || Support.GCD(e, lcm) != 1);
|
|
|
|
// Generate the modular multiplicative inverse
|
|
d = Support.Dio(e, lcm).Key + lcm;
|
|
CanEncrypt = true;
|
|
CanDecrypt = true;
|
|
}
|
|
|
|
// Load necessary values from files
|
|
private RSA(string e_file, string n_file, string d_file)
|
|
{
|
|
if (!File.Exists(e_file)) throw new SystemException($"Could not load from file \"{e_file}\"");
|
|
if (!File.Exists(n_file)) throw new SystemException($"Could not load from file \"{n_file}\"");
|
|
if (!File.Exists(d_file)) throw new SystemException($"Could not load from file \"{d_file}\"");
|
|
e = new BigInteger(File.ReadAllBytes(e_file));
|
|
n = new BigInteger(File.ReadAllBytes(n_file));
|
|
d = new BigInteger(File.ReadAllBytes(d_file));
|
|
CanEncrypt = true;
|
|
CanDecrypt = true;
|
|
}
|
|
|
|
// Create a shallow copy of the given object because it's really just wasteful to perform a deep copy
|
|
// unless the person modifying this code is a madman, in which case I highly doubt they'd willfully leave this code alone anyway...
|
|
public RSA(RSA copy)
|
|
{
|
|
e = copy.e;
|
|
n = copy.n;
|
|
d = copy.d;
|
|
CanEncrypt = copy.CanEncrypt;
|
|
CanDecrypt = copy.CanDecrypt;
|
|
}
|
|
|
|
// Create a "remote" instance of the rsa object. This means that we do not know the private exponent
|
|
private RSA(byte[] e, byte[] n)
|
|
{
|
|
this.e = new BigInteger(e);
|
|
this.n = new BigInteger(n);
|
|
this.d = BigInteger.Zero;
|
|
CanEncrypt = true;
|
|
CanDecrypt = false;
|
|
}
|
|
|
|
// Encrypt (duh)
|
|
public byte[] EncryptString(string message) => Encrypt(DEFAULT_ENCODING.GetBytes(message));
|
|
public byte[] EncryptString(string message, Encoding encoding) => Encrypt(encoding.GetBytes(message));
|
|
public byte[] EncryptString(string message, CryptoPadding padding) => Encrypt(DEFAULT_ENCODING.GetBytes(message), padding);
|
|
public byte[] EncryptString(string message, Encoding encoding, CryptoPadding padding) => Encrypt(encoding.GetBytes(message), padding);
|
|
public byte[] Encrypt(byte[] message) => Encrypt(message, NO_PADDING);
|
|
public byte[] Encrypt(byte[] message, CryptoPadding padding)
|
|
{
|
|
// Apply dynamic padding
|
|
message = padding.Pad(message);
|
|
|
|
// Apply fixed padding
|
|
byte[] b1 = new byte[message.Length + 1];
|
|
Array.Copy(message, b1, message.Length);
|
|
b1[message.Length] = 1;
|
|
message = b1;
|
|
|
|
// Represent message as a number
|
|
BigInteger m = new BigInteger(message);
|
|
|
|
// Encrypt message
|
|
BigInteger cryptomessage = Support.ModExp(m, e, n);
|
|
|
|
// Convert encrypted message back to bytes
|
|
return cryptomessage.ToByteArray();
|
|
}
|
|
|
|
// Decrypt (duh)
|
|
public string DecryptString(byte[] message) => new string(DEFAULT_ENCODING.GetChars(Decrypt(message, NO_PADDING)));
|
|
public string DecryptString(byte[] message, Encoding encoding) => new string(encoding.GetChars(Decrypt(message, NO_PADDING)));
|
|
public string DecryptString(byte[] message, Encoding encoding, CryptoPadding padding) => new string(encoding.GetChars(Decrypt(message, padding)));
|
|
public string DecryptString(byte[] message, CryptoPadding padding) => new string(DEFAULT_ENCODING.GetChars(Decrypt(message, padding)));
|
|
public byte[] Decrypt(byte[] message) => Decrypt(message, NO_PADDING);
|
|
public byte[] Decrypt(byte[] message, CryptoPadding padding)
|
|
{
|
|
// Reinterpret encrypted message as a number
|
|
BigInteger cryptomessage = new BigInteger(message);
|
|
|
|
// Reverse encryption
|
|
message = Support.ModExp(cryptomessage, d, n).ToByteArray();
|
|
|
|
// Remove fixed padding
|
|
byte[] b1 = new byte[message.Length - 1];
|
|
Array.Copy(message, b1, message.Length - 1);
|
|
message = b1;
|
|
|
|
// Remove dynamic padding
|
|
message = padding.Unpad(message);
|
|
|
|
return message;
|
|
}
|
|
|
|
// Gives you the public key
|
|
public byte[] GetPubK() => e.ToByteArray();
|
|
|
|
// Save this RSA instance to correspondingly named files
|
|
public void Save(string fileNameBase, bool force = false)
|
|
{
|
|
if (force || !File.Exists(fileNameBase + ".e")) File.WriteAllBytes(fileNameBase + ".e", e.ToByteArray());
|
|
if (force || !File.Exists(fileNameBase + ".n")) File.WriteAllBytes(fileNameBase + ".n", n.ToByteArray());
|
|
if (force || !File.Exists(fileNameBase + ".d")) File.WriteAllBytes(fileNameBase + ".d", d.ToByteArray());
|
|
}
|
|
|
|
// Serialize (for public key distribution)
|
|
public byte[] Serialize() => Support.SerializeBytes(new byte[][] { e.ToByteArray(), n.ToByteArray() });
|
|
|
|
// Deserialize RSA data (for key distribution (but the other end (how many parentheses deep can I go?)))
|
|
public static RSA Deserialize(byte[] function, out int read)
|
|
{
|
|
byte[][] rd = Support.DeserializeBytes(function, 2);
|
|
read = rd[0].Length + rd[1].Length + 8;
|
|
return new RSA(rd[0], rd[1]);
|
|
}
|
|
|
|
// Check if the data we want to convert into an RSA-instance will cause a crash if we try to parse it
|
|
public static bool CanDeserialize(IEnumerable<byte> data)
|
|
{
|
|
try
|
|
{
|
|
int size = Support.ReadInt(data, 0), size2;
|
|
if (size >= data.Count() - 8) return false;
|
|
size2 = Support.ReadInt(data, 4 + size);
|
|
if (size2 > data.Count() - size - 8) return false;
|
|
return true;
|
|
}
|
|
catch (Exception) { }
|
|
return false;
|
|
}
|
|
|
|
// Safely attempt to load RSA keys from files
|
|
public static RSA TryLoad(string fileNameBase) => TryLoad(fileNameBase + ".e", fileNameBase + ".n", fileNameBase + ".d");
|
|
public static RSA TryLoad(string e_file, string n_file, string d_file)
|
|
{
|
|
try
|
|
{
|
|
return new RSA(e_file, n_file, d_file);
|
|
}
|
|
catch (Exception) { }
|
|
return null;
|
|
}
|
|
}
|
|
}
|