![]() |
Source Code |
Forgetting that PGP tools are poorly adopted for even their most prevalent uses cases like simple E-mail communications: they're even less prevalent in the simple messaging systems that users often find themselves interacting with in web-based messaging applications.
I would argue that even if a software architect would like to have these solutions implemented, there exists a real lack of developer APIs to streamline implementing these processes.
One of the first things that strikes me when I
When is the last time, in 2014, you as a developer implemented your solution to read and write your users messages to a FLAT-FILE SYSTEM ON DISK?!
The answer is: YOU DON'T. Your solutions pass messages through in-memory strings, that are saved in a database or e-mailed or streamed to your users browsers!
In this simple example, I'm using a few methods to read-in a set of PGP-keys I've generated (Yes -they're stored on disk*) and 1. Generate a PGP Signature of my string, using my private-key, and 2. Encrypt my message with my public-key. Without reading or writing the message from DISK!
I'm using Java's Bouncy Castle library. The "Documentation" is pretty dense. So I ended up looking for an example that fits this use case.
First, in Java, it's important to add BC as a "Security Provider".
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// add Bouncy JCE Provider, http://bouncycastle.org/latest_releases.html | |
Security.addProvider(new org.bouncycastle.jce.provider.BouncyCastleProvider()); |
Next we need to to actually load our PGP-Key files. Which is easier said than done. The API's in bouncing castle and most other libraries behave in a key-chain manner, where we can load a file that contains multiple keys.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
public static PGPPublicKey readPublicKey(InputStream input) throws IOException, PGPException { | |
PGPPublicKeyRingCollection pgpPub = new PGPPublicKeyRingCollection( | |
PGPUtil.getDecoderStream(input)); | |
Iterator keyRingIter = pgpPub.getKeyRings(); | |
while (keyRingIter.hasNext()) { | |
PGPPublicKeyRing keyRing = (PGPPublicKeyRing) keyRingIter.next(); | |
Iterator keyIter = keyRing.getPublicKeys(); | |
while (keyIter.hasNext()) { | |
PGPPublicKey key = (PGPPublicKey) keyIter.next(); | |
if (key.isEncryptionKey()) { | |
return key; | |
} | |
} | |
} | |
throw new IllegalArgumentException( | |
"Can't find encryption key in key ring."); | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
public static PGPSecretKey readSecretKey(InputStream input) throws IOException, PGPException { | |
PGPSecretKeyRingCollection pgpSec = new PGPSecretKeyRingCollection( | |
PGPUtil.getDecoderStream(input)); | |
Iterator keyRingIter = pgpSec.getKeyRings(); | |
while (keyRingIter.hasNext()) { | |
PGPSecretKeyRing keyRing = (PGPSecretKeyRing) keyRingIter.next(); | |
Iterator keyIter = keyRing.getSecretKeys(); | |
while (keyIter.hasNext()) { | |
PGPSecretKey key = (PGPSecretKey) keyIter.next(); | |
if (key.isSigningKey()) { | |
return key; | |
} | |
} | |
} | |
throw new IllegalArgumentException( | |
"Can't find signing key in key ring."); | |
} |
So we need to unlock it. This is the first place I got an exception before I updated my JRE (See above)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
string pass = "hongkong"; | |
PGPPrivateKey pgpPrivKey = pgpSec | |
.extractPrivateKey(new JcePBESecretKeyDecryptorBuilder() | |
.setProvider("BC").build(pass.toCharArray())); |
First with our private key, we want to sign our message:
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
private static String signMessageByteArray(String message, | |
PGPSecretKey pgpSec, char pass[]) throws IOException, | |
NoSuchAlgorithmException, NoSuchProviderException, PGPException, | |
SignatureException { | |
byte[] messageCharArray = message.getBytes(); | |
ByteArrayOutputStream encOut = new ByteArrayOutputStream(); | |
OutputStream out = encOut; | |
out = new ArmoredOutputStream(out); | |
// Unlock the private key using the password | |
PGPPrivateKey pgpPrivKey = pgpSec | |
.extractPrivateKey(new JcePBESecretKeyDecryptorBuilder() | |
.setProvider("BC").build(pass)); | |
// Signature generator, we can generate the public key from the private key! Nifty! | |
PGPSignatureGenerator sGen = new PGPSignatureGenerator( | |
new JcaPGPContentSignerBuilder(pgpSec.getPublicKey() | |
.getAlgorithm(), PGPUtil.SHA1).setProvider("BC")); | |
sGen.init(PGPSignature.BINARY_DOCUMENT, pgpPrivKey); | |
Iterator it = pgpSec.getPublicKey().getUserIDs(); | |
if (it.hasNext()) { | |
PGPSignatureSubpacketGenerator spGen = new PGPSignatureSubpacketGenerator(); | |
spGen.setSignerUserID(false, (String) it.next()); | |
sGen.setHashedSubpackets(spGen.generate()); | |
} | |
PGPCompressedDataGenerator comData = new PGPCompressedDataGenerator( | |
PGPCompressedData.ZLIB); | |
BCPGOutputStream bOut = new BCPGOutputStream(comData.open(out)); | |
sGen.generateOnePassVersion(false).encode(bOut); | |
PGPLiteralDataGenerator lGen = new PGPLiteralDataGenerator(); | |
OutputStream lOut = lGen.open(bOut, PGPLiteralData.BINARY, | |
PGPLiteralData.CONSOLE, messageCharArray.length, new Date()); | |
for (byte c : messageCharArray) { | |
lOut.write(c); | |
sGen.update(c); | |
} | |
lOut.close(); | |
lGen.close(); | |
sGen.generate().encode(bOut); | |
comData.close(); | |
out.close(); | |
return encOut.toString(); | |
} |
That was dense. And to be perfectly frank, the fact that I can't wrap this operation into a method:
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
string signature = generatePGPSignature(message, privKey); |
Moving on.
Next, we want to encrypt our string.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
public static String encryptByteArray(byte[] clearData, | |
PGPPublicKey encKey, boolean withIntegrityCheck, boolean armor) | |
throws IOException, PGPException, NoSuchProviderException { | |
ByteArrayOutputStream encOut = new ByteArrayOutputStream(); | |
OutputStream out = encOut; | |
if (armor) { | |
out = new ArmoredOutputStream(out); | |
} | |
ByteArrayOutputStream bOut = new ByteArrayOutputStream(); | |
PGPCompressedDataGenerator comData = new PGPCompressedDataGenerator( | |
PGPCompressedDataGenerator.ZIP); | |
OutputStream cos = comData.open(bOut); // open it with the final | |
PGPLiteralDataGenerator lData = new PGPLiteralDataGenerator(); | |
OutputStream pOut = lData.open(cos, PGPLiteralData.BINARY, | |
PGPLiteralData.CONSOLE, clearData.length, | |
new Date() // current time | |
); | |
pOut.write(clearData); | |
lData.close(); | |
comData.close(); | |
PGPEncryptedDataGenerator cPk = new PGPEncryptedDataGenerator( | |
PGPEncryptedData.CAST5, withIntegrityCheck, new SecureRandom(), | |
"BC"); | |
cPk.addMethod(encKey); | |
byte[] bytes = bOut.toByteArray(); | |
OutputStream cOut = cPk.open(out, bytes.length); | |
cOut.write(bytes); | |
cOut.close(); | |
out.close(); | |
return encOut.toString(); | |
} |
Again, pretty dense. A few things to note in the above routine: Some of the methods are now marked as deprecated in Bouncy Castle, which arguably is more important when dealing with cryptography than any other area of writing code. For brevity however, I'm not going to let perfect be the enemy of good in sourcing this out.
* Storing of the actual key-files is something of a conundrum to me. The simple solution of storing a public-key in a database makes the most sense, as you could encrypt messages before they are transmitted from your web-application. However, how to safely "store" a private-key in relationship to your executing code is a matter for a real security expert in key-storage.