RFC 5297 SIV mode of operation in Java
Finding | Comment |
---|---|
1u1-22-001 | The GPG key is used exclusively for the Maven repositories, is designed for signing only and is protected by a 30-character generated password (alphabet size: 96 chars). It is iterated and salted (SHA1 with 20971520 iterations). An offline attack is also very unattractive. Apart from that, this finding has no influence on the Tresor apps1. This was not known to Cure53 at the time of reporting. |
1u1-22-002 | As per contract of BlockCipher#processBlock(byte[], int, byte[], int) , JceAesBlockCipher is designed to encrypt or decrypt just one single block at a time. JCE doesn't allow us to retrieve the plain cipher without a mode, so we explicitly request AES/ECB/NoPadding . This is by design, because we want the plain cipher for a single 128 bit block without any mode. We're not actually using ECB mode. |
private static final SivMode AES_SIV = new SivMode();
public void encrypt() {
byte[] encrypted = AES_SIV.encrypt(ctrKey, macKey, "hello world".getBytes());
byte[] decrypted = AES_SIV.decrypt(ctrKey, macKey, encrypted);
}
public void encryptWithAssociatedData() {
byte[] encrypted = AES_SIV.encrypt(ctrKey, macKey, "hello world".getBytes(), "associated".getBytes(), "data".getBytes());
byte[] decrypted = AES_SIV.decrypt(ctrKey, macKey, encrypted, "associated".getBytes(), "data".getBytes());
}
<dependencies>
<dependency>
<groupId>org.cryptomator</groupId>
<artifactId>siv-mode</artifactId>
<version>1.4.0</version>
</dependency>
</dependencies>
From version 1.3.2 onwards this library is an explicit module with the name org.cryptomator.siv
. You can use it by adding the following line to your module-info.java
.
requires org.cryptomator.siv;
Because BouncyCastle classes are shaded, this library only depends on java.base
.
This is a Maven project that can be built using mvn install
. However, if you want to build this reproducibly, please make sure:
./mvnw install
instead (or ./mvnw verify
or ./mvnw package -DskipTests
, depending on your intentions)Distributed under the MIT X Consortium license. See the LICENSE file for more info.
1 The Cure53 pentesting was performed during the development of the apps for 1&1 Mail & Media GmbH.