2011-09-22 20:51:46 +02:00
|
|
|
#
|
|
|
|
# KDF.py : a collection of Key Derivation Functions
|
|
|
|
#
|
|
|
|
# Part of the Python Cryptography Toolkit
|
|
|
|
#
|
|
|
|
# ===================================================================
|
|
|
|
# The contents of this file are dedicated to the public domain. To
|
|
|
|
# the extent that dedication to the public domain is not available,
|
|
|
|
# everyone is granted a worldwide, perpetual, royalty-free,
|
|
|
|
# non-exclusive license to exercise all rights associated with the
|
|
|
|
# contents of this file for any purpose whatsoever.
|
|
|
|
# No rights are reserved.
|
|
|
|
#
|
|
|
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
# EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
|
|
# NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
|
|
|
# BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
|
|
|
# ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
|
|
# CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
|
|
# SOFTWARE.
|
|
|
|
# ===================================================================
|
|
|
|
|
|
|
|
"""This file contains a collection of standard key derivation functions.
|
|
|
|
|
|
|
|
A key derivation function derives one or more secondary secret keys from
|
|
|
|
one primary secret (a master key or a pass phrase).
|
|
|
|
|
|
|
|
This is typically done to insulate the secondary keys from each other,
|
|
|
|
to avoid that leakage of a secondary key compromises the security of the
|
|
|
|
master key, or to thwart attacks on pass phrases (e.g. via rainbow tables).
|
|
|
|
|
|
|
|
:undocumented: __revision__
|
|
|
|
"""
|
|
|
|
|
|
|
|
__revision__ = "$Id$"
|
|
|
|
|
|
|
|
import math
|
|
|
|
import struct
|
|
|
|
|
2013-05-22 22:18:35 +02:00
|
|
|
import sys
|
|
|
|
if sys.version_info[0] == 2 and sys.version_info[1] == 1:
|
|
|
|
from Crypto.Util.py21compat import *
|
2011-10-18 23:20:26 +02:00
|
|
|
from Crypto.Util.py3compat import *
|
2013-05-22 22:18:35 +02:00
|
|
|
|
2013-08-10 18:54:04 +02:00
|
|
|
from Crypto.Cipher import _Salsa20
|
|
|
|
from Crypto.Hash import SHA1, SHA256, HMAC, CMAC
|
2011-09-22 20:51:46 +02:00
|
|
|
from Crypto.Util.strxor import strxor
|
2013-08-10 18:54:04 +02:00
|
|
|
from Crypto.Util.number import size as bit_size, long_to_bytes, bytes_to_long
|
|
|
|
from Crypto.Util.number import bytes_to_long_le
|
2011-09-22 20:51:46 +02:00
|
|
|
|
2012-04-19 22:40:39 +02:00
|
|
|
def PBKDF1(password, salt, dkLen, count=1000, hashAlgo=None):
|
2011-09-22 20:51:46 +02:00
|
|
|
"""Derive one key from a password (or passphrase).
|
|
|
|
|
|
|
|
This function performs key derivation according an old version of
|
|
|
|
the PKCS#5 standard (v1.5).
|
2013-05-22 22:18:35 +02:00
|
|
|
|
2011-09-22 20:51:46 +02:00
|
|
|
This algorithm is called ``PBKDF1``. Even though it is still described
|
|
|
|
in the latest version of the PKCS#5 standard (version 2, or RFC2898),
|
|
|
|
newer applications should use the more secure and versatile `PBKDF2` instead.
|
|
|
|
|
|
|
|
:Parameters:
|
|
|
|
password : string
|
|
|
|
The secret password or pass phrase to generate the key from.
|
2011-10-18 23:20:26 +02:00
|
|
|
salt : byte string
|
2011-09-22 20:51:46 +02:00
|
|
|
An 8 byte string to use for better protection from dictionary attacks.
|
|
|
|
This value does not need to be kept secret, but it should be randomly
|
|
|
|
chosen for each derivation.
|
|
|
|
dkLen : integer
|
|
|
|
The length of the desired key. Default is 16 bytes, suitable for instance for `Crypto.Cipher.AES`.
|
|
|
|
count : integer
|
|
|
|
The number of iterations to carry out. It's recommended to use at least 1000.
|
|
|
|
hashAlgo : module
|
|
|
|
The hash algorithm to use, as a module or an object from the `Crypto.Hash` package.
|
|
|
|
The digest length must be no shorter than ``dkLen``.
|
2012-04-19 22:40:39 +02:00
|
|
|
The default algorithm is `SHA1`.
|
2011-09-22 20:51:46 +02:00
|
|
|
|
|
|
|
:Return: A byte string of length `dkLen` that can be used as key.
|
2012-04-19 22:40:39 +02:00
|
|
|
"""
|
|
|
|
if not hashAlgo:
|
|
|
|
hashAlgo = SHA1
|
2011-10-18 23:20:26 +02:00
|
|
|
password = tobytes(password)
|
2011-09-22 20:51:46 +02:00
|
|
|
pHash = hashAlgo.new(password+salt)
|
|
|
|
digest = pHash.digest_size
|
|
|
|
if dkLen>digest:
|
2013-09-29 03:01:28 -07:00
|
|
|
raise TypeError("Selected hash algorithm has a too short digest (%d bytes)." % digest)
|
2011-09-22 20:51:46 +02:00
|
|
|
if len(salt)!=8:
|
|
|
|
raise ValueError("Salt is not 8 bytes long.")
|
|
|
|
for i in xrange(count-1):
|
|
|
|
pHash = pHash.new(pHash.digest())
|
|
|
|
return pHash.digest()[:dkLen]
|
|
|
|
|
|
|
|
def PBKDF2(password, salt, dkLen=16, count=1000, prf=None):
|
|
|
|
"""Derive one or more keys from a password (or passphrase).
|
|
|
|
|
2013-08-10 18:54:04 +02:00
|
|
|
This function performs key derivation according to
|
|
|
|
the PKCS#5 standard (v2.0), by means of the ``PBKDF2`` algorithm.
|
2011-09-22 20:51:46 +02:00
|
|
|
|
|
|
|
:Parameters:
|
|
|
|
password : string
|
|
|
|
The secret password or pass phrase to generate the key from.
|
|
|
|
salt : string
|
|
|
|
A string to use for better protection from dictionary attacks.
|
|
|
|
This value does not need to be kept secret, but it should be randomly
|
|
|
|
chosen for each derivation. It is recommended to be at least 8 bytes long.
|
|
|
|
dkLen : integer
|
|
|
|
The cumulative length of the desired keys. Default is 16 bytes, suitable for instance for `Crypto.Cipher.AES`.
|
|
|
|
count : integer
|
|
|
|
The number of iterations to carry out. It's recommended to use at least 1000.
|
|
|
|
prf : callable
|
|
|
|
A pseudorandom function. It must be a function that returns a pseudorandom string
|
|
|
|
from two parameters: a secret and a salt. If not specified, HMAC-SHA1 is used.
|
|
|
|
|
|
|
|
:Return: A byte string of length `dkLen` that can be used as key material.
|
|
|
|
If you wanted multiple keys, just break up this string into segments of the desired length.
|
|
|
|
"""
|
2011-10-18 23:20:26 +02:00
|
|
|
password = tobytes(password)
|
2011-09-22 20:51:46 +02:00
|
|
|
if prf is None:
|
|
|
|
prf = lambda p,s: HMAC.new(p,s,SHA1).digest()
|
2011-10-18 23:20:26 +02:00
|
|
|
key = b('')
|
2011-09-22 20:51:46 +02:00
|
|
|
i = 1
|
|
|
|
while len(key)<dkLen:
|
|
|
|
U = previousU = prf(password,salt+struct.pack(">I", i))
|
|
|
|
for j in xrange(count-1):
|
|
|
|
previousU = t = prf(password,previousU)
|
|
|
|
U = strxor(U,t)
|
|
|
|
key += U
|
|
|
|
i = i + 1
|
|
|
|
return key[:dkLen]
|
|
|
|
|
2013-08-10 18:54:04 +02:00
|
|
|
|
2013-10-20 17:46:14 -07:00
|
|
|
class _S2V(object):
|
2013-05-22 22:18:35 +02:00
|
|
|
"""String-to-vector PRF as defined in `RFC5297`_.
|
|
|
|
|
|
|
|
This class implements a pseudorandom function family
|
|
|
|
based on CMAC that takes as input a vector of strings.
|
|
|
|
|
|
|
|
.. _RFC5297: http://tools.ietf.org/html/rfc5297
|
|
|
|
"""
|
|
|
|
|
|
|
|
def __init__(self, key, ciphermod):
|
|
|
|
"""Initialize the S2V PRF.
|
|
|
|
|
|
|
|
:Parameters:
|
|
|
|
key : byte string
|
|
|
|
A secret that can be used as key for CMACs
|
|
|
|
based on ciphers from ``ciphermod``.
|
|
|
|
ciphermod : module
|
|
|
|
A block cipher module from `Crypto.Cipher`.
|
|
|
|
"""
|
|
|
|
|
|
|
|
self._key = key
|
|
|
|
self._ciphermod = ciphermod
|
|
|
|
self._last_string = self._cache = bchr(0)*ciphermod.block_size
|
|
|
|
self._n_updates = ciphermod.block_size*8-1
|
|
|
|
|
|
|
|
def new(key, ciphermod):
|
|
|
|
"""Create a new S2V PRF.
|
|
|
|
|
|
|
|
:Parameters:
|
|
|
|
key : byte string
|
|
|
|
A secret that can be used as key for CMACs
|
|
|
|
based on ciphers from ``ciphermod``.
|
|
|
|
ciphermod : module
|
|
|
|
A block cipher module from `Crypto.Cipher`.
|
|
|
|
"""
|
2013-10-20 17:46:14 -07:00
|
|
|
return _S2V(key, ciphermod)
|
2013-05-22 22:18:35 +02:00
|
|
|
new = staticmethod(new)
|
|
|
|
|
|
|
|
def _double(self, bs):
|
|
|
|
doubled = bytes_to_long(bs)<<1
|
|
|
|
if bord(bs[0]) & 0x80:
|
|
|
|
doubled ^= 0x87
|
|
|
|
return long_to_bytes(doubled, len(bs))[-len(bs):]
|
|
|
|
|
|
|
|
def update(self, item):
|
|
|
|
"""Pass the next component of the vector.
|
|
|
|
|
|
|
|
The maximum number of components you can pass is equal to the block
|
|
|
|
length of the cipher (in bits) minus 1.
|
|
|
|
|
|
|
|
:Parameters:
|
|
|
|
item : byte string
|
|
|
|
The next component of the vector.
|
|
|
|
:Raise TypeError: when the limit on the number of components has been reached.
|
|
|
|
:Raise ValueError: when the component is empty
|
|
|
|
"""
|
|
|
|
|
|
|
|
if not item:
|
|
|
|
raise ValueError("A component cannot be empty")
|
|
|
|
|
|
|
|
if self._n_updates==0:
|
|
|
|
raise TypeError("Too many components passed to S2V")
|
|
|
|
self._n_updates -= 1
|
|
|
|
|
|
|
|
mac = CMAC.new(self._key, msg=self._last_string, ciphermod=self._ciphermod)
|
|
|
|
self._cache = strxor(self._double(self._cache), mac.digest())
|
|
|
|
self._last_string = item
|
|
|
|
|
|
|
|
def derive(self):
|
|
|
|
""""Derive a secret from the vector of components.
|
|
|
|
|
|
|
|
:Return: a byte string, as long as the block length of the cipher.
|
|
|
|
"""
|
|
|
|
|
|
|
|
if len(self._last_string)>=16:
|
|
|
|
final = self._last_string[:-16] + strxor(self._last_string[-16:], self._cache)
|
|
|
|
else:
|
|
|
|
padded = (self._last_string + bchr(0x80)+ bchr(0)*15)[:16]
|
|
|
|
final = strxor(padded, self._double(self._cache))
|
|
|
|
mac = CMAC.new(self._key, msg=final, ciphermod=self._ciphermod)
|
|
|
|
return mac.digest()
|
2013-08-10 18:54:04 +02:00
|
|
|
|
|
|
|
|
|
|
|
def _scryptBlockMix(blocks):
|
|
|
|
"""Hash function for ROMix."""
|
|
|
|
|
|
|
|
x = blocks[-1]
|
|
|
|
core = _Salsa20._salsa20_8_core
|
|
|
|
result = [None]*len(blocks)
|
|
|
|
for i in xrange(len(blocks)):
|
|
|
|
x = core(strxor(x, blocks[i]))
|
|
|
|
result[i] = x
|
|
|
|
return [result[i + j] for j in xrange(2)
|
|
|
|
for i in xrange(0, len(blocks), 2)]
|
|
|
|
|
|
|
|
|
|
|
|
def _scryptROMix(blocks, n):
|
|
|
|
"""Sequential memory-hard function for scrypt."""
|
|
|
|
|
|
|
|
x = [blocks[i:i + 64] for i in xrange(0, len(blocks), 64)]
|
|
|
|
len_x = len(x)
|
|
|
|
v = []
|
|
|
|
for i in xrange(n):
|
|
|
|
v.append(x)
|
|
|
|
x = _scryptBlockMix(x)
|
|
|
|
for i in xrange(n):
|
|
|
|
j = bytes_to_long_le(x[-1]) & (n - 1)
|
|
|
|
t = [strxor(x[idx], v[j][idx]) for idx in xrange(len_x)]
|
|
|
|
x = _scryptBlockMix(t)
|
|
|
|
return b("").join(x)
|
|
|
|
|
|
|
|
|
|
|
|
def scrypt(password, salt, key_len, N, r, p, num_keys=1):
|
|
|
|
"""Derive one or more keys from a passphrase.
|
|
|
|
|
|
|
|
This function performs key derivation according to
|
|
|
|
the `scrypt`_ algorithm, introduced in Percival's paper
|
|
|
|
`"Stronger key derivation via sequential memory-hard functions"`__.
|
|
|
|
|
|
|
|
This implementation is based on the `RFC draft`__.
|
|
|
|
|
|
|
|
:Parameters:
|
|
|
|
password : string
|
|
|
|
The secret pass phrase to generate the keys from.
|
|
|
|
salt : string
|
|
|
|
A string to use for better protection from dictionary attacks.
|
|
|
|
This value does not need to be kept secret,
|
|
|
|
but it should be randomly chosen for each derivation.
|
|
|
|
It is recommended to be at least 8 bytes long.
|
|
|
|
key_len : integer
|
|
|
|
The length in bytes of every derived key.
|
|
|
|
N : integer
|
|
|
|
CPU/Memory cost parameter. It must be a power of 2 and less
|
|
|
|
than ``2**(16r)``.
|
|
|
|
r : integer
|
|
|
|
Block size parameter.
|
|
|
|
p : integer
|
|
|
|
Parallelization parameter.
|
|
|
|
It must be no greater than ``(2**32-1)/(4r)``.
|
|
|
|
num_keys : integer
|
|
|
|
The number of keys to derive. Every key is ``key_len`` bytes long.
|
|
|
|
By default, only 1 key is generated.
|
|
|
|
The maximum cumulative length of all keys is ``(2**32-1)*32``
|
|
|
|
(that is, 128TB).
|
|
|
|
|
|
|
|
A good choice of parameters *(N, r , p)* was suggested
|
|
|
|
by Colin Percival in his `presentation in 2009`__:
|
|
|
|
|
|
|
|
- *(16384, 8, 1)* for interactive logins (<=100ms)
|
|
|
|
- *(1048576, 8, 1)* for file encryption (<=5s)
|
|
|
|
|
|
|
|
:Return: A byte string or a tuple of byte strings.
|
|
|
|
|
|
|
|
.. _scrypt: http://www.tarsnap.com/scrypt.html
|
|
|
|
.. __: http://www.tarsnap.com/scrypt/scrypt.pdf
|
|
|
|
.. __: http://tools.ietf.org/html/draft-josefsson-scrypt-kdf-01
|
|
|
|
.. __: http://www.tarsnap.com/scrypt/scrypt-slides.pdf
|
|
|
|
"""
|
|
|
|
|
|
|
|
if 2 ** (bit_size(N) - 1) != N:
|
|
|
|
raise ValueError("N must be a power of 2")
|
|
|
|
if N >= 2L ** (16 * r):
|
|
|
|
raise ValueError("N is too big (or r is too small)")
|
|
|
|
if p > divmod((2L ** 32 - 1) * 32, 128 * r)[0]:
|
|
|
|
raise ValueError("p or r are too big")
|
|
|
|
|
|
|
|
prf_hmac_sha256 = lambda p, s: HMAC.new(p, s, SHA256).digest()
|
|
|
|
|
|
|
|
blocks = PBKDF2(password, salt, p * 128 * r, 1, prf=prf_hmac_sha256)
|
|
|
|
|
|
|
|
blocks = b("").join([_scryptROMix(blocks[x:x + 128 * r], N)
|
|
|
|
for x in xrange(0, len(blocks), 128 * r)])
|
|
|
|
|
|
|
|
dk = PBKDF2(password, blocks, key_len * num_keys, 1,
|
|
|
|
prf=prf_hmac_sha256)
|
|
|
|
|
|
|
|
if num_keys == 1:
|
|
|
|
return dk
|
|
|
|
|
|
|
|
kol = [dk[idx:idx + key_len]
|
|
|
|
for idx in xrange(0, key_len * num_keys, key_len)]
|
|
|
|
return kol
|