/sandbox/HsmSymmetricEncryptionExample/src/main/java/com/fdc/SymmetricEncryptionExample.java

https://bitbucket.org/ericobueno/javaprojects · Java · 195 lines · 106 code · 28 blank · 61 comment · 9 complexity · b73be76d6d13ec2c9f1edd32df5cc6df MD5 · raw file

  1. /*
  2. * To change this license header, choose License Headers in Project Properties.
  3. * To change this template file, choose Tools | Templates
  4. * and open the template in the editor.
  5. */
  6. package com.fdc;
  7. import java.security.InvalidAlgorithmParameterException;
  8. import java.security.InvalidKeyException;
  9. import java.security.NoSuchAlgorithmException;
  10. import java.security.NoSuchProviderException;
  11. import java.security.SecureRandom;
  12. import javax.crypto.BadPaddingException;
  13. import javax.crypto.Cipher;
  14. import javax.crypto.IllegalBlockSizeException;
  15. import javax.crypto.KeyGenerator;
  16. import javax.crypto.NoSuchPaddingException;
  17. import javax.crypto.SecretKey;
  18. import javax.crypto.spec.IvParameterSpec;
  19. /**
  20. *
  21. * @author ebueno
  22. */
  23. public class SymmetricEncryptionExample
  24. {
  25. public static void main(String[] args) throws NoSuchProviderException,
  26. NoSuchPaddingException, InvalidKeyException, IllegalBlockSizeException,
  27. BadPaddingException, InvalidAlgorithmParameterException, NoSuchAlgorithmException
  28. {
  29. // String provider = "BC";
  30. String provider = "nCipherKM";
  31. /*
  32. * keyTypes lists the supported symmetric key types.
  33. * Note that not all mechanisms are available, depending on the underlying
  34. * software and hardware support.
  35. */
  36. String[] keyTypes = new String[]
  37. {
  38. /*
  39. "ArcFour", "BlowfishKey", "CAST256",
  40. "CAST", "DES2", "DESede", "DES", "Rijndael", "Serpent", "Twofish"
  41. */
  42. "AES"
  43. };
  44. /*
  45. * cipherModes lists the supported symmetric cipher modes.
  46. * paddingTypes lists the supported symmetric padding types.
  47. */
  48. String[] cipherModes = new String[]
  49. {
  50. // "CBC", "CFB", "CTR", "ECB", "OFB"
  51. "ECB"
  52. };
  53. String[] paddingTypes = new String[]
  54. {
  55. /*
  56. "ANSIX923Padding", "ISO10126Padding",
  57. "ISO7816Padding", "NoPadding", "PKCS5Padding", "ZeroBytePadding"
  58. */
  59. "NoPadding"
  60. };
  61. /*
  62. * For each symmetric key type, cipher mode and padding type supported by
  63. * the nCipher JCE provider, perform an encryption and decryption on a
  64. * sample plain text.
  65. */
  66. for (int kt = 0; kt < keyTypes.length; kt++)
  67. {
  68. try
  69. {
  70. for (int cm = 0; cm < cipherModes.length; cm++)
  71. {
  72. for (int pt = 0; pt < paddingTypes.length; pt++)
  73. {
  74. performEncryptDecrypt(keyTypes[kt],
  75. cipherModes[cm],
  76. paddingTypes[pt],
  77. provider);
  78. System.out.println("===================================");
  79. }
  80. }
  81. }
  82. catch (NoSuchAlgorithmException e)
  83. {
  84. System.out.println(keyTypes[kt] + " algorithm unavailable @ " + System.currentTimeMillis());
  85. }
  86. }
  87. }
  88. private static void performEncryptDecrypt(String keyType, String cipherMode,
  89. String paddingType, String provider)
  90. throws NoSuchAlgorithmException, NoSuchProviderException,
  91. NoSuchPaddingException, InvalidKeyException,
  92. InvalidAlgorithmParameterException, IllegalBlockSizeException,
  93. BadPaddingException
  94. {
  95. System.out.print("KeyType = " + keyType);
  96. System.out.print(" cipher = " + cipherMode);
  97. System.out.println(" Padding = " + paddingType + " @ " + System.currentTimeMillis());
  98. Cipher encCipher = Cipher.getInstance(keyType + "/"
  99. + cipherMode + "/" + paddingType, provider );
  100. if (encCipher != null)
  101. {
  102. System.out.println("Encrypt/Decrypt using = " + encCipher.getAlgorithm());
  103. }
  104. /*
  105. * Symmetric SecretKeys are generated with the KeyGenerator class.
  106. */
  107. KeyGenerator kg = KeyGenerator.getInstance(keyType, provider);
  108. if (kg == null)
  109. {
  110. System.exit(0);
  111. }
  112. kg.init(192);
  113. SecretKey key = kg.generateKey();
  114. // System.out.println("key : " + Utils.toHex(key.getEncoded()));
  115. /*
  116. * This example uses the HSM true random source to produce an example
  117. * plain text.
  118. */
  119. // SecureRandom r = SecureRandom.getInstance("RNG", provider);
  120. SecureRandom r = new SecureRandom();
  121. byte[] plainText = new byte[800];
  122. r.nextBytes(plainText);
  123. /*
  124. * Create and initialise a Cipher instance for encryption.
  125. */
  126. /*
  127. * All the supported cipher modes other than ECB mode require an
  128. * initialisation vector (IV). The same IV must be used for encryption
  129. * and decryption. Here a new byte array (guaranteed by Java language to
  130. * be all zeros) is used.
  131. */
  132. if (cipherMode.equalsIgnoreCase("ECB"))
  133. {
  134. encCipher.init(Cipher.ENCRYPT_MODE, key);
  135. }
  136. else
  137. {
  138. encCipher.init(Cipher.ENCRYPT_MODE, key,
  139. new IvParameterSpec(new byte[encCipher.getBlockSize()]));
  140. }
  141. /*
  142. * Encrypt the plain text.
  143. */
  144. System.out.println("Encrypting @ " + System.currentTimeMillis());
  145. byte[] cipherText = encCipher.doFinal(plainText);
  146. System.out.println("cipher text size = " + cipherText.length);
  147. /*
  148. * Create and initialise a Cipher instance for decryption
  149. */
  150. Cipher decCipher = Cipher.getInstance(keyType + "/"
  151. + cipherMode + "/" + paddingType, provider);
  152. if (cipherMode.equalsIgnoreCase("ECB"))
  153. {
  154. decCipher.init(Cipher.DECRYPT_MODE, key);
  155. }
  156. else
  157. {
  158. decCipher.init(Cipher.DECRYPT_MODE, key,
  159. new IvParameterSpec(new byte[encCipher.getBlockSize()]));
  160. }
  161. /*
  162. * Decrypt the cipher text - the resulting deciphered text should match the
  163. * original plaintext.
  164. */
  165. byte[] decipheredText = decCipher.doFinal(cipherText);
  166. }
  167. }