1
0
mirror of https://github.com/danog/tgseclib.git synced 2024-11-30 04:39:02 +01:00
tgseclib/phpseclib/Crypt/TripleDES.php

457 lines
14 KiB
PHP
Raw Permalink Normal View History

<?php
/**
* Pure-PHP implementation of Triple DES.
*
* Uses mcrypt, if available, and an internal implementation, otherwise. Operates in the EDE3 mode (encrypt-decrypt-encrypt).
*
2015-04-02 12:57:52 +02:00
* PHP version 5
*
* Here's a short example of how to use this library:
* <code>
* <?php
2014-12-17 01:16:54 +01:00
* include 'vendor/autoload.php';
*
2019-12-18 14:00:20 +01:00
* $des = new \tgseclib\Crypt\TripleDES();
*
* $des->setKey('abcdefghijklmnopqrstuvwx');
*
* $size = 10 * 1024;
* $plaintext = '';
* for ($i = 0; $i < $size; $i++) {
* $plaintext.= 'a';
* }
*
* echo $des->decrypt($des->encrypt($plaintext));
* ?>
* </code>
*
* @category Crypt
2014-12-17 01:16:54 +01:00
* @package TripleDES
* @author Jim Wigginton <terrafrost@php.net>
* @copyright 2007 Jim Wigginton
* @license http://www.opensource.org/licenses/mit-license.html MIT License
* @link http://phpseclib.sourceforge.net
*/
2019-12-18 14:00:20 +01:00
namespace tgseclib\Crypt;
2014-12-17 01:16:54 +01:00
/**
* Pure-PHP implementation of Triple DES.
*
2014-12-17 01:16:54 +01:00
* @package TripleDES
* @author Jim Wigginton <terrafrost@php.net>
* @access public
*/
2014-12-17 01:16:54 +01:00
class TripleDES extends DES
{
/**
* Encrypt / decrypt using inner chaining
*
* Inner chaining is used by SSH-1 and is generally considered to be less secure then outer chaining (self::MODE_CBC3).
*/
const MODE_3CBC = -2;
/**
* Encrypt / decrypt using outer chaining
*
2019-12-18 14:00:20 +01:00
* Outer chaining is used by SSH-2 and when the mode is set to \tgseclib\Crypt\Common\BlockCipher::MODE_CBC.
*/
const MODE_CBC3 = self::MODE_CBC;
2013-05-20 08:19:38 +02:00
/**
* Key Length (in bytes)
2013-05-20 08:19:38 +02:00
*
2019-12-18 14:00:20 +01:00
* @see \tgseclib\Crypt\TripleDES::setKeyLength()
* @var int
2013-05-20 08:19:38 +02:00
* @access private
*/
protected $key_length = 24;
2013-05-20 08:19:38 +02:00
/**
* The mcrypt specific name of the cipher
*
2019-12-18 14:00:20 +01:00
* @see \tgseclib\Crypt\DES::cipher_name_mcrypt
* @see \tgseclib\Crypt\Common\SymmetricKey::cipher_name_mcrypt
* @var string
2013-05-20 08:19:38 +02:00
* @access private
*/
protected $cipher_name_mcrypt = 'tripledes';
2013-05-20 08:19:38 +02:00
/**
* Optimizing value while CFB-encrypting
*
2019-12-18 14:00:20 +01:00
* @see \tgseclib\Crypt\Common\SymmetricKey::cfb_init_len
* @var int
2013-05-20 08:19:38 +02:00
* @access private
*/
protected $cfb_init_len = 750;
2013-05-20 08:19:38 +02:00
/**
* max possible size of $key
*
* @see self::setKey()
2019-12-18 14:00:20 +01:00
* @see \tgseclib\Crypt\DES::setKey()
* @var string
2013-05-20 08:19:38 +02:00
* @access private
*/
protected $key_length_max = 24;
2013-05-20 08:19:38 +02:00
/**
* Internal flag whether using self::MODE_3CBC or not
2013-05-20 08:19:38 +02:00
*
* @var bool
2013-05-20 08:19:38 +02:00
* @access private
*/
private $mode_3cbc;
2013-05-20 08:19:38 +02:00
/**
2019-12-18 14:00:20 +01:00
* The \tgseclib\Crypt\DES objects
*
2013-05-20 08:19:38 +02:00
* Used only if $mode_3cbc === true
*
* @var array
* @access private
*/
private $des;
/**
* Default Constructor.
*
* Determines whether or not the mcrypt or OpenSSL extensions should be used.
2013-05-20 08:19:38 +02:00
*
* $mode could be:
2013-05-25 06:22:25 +02:00
*
* - ecb
2013-05-25 06:22:25 +02:00
*
* - cbc
2013-05-25 06:22:25 +02:00
*
* - ctr
2013-05-25 06:22:25 +02:00
*
* - cfb
2013-05-25 06:22:25 +02:00
*
* - ofb
2013-05-25 06:22:25 +02:00
*
* - 3cbc
*
* - cbc3 (same as cbc)
*
2019-12-18 14:00:20 +01:00
* @see \tgseclib\Crypt\DES::__construct()
* @see \tgseclib\Crypt\Common\SymmetricKey::__construct()
2019-08-28 14:16:24 +02:00
* @param string $mode
* @access public
*/
public function __construct($mode)
{
switch (strtolower($mode)) {
// In case of self::MODE_3CBC, we init as CRYPT_DES_MODE_CBC
2013-05-20 08:19:38 +02:00
// and additional flag us internally as 3CBC
case '3cbc':
parent::__construct('cbc');
2013-05-20 08:19:38 +02:00
$this->mode_3cbc = true;
// This three $des'es will do the 3CBC work (if $key > 64bits)
2016-11-30 22:19:23 +01:00
$this->des = [
new DES('cbc'),
new DES('cbc'),
new DES('cbc'),
2016-11-30 22:19:23 +01:00
];
2013-05-20 08:19:38 +02:00
2019-12-18 14:00:20 +01:00
// we're going to be doing the padding, ourselves, so disable it in the \tgseclib\Crypt\DES objects
$this->des[0]->disablePadding();
$this->des[1]->disablePadding();
$this->des[2]->disablePadding();
2013-05-20 08:19:38 +02:00
break;
case 'cbc3':
$mode = 'cbc';
2013-05-20 08:19:38 +02:00
// If not 3CBC, we init as usual
default:
parent::__construct($mode);
2019-08-28 14:16:24 +02:00
if ($this->mode == self::MODE_STREAM) {
throw new BadModeException('Block ciphers cannot be ran in stream mode');
}
}
}
/**
* Test for engine validity
*
2019-12-18 14:00:20 +01:00
* This is mainly just a wrapper to set things up for \tgseclib\Crypt\Common\SymmetricKey::isValidEngine()
*
2019-12-18 14:00:20 +01:00
* @see \tgseclib\Crypt\Common\SymmetricKey::__construct()
* @param int $engine
* @access protected
* @return bool
*/
protected function isValidEngineHelper($engine)
{
if ($engine == self::ENGINE_OPENSSL) {
self::$cipher_name_openssl_ecb = 'des-ede3';
$mode = $this->openssl_translate_mode();
$this->cipher_name_openssl = $mode == 'ecb' ? 'des-ede3' : 'des-ede3-' . $mode;
}
return parent::isValidEngineHelper($engine);
}
2013-05-25 04:05:24 +02:00
/**
* Sets the initialization vector.
2013-05-25 04:05:24 +02:00
*
2019-12-18 14:00:20 +01:00
* SetIV is not required when \tgseclib\Crypt\Common\SymmetricKey::MODE_ECB is being used.
2013-05-25 04:05:24 +02:00
*
2019-12-18 14:00:20 +01:00
* @see \tgseclib\Crypt\Common\SymmetricKey::setIV()
2013-05-25 04:05:24 +02:00
* @access public
* @param string $iv
2013-05-25 04:05:24 +02:00
*/
public function setIV($iv)
2013-05-25 04:05:24 +02:00
{
parent::setIV($iv);
if ($this->mode_3cbc) {
$this->des[0]->setIV($iv);
$this->des[1]->setIV($iv);
$this->des[2]->setIV($iv);
}
}
/**
* Sets the key length.
*
* Valid key lengths are 128 and 192 bits.
*
* If you want to use a 64-bit key use DES.php
*
2019-12-18 14:00:20 +01:00
* @see \tgseclib\Crypt\Common\SymmetricKey:setKeyLength()
* @access public
* @throws \LengthException if the key length is invalid
* @param int $length
*/
public function setKeyLength($length)
{
switch ($length) {
case 128:
case 192:
break;
default:
throw new \LengthException('Key size of ' . $length . ' bits is not supported by this algorithm. Only keys of sizes 128 or 192 bits are supported');
}
parent::setKeyLength($length);
}
/**
* Sets the key.
*
* Triple DES can use 128-bit (eg. strlen($key) == 16) or 192-bit (eg. strlen($key) == 24) keys.
*
* DES also requires that every eighth bit be a parity bit, however, we'll ignore that.
*
* @access public
2019-12-18 14:00:20 +01:00
* @see \tgseclib\Crypt\DES::setKey()
* @see \tgseclib\Crypt\Common\SymmetricKey::setKey()
* @throws \LengthException if the key length is invalid
* @param string $key
*/
public function setKey($key)
{
if ($this->explicit_key_length !== false && strlen($key) != $this->explicit_key_length) {
throw new \LengthException('Key length has already been set to ' . $this->explicit_key_length . ' bytes and this key is ' . strlen($key) . ' bytes');
}
switch (strlen($key)) {
case 16:
$key.= substr($key, 0, 8);
break;
case 24:
break;
default:
throw new \LengthException('Key of size ' . strlen($key) . ' not supported by this algorithm. Only keys of sizes 16 or 24 are supported');
}
// copied from self::setKey()
$this->key = $key;
$this->key_length = strlen($key);
$this->changed = $this->nonIVChanged = true;
$this->setEngine();
if ($this->mode_3cbc) {
2013-05-20 08:19:38 +02:00
$this->des[0]->setKey(substr($key, 0, 8));
$this->des[1]->setKey(substr($key, 8, 8));
$this->des[2]->setKey(substr($key, 16, 8));
}
}
/**
* Encrypts a message.
*
2019-12-18 14:00:20 +01:00
* @see \tgseclib\Crypt\Common\SymmetricKey::encrypt()
* @access public
* @param string $plaintext
* @return string $cipertext
*/
public function encrypt($plaintext)
{
2013-05-20 08:19:38 +02:00
// parent::en/decrypt() is able to do all the work for all modes and keylengths,
// except for: self::MODE_3CBC (inner chaining CBC) with a key > 64bits
// if the key is smaller then 8, do what we'd normally do
2013-05-20 08:19:38 +02:00
if ($this->mode_3cbc && strlen($this->key) > 8) {
return $this->des[2]->encrypt(
$this->des[1]->decrypt(
$this->des[0]->encrypt(
$this->pad($plaintext)
)
)
);
}
2013-05-20 08:19:38 +02:00
return parent::encrypt($plaintext);
}
/**
* Decrypts a message.
*
2019-12-18 14:00:20 +01:00
* @see \tgseclib\Crypt\Common\SymmetricKey::decrypt()
* @access public
* @param string $ciphertext
* @return string $plaintext
*/
public function decrypt($ciphertext)
{
2013-05-20 08:19:38 +02:00
if ($this->mode_3cbc && strlen($this->key) > 8) {
return $this->unpad(
$this->des[0]->decrypt(
$this->des[1]->encrypt(
$this->des[2]->decrypt(
str_pad($ciphertext, (strlen($ciphertext) + 7) & 0xFFFFFFF8, "\0")
)
)
)
);
}
2013-05-20 08:19:38 +02:00
return parent::decrypt($ciphertext);
}
/**
* Treat consecutive "packets" as if they are a continuous buffer.
*
* Say you have a 16-byte plaintext $plaintext. Using the default behavior, the two following code snippets
* will yield different outputs:
*
* <code>
* echo $des->encrypt(substr($plaintext, 0, 8));
* echo $des->encrypt(substr($plaintext, 8, 8));
* </code>
* <code>
* echo $des->encrypt($plaintext);
* </code>
*
* The solution is to enable the continuous buffer. Although this will resolve the above discrepancy, it creates
* another, as demonstrated with the following:
*
* <code>
* $des->encrypt(substr($plaintext, 0, 8));
* echo $des->decrypt($des->encrypt(substr($plaintext, 8, 8)));
* </code>
* <code>
* echo $des->decrypt($des->encrypt(substr($plaintext, 8, 8)));
* </code>
*
* With the continuous buffer disabled, these would yield the same output. With it enabled, they yield different
* outputs. The reason is due to the fact that the initialization vector's change after every encryption /
* decryption round when the continuous buffer is enabled. When it's disabled, they remain constant.
*
2019-12-18 14:00:20 +01:00
* Put another way, when the continuous buffer is enabled, the state of the \tgseclib\Crypt\DES() object changes after each
* encryption / decryption round, whereas otherwise, it'd remain constant. For this reason, it's recommended that
* continuous buffers not be used. They do offer better security and are, in fact, sometimes required (SSH uses them),
* however, they are also less intuitive and more likely to cause you problems.
*
2019-12-18 14:00:20 +01:00
* @see \tgseclib\Crypt\Common\SymmetricKey::enableContinuousBuffer()
* @see self::disableContinuousBuffer()
* @access public
*/
public function enableContinuousBuffer()
{
2013-05-20 08:19:38 +02:00
parent::enableContinuousBuffer();
if ($this->mode_3cbc) {
$this->des[0]->enableContinuousBuffer();
$this->des[1]->enableContinuousBuffer();
$this->des[2]->enableContinuousBuffer();
}
}
/**
* Treat consecutive packets as if they are a discontinuous buffer.
*
* The default behavior.
*
2019-12-18 14:00:20 +01:00
* @see \tgseclib\Crypt\Common\SymmetricKey::disableContinuousBuffer()
* @see self::enableContinuousBuffer()
* @access public
*/
public function disableContinuousBuffer()
{
2013-05-20 08:19:38 +02:00
parent::disableContinuousBuffer();
if ($this->mode_3cbc) {
$this->des[0]->disableContinuousBuffer();
$this->des[1]->disableContinuousBuffer();
$this->des[2]->disableContinuousBuffer();
}
}
2013-05-25 04:05:24 +02:00
/**
* Creates the key schedule
*
2019-12-18 14:00:20 +01:00
* @see \tgseclib\Crypt\DES::setupKey()
* @see \tgseclib\Crypt\Common\SymmetricKey::setupKey()
2013-05-25 04:05:24 +02:00
* @access private
*/
protected function setupKey()
2013-05-25 04:05:24 +02:00
{
switch (true) {
// if $key <= 64bits we configure our internal pure-php cipher engine
// to act as regular [1]DES, not as 3DES. mcrypt.so::tripledes does the same.
case strlen($this->key) <= 8:
$this->des_rounds = 1;
break;
// otherwise, if $key > 64bits, we configure our engine to work as 3DES.
default:
$this->des_rounds = 3;
// (only) if 3CBC is used we have, of course, to setup the $des[0-2] keys also separately.
if ($this->mode_3cbc) {
$this->des[0]->setupKey();
$this->des[1]->setupKey();
$this->des[2]->setupKey();
2013-05-25 04:05:24 +02:00
// because $des[0-2] will, now, do all the work we can return here
// not need unnecessary stress parent::setupKey() with our, now unused, $key.
2013-05-25 04:05:24 +02:00
return;
}
}
// setup our key
parent::setupKey();
2013-05-25 04:05:24 +02:00
}
/**
* Sets the internal crypt engine
*
2019-12-18 14:00:20 +01:00
* @see \tgseclib\Crypt\Common\SymmetricKey::__construct()
* @see \tgseclib\Crypt\Common\SymmetricKey::setPreferredEngine()
* @param int $engine
* @access public
*/
public function setPreferredEngine($engine)
{
if ($this->mode_3cbc) {
$this->des[0]->setPreferredEngine($engine);
$this->des[1]->setPreferredEngine($engine);
$this->des[2]->setPreferredEngine($engine);
}
parent::setPreferredEngine($engine);
}
}