TForge 0.70 is released.
The release adds a new package TCiphers implementing private-key cryptography (block and stream ciphers). The current release supports:
- Block Ciphers:
- Modes of operation
- Padding methods
- No padding
- Zero padding
- ANSI X.923
- ISO 10126
- ISO/IEC 7816-4
- Stream Ciphers
The main idea behind writing the package is user-friendly Pascal Crypto API, suitable both for writing production code and for learning cryptography. Here is an example (the full source code can be found in the CipherDemo project) demonstrating how to encrypt and decrypt a file using AES cipher and CBC mode of operation in TForge:
procedure CBCFileDemo(const FileName: string;
const IV, Key: ByteArray);
TCipher.AES.ExpandKey(Key, CBC_ENCRYPT, IV)
.EncryptFile(FileName, FileName + '.aes');
TCipher.AES.ExpandKey(Key, CBC_DECRYPT, IV)
.DecryptFile(FileName + '.aes', FileName + '.bak');
The above example requires some explanation. For security reasons TForge don’t keep a copy of a plaintext key in a state of cipher instance if an algorithm supports key expansion (aka “key schedule”) procedure; instead it immediately expands a plaintext key passed as a parameter of ExpandKey method into a form internally used by the algorithm. A key expansion procedure may generally be affected by the encryption direction (encryption/decryption) and mode of operation, that is why TForge requires to set the encryption direction explicitly. If you expand key for decryption (ex using CBC_DECRYPT flag) and then call encryption method (ex EncryptFile), TForge raises exception.
The example is more suitable for crypto exercises. Production code usually follows the next template:
- create a cipher instance
- use the cipher instance for encryption or decryption
- erase the key data from the instance
which can be implemented as follows:
Cipher:= TCipher.AES.ExpandKey(Key, CBC_ENCRYPT, IV);
Cipher.EncryptFile(FileName, FileName + '.aes');
The instances of the TCipher type support Free method but there is no need to call Free explicitly because an instance is freed automatically when it goes out of scope.
If the padding method is not set explicitly TForge applies “default” padding method which depends on the mode of operation used. Ex for the CBC mode of operation the default padding method is “PKCS”, for the CTR mode of operation the default padding method is “no padding”; if you need say CTR with PKCS padding declare the padding method explicitly:
Cipher:= TCipher.AES.ExpandKey(Key, CTR_ENCRYPT or PADDING_PKCS, IV);
TCipher type includes several helper methods to keep simple tasks simple; for example to encrypt/decrypt a single 64-bit block by DES cipher with a given key
procedure BlockDemo(const Block, Key: ByteArray);
CipherText, PlainText: ByteArray;
CipherText:= TCipher.DES.EncryptBlock(Block, Key);
PlainText:= TCipher.DES.DecryptBlock(CipherText, Key);
Assert(PlainText = Block);
the methods EncryptBlock and DecryptBlock keep the key expansion details under the hood.
Another handy pair of TCipher methods is designed to encrypt/decrypt arbitrary-sized data:
procedure CBCDemo(const PlainText, IV, Key: ByteArray);
CipherText, Plaintext2: ByteArray;
CipherText:= TCipher.AES.ExpandKey(Key, CBC_ENCRYPT, IV)
PlainText2:= TCipher.AES.ExpandKey(Key, CBC_DECRYPT, IV)
Assert(PlainText = PlainText2);
The core TCipher methods for encryption/decryption of arbitrary data are
procedure TCipher.Encrypt(var Data; var DataSize: LongWord;
BufSize: LongWord; Last: Boolean);
procedure TCipher.Decrypt(var Data; var DataSize: LongWord;
The methods are designed for block ciphers but work with stream ciphers too. The Last argument defines whether the current portion of data is the last or not. For the last block the padding should be applied, and consequently the size of output data can differ from the size of input data. Generally the size of output data is larger for encryption and lesser for decryption; the difference can’t exceed the cipher’s block size. After the data is processed, the DataSize parameter contains the size of output data; the BufSize should be large enough to hold the output data, otherwise an exception is raised.
Stream ciphers expand a random key into a pseudorandom keystream and encrypt/decrypt by calculating xor
of the keystream and the input data, no padding involved, so the size of output data is always equal to the size of input data. This operation is implemented by the method TCipher.KeyCrypt
procedure TCipher.KeyCrypt(var Data; DataSize: LongWord;
which is the preferable method for encryption/decryption with a stream cipher.
The Last argument defines whether the current portion of data is last or not; if Last is false then the DataSize should be multiple of the cipher’s block size.
Legacy stream ciphers (RC4) have no block structure inside, so the “block size” for RC4 is equal to 1 (byte). On the other hand Salsa20 generates a keystream in 64-byte (that is 512-bit) blocks, sort of having a block cipher under the hood, so the notion of block size applies both to block and stream ciphers.
Any secure cipher can be used as a secure pseudorandom generator; the pseudorandom data can be generated by the method
function TCipher.KeyStream(DataSize: LongWord): ByteArray;
The seed of the pseudorandom generator is a random key.
Block ciphers implement TCipher.KeyCrypt and TCipher.KeyStream methods by applying the CTR mode of operation without padding, which converts a block cipher into a stream cipher. Ex the right way to use the AES algorithm for generating pseudorandom integer values is to expand a random key for CTR mode without padding and call TCipher.KeyStream:
procedure RandDemo(const Key: ByteArray);
Cipher:= Cipher.AES.ExpandKey(Key, CTR_ENCRYPT);
for I:= 0 to 9 do begin
Writeln(I:3, ': ', Rand);
block cipher algorithm is fully implemented as it was originally described, including 32- and 128-bit sized blocks. An instance of RC5 cipher can be created either as “standard” (8-byte block size, 12 rounds – just RC5
) or “extended” (4-, 8- or 16-byte block size, 1..255 rounds – RC5(BlockSize, Rounds)
procedure RC5BlockDemo(const Block, Key: ByteArray);
CipherText, PlainText: ByteArray;
CipherText:= TCipher.RC5(Block.Len, 20)
PlainText:= TCipher.RC5(Block.Len, 20)
Assert(PlainText = Block);
RC4 is a simple non-parallelizable stream cipher, widely used in today’s communication protocols but not recommended to use in new products because it is not considered secure now. Here is an example of file encryption/decryption using RC4:
procedure RC4FileDemo(const FileName: string; const Key: ByteArray);
.EncryptFile(FileName, FileName + '.rc4');
.DecryptFile(FileName + '.rc4', FileName + '.bak');
The example uses TCipher.Skip method to discard the first 1536 bytes of RC4 keystream [recommended for security reasons in RFC4345] prior to encryption/decryption. The parameter of TCipher.Skip method is the number of cipher blocks to be discarded; since RC4 has no block structure the “block” of RC4 is 1 byte.
Salsa20 is one of the eStream portfolio stream ciphers, modern, fast and parallelizable. The instances of Salsa20 can be created as “standard” (20-rounds) or “non-standard” (any even number of rounds from 2 to 254):
class function TCipher.Salsa20: TCipher;
class function TCipher.Salsa20(Rounds: LongWord): TCipher;
I will tell more about Salsa20 support in the next post dedicated to multithreading with TCiphers.