gpt4 book ai didi

c++ - 如何使Botan RSA签名验证匹配PyCrypto

转载 作者:行者123 更新时间:2023-11-28 08:10:49 34 4
gpt4 key购买 nike

我正在开发一个生成 RSA 签名的 key 生成器将被下载到客户端计算机。

在客户端计算机中,我想使用 RSA 签名和用于验证字符串的公钥。如果你能帮忙的话,我想知道算法是什么我应该用它来验证签名或有什么问题我的代码。

[编辑根据建议更新了代码,但仍然没有成功。]

Python 代码:

from Crypto.Signature import PKCS1_PSS
from Crypto.Hash import SHA
from Crypto.PublicKey import RSA
from Crypto import Random

key_priv = RSA.generate(1024)#, random_generator)
#key_priv = RSA.importKey(open('key.priv.pem.rsa').read())

key_pub = key_priv.publickey()
n, e = key_pub.n, key_pub.e

p,q,d,u = key_priv.p, key_priv.q, key_priv.d, key_priv.u

print "char n[] = \"",n,"\";"
print "char e[] = \"",e,"\";"

#print "key_pub.exportKey(): ",key_pub.exportKey()

mac = '192.168.0.106'
plugin = 'Bluetooth'
text = plugin + mac

hash = SHA.new()
hash.update(text)

#signature = key_priv.sign(hash, None, 'PKCS1')[0]
#print "signature: ", signature

#random_generator = Random.new().read
#signature = key_priv.sign(hash, '')

signer = PKCS1_PSS.new(key_priv)

# signature = signer.sign(hash)
signature = open('plugin_example.signature').read()

print "type(signature)", type(signature) #str
print "signature: ", signature

verifier = PKCS1_PSS.new(key_pub)
if verifier.verify(hash, signature):
print "The signature is authentic."
else:
print "The signature is not authentic."

fd = open("plugin_example.signature", "w")
fd.write(signature)
fd.close()

fd = open("key.pub.pem.rsa", "w")
fd.write(key_pub.exportKey())
fd.close()

fd = open("key.priv.pem.rsa", "w")
fd.write(key_priv.exportKey())
fd.close()

C++ 代码:

#include <string.h>
#include <assert.h>
#include <iostream>
#include <fstream>
#include <string>
#include <memory>
#include <vector>

#include <botan/botan.h>
#include <botan/look_pk.h>
#include <botan/rsa.h>

#include <QtCore>
#include "lib/debug.hpp"
#include <QDebug>

#define Q(AAA) qDebug() << #AAA <<" " << AAA << endl;
#define P(X) std::cout << #X <<" = " << X << " "<< std::endl;

using namespace Botan;

static BigInt to_bigint(const std::string& h)
{
return BigInt::decode((const byte*)h.data(),
h.length(), BigInt::Hexadecimal);
}


int main(int argc, char ** argv) {

Botan::LibraryInitializer init;

QByteArray mac = "192.168.0.106";
QByteArray plugin = "Bluetooth";
QByteArray mac_and_plugin = plugin+mac;

QByteArray mac_and_plugin_hex = QCryptographicHash::hash ( mac_and_plugin, QCryptographicHash::Sha1 ).toHex();

QByteArray qByteArray_sig;
QFile file ( argv[1] );
file.open ( QIODevice::ReadOnly );
if ( file.isReadable() )
{
qByteArray_sig = file.readAll();
}
file.close();

QByteArray qByteArray_sig_hex = qByteArray_sig.toHex();

char n[] = "137758869720100695031597743484335597584728606037599895664824678915370363634933922524373276431650126408515526550739072301333537631796375930381713667037665579467940926539847824669399430790335904629465572107797677521774814742987023253982675971904413266030976887012380999213491205226382726115118193377641942499979";
char e[] = "65537";

BigInt big_n = to_bigint(n);// mod
BigInt big_e = to_bigint(e);// exp
RSA_PublicKey pub_key(big_n,big_e);

PK_Verifier* verifier = 0;

QStringList l;
l.push_back("EMSA1(SHA-1)");
l.push_back("EMSA3(SHA-1)");
l.push_back("EMSA4(SHA-1)");
l.push_back("EMSA1(SHA-256)");
l.push_back("EMSA3(SHA-256)");
l.push_back("EMSA4(SHA-256)");
l.push_back("EMSA3(MD5)");

P(qByteArray_sig.length());

for (int i = 0 ; i < l.size(); i++) {
if (verifier)
delete verifier;
verifier = get_pk_verifier(pub_key, l[i].toStdString() );

bool is_valid = verifier->verify_message(
mac_and_plugin_hex.data(),mac_and_plugin_hex.length(),
qByteArray_sig_hex.data(), qByteArray_sig_hex.length()
);
P(is_valid);

is_valid = verifier->verify_message(
mac_and_plugin_hex.data(),mac_and_plugin_hex.length(),
qByteArray_sig.data(), qByteArray_sig.length()
);
P(is_valid);

is_valid = verifier->verify_message(
mac_and_plugin.data(),mac_and_plugin.length(),
qByteArray_sig.data(), qByteArray_sig.length()
);
P(is_valid);

}

Q(qByteArray_sig);
Q(qByteArray_sig_hex);;
}

最佳答案

在这段 Python 代码中,您正在创建一个不遵循任何实际协议(protocol)或标准的 RSA 签名。换句话说,它是原始的并且在大多数情况下是不安全的。

相反,您应该使用类似 PSS 的东西(使用 pycrypto 模块 PKCS1_PSS here )。在Botan编码中,可以通过EMSA4编码验证。

或者你可以使用 PKCS#1 v1.5 .在牡丹,就是 EMSA3。

无论哪种情况,双方的哈希算法必须相同。

关于c++ - 如何使Botan RSA签名验证匹配PyCrypto,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/9116970/

34 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com