gpt4 book ai didi

c# - (C#) 在 (EC)DHE x25519 上使用私钥和公钥计算 key 份额

转载 作者:行者123 更新时间:2023-12-05 09:31:47 24 4
gpt4 key购买 nike

我正在使用 (EC)DHE 加密类型 x25519,我在计算共享 key 时遇到了一个大问题。

我有三个键:

  • 爱丽丝的私钥:

    a : "984a382e1e48d2a522a0e81b92fd13517e904316c6687a59d66cd2e5d9519a53"
  • 爱丽丝的公钥:

    Q(a) = a*G(a) : "3db045ba8a16efd9e15de287158097ee754ce5d76e83c5e434109dd132a4736d"
  • Bob 的公钥:

    Q(b) =  b*G(b) : "74676252b0757ba3cb945ea053d9d65897a22e01592f7fa9c9503b818cd9df5a"

所以现在我需要像这样组合 Alice 的私钥和 Bob 的公钥(以找到它们之间的共享 key ):

Z = a * Q(b) = a * b * G(b)

有人用 C# 帮我解决这个问题吗? (我需要一个编程代码)。

最佳答案

I am working with (EC)DHE encryption type x25519 and I have a big problem on calculating shared key.

Microsoft 没有椭圆曲线 x25519 的默认实现。然而,他们对加密 Diffie Hellman 对象的实现允许我们定义我们自己的曲线。

一旦我们定义了自己的曲线以使用 (x25519),我们就可以使用 Microsoft 的 ECDiffieHellmanCng 实现来导入曲线、生成 key 并创建共享 secret 。

感谢Yasar_yy对于他关于 x25519 上不相关主题的问题,他为我们实现了曲线。

我们使用 ECCurve 类实现曲线

public static ECCurve Curve25519 {get; init;} = new ECCurve()
{
CurveType = ECCurve.ECCurveType.PrimeMontgomery,
B = new byte[] { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1 },
A = new byte[] { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0x07, 0x6d, 0x06 }, // 486662
G = new ECPoint()
{
X = new byte[] { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 9 },
Y = new byte[] { 0x20, 0xae, 0x19, 0xa1, 0xb8, 0xa0, 0x86, 0xb4, 0xe0, 0x1e, 0xdd, 0x2c, 0x77, 0x48, 0xd1, 0x4c,
0x92, 0x3d, 0x4d, 0x7e, 0x6d, 0x7c, 0x61, 0xb2, 0x29, 0xe9, 0xc5, 0xa2, 0x7e, 0xce, 0xd3, 0xd9 }
},
Prime = new byte[] { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xed },
//Prime = new byte[] { 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1 },
Order = new byte[] { 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x14, 0xde, 0xf9, 0xde, 0xa2, 0xf7, 0x9c, 0xd6, 0x58, 0x12, 0x63, 0x1a, 0x5c, 0xf5, 0xd3, 0xed },
Cofactor = new byte[] { 8 }
};

在我们定义了我们想要使用的曲线之后,我们只需要为曲线生成键,其余的是使用 ECDiffieHellmanCng 类的标准。

public class Person
{
public string Name {get; set;}

public byte[] PublicKey {get; private set;}

public byte[] PrivateKey {get; private set;}

private ECParameters EncryptionParameters;

public void GenerateInitialKeys()
{
using (ECDiffieHellmanCng bob = new ECDiffieHellmanCng())
{
// we have to generate the key explicitly using the curve we defined, the auto-generated keys can not be used
bob.GenerateKey(Curve25519);

// assign what algorithms for derivation and hashing should be used
bob.KeyDerivationFunction = ECDiffieHellmanKeyDerivationFunction.Hash;
bob.HashAlgorithm = CngAlgorithm.Sha256;

// save the keys
PublicKey = bob.PublicKey.ToByteArray();
PrivateKey = bob.ExportECPrivateKey();

// export the curve information so we can create a shared secret later
EncryptionParameters = bob.ExportParameters(true);
}
}

public void CreateSharedSecret(byte[] OtherPublicKey)
{
if(EncryptionParameters is null)
{
throw new NullReferenceException($"{nameof(EncryptionParameters)} must not be null, invoke {nameof(GenerateInitialKeys)} to generate new keys and {nameof(EncryptionParameters)}");
}
using (ECDiffieHellmanCng bob = new ECDiffieHellmanCng())
{
// import the curve information from when generated our initial keys
bob.ImportParameters(EncryptionParameters);

// assign what algorithms for derivation and hashing should be used
bob.KeyDerivationFunction = ECDiffieHellmanKeyDerivationFunction.Hash;
bob.HashAlgorithm = CngAlgorithm.Sha256;

// import the byte[] as a key, note EccFullPublicBlob is required, otherwise a generic runtime error will throw and will contain absolutely no useful information
CngKey otherKey = CngKey.Import(OtherPublicKey, CngKeyBlobFormat.EccFullPublicBlob)

// Save the shared secret
PrivateKey = bob.DeriveKeyMaterial(otherKey);
}
}

// This is just here to visually verify the private keys for equality because we don't speak or read byte[]
public string ExportPrivateKey()
{
return Convert.ToBase64String(PrivateKey ?? Array.Empty<byte>());
}
}

要使用这个非常基本的类,我们只需调用GenerateKeys,然后调用CreateSharedSecret

Person alice = new();
Person bob = new();

alice.GenerateInitialKeys();

bob.GenerateInitialKeys();

alice.CreateSharedSecret(bob.PublicKey);

bob.CreateSharedSecret(alice.PublicKey);

Console.WriteLine(alice.ExportPrivateKey() == bob.ExportPrivateKey());
// ideally should output: true

关于c# - (C#) 在 (EC)DHE x25519 上使用私钥和公钥计算 key 份额,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/68622359/

24 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com