/* TripleDES.java -- Copyright (C) 2002, 2006 Free Software Foundation, Inc. This file is a part of GNU Classpath. GNU Classpath is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. GNU Classpath is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with GNU Classpath; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA Linking this library statically or dynamically with other modules is making a combined work based on this library. Thus, the terms and conditions of the GNU General Public License cover the whole combination. As a special exception, the copyright holders of this library give you permission to link this library with independent modules to produce an executable, regardless of the license terms of these independent modules, and to copy and distribute the resulting executable under terms of your choice, provided that you also meet, for each linked independent module, the terms and conditions of the license of that module. An independent module is a module which is not derived from or based on this library. If you modify this library, you may extend this exception to your version of the library, but you are not obligated to do so. If you do not wish to do so, delete this exception statement from your version. */ package gnu.javax.crypto.cipher; import gnu.java.security.Registry; import java.util.ArrayList; import java.util.Collections; import java.util.Iterator; import java.security.InvalidKeyException; /** * Triple-DES, 3DES, or DESede is a combined cipher that uses three * iterations of the Data Encryption Standard cipher to theoretically improve * the security of plain DES, at the cost of speed. *
* Triple-DES runs the DES algorithm three times with one, two or three * independent 56-bit (DES) keys. When used with one DES key, the cipher behaves * exactly like a (slower) DES. *
* To encrypt: *
Ci = Ek3 ( Ek2-1 ( * Ek1 ( Pi ))) **
* And to decrypt: *
Pi = Ek1-1 ( * Ek2 ( Ek3-1 ( Ci ))) **
* (The "ede" comes from the encryption operation, which runs * Encrypt-Decrypt-Encrypt) *
* References: *
3
as the value of the first parameter.
*
* @param kb The key bytes to adjust.
* @param offset The starting offset into the key bytes.
*/
public static void adjustParity(byte[] kb, int offset)
{
adjustParity(3, kb, offset);
}
/**
* Adjusts, in-situ, the parity of the designated bytes, so they can be used
* as DES keys for a 3-DES 1-, 2- or 3-key cipher.
*
* @param keyCount the number of independent DES keys. Can be either
* 1
, 2
or 3
. Any other value
* will cause an {@link IllegalArgumentException} to be raised.
* @param kb the array containing the key bytes to adjust. MUST have at least
* 8 * keyCount
bytes starting at offset position
* offset
, otherwise an
* {@link ArrayIndexOutOfBoundsException} will be raised.
* @param offset the starting offset into the array.
* @see DES#adjustParity(byte[],int)
*/
public static void adjustParity(int keyCount, byte[] kb, int offset)
{
if (keyCount < 1 || keyCount > 3)
throw new IllegalArgumentException("Invalid keyCount value: " + keyCount);
DES.adjustParity(kb, offset);
if (keyCount > 1)
DES.adjustParity(kb, offset + 8);
if (keyCount > 2)
DES.adjustParity(kb, offset + 16);
}
/**
* Convenience method which calls the method with same name and three
* arguments, passing 3
as the value of the first parameter.
*
* @param kb The key bytes to test.
* @param offset The starting offset into the key bytes.
* @return true
if the bytes in kb starting at
* offset are parity adjusted.
* @see DES#isParityAdjusted(byte[],int)
* @see #adjustParity(byte[],int)
*/
public static boolean isParityAdjusted(byte[] kb, int offset)
{
return isParityAdjusted(3, kb, offset);
}
/**
* Tests if enough bytes, expected to be used as DES keys for a 3-DES 1-, 2-
* or 3-key cipher, located in a designated byte array, has already been
* parity adjusted.
*
* @param keyCount the number of independent DES keys. Can be either
* 1
, 2
or 3
. Any other value
* will cause an {@link IllegalArgumentException} to be raised.
* @param kb the array containing the key bytes to test. MUST have at least
* 8 * keyCount
bytes starting at offset position
* offset
, otherwise an
* {@link ArrayIndexOutOfBoundsException} will be raised.
* @param offset the starting offset into the array.
* @return true
if the bytes in kb starting at
* offset are parity adjusted.
* @see DES#isParityAdjusted(byte[],int)
* @see #adjustParity(int,byte[],int)
*/
public static boolean isParityAdjusted(int keyCount, byte[] kb, int offset)
{
if (keyCount < 1 || keyCount > 3)
throw new IllegalArgumentException("Invalid keyCount value: " + keyCount);
boolean result = DES.isParityAdjusted(kb, offset);
if (keyCount > 1)
result = result && DES.isParityAdjusted(kb, offset + 8);
if (keyCount > 2)
result = result && DES.isParityAdjusted(kb, offset + 16);
return result;
}
public Object clone()
{
return new TripleDES();
}
public Iterator blockSizes()
{
return Collections.singleton(Integer.valueOf(BLOCK_SIZE)).iterator();
}
public Iterator keySizes()
{
ArrayList al = new ArrayList();
al.add(Integer.valueOf(8));
al.add(Integer.valueOf(16));
al.add(Integer.valueOf(24));
return Collections.unmodifiableList(al).iterator();
}
public Object makeKey(byte[] kb, int bs) throws InvalidKeyException
{
if (kb.length != 8 && kb.length != 16 && kb.length != 24)
throw new InvalidKeyException("TripleDES key must be 8, 16 or 24 bytes: "
+ kb.length);
Context ctx = new Context();
byte[] k1 = new byte[DES.KEY_SIZE];
System.arraycopy(kb, 0, k1, 0, DES.KEY_SIZE);
if (! DES.isParityAdjusted(k1, 0))
DES.adjustParity(k1, 0);
ctx.k1 = (DES.Context) des.makeKey(k1, bs);
if (kb.length == 8)
{
ctx.k2 = (DES.Context) des.makeKey(k1, bs);
ctx.k3 = (DES.Context) des.makeKey(k1, bs);
}
else
{
byte[] k2 = new byte[DES.KEY_SIZE];
System.arraycopy(kb, DES.KEY_SIZE, k2, 0, DES.KEY_SIZE);
if (! DES.isParityAdjusted(k2, 0))
DES.adjustParity(k2, 0);
ctx.k2 = (DES.Context) des.makeKey(k2, bs);
byte[] k3 = new byte[DES.KEY_SIZE];
if (kb.length == 16)
ctx.k3 = (DES.Context) des.makeKey(k1, bs);
else
{
System.arraycopy(kb, 2 * DES.KEY_SIZE, k3, 0, DES.KEY_SIZE);
if (! DES.isParityAdjusted(k3, 0))
DES.adjustParity(k3, 0);
ctx.k3 = (DES.Context) des.makeKey(k3, bs);
}
}
return ctx;
}
public void encrypt(byte[] in, int i, byte[] out, int o, Object K, int bs)
{
byte[] temp = new byte[BLOCK_SIZE];
des.encrypt(in, i, temp, 0, ((Context) K).k1, bs);
des.decrypt(temp, 0, temp, 0, ((Context) K).k2, bs);
des.encrypt(temp, 0, out, o, ((Context) K).k3, bs);
}
public void decrypt(byte[] in, int i, byte[] out, int o, Object K, int bs)
{
byte[] temp = new byte[BLOCK_SIZE];
des.decrypt(in, i, temp, 0, ((Context) K).k3, bs);
des.encrypt(temp, 0, temp, 0, ((Context) K).k2, bs);
des.decrypt(temp, 0, out, o, ((Context) K).k1, bs);
}
private final class Context
{
DES.Context k1, k2, k3;
}
}