pc-dart icon indicating copy to clipboard operation
pc-dart copied to clipboard

rsa/ecb/oaepwithsha-256andmgf1padding support?

Open santitigaga opened this issue 3 years ago • 9 comments

pc-dart support rsa/ecb/oaepwithsha-256andmgf1padding? I hope we can encrypt with pc-dart and decrypt with Java.

The same issue is open here

santitigaga avatar Dec 30 '20 17:12 santitigaga

To add some weight to this issue, many implementations out there (including the recommended implementation of WebCrypto) of RSA-OAEP is using SHA-256 for hashing and MGF.

The implementation currently in pointycastle is hardcoding SHA1 for those, and it makes interoperability between, say, a Native Flutter and a Web-based application to be broken.

I tried playing in the internals of asymmetric/oaep.dart but I'm not cryptographer, so I feel clueless to help unfortunately.

matehat avatar Jan 10 '21 16:01 matehat

Hi,

Thanks, I'll see how I go getting to it.

MW

mwcw avatar Jan 11 '21 09:01 mwcw

Thanks @mwcw! I did a quick implementation that seems to work, although I'm not sure it's up to the PointyCastle standard right now: https://github.com/braverhealth/pc-dart/commit/0be621ffae8104e26050342f1fb41bee46f8a44b

To avoid clashing with existing API, I simply added an entirely new class that is a copy of pretty much the entire existing SHA1-based OAEP class, but using SHA-256 where appropriate. Tests against a reference implementation (from a Python equivalent library) indicate that encryption/decryption work fine with this minimal change.

If you don't have bandwidth to tackle that now, I can open a PR in a couple days to clean things up.

matehat avatar Jan 11 '21 14:01 matehat

I opened a PR (#98) with the mentioned changes. We are actively using it in a production app and encryption is compatible with other implementations.

matehat avatar Apr 18 '21 12:04 matehat

Maybe I'm out of line here, and asymmetric encryption isn't my specialty, but can we generalize OAEP to work with any hashing algorithm underneath? We do have a Digest class, so if users can pass a digest, we can do something similar to the PBKDF2 construction (or whatever).

AKushWarrior avatar Apr 19 '21 07:04 AKushWarrior

@AKushWarrior it could in theory, but in practice and through different recommendations, SHA256 is most often used as the Hash function as well as in the MGF1 hash generation. SHA1 is considered less secure and I've never seen other hash functions used in place of those.

matehat avatar Apr 19 '21 15:04 matehat

I think that we likely have to preserve SHA-1 as the default (in the interest of not breaking all RSA-OAEP code). Providing multiple OAEP classes seems ridiculous (the digest is already declared as a top-level field, we can literally just provide access to that through a parameter).

We should probably use: "RSA/OAEP/___", where the empty space is the hashing algorithm, for the registry. If a consumer is accessing the class directly, we can provide an optional "digest" parameter in the constructor which defines the hashing algorithm to use.

Though this allows novel constructions (which are discouraged), I think that this library is not strongly opinionated when it comes to "best practices"; we provide the tools and have faith that client programmers know enough not to shoot themselves in the foot.

AKushWarrior avatar Apr 21 '21 03:04 AKushWarrior

Have you looked at the PR? Maybe it'd be more constructive to discuss there? Your comment seems out of date with the current situation.

matehat avatar Apr 21 '21 10:04 matehat

@AKushWarrior

I think that we likely have to preserve SHA-1 as the default (in the interest of not breaking all RSA-OAEP code). Providing multiple OAEP classes seems ridiculous (the digest is already declared as a top-level field, we can literally just provide access to that through a parameter).

This can be mitigated with a major version change. Using SHA-1 makes encryption vulnerable - see the comment here - https://developer.mozilla.org/en-US/docs/Web/API/RsaHashedKeyGenParams

We should probably use: "RSA/OAEP/___", where the empty space is the hashing algorithm, for the registry. If a consumer is accessing the class directly, we can provide an optional "digest" parameter in the constructor which defines the hashing algorithm to use.

That might be ok as long as the default is secure. Preserving backwards compatibility in the face of existing security vulnerability is wrong.

I believe that this issue should be treated as a disclosed security vulnerability and OAEP implementation here should not be used until this issue is fixed. It also deserves a notice in readme once the major version change is released that OAEP implementation in previous versions is insecure.

epoberezkin avatar Oct 17 '21 11:10 epoberezkin