Пример #1
0
 public static User GetLoggedUser()
 {
     try
     {
         XmlDocument doc            = new XmlDocument();
         String      configFileName = Utils.DirectoryAndFileHelper.SignedInUserFile;
         if (File.Exists(configFileName))
         {
             doc.Load(configFileName);
             RC4Engine encrytionEngine = new RC4Engine();
             encrytionEngine.EncryptionKey = "1deageo!";
             encrytionEngine.CryptedText   = doc.DocumentElement.Attributes["user"].Value;
             if (!encrytionEngine.Decrypt())
             {
                 return(null);
             }
             if (encrytionEngine.InClearText == "-1")
             {
                 return(null);
             }
             return(GetByIDUser(Convert.ToInt32(encrytionEngine.InClearText)));
         }
         return(null);
     }
     catch (Exception)
     {
         return(null);
     }
 }
Пример #2
0
        public Ntlmv2Decoder(byte[] serverSigningKey, byte[] serverSealingKey)
        {
            _sealing = new RC4Engine();
            _sealing.Init(false, new KeyParameter(serverSealingKey));

            _signing = new HMACMD5(serverSigningKey);
        }
Пример #3
0
        private void CacheCurrentUser()
        {
            String      userInfoFileName = DirectoryAndFileHelper.SignedInUserFile;
            XmlDocument doc = new XmlDocument();
            RC4Engine   encryptionEngine = new RC4Engine();

            encryptionEngine.EncryptionKey = "1deageo!";
            encryptionEngine.InClearText   = ERMTSession.Instance.CurrentUser.IDUser.ToString();
            if (!encryptionEngine.Encrypt())
            {
                return;
            }

            if (File.Exists(userInfoFileName))
            {
                doc.Load(userInfoFileName);
                doc.DocumentElement.Attributes["user"].Value = encryptionEngine.CryptedText;
            }
            else
            {
                doc.LoadXml("<Language user=\"" + encryptionEngine.CryptedText + "\" />");
            }

            doc.Save(userInfoFileName);
        }
Пример #4
0
 public static void SignOutUser()
 {
     try
     {
         XmlDocument doc = new XmlDocument();
         String      userInfoFileName = Utils.DirectoryAndFileHelper.SignedInUserFile;
         if (File.Exists(userInfoFileName))
         {
             doc.Load(userInfoFileName);
             RC4Engine encryptionEngine = new RC4Engine();
             encryptionEngine.EncryptionKey = "1deageo!";
             encryptionEngine.InClearText   = "-1";
             if (!encryptionEngine.Encrypt())
             {
                 return;
             }
             doc.DocumentElement.Attributes["user"].Value = encryptionEngine.CryptedText;
             doc.Save(userInfoFileName);
         }
         ERMTSession.Instance.LogoutUser();
     }
     catch (Exception)
     {
     }
 }
Пример #5
0
        public Ntlmv2Encoder(byte[] clientSigningKey, byte[] clientSealingKey)
        {
            _sealing = new RC4Engine();
            _sealing.Init(true, new KeyParameter(clientSealingKey));

            _signing = new HMACMD5(clientSigningKey);
        }
Пример #6
0
 private RC4(string key = null, string iv = null, int keyLength = Utility.DefaultGeneratedPasswordLength, bool generateIV = false)
 {
     this._key    = key ?? Utility.GeneratePassword(keyLength);
     this._iv     = generateIV ? Utility.ConvertToString(Utility.GenerateIV()) : iv;
     this.cipher  = new RC4Engine();
     cipherParams = new KeyParameter(Encoding.UTF8.GetBytes(this.Key + this.IV));
 }
Пример #7
0
        /// <summary>
        /// Creates a new instance of an NTLM type 3 message using the specified
        /// values.
        /// </summary>
        /// <param name="username">The Windows account name to use for
        /// authentication.</param>
        /// <param name="password">The Windows account password to use for
        /// authentication.</param>
        /// <param name="challenge">The challenge received from the server as part
        /// of the NTLM type 2 message.</param>
        /// <param name="useUnicode">Set this to true, if Unicode encoding has been
        /// negotiated between client and server.</param>
        /// <param name="workstation">The client's workstation name.</param>
        /// <param name="ntlmv2">Set to true to send an NTLMv2 challenge
        /// response.</param>
        /// <param name="targetName">The authentication realm in which the
        /// authenticating account has membership.</param>
        /// <param name="targetInformation">The target information block from
        /// the NTLM type 2 message.</param>
        /// <remarks>The target name is a domain name for domain accounts, or
        /// a server name for local machine accounts.</remarks>
        /// <exception cref="ArgumentNullException">Thrown if the username, password
        /// or challenge parameters are null.</exception>
        public Type3Message(NetworkCredential credential, byte[] challenge,
                            bool useUnicode, string workstation, Flags additionalFlags = default(Flags), bool ntlmv2 = false,
                            string targetName = null, byte[] targetInformation = null)
        {
            // Preconditions.
            credential.UserName.ThrowIfNull("username");
            credential.Password.ThrowIfNull("password");
            challenge.ThrowIfNull("challenge");
            encoding = useUnicode ? Encoding.Unicode : Encoding.ASCII;

            // Setup the security buffers contents.
            this.username    = encoding.GetBytes(credential.UserName);
            this.workstation = encoding.GetBytes(workstation);
            this.targetName  = String.IsNullOrEmpty(targetName) ? new byte[0] :
                               encoding.GetBytes(targetName);
            // The session key is not relevant to authentication.
            this.sessionKey = new byte[0];
            // Compute the actual challenge response data.
            if (!ntlmv2)
            {
                LMResponse   = Responses.ComputeLMResponse(challenge, credential.Password);
                NtlmResponse = Responses.ComputeNtlmResponse(challenge, credential.Password);
            }
            else
            {
                byte[] cnonce = GetCNonce();
                LMResponse = Responses.ComputeLMv2Response(targetName, credential, challenge, cnonce);
                var ntlmv2Hash = Responses.Ntlmv2Hash(targetName, credential);
                NtlmResponse = Responses.ComputeNtlmv2Response(ntlmv2Hash, targetInformation, challenge, cnonce);
                Flags       |= additionalFlags;
                using (var hmac = new HMACMD5(ntlmv2Hash))
                {
                    var userSessionKey = hmac.ComputeHash(NtlmResponse, 0, 16);
                    if ((Flags & Flags.NegotiateSeal) != default(Flags) || (Flags & Flags.NegotiateSign) != default(Flags))
                    {
                        // Sealing or signing required
                        if ((Flags & Flags.NegotiateKeyExchange) != default(Flags))
                        {
                            // Key exchange initiated so need to generate a new key
                            var cipher = new RC4Engine();
                            cipher.Init(true, new KeyParameter(userSessionKey));
                            SessionKey = new byte[16];
                            using (var rnd = RandomNumberGenerator.Create())
                                rnd.GetBytes(SessionKey);

                            sessionKey = new byte[16];
                            cipher.ProcessBytes(SessionKey, 0, SessionKey.Length, sessionKey, 0);
                        }
                        else
                        {
                            // NTLMv2 User Session Key used
                            SessionKey = userSessionKey;
                        }
                    }
                }
            }
            // We spoof an OS version of Windows 7 Build 7601.
            OSVersion = new OSVersion(6, 1, 7601);
        }
Пример #8
0
    public ARC4(byte[] sessionKey, bool forEncryption)
    {
        this.rc4 = new RC4Engine();
        this.rc4.Init(forEncryption, new KeyParameter(sessionKey));

        // Drop first 1024 bytes
        this.ProcessBytes(new byte[1024]);
    }
 /// <summary>
 /// 将有效的RC4编码字符串转换到等效字符串表示形式。
 /// </summary>
 /// <param name="value">欲被转换的字符串</param>
 /// <returns></returns>
 public static string FromRC4String(this string value, string key)
 {
     if (string.IsNullOrEmpty(value) || string.IsNullOrEmpty(key))
     {
         return(string.Empty);
     }
     return(RC4Engine.RC4Create(key, value));
 }
Пример #10
0
 protected internal RC4Engine GetEngine()
 {
     if (_engine == null)
     {
         _engine = new RC4Engine();
     }
     return(_engine);
 }
Пример #11
0
        /// <summary>
        /// Decodes the page in the given buffer (in place) using RC4 decryption with
        /// the given params.
        /// </summary>
        /// <remarks>
        /// Decodes the page in the given buffer (in place) using RC4 decryption with
        /// the given params.
        /// </remarks>
        /// <param name="buffer">encoded page buffer</param>
        /// <param name="params">RC4 decryption parameters</param>
        protected internal virtual void DecodePage(ByteBuffer buffer, KeyParameter @params
                                                   )
        {
            RC4Engine engine = GetEngine();

            engine.Init(false, @params);
            byte[] array = ((byte[])buffer.Array());
            engine.ProcessBytes(array, 0, array.Length, array, 0);
        }
        /// <summary>
        /// Creates a new RC4 service with the provided <see cref="key"/>.
        /// </summary>
        /// <param name="key">The RC4 key.</param>
        public RC4CryptoServiceProvider([NotNull] byte[] key, bool forEncryption)
        {
            if (key == null)
            {
                throw new ArgumentNullException(nameof(key));
            }

            //Bouncy requires key initialization
            internalRC4Engine = new RC4Engine();
            internalRC4Engine.Init(forEncryption, new KeyParameter(key));
        }
Пример #13
0
        /// <summary>
        ///
        /// </summary>
        /// <param name="bootKey"></param>
        /// <returns></returns>
        private byte[] GenerateHashedBootKey(List <byte> bootKey)
        {
            try
            {
                RegParser regParser = new RegParser(_samFile);

                RegKey rootKey = regParser.RootKey;

                RegKey regKey = rootKey.Key(@"SAM\Domains\Account");

                if (regKey == null)
                {
                    this.OnError("Unable to locate the following registry key: SAM\\SAM\\Domains\\Account");
                    return(null);
                }

                RegValue regValue = regKey.Value("F");
                if (regValue == null)
                {
                    this.OnError("Unable to locate the following registry key: SAM\\SAM\\Domains\\Account\\F");
                    return(null);
                }

                byte[] hashedBootKey = new byte[16];

                Buffer.BlockCopy((byte[])regValue.Data, 112, hashedBootKey, 0, 16);

                //this.PrintHex("Hashed bootkey", hashedBootKey.ToArray());

                List <byte> data = new List <byte>();
                data.AddRange(hashedBootKey.ToArray());
                data.AddRange(Encoding.ASCII.GetBytes(_aqwerty));
                data.AddRange(bootKey.ToArray());
                data.AddRange(Encoding.ASCII.GetBytes(_anum));
                byte[] md5 = MD5.Create().ComputeHash(data.ToArray());

                byte[] encData   = new byte[32];
                byte[] encOutput = new byte[32];

                Buffer.BlockCopy((byte[])regValue.Data, 128, encData, 0, 32);

                RC4Engine rc4Engine = new RC4Engine();
                rc4Engine.Init(true, new KeyParameter(md5));
                rc4Engine.ProcessBytes(encData, 0, 32, encOutput, 0);

                return(encOutput);
            }
            catch (Exception ex)
            {
                this.OnError("An error occured whilst generating the hashed boot key");
                Misc.WriteToEventLog(Application.ProductName, ex.Message, EventLogEntryType.Error);
                return(null);
            }
        }
Пример #14
0
        public void ThreadRun()
        {
            int i = 0;

            byte[] clearText    = new byte[kryptogram.Length];
            string czescKlucza1 = "";

            while (i <= szukaj.max)
            {
                i = szukaj.wykonane();

                if (i <= szukaj.max)
                {
                    czescKlucza1 = i.ToString("X");
                    while (czescKlucza1.Length < 8)
                    {
                        czescKlucza1 = "0" + czescKlucza1;
                    }

                    String klucz = czescKlucza1.ToLower() + czescKlucza2;
                    try
                    {
                        RC4Engine    rc4      = new RC4Engine();
                        KeyParameter keyParam = new KeyParameter(System.Text.Encoding.ASCII.GetBytes(klucz));
                        rc4.Init(false, keyParam);
                        rc4.ProcessBytes(kryptogram, 0, kryptogram.Length, clearText, 0);
                    }
                    catch (Exception e)
                    {
                    }
                    bool zgodne = true;
                    for (int j = 0; j < clearText.Length; j++)
                    {
                        if (!alfabet.lista_znakow.Contains((char)clearText[j]))
                        {
                            zgodne = false;
                        }
                    }
                    //jeśli znalazl dobry klucz
                    if (zgodne)
                    {
                        Console.Write("Wiadomosc : ");
                        foreach (byte x in clearText)
                        {
                            Console.Write("{0} ", (char)x);
                        }
                        Console.WriteLine("");
                        Console.WriteLine(" klucz: {0}", klucz);
                        szukaj.ileZrobiono = szukaj.max;
                    }
                }
            }
        }
        private void VerifyPassword(ByteBuffer buffer, byte[] testEncodingKey, byte[] testBytes
                                    )
        {
            RC4Engine engine = GetEngine();

            engine.Init(false, new KeyParameter(testEncodingKey));
            byte[] encrypted4BytesCheck = GetPasswordTestBytes(buffer);
            byte[] decrypted4BytesCheck = new byte[4];
            engine.ProcessBytes(encrypted4BytesCheck, 0, encrypted4BytesCheck.Length, decrypted4BytesCheck
                                , 0);
            if (!Arrays.Equals(decrypted4BytesCheck, testBytes))
            {
                throw new InvalidOperationException("Incorrect password provided");
            }
        }
Пример #16
0
 private void InitEngine()
 {
     if (_config.CipherAlgorithm == CipherAlgorithm.RC4)
     {
         _myRc4 = new RC4Engine();
     }
     else
     {
         _myAes = new AesEngine();
         if (_config.IvOrSalt == null && _config.BlockMode != BlockMode.ECB)
         {
             _config.IvOrSalt = GenerateIv();
         }
     }
 }
Пример #17
0
        /// <summary>
        /// Encrypt a string using RC4 algorithm
        /// </summary>
        /// <param name="Data">Original string</param>
        /// <param name="Salt">Random data</param>
        /// <returns>HEX encoded encrypted string literal</returns>
        public static string EncryptWithRC4(string Data, string Salt = "")
        {
            // URL encode string to preserve foriegn characters and NON-ANSI characters
            Data = System.Net.WebUtility.UrlEncode(Data);

            // Encrypt string
            RC4Engine RC4 = new RC4Engine();

            RC4.EncryptionKey = Config.EncryptionPassword + Salt + Config.EncryptionSalt;
            RC4.InClearText   = Data;
            RC4.Encrypt();
            string Encrypted = RC4.CryptedText;

            // Convert to HEX
            return(ConvertToHexString(Encrypted));
        }
Пример #18
0
        /// <summary>
        /// Decrypt a string using RC4 algorithm
        /// </summary>
        /// <param name="Data">HEX encoded encrypted string</param>
        /// <param name="Salt">Random data</param>
        /// <returns>Decrypted string literal</returns>
        public static string DecryptWithRC4(string Data, string Salt = "")
        {
            // Convert from HEX
            Data = ConvertFromHexString(Data);

            // Decrypt string
            RC4Engine RC4 = new RC4Engine();

            RC4.EncryptionKey = Config.EncryptionPassword + Salt + Config.EncryptionSalt;
            RC4.CryptedText   = Data;
            RC4.Decrypt();
            string Decrypted = RC4.InClearText;

            // URL decode
            return(System.Net.WebUtility.UrlDecode(Decrypted));
        }
Пример #19
0
        private static string RC4Create(string key, string value)
        {
            char[] buffer = value.ToCharArray();
            byte[] box    = RC4Engine.RC4Init(key);
            for (int i = 0, low = 0, high = 0, mid; i < buffer.Length; i++)
            {
                low  = (low + key.Length) % byte.MaxValue;
                high = (high + box[i % byte.MaxValue]) % byte.MaxValue;

                byte b = box[low];
                box[low]  = box[high];
                box[high] = b;

                mid        = (box[low] + box[high]) % byte.MaxValue;
                buffer[i] ^= (char)box[mid];
            }
            return(new string(buffer));
        }
Пример #20
0
        /********EXTERNAL OBJECT PUBLIC METHODS  - END ********/



        /// <summary>
        /// Buils the StreamCipher
        /// </summary>
        /// <param name="algorithm">SymmetrcStreamAlgorithm enum, algorithm name</param>
        /// <returns>IStreamCipher with the algorithm Stream Engine</returns>
        private IStreamCipher getCipherEngine(SymmetricStreamAlgorithm algorithm)
        {
            IStreamCipher engine = null;

            switch (algorithm)
            {
            case SymmetricStreamAlgorithm.RC4:
                engine = new RC4Engine();
                break;

            case SymmetricStreamAlgorithm.HC128:
                engine = new HC128Engine();
                break;

            case SymmetricStreamAlgorithm.HC256:
                engine = new HC256Engine();
                break;

            case SymmetricStreamAlgorithm.SALSA20:
                engine = new Salsa20Engine();
                break;

            case SymmetricStreamAlgorithm.CHACHA20:
                engine = new ChaChaEngine();
                break;

            case SymmetricStreamAlgorithm.XSALSA20:
                engine = new XSalsa20Engine();
                break;

            case SymmetricStreamAlgorithm.ISAAC:
                engine = new IsaacEngine();
                break;

            case SymmetricStreamAlgorithm.VMPC:
                engine = new VmpcEngine();
                break;

            default:
                this.GetError().setError("SS005", "Cipher " + algorithm + " not recognised.");
                break;
            }
            return(engine);
        }
Пример #21
0
        static void Main(string[] args)
        {
            if (args[0] == "-d")
            {
                FileStream fs = new FileStream(args[1], FileMode.OpenOrCreate, FileAccess.ReadWrite);

                int keyLen = readInt32BE(fs);
                Console.WriteLine("KeyLen: " + keyLen.ToString());
                byte[] key = new byte[keyLen];
                fs.Read(key, 0, keyLen);

                long Remaining = fs.Length - fs.Position;
                Console.WriteLine("Remaining: " + Remaining.ToString());
                byte[] data  = new byte[Remaining];
                byte[] data2 = new byte[Remaining];
                fs.Read(data, 0, (int)Remaining);

                RC4Engine ARC4 = new RC4Engine();
                ARC4.Init(false, new KeyParameter(key));
                ARC4.ProcessBytes(data, 0, data.Length, data2, 0);
                Byte[] DecompressedData = ZlibStream.UncompressBuffer(data2);
                File.WriteAllBytes(args[2], DecompressedData);
            }
            else if (args[0] == "-e")
            {
                FileStream fs = new FileStream(args[2], FileMode.OpenOrCreate, FileAccess.ReadWrite);

                int keyLen = readInt32BE(fs);
                Console.WriteLine("KeyLen: " + keyLen.ToString());
                byte[] key = new byte[keyLen];
                fs.Read(key, 0, keyLen);

                Byte[] PlaintextData  = File.ReadAllBytes(args[1]);
                Byte[] CompressedData = ZlibStream.CompressBuffer(PlaintextData);
                Byte[] EncryptedData  = new Byte[CompressedData.Length];

                RC4Engine ARC4 = new RC4Engine();
                ARC4.Init(false, new KeyParameter(key));
                ARC4.ProcessBytes(CompressedData, 0, CompressedData.Length, EncryptedData, 0);
                fs.SetLength(fs.Position);
                fs.Write(EncryptedData, 0, EncryptedData.Length);
                fs.Close();
            }
        }
Пример #22
0
        public static IBufferedCipher GetCipher(
            string algorithm)
        {
            if (algorithm == null)
            {
                throw new ArgumentNullException("algorithm");
            }

            algorithm = Platform.ToUpperInvariant(algorithm);

            {
                string aliased = (string)algorithms[algorithm];

                if (aliased != null)
                {
                    algorithm = aliased;
                }
            }

            IBasicAgreement iesAgreement = null;

            if (algorithm == "IES")
            {
                iesAgreement = new DHBasicAgreement();
            }
            else if (algorithm == "ECIES")
            {
                iesAgreement = new ECDHBasicAgreement();
            }

            if (iesAgreement != null)
            {
                return(new BufferedIesCipher(
                           new IesEngine(
                               iesAgreement,
                               new Kdf2BytesGenerator(
                                   new Sha1Digest()),
                               new HMac(
                                   new Sha1Digest()))));
            }



            if (Platform.StartsWith(algorithm, "PBE"))
            {
                if (Platform.EndsWith(algorithm, "-CBC"))
                {
                    if (algorithm == "PBEWITHSHA1ANDDES-CBC")
                    {
                        return(new PaddedBufferedBlockCipher(
                                   new CbcBlockCipher(new DesEngine())));
                    }
                    else if (algorithm == "PBEWITHSHA1ANDRC2-CBC")
                    {
                        return(new PaddedBufferedBlockCipher(
                                   new CbcBlockCipher(new RC2Engine())));
                    }
                    else if (Strings.IsOneOf(algorithm,
                                             "PBEWITHSHAAND2-KEYTRIPLEDES-CBC", "PBEWITHSHAAND3-KEYTRIPLEDES-CBC"))
                    {
                        return(new PaddedBufferedBlockCipher(
                                   new CbcBlockCipher(new DesEdeEngine())));
                    }
                    else if (Strings.IsOneOf(algorithm,
                                             "PBEWITHSHAAND128BITRC2-CBC", "PBEWITHSHAAND40BITRC2-CBC"))
                    {
                        return(new PaddedBufferedBlockCipher(
                                   new CbcBlockCipher(new RC2Engine())));
                    }
                }
                else if (Platform.EndsWith(algorithm, "-BC") || Platform.EndsWith(algorithm, "-OPENSSL"))
                {
                    if (Strings.IsOneOf(algorithm,
                                        "PBEWITHSHAAND128BITAES-CBC-BC",
                                        "PBEWITHSHAAND192BITAES-CBC-BC",
                                        "PBEWITHSHAAND256BITAES-CBC-BC",
                                        "PBEWITHSHA256AND128BITAES-CBC-BC",
                                        "PBEWITHSHA256AND192BITAES-CBC-BC",
                                        "PBEWITHSHA256AND256BITAES-CBC-BC",
                                        "PBEWITHMD5AND128BITAES-CBC-OPENSSL",
                                        "PBEWITHMD5AND192BITAES-CBC-OPENSSL",
                                        "PBEWITHMD5AND256BITAES-CBC-OPENSSL"))
                    {
                        return(new PaddedBufferedBlockCipher(
                                   new CbcBlockCipher(new AesFastEngine())));
                    }
                }
            }



            string[] parts = algorithm.Split('/');

            IBlockCipher           blockCipher     = null;
            IAsymmetricBlockCipher asymBlockCipher = null;
            IStreamCipher          streamCipher    = null;

            string algorithmName = parts[0];

            {
                string aliased = (string)algorithms[algorithmName];

                if (aliased != null)
                {
                    algorithmName = aliased;
                }
            }

            CipherAlgorithm cipherAlgorithm;

            try
            {
                cipherAlgorithm = (CipherAlgorithm)Enums.GetEnumValue(typeof(CipherAlgorithm), algorithmName);
            }
            catch (ArgumentException)
            {
                throw new SecurityUtilityException("Cipher " + algorithm + " not recognised.");
            }

            switch (cipherAlgorithm)
            {
            case CipherAlgorithm.AES:
                blockCipher = new AesFastEngine();
                break;

            case CipherAlgorithm.ARC4:
                streamCipher = new RC4Engine();
                break;

            case CipherAlgorithm.BLOWFISH:
                blockCipher = new BlowfishEngine();
                break;

            case CipherAlgorithm.CAMELLIA:
                blockCipher = new CamelliaEngine();
                break;

            case CipherAlgorithm.CAST5:
                blockCipher = new Cast5Engine();
                break;

            case CipherAlgorithm.CAST6:
                blockCipher = new Cast6Engine();
                break;

            case CipherAlgorithm.DES:
                blockCipher = new DesEngine();
                break;

            case CipherAlgorithm.DESEDE:
                blockCipher = new DesEdeEngine();
                break;

            case CipherAlgorithm.ELGAMAL:
                asymBlockCipher = new ElGamalEngine();
                break;

            case CipherAlgorithm.GOST28147:
                blockCipher = new Gost28147Engine();
                break;

            case CipherAlgorithm.HC128:
                streamCipher = new HC128Engine();
                break;

            case CipherAlgorithm.HC256:
                streamCipher = new HC256Engine();
                break;

            case CipherAlgorithm.IDEA:
                blockCipher = new IdeaEngine();
                break;

            case CipherAlgorithm.NOEKEON:
                blockCipher = new NoekeonEngine();
                break;

            case CipherAlgorithm.PBEWITHSHAAND128BITRC4:
            case CipherAlgorithm.PBEWITHSHAAND40BITRC4:
                streamCipher = new RC4Engine();
                break;

            case CipherAlgorithm.RC2:
                blockCipher = new RC2Engine();
                break;

            case CipherAlgorithm.RC5:
                blockCipher = new RC532Engine();
                break;

            case CipherAlgorithm.RC5_64:
                blockCipher = new RC564Engine();
                break;

            case CipherAlgorithm.RC6:
                blockCipher = new RC6Engine();
                break;

            case CipherAlgorithm.RIJNDAEL:
                blockCipher = new RijndaelEngine();
                break;

            case CipherAlgorithm.RSA:
                asymBlockCipher = new RsaBlindedEngine();
                break;

            case CipherAlgorithm.SALSA20:
                streamCipher = new Salsa20Engine();
                break;

            case CipherAlgorithm.SEED:
                blockCipher = new SeedEngine();
                break;

            case CipherAlgorithm.SERPENT:
                blockCipher = new SerpentEngine();
                break;

            case CipherAlgorithm.SKIPJACK:
                blockCipher = new SkipjackEngine();
                break;

            case CipherAlgorithm.TEA:
                blockCipher = new TeaEngine();
                break;

            case CipherAlgorithm.THREEFISH_256:
                blockCipher = new ThreefishEngine(ThreefishEngine.BLOCKSIZE_256);
                break;

            case CipherAlgorithm.THREEFISH_512:
                blockCipher = new ThreefishEngine(ThreefishEngine.BLOCKSIZE_512);
                break;

            case CipherAlgorithm.THREEFISH_1024:
                blockCipher = new ThreefishEngine(ThreefishEngine.BLOCKSIZE_1024);
                break;

            case CipherAlgorithm.TNEPRES:
                blockCipher = new TnepresEngine();
                break;

            case CipherAlgorithm.TWOFISH:
                blockCipher = new TwofishEngine();
                break;

            case CipherAlgorithm.VMPC:
                streamCipher = new VmpcEngine();
                break;

            case CipherAlgorithm.VMPC_KSA3:
                streamCipher = new VmpcKsa3Engine();
                break;

            case CipherAlgorithm.XTEA:
                blockCipher = new XteaEngine();
                break;

            default:
                throw new SecurityUtilityException("Cipher " + algorithm + " not recognised.");
            }

            if (streamCipher != null)
            {
                if (parts.Length > 1)
                {
                    throw new ArgumentException("Modes and paddings not used for stream ciphers");
                }

                return(new BufferedStreamCipher(streamCipher));
            }


            bool cts    = false;
            bool padded = true;
            IBlockCipherPadding padding         = null;
            IAeadBlockCipher    aeadBlockCipher = null;

            if (parts.Length > 2)
            {
                if (streamCipher != null)
                {
                    throw new ArgumentException("Paddings not used for stream ciphers");
                }

                string paddingName = parts[2];

                CipherPadding cipherPadding;
                if (paddingName == "")
                {
                    cipherPadding = CipherPadding.RAW;
                }
                else if (paddingName == "X9.23PADDING")
                {
                    cipherPadding = CipherPadding.X923PADDING;
                }
                else
                {
                    try
                    {
                        cipherPadding = (CipherPadding)Enums.GetEnumValue(typeof(CipherPadding), paddingName);
                    }
                    catch (ArgumentException)
                    {
                        throw new SecurityUtilityException("Cipher " + algorithm + " not recognised.");
                    }
                }

                switch (cipherPadding)
                {
                case CipherPadding.NOPADDING:
                    padded = false;
                    break;

                case CipherPadding.RAW:
                    break;

                case CipherPadding.ISO10126PADDING:
                case CipherPadding.ISO10126D2PADDING:
                case CipherPadding.ISO10126_2PADDING:
                    padding = new ISO10126d2Padding();
                    break;

                case CipherPadding.ISO7816_4PADDING:
                case CipherPadding.ISO9797_1PADDING:
                    padding = new ISO7816d4Padding();
                    break;

                case CipherPadding.ISO9796_1:
                case CipherPadding.ISO9796_1PADDING:
                    asymBlockCipher = new ISO9796d1Encoding(asymBlockCipher);
                    break;

                case CipherPadding.OAEP:
                case CipherPadding.OAEPPADDING:
                    asymBlockCipher = new OaepEncoding(asymBlockCipher);
                    break;

                case CipherPadding.OAEPWITHMD5ANDMGF1PADDING:
                    asymBlockCipher = new OaepEncoding(asymBlockCipher, new MD5Digest());
                    break;

                case CipherPadding.OAEPWITHSHA1ANDMGF1PADDING:
                case CipherPadding.OAEPWITHSHA_1ANDMGF1PADDING:
                    asymBlockCipher = new OaepEncoding(asymBlockCipher, new Sha1Digest());
                    break;

                case CipherPadding.OAEPWITHSHA224ANDMGF1PADDING:
                case CipherPadding.OAEPWITHSHA_224ANDMGF1PADDING:
                    asymBlockCipher = new OaepEncoding(asymBlockCipher, new Sha224Digest());
                    break;

                case CipherPadding.OAEPWITHSHA256ANDMGF1PADDING:
                case CipherPadding.OAEPWITHSHA_256ANDMGF1PADDING:
                    asymBlockCipher = new OaepEncoding(asymBlockCipher, new Sha256Digest());
                    break;

                case CipherPadding.OAEPWITHSHA384ANDMGF1PADDING:
                case CipherPadding.OAEPWITHSHA_384ANDMGF1PADDING:
                    asymBlockCipher = new OaepEncoding(asymBlockCipher, new Sha384Digest());
                    break;

                case CipherPadding.OAEPWITHSHA512ANDMGF1PADDING:
                case CipherPadding.OAEPWITHSHA_512ANDMGF1PADDING:
                    asymBlockCipher = new OaepEncoding(asymBlockCipher, new Sha512Digest());
                    break;

                case CipherPadding.PKCS1:
                case CipherPadding.PKCS1PADDING:
                    asymBlockCipher = new Pkcs1Encoding(asymBlockCipher);
                    break;

                case CipherPadding.PKCS5:
                case CipherPadding.PKCS5PADDING:
                case CipherPadding.PKCS7:
                case CipherPadding.PKCS7PADDING:
                    padding = new Pkcs7Padding();
                    break;

                case CipherPadding.TBCPADDING:
                    padding = new TbcPadding();
                    break;

                case CipherPadding.WITHCTS:
                    cts = true;
                    break;

                case CipherPadding.X923PADDING:
                    padding = new X923Padding();
                    break;

                case CipherPadding.ZEROBYTEPADDING:
                    padding = new ZeroBytePadding();
                    break;

                default:
                    throw new SecurityUtilityException("Cipher " + algorithm + " not recognised.");
                }
            }

            string mode = "";

            if (parts.Length > 1)
            {
                mode = parts[1];

                int    di       = GetDigitIndex(mode);
                string modeName = di >= 0 ? mode.Substring(0, di) : mode;

                try
                {
                    CipherMode cipherMode = modeName == ""
                        ? CipherMode.NONE
                        : (CipherMode)Enums.GetEnumValue(typeof(CipherMode), modeName);

                    switch (cipherMode)
                    {
                    case CipherMode.ECB:
                    case CipherMode.NONE:
                        break;

                    case CipherMode.CBC:
                        blockCipher = new CbcBlockCipher(blockCipher);
                        break;

                    case CipherMode.CCM:
                        aeadBlockCipher = new CcmBlockCipher(blockCipher);
                        break;

                    case CipherMode.CFB:
                    {
                        int bits = (di < 0)
                                ?       8 * blockCipher.GetBlockSize()
                                :       int.Parse(mode.Substring(di));

                        blockCipher = new CfbBlockCipher(blockCipher, bits);
                        break;
                    }

                    case CipherMode.CTR:
                        blockCipher = new SicBlockCipher(blockCipher);
                        break;

                    case CipherMode.CTS:
                        cts         = true;
                        blockCipher = new CbcBlockCipher(blockCipher);
                        break;

                    case CipherMode.EAX:
                        aeadBlockCipher = new EaxBlockCipher(blockCipher);
                        break;

                    case CipherMode.GCM:
                        aeadBlockCipher = new GcmBlockCipher(blockCipher);
                        break;

                    case CipherMode.GOFB:
                        blockCipher = new GOfbBlockCipher(blockCipher);
                        break;

                    case CipherMode.OCB:
                        aeadBlockCipher = new OcbBlockCipher(blockCipher, CreateBlockCipher(cipherAlgorithm));
                        break;

                    case CipherMode.OFB:
                    {
                        int bits = (di < 0)
                                ?       8 * blockCipher.GetBlockSize()
                                :       int.Parse(mode.Substring(di));

                        blockCipher = new OfbBlockCipher(blockCipher, bits);
                        break;
                    }

                    case CipherMode.OPENPGPCFB:
                        blockCipher = new OpenPgpCfbBlockCipher(blockCipher);
                        break;

                    case CipherMode.SIC:
                        if (blockCipher.GetBlockSize() < 16)
                        {
                            throw new ArgumentException("Warning: SIC-Mode can become a twotime-pad if the blocksize of the cipher is too small. Use a cipher with a block size of at least 128 bits (e.g. AES)");
                        }
                        blockCipher = new SicBlockCipher(blockCipher);
                        break;

                    default:
                        throw new SecurityUtilityException("Cipher " + algorithm + " not recognised.");
                    }
                }
                catch (ArgumentException)
                {
                    throw new SecurityUtilityException("Cipher " + algorithm + " not recognised.");
                }
            }

            if (aeadBlockCipher != null)
            {
                if (cts)
                {
                    throw new SecurityUtilityException("CTS mode not valid for AEAD ciphers.");
                }
                if (padded && parts.Length > 2 && parts[2] != "")
                {
                    throw new SecurityUtilityException("Bad padding specified for AEAD cipher.");
                }

                return(new BufferedAeadBlockCipher(aeadBlockCipher));
            }

            if (blockCipher != null)
            {
                if (cts)
                {
                    return(new CtsBlockCipher(blockCipher));
                }

                if (padding != null)
                {
                    return(new PaddedBufferedBlockCipher(blockCipher, padding));
                }

                if (!padded || blockCipher.IsPartialBlockOkay)
                {
                    return(new BufferedBlockCipher(blockCipher));
                }

                return(new PaddedBufferedBlockCipher(blockCipher));
            }

            if (asymBlockCipher != null)
            {
                return(new BufferedAsymmetricBlockCipher(asymBlockCipher));
            }

            throw new SecurityUtilityException("Cipher " + algorithm + " not recognised.");
        }
Пример #23
0
 public RC4(byte[] key)
 {
     rc4 = new RC4Engine();
     rc4.Init(true, new KeyParameter(key));
 }
Пример #24
0
 /// <summary>
 /// 将有效的字符串转换为 RC4 编码的等效字符串表示形式。
 /// </summary>
 /// <param name="value">欲被转换的字符串</param>
 /// <returns></returns>
 public static string ToRC4String(this string value, string key)
 {
     return(RC4Engine.FromRC4String(value, key));
 }
Пример #25
0
 public BcRC4Crypto(byte[] key)
 {
     _rc4 = new RC4Engine();
     _rc4.Init(default, new KeyParameter(key));
        public static IBufferedCipher GetCipher(
            string algorithm)
        {
            if (algorithm == null)
            {
                throw new ArgumentNullException("algorithm");
            }

            algorithm = algorithm.ToUpper(CultureInfo.InvariantCulture);

            string aliased = (string)algorithms[algorithm];

            if (aliased != null)
            {
                algorithm = aliased;
            }



            IBasicAgreement iesAgreement = null;

            if (algorithm == "IES")
            {
                iesAgreement = new DHBasicAgreement();
            }
            else if (algorithm == "ECIES")
            {
                iesAgreement = new ECDHBasicAgreement();
            }

            if (iesAgreement != null)
            {
                return(new BufferedIesCipher(
                           new IesEngine(
                               iesAgreement,
                               new Kdf2BytesGenerator(
                                   new Sha1Digest()),
                               new HMac(
                                   new Sha1Digest()))));
            }



            if (algorithm.StartsWith("PBE"))
            {
                switch (algorithm)
                {
                case "PBEWITHSHAAND2-KEYTRIPLEDES-CBC":
                case "PBEWITHSHAAND3-KEYTRIPLEDES-CBC":
                    return(new PaddedBufferedBlockCipher(
                               new CbcBlockCipher(new DesEdeEngine())));

                case "PBEWITHSHAAND128BITRC2-CBC":
                case "PBEWITHSHAAND40BITRC2-CBC":
                    return(new PaddedBufferedBlockCipher(
                               new CbcBlockCipher(new RC2Engine())));

                case "PBEWITHSHAAND128BITAES-CBC-BC":
                case "PBEWITHSHAAND192BITAES-CBC-BC":
                case "PBEWITHSHAAND256BITAES-CBC-BC":
                case "PBEWITHSHA256AND128BITAES-CBC-BC":
                case "PBEWITHSHA256AND192BITAES-CBC-BC":
                case "PBEWITHSHA256AND256BITAES-CBC-BC":
                case "PBEWITHMD5AND128BITAES-CBC-OPENSSL":
                case "PBEWITHMD5AND192BITAES-CBC-OPENSSL":
                case "PBEWITHMD5AND256BITAES-CBC-OPENSSL":
                    return(new PaddedBufferedBlockCipher(
                               new CbcBlockCipher(new AesFastEngine())));

                case "PBEWITHSHA1ANDDES-CBC":
                    return(new PaddedBufferedBlockCipher(
                               new CbcBlockCipher(new DesEngine())));

                case "PBEWITHSHA1ANDRC2-CBC":
                    return(new PaddedBufferedBlockCipher(
                               new CbcBlockCipher(new RC2Engine())));
                }
            }



            string[] parts = algorithm.Split('/');

            IBlockCipher           blockCipher     = null;
            IAsymmetricBlockCipher asymBlockCipher = null;
            IStreamCipher          streamCipher    = null;

            switch (parts[0])
            {
            case "AES":
                blockCipher = new AesFastEngine();
                break;

            case "ARC4":
                streamCipher = new RC4Engine();
                break;

            case "BLOWFISH":
                blockCipher = new BlowfishEngine();
                break;

            case "CAMELLIA":
                blockCipher = new CamelliaEngine();
                break;

            case "CAST5":
                blockCipher = new Cast5Engine();
                break;

            case "CAST6":
                blockCipher = new Cast6Engine();
                break;

            case "DES":
                blockCipher = new DesEngine();
                break;

            case "DESEDE":
                blockCipher = new DesEdeEngine();
                break;

            case "ELGAMAL":
                asymBlockCipher = new ElGamalEngine();
                break;

            case "GOST28147":
                blockCipher = new Gost28147Engine();
                break;

            case "HC128":
                streamCipher = new HC128Engine();
                break;

            case "HC256":
                streamCipher = new HC256Engine();
                break;

#if INCLUDE_IDEA
            case "IDEA":
                blockCipher = new IdeaEngine();
                break;
#endif
            case "NOEKEON":
                blockCipher = new NoekeonEngine();
                break;

            case "PBEWITHSHAAND128BITRC4":
            case "PBEWITHSHAAND40BITRC4":
                streamCipher = new RC4Engine();
                break;

            case "RC2":
                blockCipher = new RC2Engine();
                break;

            case "RC5":
                blockCipher = new RC532Engine();
                break;

            case "RC5-64":
                blockCipher = new RC564Engine();
                break;

            case "RC6":
                blockCipher = new RC6Engine();
                break;

            case "RIJNDAEL":
                blockCipher = new RijndaelEngine();
                break;

            case "RSA":
                asymBlockCipher = new RsaBlindedEngine();
                break;

            case "SALSA20":
                streamCipher = new Salsa20Engine();
                break;

            case "SEED":
                blockCipher = new SeedEngine();
                break;

            case "SERPENT":
                blockCipher = new SerpentEngine();
                break;

            case "SKIPJACK":
                blockCipher = new SkipjackEngine();
                break;

            case "TEA":
                blockCipher = new TeaEngine();
                break;

            case "TWOFISH":
                blockCipher = new TwofishEngine();
                break;

            case "VMPC":
                streamCipher = new VmpcEngine();
                break;

            case "VMPC-KSA3":
                streamCipher = new VmpcKsa3Engine();
                break;

            case "XTEA":
                blockCipher = new XteaEngine();
                break;

            default:
                throw new SecurityUtilityException("Cipher " + algorithm + " not recognised.");
            }

            if (streamCipher != null)
            {
                if (parts.Length > 1)
                {
                    throw new ArgumentException("Modes and paddings not used for stream ciphers");
                }

                return(new BufferedStreamCipher(streamCipher));
            }


            bool cts    = false;
            bool padded = true;
            IBlockCipherPadding padding         = null;
            IAeadBlockCipher    aeadBlockCipher = null;

            if (parts.Length > 2)
            {
                if (streamCipher != null)
                {
                    throw new ArgumentException("Paddings not used for stream ciphers");
                }

                switch (parts[2])
                {
                case "NOPADDING":
                    padded = false;
                    break;

                case "":
                case "RAW":
                    break;

                case "ISO10126PADDING":
                case "ISO10126D2PADDING":
                case "ISO10126-2PADDING":
                    padding = new ISO10126d2Padding();
                    break;

                case "ISO7816-4PADDING":
                case "ISO9797-1PADDING":
                    padding = new ISO7816d4Padding();
                    break;

                case "ISO9796-1":
                case "ISO9796-1PADDING":
                    asymBlockCipher = new ISO9796d1Encoding(asymBlockCipher);
                    break;

                case "OAEP":
                case "OAEPPADDING":
                    asymBlockCipher = new OaepEncoding(asymBlockCipher);
                    break;

                case "OAEPWITHMD5ANDMGF1PADDING":
                    asymBlockCipher = new OaepEncoding(asymBlockCipher, new MD5Digest());
                    break;

                case "OAEPWITHSHA1ANDMGF1PADDING":
                case "OAEPWITHSHA-1ANDMGF1PADDING":
                    asymBlockCipher = new OaepEncoding(asymBlockCipher, new Sha1Digest());
                    break;

                case "OAEPWITHSHA224ANDMGF1PADDING":
                case "OAEPWITHSHA-224ANDMGF1PADDING":
                    asymBlockCipher = new OaepEncoding(asymBlockCipher, new Sha224Digest());
                    break;

                case "OAEPWITHSHA256ANDMGF1PADDING":
                case "OAEPWITHSHA-256ANDMGF1PADDING":
                    asymBlockCipher = new OaepEncoding(asymBlockCipher, new Sha256Digest());
                    break;

                case "OAEPWITHSHA384ANDMGF1PADDING":
                case "OAEPWITHSHA-384ANDMGF1PADDING":
                    asymBlockCipher = new OaepEncoding(asymBlockCipher, new Sha384Digest());
                    break;

                case "OAEPWITHSHA512ANDMGF1PADDING":
                case "OAEPWITHSHA-512ANDMGF1PADDING":
                    asymBlockCipher = new OaepEncoding(asymBlockCipher, new Sha512Digest());
                    break;

                case "PKCS1":
                case "PKCS1PADDING":
                    asymBlockCipher = new Pkcs1Encoding(asymBlockCipher);
                    break;

                case "PKCS5":
                case "PKCS5PADDING":
                case "PKCS7":
                case "PKCS7PADDING":
                    // NB: Padding defaults to Pkcs7Padding already
                    break;

                case "TBCPADDING":
                    padding = new TbcPadding();
                    break;

                case "WITHCTS":
                    cts = true;
                    break;

                case "X9.23PADDING":
                case "X923PADDING":
                    padding = new X923Padding();
                    break;

                case "ZEROBYTEPADDING":
                    padding = new ZeroBytePadding();
                    break;

                default:
                    throw new SecurityUtilityException("Cipher " + algorithm + " not recognised.");
                }
            }

            string mode = "";
            if (parts.Length > 1)
            {
                mode = parts[1];

                int    di       = GetDigitIndex(mode);
                string modeName = di >= 0 ? mode.Substring(0, di) : mode;

                switch (modeName)
                {
                case "":
                case "ECB":
                case "NONE":
                    break;

                case "CBC":
                    blockCipher = new CbcBlockCipher(blockCipher);
                    break;

                case "CCM":
                    aeadBlockCipher = new CcmBlockCipher(blockCipher);
                    break;

                case "CFB":
                {
                    int bits = (di < 0)
                                                        ?       8 * blockCipher.GetBlockSize()
                                                        :       int.Parse(mode.Substring(di));

                    blockCipher = new CfbBlockCipher(blockCipher, bits);
                    break;
                }

                case "CTR":
                    blockCipher = new SicBlockCipher(blockCipher);
                    break;

                case "CTS":
                    cts         = true;
                    blockCipher = new CbcBlockCipher(blockCipher);
                    break;

                case "EAX":
                    aeadBlockCipher = new EaxBlockCipher(blockCipher);
                    break;

                case "GCM":
                    aeadBlockCipher = new GcmBlockCipher(blockCipher);
                    break;

                case "GOFB":
                    blockCipher = new GOfbBlockCipher(blockCipher);
                    break;

                case "OFB":
                {
                    int bits = (di < 0)
                                                        ?       8 * blockCipher.GetBlockSize()
                                                        :       int.Parse(mode.Substring(di));

                    blockCipher = new OfbBlockCipher(blockCipher, bits);
                    break;
                }

                case "OPENPGPCFB":
                    blockCipher = new OpenPgpCfbBlockCipher(blockCipher);
                    break;

                case "SIC":
                    if (blockCipher.GetBlockSize() < 16)
                    {
                        throw new ArgumentException("Warning: SIC-Mode can become a twotime-pad if the blocksize of the cipher is too small. Use a cipher with a block size of at least 128 bits (e.g. AES)");
                    }
                    blockCipher = new SicBlockCipher(blockCipher);
                    break;

                default:
                    throw new SecurityUtilityException("Cipher " + algorithm + " not recognised.");
                }
            }

            if (aeadBlockCipher != null)
            {
                if (cts)
                {
                    throw new SecurityUtilityException("CTS mode not valid for AEAD ciphers.");
                }
                if (padded && parts.Length > 1 && parts[2] != "")
                {
                    throw new SecurityUtilityException("Bad padding specified for AEAD cipher.");
                }

                return(new BufferedAeadBlockCipher(aeadBlockCipher));
            }

            if (blockCipher != null)
            {
                if (cts)
                {
                    return(new CtsBlockCipher(blockCipher));
                }

                if (!padded || blockCipher.IsPartialBlockOkay)
                {
                    return(new BufferedBlockCipher(blockCipher));
                }

                if (padding != null)
                {
                    return(new PaddedBufferedBlockCipher(blockCipher, padding));
                }

                return(new PaddedBufferedBlockCipher(blockCipher));
            }

            if (asymBlockCipher != null)
            {
                return(new BufferedAsymmetricBlockCipher(asymBlockCipher));
            }

            throw new SecurityUtilityException("Cipher " + algorithm + " not recognised.");
        }
Пример #27
0
        private object ReadValue(BinaryReader br, Type type, bool encrypted)
        {
            if (type == typeof(int))
            {
                return(br.ReadInt32());
            }
            else if (type == typeof(double))
            {
                return(br.ReadDouble());
            }
            else if (type == typeof(bool))
            {
                return(br.ReadBoolean());
            }
            else if (type == typeof(string))
            {
                if (!encrypted)
                {
                    return(br.ReadString());
                }

                byte   size = br.ReadByte();
                byte[] data = RC4Engine.Decrypt(br.ReadBytes(size));
                return(Encoding.ASCII.GetString(data));
            }
            else if (type == typeof(byte[]))
            {
                return(br.ReadBytes(br.ReadInt32()));
            }
            else if (type.IsEnum)
            {
                Type t = Enum.GetUnderlyingType(type);
                if (t == typeof(byte))
                {
                    return(br.ReadByte());
                }
                else if (t == typeof(short))
                {
                    return(br.ReadInt16());
                }
                else if (t == typeof(int))
                {
                    return(br.ReadInt32());
                }
                else if (t == typeof(long))
                {
                    return(br.ReadInt64());
                }
                else
                {
                    MessageBox.Show("Unable to read this enum type! Type: " + t.ToString());
                }
            }
            else if (type.IsGenericType && type.GetGenericTypeDefinition() == typeof(ISettingList <>))
            {
                object settingList = Activator.CreateInstance(type, new object[] { });
                settingList.GetType().GetMethod("Read").Invoke(settingList, new object[] { br });
                return(settingList);
            }
            else
            {
                MessageBox.Show("Cannot read type " + type.ToString());
            }

            return(null);
        }
Пример #28
0
        static void Main(string[] args)
        {
            byte[] key                 = ComputeTestKey();
            byte[] testData            = NewTestData();
            byte[] jackpozData         = testData.ToArray();
            byte[] outputBufferBouncy  = new byte[1024];
            byte[] outputBufferJackpoz = new byte[1024];

            JackpozARC4 arc4 = new JackpozARC4(key);
            RC4CryptoServiceProvider myRc4 = new RC4CryptoServiceProvider(key, true);
            RC4Engine bouncyRC4            = new RC4Engine();

            bouncyRC4.Init(true, new KeyParameter(key));


            byte[] sameBuffer  = jackpozData.ToArray();
            byte[] myRC4Buffer = jackpozData.ToArray();
            bouncyRC4.ProcessBytes(testData, 0, testData.Length, outputBufferBouncy, 0);
            arc4.Process(sameBuffer, sameBuffer, 0, sameBuffer.Length);
            myRc4.ProcessBytes(myRC4Buffer, 0, myRC4Buffer.Length, myRC4Buffer, 0);

            Console.WriteLine(jackpozData.Length);
            for (int i = 0; i < jackpozData.Length; i++)
            {
                if (sameBuffer[i] != outputBufferBouncy[i])
                {
                    Console.WriteLine($"Failed at index: {i} with Value Jackpoz: {sameBuffer[i]} vs Bouncy: {outputBufferBouncy[i]}");
                    Console.ReadKey();
                }

                if (myRC4Buffer[i] != outputBufferBouncy[i])
                {
                    Console.WriteLine($"Failed at index: {i} with Value MyBuffer: {myRC4Buffer[i]} vs Jackpoz: {sameBuffer[i]}");
                    Console.ReadKey();
                }
            }

            Console.WriteLine("Finished parity test.");

            Stopwatch bouncyWatch = new Stopwatch();

            bouncyWatch.Start();
            for (int i = 0; i < 1000000; i++)
            {
                bouncyRC4.ProcessBytes(testData, 0, testData.Length, outputBufferBouncy, 0);
            }
            bouncyWatch.Stop();
            GC.Collect();

            Console.WriteLine($"Bouncy perf: {bouncyWatch.ElapsedMilliseconds}");

            Stopwatch jackpozWatch = new Stopwatch();

            jackpozWatch.Start();
            for (int i = 0; i < 1000000; i++)
            {
                arc4.Process(jackpozData, outputBufferJackpoz, 0, jackpozData.Length);
            }
            jackpozWatch.Stop();
            GC.Collect();

            Console.WriteLine($"Jackpoz perf: {jackpozWatch.ElapsedMilliseconds}");

            Console.ReadKey();
        }
Пример #29
0
        public static object CreateContentCipher(bool forEncryption, ICipherParameters encKey,
                                                 AlgorithmIdentifier encryptionAlgID)
        {
            DerObjectIdentifier encAlg = encryptionAlgID.Algorithm;

            if (encAlg.Equals(PkcsObjectIdentifiers.rc4))
            {
                IStreamCipher cipher = new RC4Engine();
                cipher.Init(forEncryption, encKey);
                return(cipher);
            }
            else
            {
                BufferedBlockCipher cipher  = CreateCipher(encryptionAlgID.Algorithm);
                Asn1Object          sParams = encryptionAlgID.Parameters.ToAsn1Object();

                if (sParams != null && !(sParams is DerNull))
                {
                    if (encAlg.Equals(PkcsObjectIdentifiers.DesEde3Cbc) ||
                        encAlg.Equals(AlgorithmIdentifierFactory.IDEA_CBC) ||
                        encAlg.Equals(NistObjectIdentifiers.IdAes128Cbc) ||
                        encAlg.Equals(NistObjectIdentifiers.IdAes192Cbc) ||
                        encAlg.Equals(NistObjectIdentifiers.IdAes256Cbc) ||
                        encAlg.Equals(NttObjectIdentifiers.IdCamellia128Cbc) ||
                        encAlg.Equals(NttObjectIdentifiers.IdCamellia192Cbc) ||
                        encAlg.Equals(NttObjectIdentifiers.IdCamellia256Cbc) ||
                        encAlg.Equals(KisaObjectIdentifiers.IdSeedCbc) ||
                        encAlg.Equals(OiwObjectIdentifiers.DesCbc))
                    {
                        cipher.Init(forEncryption, new ParametersWithIV(encKey,
                                                                        Asn1OctetString.GetInstance(sParams).GetOctets()));
                    }
                    else if (encAlg.Equals(AlgorithmIdentifierFactory.CAST5_CBC))
                    {
                        Cast5CbcParameters cbcParams = Cast5CbcParameters.GetInstance(sParams);

                        cipher.Init(forEncryption, new ParametersWithIV(encKey, cbcParams.GetIV()));
                    }
                    else if (encAlg.Equals(PkcsObjectIdentifiers.RC2Cbc))
                    {
                        RC2CbcParameter cbcParams = RC2CbcParameter.GetInstance(sParams);

                        cipher.Init(forEncryption, new ParametersWithIV(new RC2Parameters(((KeyParameter)encKey).GetKey(), rc2Ekb[cbcParams.RC2ParameterVersion.IntValue]), cbcParams.GetIV()));
                    }
                    else
                    {
                        throw new InvalidOperationException("cannot match parameters");
                    }
                }
                else
                {
                    if (encAlg.Equals(PkcsObjectIdentifiers.DesEde3Cbc) ||
                        encAlg.Equals(AlgorithmIdentifierFactory.IDEA_CBC) ||
                        encAlg.Equals(AlgorithmIdentifierFactory.CAST5_CBC))
                    {
                        cipher.Init(forEncryption, new ParametersWithIV(encKey, new byte[8]));
                    }
                    else
                    {
                        cipher.Init(forEncryption, encKey);
                    }
                }

                return(cipher);
            }
        }
Пример #30
0
        /// <summary>
        ///
        /// </summary>
        /// <param name="hexRid"></param>
        /// <param name="hashedBootKey"></param>
        /// <param name="lmntpassword"></param>
        /// <param name="isLmHash"></param>
        /// <param name="userAccount"></param>
        /// <returns></returns>
        private bool DecryptHash(string hexRid,
                                 byte[] hashedBootKey,
                                 string lmntpassword,
                                 bool isLmHash,
                                 UserAccount userAccount)
        {
            try
            {
                userAccount.Rid = Int32.Parse(hexRid, System.Globalization.NumberStyles.HexNumber);

                byte[] tempBootKey = new byte[16];
                Buffer.BlockCopy(hashedBootKey, 0, tempBootKey, 0, 16);

                List <byte> data = new List <byte>();
                data.AddRange(tempBootKey.ToArray());
                data.AddRange(MiscUtil.Conversion.EndianBitConverter.Little.GetBytes(Int32.Parse(hexRid, System.Globalization.NumberStyles.HexNumber)));
                data.AddRange(Encoding.ASCII.GetBytes(lmntpassword));
                byte[] md5 = MD5.Create().ComputeHash(data.ToArray());

                //PrintHex(md5);

                byte[] encOutput = new byte[16];

                RC4Engine rc4Engine = new RC4Engine();
                if (isLmHash == true)
                {
                    rc4Engine.Init(true, new KeyParameter(md5));
                    rc4Engine.ProcessBytes(userAccount.EncLmHash, 0, 16, encOutput, 0);
                }
                else
                {
                    rc4Engine.Init(true, new KeyParameter(md5));
                    rc4Engine.ProcessBytes(userAccount.EncNtHash, 0, 16, encOutput, 0);
                }

                //PrintHex(encOutput);

                byte[] hashBytes1 = new byte[8];
                byte[] hashBytes2 = new byte[8];
                Buffer.BlockCopy(encOutput, 0, hashBytes1, 0, 8);
                Buffer.BlockCopy(encOutput, 8, hashBytes2, 0, 8);

                List <int> key1Temp = new List <int>();
                List <int> key2Temp = new List <int>();

                this.SidToKey(hexRid, ref key1Temp, ref key2Temp);

                DESCryptoServiceProvider cryptoProvider = new DESCryptoServiceProvider();

                List <byte> key1 = new List <byte>();
                foreach (int val in key1Temp)
                {
                    key1.Add((byte)val);
                }

                List <byte> key2 = new List <byte>();
                foreach (int val in key2Temp)
                {
                    key2.Add((byte)val);
                }

                cryptoProvider.Padding = PaddingMode.None;
                cryptoProvider.Mode    = CipherMode.ECB;
                ICryptoTransform transform      = cryptoProvider.CreateDecryptor(key1.ToArray(), new byte[] { 0, 0, 0, 0, 0, 0, 0, 0 });
                MemoryStream     memoryStream   = new MemoryStream(hashBytes1);
                CryptoStream     cryptoStream   = new CryptoStream(memoryStream, transform, CryptoStreamMode.Read);
                byte[]           plainTextBytes = new byte[hashBytes1.Length];
                int decryptedByteCount          = cryptoStream.Read(plainTextBytes, 0, plainTextBytes.Length);

                PrintHex("HASH:", plainTextBytes);

                if (isLmHash == true)
                {
                    userAccount.LmHash = Text.ConvertByteArrayToHexString(plainTextBytes);
                }
                else
                {
                    userAccount.NtHash = Text.ConvertByteArrayToHexString(plainTextBytes);
                }

                //PrintHex(plainTextBytes);

                cryptoProvider.Padding = PaddingMode.None;
                cryptoProvider.Mode    = CipherMode.ECB;
                transform          = cryptoProvider.CreateDecryptor(key2.ToArray(), new byte[] { 0, 0, 0, 0, 0, 0, 0, 0 });
                memoryStream       = new MemoryStream(hashBytes2);
                cryptoStream       = new CryptoStream(memoryStream, transform, CryptoStreamMode.Read);
                plainTextBytes     = new byte[hashBytes2.Length];
                decryptedByteCount = cryptoStream.Read(plainTextBytes, 0, plainTextBytes.Length);

                if (isLmHash == true)
                {
                    userAccount.LmHash += Text.ConvertByteArrayToHexString(plainTextBytes);
                }
                else
                {
                    userAccount.NtHash += Text.ConvertByteArrayToHexString(plainTextBytes);
                }

                //PrintHex(plainTextBytes);

                return(true);
            }
            catch (Exception ex)
            {
                this.OnError("An error occured whilst decrypting the user hash");
                Misc.WriteToEventLog(Application.ProductName, "An error occured whilst decrypting the user hash: " + ex.Message, EventLogEntryType.Error);
                return(false);
            }
        }