blob: 35b0d9a849b8fff693d4fa20bc916a7787d6d875 [file] [log] [blame]
Alex Gaynoraf82d5e2013-10-29 17:07:24 -07001.. hazmat::
Donald Stufftd8f01182013-10-27 16:59:56 -04002
3
Donald Stuffte51fb932013-10-27 17:26:17 -04004Symmetric Encryption
5====================
6
Paul Kehrer051099e2013-11-06 15:53:40 +08007.. currentmodule:: cryptography.hazmat.primitives.ciphers
David Reid1f3d7182013-10-22 16:55:18 -07008
Donald Stufft173de982013-08-12 07:34:39 -04009.. testsetup::
10
11 import binascii
12 key = binascii.unhexlify(b"0" * 32)
13 iv = binascii.unhexlify(b"0" * 32)
14
15
Alex Gaynorf6c47e92013-08-08 07:16:01 -070016Symmetric encryption is a way to encrypt (hide the plaintext value) material
Alex Gaynorb317c7a2013-11-15 16:45:52 -080017where the sender and receiver both use the same key. Note that symmetric
Alex Gaynorab5f0112013-11-08 10:34:00 -080018encryption is **not** sufficient for most applications, because it only
19provides secrecy (an attacker can't see the message) but not authenticity (an
20attacker can create bogus messages and force the application to decrypt them).
Alex Gaynor9316f4c2013-11-15 16:38:42 -080021For this reason it is *strongly* recommended to combine encryption with a
Alex Gaynorab5f0112013-11-08 10:34:00 -080022message authentication code, such as :doc:`HMAC </hazmat/primitives/hmac>`, in
23an "encrypt-then-MAC" formulation as `described by Colin Percival`_.
Alex Gaynorf6c47e92013-08-08 07:16:01 -070024
Paul Kehrer051099e2013-11-06 15:53:40 +080025.. class:: Cipher(algorithm, mode)
Alex Gaynorf6c47e92013-08-08 07:16:01 -070026
Alex Gaynorab5f0112013-11-08 10:34:00 -080027 Cipher objects combine an algorithm (such as
28 :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES`) with a
29 mode (such as
30 :class:`~cryptography.hazmat.primitives.ciphers.modes.CBC` or
31 :class:`~cryptography.hazmat.primitives.ciphers.modes.CTR`). A simple
32 example of encrypting (and then decrypting) content with AES is:
Alex Gaynorf6c47e92013-08-08 07:16:01 -070033
Donald Stufft173de982013-08-12 07:34:39 -040034 .. doctest::
Alex Gaynorf6c47e92013-08-08 07:16:01 -070035
Paul Kehrer051099e2013-11-06 15:53:40 +080036 >>> from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
37 >>> cipher = Cipher(algorithms.AES(key), modes.CBC(iv))
Paul Kehrer3e0895c2013-10-21 22:19:29 -050038 >>> encryptor = cipher.encryptor()
39 >>> ct = encryptor.update(b"a secret message") + encryptor.finalize()
40 >>> decryptor = cipher.decryptor()
41 >>> decryptor.update(ct) + decryptor.finalize()
Paul Kehrerf6cf9562013-10-22 10:36:00 -050042 'a secret message'
Alex Gaynorf6c47e92013-08-08 07:16:01 -070043
Paul Kehrer051099e2013-11-06 15:53:40 +080044 :param algorithms: One of the algorithms described below.
Alex Gaynore62aa402013-08-08 15:23:11 -070045 :param mode: One of the modes described below.
Alex Gaynor0ca7fdb2013-08-08 07:35:26 -070046
Paul Kehrer5399fd02013-10-21 23:48:25 -050047 .. method:: encryptor()
Alex Gaynor09515f02013-08-08 15:26:55 -070048
David Reid63ba6652013-10-22 14:09:19 -070049 :return: An encrypting
Donald Stufftf04317a2013-10-27 16:44:30 -040050 :class:`~cryptography.hazmat.primitives.interfaces.CipherContext`
David Reid63ba6652013-10-22 14:09:19 -070051 provider.
Alex Gaynore62aa402013-08-08 15:23:11 -070052
Alex Gaynorf1a3fc02013-11-02 14:03:34 -070053 If the backend doesn't support the requested combination of ``cipher``
Alex Gaynor3949f112013-11-02 16:57:10 -070054 and ``mode`` an :class:`cryptography.exceptions.UnsupportedAlgorithm`
55 will be raised.
Alex Gaynorf1a3fc02013-11-02 14:03:34 -070056
Paul Kehrer5399fd02013-10-21 23:48:25 -050057 .. method:: decryptor()
58
David Reid63ba6652013-10-22 14:09:19 -070059 :return: A decrypting
Donald Stufftf04317a2013-10-27 16:44:30 -040060 :class:`~cryptography.hazmat.primitives.interfaces.CipherContext`
David Reid63ba6652013-10-22 14:09:19 -070061 provider.
Paul Kehrer5399fd02013-10-21 23:48:25 -050062
Alex Gaynorf1a3fc02013-11-02 14:03:34 -070063 If the backend doesn't support the requested combination of ``cipher``
Alex Gaynor3949f112013-11-02 16:57:10 -070064 and ``mode`` an :class:`cryptography.exceptions.UnsupportedAlgorithm`
65 will be raised.
Alex Gaynorf1a3fc02013-11-02 14:03:34 -070066
67
Donald Stufftf04317a2013-10-27 16:44:30 -040068.. currentmodule:: cryptography.hazmat.primitives.interfaces
David Reid1f3d7182013-10-22 16:55:18 -070069
Alex Gaynorb2d5efd2013-10-29 11:15:30 -070070.. class:: CipherContext
Paul Kehrer5399fd02013-10-21 23:48:25 -050071
Paul Kehrer051099e2013-11-06 15:53:40 +080072 When calling ``encryptor()`` or ``decryptor()`` on a ``Cipher`` object
Alex Gaynorb2d5efd2013-10-29 11:15:30 -070073 you will receive a return object conforming to the ``CipherContext``
74 interface. You can then call ``update(data)`` with data until you have fed
75 everything into the context. Once that is done call ``finalize()`` to
76 finish the operation and obtain the remainder of the data.
Paul Kehrer5399fd02013-10-21 23:48:25 -050077
Alex Gaynor797dd832013-11-22 13:08:58 -080078 Block ciphers require that plaintext or ciphertext always be a multiple of
79 their block size, because of that **padding** is often required to make a
80 message the correct size. ``CipherContext`` will not automatically apply
81 any padding; you'll need to add your own. For block ciphers the reccomended
82 padding is :class:`cryptography.hazmat.primitives.padding.PKCS7`. If you
83 are using a stream cipher mode (such as
84 :class:`cryptography.hazmat.primitives.modes.CTR`) you don't have to worry
85 about this.
86
Paul Kehrer5399fd02013-10-21 23:48:25 -050087 .. method:: update(data)
88
Alex Gaynorb2d5efd2013-10-29 11:15:30 -070089 :param bytes data: The data you wish to pass into the context.
Paul Kehrer5399fd02013-10-21 23:48:25 -050090 :return bytes: Returns the data that was encrypted or decrypted.
Alex Gaynor34511c62013-11-13 13:30:30 -080091 :raises cryptography.exceptions.AlreadyFinalized: See :meth:`finalize`
Alex Gaynore62aa402013-08-08 15:23:11 -070092
Paul Kehrer051099e2013-11-06 15:53:40 +080093 When the ``Cipher`` was constructed in a mode that turns it into a
Alex Gaynorfc09a7c2013-11-01 14:43:02 -070094 stream cipher (e.g.
Paul Kehrer051099e2013-11-06 15:53:40 +080095 :class:`cryptography.hazmat.primitives.ciphers.modes.CTR`), this will
Alex Gaynorbf2de742013-11-01 14:48:19 -070096 return bytes immediately, however in other modes it will return chunks,
97 whose size is determined by the cipher's block size.
Alex Gaynord1f02012013-11-01 14:12:35 -070098
Alex Gaynore62aa402013-08-08 15:23:11 -070099 .. method:: finalize()
100
Paul Kehrer5399fd02013-10-21 23:48:25 -0500101 :return bytes: Returns the remainder of the data.
Alex Gaynor797dd832013-11-22 13:08:58 -0800102 :raises cryptography.exceptions.IncorrectPadding: This is raised when
103 the data provided
104 isn't correctly
105 padded to be a
106 multiple of the
107 algorithm's block
108 size.
Alex Gaynord96d1002013-08-08 07:37:26 -0700109
Alex Gaynor34511c62013-11-13 13:30:30 -0800110 Once ``finalize`` is called this object can no longer be used and
Alex Gaynor9b70ba32013-11-13 13:49:43 -0800111 :meth:`update` and :meth:`finalize` will raise
Alex Gaynor34511c62013-11-13 13:30:30 -0800112 :class:`~cryptography.exceptions.AlreadyFinalized`.
113
Paul Kehrer051099e2013-11-06 15:53:40 +0800114Algorithms
115~~~~~~~~~~
Alex Gaynord96d1002013-08-08 07:37:26 -0700116
Paul Kehrer051099e2013-11-06 15:53:40 +0800117.. currentmodule:: cryptography.hazmat.primitives.ciphers.algorithms
David Reid1f3d7182013-10-22 16:55:18 -0700118
119.. class:: AES(key)
Alex Gaynor5ba2dfa2013-08-08 11:04:44 -0700120
Alex Gaynor1e3f81f2013-08-08 11:31:43 -0700121 AES (Advanced Encryption Standard) is a block cipher standardized by NIST.
Alex Gaynor5ba2dfa2013-08-08 11:04:44 -0700122 AES is both fast, and cryptographically strong. It is a good default
123 choice for encryption.
124
125 :param bytes key: The secret key, either ``128``, ``192``, or ``256`` bits.
Alex Gaynor48ec9a32013-08-08 11:13:46 -0700126 This must be kept secret.
Alex Gaynor5ba2dfa2013-08-08 11:04:44 -0700127
David Reid1f3d7182013-10-22 16:55:18 -0700128.. class:: Camellia(key)
Paul Kehrerdff22d42013-09-27 13:43:06 -0500129
130 Camellia is a block cipher approved for use by CRYPTREC and ISO/IEC.
131 It is considered to have comparable security and performance to AES, but
132 is not as widely studied or deployed.
133
134 :param bytes key: The secret key, either ``128``, ``192``, or ``256`` bits.
135 This must be kept secret.
136
Alex Gaynord96d1002013-08-08 07:37:26 -0700137
David Reid1f3d7182013-10-22 16:55:18 -0700138.. class:: TripleDES(key)
Alex Gaynoraeb714c2013-09-09 18:06:14 -0700139
Alex Gaynor9316f4c2013-11-15 16:38:42 -0800140 Triple DES (Data Encryption Standard), sometimes referred to as 3DES, is a
141 block cipher standardized by NIST. Triple DES has known crypto-analytic
Alex Gaynor17adce62013-10-16 17:04:40 -0700142 flaws, however none of them currently enable a practical attack.
Alex Gaynor9316f4c2013-11-15 16:38:42 -0800143 Nonetheless, Triples DES is not recommended for new applications because it
Alex Gaynorfbcc5642013-10-22 08:26:00 -0700144 is incredibly slow; old applications should consider moving away from it.
Alex Gaynoraeb714c2013-09-09 18:06:14 -0700145
146 :param bytes key: The secret key, either ``64``, ``128``, or ``192`` bits
147 (note that DES functionally uses ``56``, ``112``, or
148 ``168`` bits of the key, there is a parity byte in each
149 component of the key), in some materials these are
150 referred to as being up to three separate keys (each
151 ``56`` bits long), they can simply be concatenated to
152 produce the full key. This must be kept secret.
153
Paul Kehrer6022d452013-10-30 17:03:54 -0500154.. class:: CAST5(key)
155
156 CAST5 (also known as CAST-128) is a block cipher approved for use in the
157 Canadian government by their Communications Security Establishment. It is a
158 variable key length cipher and supports keys from 40-128 bits in length.
159
160 :param bytes key: The secret key, 40-128 bits in length (in increments of
161 8). This must be kept secret.
162
Paul Kehrer3446d812013-10-31 17:15:03 -0500163Weak Ciphers
164------------
165
166.. warning::
167
168 These ciphers are considered weak for a variety of reasons. New
169 applications should avoid their use and existing applications should
170 strongly consider migrating away.
171
Paul Kehrer5df0abe2013-10-30 16:57:04 -0500172.. class:: Blowfish(key)
173
174 Blowfish is a block cipher developed by Bruce Schneier. It is known to be
175 susceptible to attacks when using weak keys. The author has recommended
Alex Gaynorab5f0112013-11-08 10:34:00 -0800176 that users of Blowfish move to newer algorithms, such as :class:`AES`.
Paul Kehrer5df0abe2013-10-30 16:57:04 -0500177
178 :param bytes key: The secret key, 32-448 bits in length (in increments of
179 8). This must be kept secret.
180
Paul Kehrer4da28c32013-11-07 07:50:17 +0800181.. class:: ARC4(key)
182
183 ARC4 (Alleged RC4) is a stream cipher with serious weaknesses in its
184 initial stream output. Its use is strongly discouraged. ARC4 does not use
185 mode constructions.
186
187 :param bytes key: The secret key, ``40``, ``56``, ``64``, ``80``, ``128``,
188 ``192``, or ``256`` bits in length. This must be kept
189 secret.
190
Paul Kehrer0994c562013-11-10 03:19:14 +0800191 .. doctest::
192
193 >>> from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
194 >>> algorithm = algorithms.ARC4(key)
195 >>> cipher = Cipher(algorithm, mode=None)
196 >>> encryptor = cipher.encryptor()
197 >>> ct = encryptor.update(b"a secret message")
198 >>> decryptor = cipher.decryptor()
199 >>> decryptor.update(ct)
200 'a secret message'
201
David Reid30722b92013-11-07 13:03:39 -0800202
203.. _symmetric-encryption-modes:
204
Alex Gaynord96d1002013-08-08 07:37:26 -0700205Modes
206~~~~~
207
Paul Kehrer051099e2013-11-06 15:53:40 +0800208.. currentmodule:: cryptography.hazmat.primitives.ciphers.modes
David Reid1f3d7182013-10-22 16:55:18 -0700209
210.. class:: CBC(initialization_vector)
Alex Gaynor48ec9a32013-08-08 11:13:46 -0700211
212 CBC (Cipher block chaining) is a mode of operation for block ciphers. It is
213 considered cryptographically strong.
214
215 :param bytes initialization_vector: Must be random bytes. They do not need
216 to be kept secret (they can be included
Alex Gaynor2dc2b862013-08-08 11:58:04 -0700217 in a transmitted message). Must be the
218 same number of bytes as the
Alex Gaynor8ed651e2013-11-07 13:24:31 -0800219 ``block_size`` of the cipher. Each time
Alex Gaynor9de452d2013-11-07 13:28:23 -0800220 something is encrypted a new
Alex Gaynor8ed651e2013-11-07 13:24:31 -0800221 ``initialization_vector`` should be
222 generated. Do not reuse an
223 ``initialization_vector`` with
224 a given ``key``, and particularly do
225 not use a constant
226 ``initialization_vector``.
227
228 A good construction looks like:
229
230 .. code-block:: pycon
231
232 >>> import os
233 >>> iv = os.urandom(16)
234 >>> mode = CBC(iv)
235
236 While the following is bad and will leak information:
237
238 .. code-block:: pycon
239
240 >>> iv = "a" * 16
241 >>> mode = CBC(iv)
Paul Kehrer13f108f2013-09-09 21:41:03 -0500242
Paul Kehrer45064282013-10-17 13:41:53 -0500243
David Reid1f3d7182013-10-22 16:55:18 -0700244.. class:: CTR(nonce)
Paul Kehrerd0ec60e2013-10-16 08:46:50 -0500245
Paul Kehrer45064282013-10-17 13:41:53 -0500246 .. warning::
247
248 Counter mode is not recommended for use with block ciphers that have a
249 block size of less than 128-bits.
250
Paul Kehrerd0ec60e2013-10-16 08:46:50 -0500251 CTR (Counter) is a mode of operation for block ciphers. It is considered
Alex Gaynord1f02012013-11-01 14:12:35 -0700252 cryptographically strong. It transforms a block cipher into a stream
253 cipher.
Paul Kehrerd0ec60e2013-10-16 08:46:50 -0500254
Paul Kehrer89b3dd32013-10-17 14:02:45 -0500255 :param bytes nonce: Should be random bytes. It is critical to never reuse a
256 ``nonce`` with a given key. Any reuse of a nonce
257 with the same key compromises the security of every
258 message encrypted with that key. Must be the same
259 number of bytes as the ``block_size`` of the cipher
260 with a given key. The nonce does not need to be kept
261 secret and may be included alongside the ciphertext.
Paul Kehrerd0ec60e2013-10-16 08:46:50 -0500262
David Reid1f3d7182013-10-22 16:55:18 -0700263.. class:: OFB(initialization_vector)
Paul Kehrer6f412a02013-09-10 21:30:50 -0500264
265 OFB (Output Feedback) is a mode of operation for block ciphers. It
266 transforms a block cipher into a stream cipher.
267
David Reidf1a39bd2013-09-11 16:28:42 -0700268 :param bytes initialization_vector: Must be random bytes. They do not need
269 to be kept secret (they can be included
270 in a transmitted message). Must be the
271 same number of bytes as the
272 ``block_size`` of the cipher. Do not
273 reuse an ``initialization_vector`` with
274 a given ``key``.
Paul Kehrer6f412a02013-09-10 21:30:50 -0500275
David Reid1f3d7182013-10-22 16:55:18 -0700276.. class:: CFB(initialization_vector)
Paul Kehrer4223df72013-09-11 09:48:04 -0500277
278 CFB (Cipher Feedback) is a mode of operation for block ciphers. It
279 transforms a block cipher into a stream cipher.
280
281 :param bytes initialization_vector: Must be random bytes. They do not need
282 to be kept secret (they can be included
283 in a transmitted message). Must be the
284 same number of bytes as the
285 ``block_size`` of the cipher. Do not
286 reuse an ``initialization_vector`` with
287 a given ``key``.
288
Paul Kehrer13f108f2013-09-09 21:41:03 -0500289
290Insecure Modes
291--------------
292
Alex Gaynorcd413a32013-09-10 18:59:43 -0700293.. warning::
294
295 These modes are insecure. New applications should never make use of them,
296 and existing applications should strongly consider migrating away.
297
298
David Reid1f3d7182013-10-22 16:55:18 -0700299.. class:: ECB()
Paul Kehrer13f108f2013-09-09 21:41:03 -0500300
301 ECB (Electronic Code Book) is the simplest mode of operation for block
Alex Gaynorcd413a32013-09-10 18:59:43 -0700302 ciphers. Each block of data is encrypted in the same way. This means
303 identical plaintext blocks will always result in identical ciphertext
304 blocks, and thus result in information leakage
Alex Gaynorab5f0112013-11-08 10:34:00 -0800305
306
307.. _`described by Colin Percival`: http://www.daemonology.net/blog/2009-06-11-cryptographic-right-answers.html