原创文章,欢迎转发朋友圈,转载请注明出处python
cryptography是python语言中很是著名的加解密库,在算法层面提供了高层次的抽象,使用起来很是简单、直观,pythonic,同时还保留了各类不一样算法的低级别接口,保留灵活性。算法
咱们知道加密通常分为对称加密(Symmetric Key Encryption)和非对称加密(Asymmetric Key Encryption)。,各自对应多种不一样的算法,每种算法又有不一样的密钥位长要求,另外还涉及到不一样的分组加密模式,以及末尾补齐方式。所以须要高层次的抽象,把这些参数封装起来,让咱们使用时,不用关心这么多参数,只要知道这么用足够安全就够了。安全
对称加密又分为分组加密和序列加密,本文只讨论对称分组加密。dom
主流对称分组加密算法:DES、3DES、AES编码
主流对称分组加密模式:ECB、CBC、CFB、OFB加密
主流填充标准:PKCS七、ISO 1012六、ANSI X.92三、Zero paddingurl
在cryptography库中,对称加密算法的抽象是fernet模块,包括了对数据的加解密以及签名验证功能,以及密钥过时机制。 spa
该模块采用以下定义:code
>>> import os >>> from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes >>> from cryptography.hazmat.backends import default_backend >>> backend = default_backend() >>> key = os.urandom(32) >>> iv = os.urandom(16) >>> cipher = Cipher(algorithms.AES(key), modes.CBC(iv), backend=backend) >>> encryptor = cipher.encryptor() >>> ct = encryptor.update(b"a secret message") + encryptor.finalize() >>> decryptor = cipher.decryptor() >>> decryptor.update(ct) + decryptor.finalize() 'a secret message'
@classmethod def generate_key(cls): return base64.urlsafe_b64encode(os.urandom(32))
self._signing_key = key[:16] self._encryption_key = key[16:] self._backend = backend
basic_parts = ( b"\x80" + struct.pack(">Q", current_time) + iv + ciphertext )
def encrypt(self, data): current_time = int(time.time()) iv = os.urandom(16) return self._encrypt_from_parts(data, current_time, iv) def _encrypt_from_parts(self, data, current_time, iv): if not isinstance(data, bytes): raise TypeError("data must be bytes.") padder = padding.PKCS7(algorithms.AES.block_size).padder() padded_data = padder.update(data) + padder.finalize() encryptor = Cipher( algorithms.AES(self._encryption_key), modes.CBC(iv), self._backend ).encryptor() ciphertext = encryptor.update(padded_data) + encryptor.finalize() basic_parts = ( b"\x80" + struct.pack(">Q", current_time) + iv + ciphertext ) h = HMAC(self._signing_key, hashes.SHA256(), backend=self._backend) h.update(basic_parts) hmac = h.finalize() return base64.urlsafe_b64encode(basic_parts + hmac)
def decrypt(self, token, ttl=None): if not isinstance(token, bytes): raise TypeError("token must be bytes.") current_time = int(time.time()) try: data = base64.urlsafe_b64decode(token) except (TypeError, binascii.Error): raise InvalidToken if not data or six.indexbytes(data, 0) != 0x80: raise InvalidToken try: timestamp, = struct.unpack(">Q", data[1:9]) except struct.error: raise InvalidToken if ttl is not None: if timestamp + ttl < current_time: raise InvalidToken if current_time + _MAX_CLOCK_SKEW < timestamp: raise InvalidToken h = HMAC(self._signing_key, hashes.SHA256(), backend=self._backend) h.update(data[:-32]) try: h.verify(data[-32:]) except InvalidSignature: raise InvalidToken iv = data[9:25] ciphertext = data[25:-32] decryptor = Cipher( algorithms.AES(self._encryption_key), modes.CBC(iv), self._backend ).decryptor() plaintext_padded = decryptor.update(ciphertext) try: plaintext_padded += decryptor.finalize() except ValueError: raise InvalidToken unpadder = padding.PKCS7(algorithms.AES.block_size).unpadder() unpadded = unpadder.update(plaintext_padded) try: unpadded += unpadder.finalize() except ValueError: raise InvalidToken return unpadded