Interface StreamingAead
-
- All Known Implementing Classes:
AesCtrHmacStreaming,AesGcmHkdfStreaming,LegacyFullStreamingAead
public interface StreamingAeadAn interface for streaming authenticated encryption with associated data.Streaming encryption is typically used for encrypting large plaintexts such as large files. Tink may eventually contain multiple interfaces for streaming encryption depending on the supported properties. This interface supports a streaming interface for symmetric encryption with authentication. The underlying encryption modes are selected so that partial plaintext can be obtained fast by decrypting and authenticating just a part of the ciphertext.
Security guarantees
Instances of StreamingAead must follow the nOAE definition as proposed in the paper "Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance" by Hoang, Reyhanitabar, Rogaway and Vizár https://eprint.iacr.org/2015/189.pdf
Restrictions
Encryption must be done in one session. There is no possibility to modify an existing ciphertext or append to it (other than reencrypt the whole file again). One reason for this restriction is the use of AES-GCM as one cipher to implement this interface. If single segments are modified then this is equivalent to reusing the same IV twice, but reusing an IV twice leaks an AES-GCM key. Another reason is that implementations of this interface have no protection against roll-back attacks: an attacker can always try to restore a previous version of the file without detection.
Blocking vs non-blocking I/O
A channel can be in a blocking mode (i.e. always waits until the requested number of bytes have been processed) or non-blocking mode (i.e. I/O operation will never block and may transfer fewer bytes than were requested or possibly no bytes at all).
If the channel provided to the streaming encryption is in blocking mode then encryption and decryption have the same property. That is, encryption always processes all the plaintext passed in, and waits until complete segments have been written to the ciphertext channel (incomplete segment, if any, is buffered). Similarly, decryption blocks until sufficiently many bytes have been read from the ciphertext channel so that all the requested plaintext can be decrypted and authenticated, or until the end of the plaintext has been reached, or an IOException occurred.
If the channel provided to the streaming encryption is in non-blocking mode, then encryption and decryption are also non-blocking. Since encryption and decryption is done in segments it is possible that for example a call attempting to read() returns no plaintext at all even if partial ciphertext was read from the underlying channel.
Sample encryption
StreamingAead s = ... java.nio.channels.FileChannel ciphertextDestination = new FileOutputStream(ciphertextFile).getChannel(); byte[] aad = ... WritableByteChannel encryptingChannel = s.newEncryptingChannel(ciphertextDestination, aad); while ( ... ) { int r = encryptingChannel.write(buffer); ... } encryptingChannel.close();Sample full decryption
StreamingAead s = ... java.nio.channels.FileChannel ciphertextSource = new FileInputStream(ciphertextFile).getChannel(); byte[] aad = ... ReadableByteChannel decryptingChannel = s.newDecryptingChannel(ciphertextSource, aad); int chunkSize = ... ByteBuffer buffer = ByteBuffer.allocate(chunkSize); do { buffer.clear(); int cnt = decryptingChannel.read(buffer); if (cnt > 0) { // Process cnt bytes of plaintext. } else if (read == -1) { // End of plaintext detected. break; } else if (read == 0) { // No ciphertext is available at the moment. } }- Since:
- 1.1.0
-
-
Method Summary
All Methods Instance Methods Abstract Methods Modifier and Type Method Description java.nio.channels.ReadableByteChannelnewDecryptingChannel(java.nio.channels.ReadableByteChannel ciphertextSource, byte[] associatedData)java.io.InputStreamnewDecryptingStream(java.io.InputStream ciphertextSource, byte[] associatedData)Returns a wrapper aroundciphertextSource, such that any read-operation via the wrapper results in AEAD-decryption of the underlying ciphertext, usingassociatedDataas associated authenticated data.java.nio.channels.WritableByteChannelnewEncryptingChannel(java.nio.channels.WritableByteChannel ciphertextDestination, byte[] associatedData)Returns a WritableByteChannel for plaintext.java.io.OutputStreamnewEncryptingStream(java.io.OutputStream ciphertextDestination, byte[] associatedData)Returns a wrapper aroundciphertextDestination, such that any write-operation via the wrapper results in AEAD-encryption of the written data, usingassociatedDataas associated authenticated data.java.nio.channels.SeekableByteChannelnewSeekableDecryptingChannel(java.nio.channels.SeekableByteChannel ciphertextSource, byte[] associatedData)Returns a SeekableByteChannel that allows to access the plaintext.
-
-
-
Method Detail
-
newEncryptingChannel
java.nio.channels.WritableByteChannel newEncryptingChannel(java.nio.channels.WritableByteChannel ciphertextDestination, byte[] associatedData) throws java.security.GeneralSecurityException, java.io.IOExceptionReturns a WritableByteChannel for plaintext. Any data written to the returned channel will be encrypted and the resulting ciphertext written to the providedciphertextDestination- Parameters:
ciphertextDestination- the channel to which the ciphertext is written.associatedData- data associated with the plaintext. This data is authenticated but not encrypted. It must be passed into the decryption.- Throws:
java.security.GeneralSecurityExceptionjava.io.IOException
-
newSeekableDecryptingChannel
java.nio.channels.SeekableByteChannel newSeekableDecryptingChannel(java.nio.channels.SeekableByteChannel ciphertextSource, byte[] associatedData) throws java.security.GeneralSecurityException, java.io.IOExceptionReturns a SeekableByteChannel that allows to access the plaintext.This method does not work on Android Marshmallow (API level 23) or older because these Android versions don't have the java.nio.channels.SeekableByteChannel interface.
- Parameters:
ciphertextSource- the ciphertextassociatedData- the data associated with the ciphertext.- Returns:
SeekableByteChannelthat allows random read access to the plaintext. The following methods of SeekableByteChannel are implemented:long position()Returns the channel's position in the plaintext.SeekableByteChannel position(long newPosition)Sets the channel's position. Setting the position to a value greater than the plaintext size is legal. A later attempt to read byte will immediately return an end-of-file indication.int read(ByteBuffer dst)Bytes are read starting at the channel's position, and then the position is updated with the number of bytes actually read. All bytes returned have been authenticated. If the end of the stream has been reached -1 is returned. A result of -1 is authenticated (e.g. by checking the MAC of the last ciphertext chunk.) A call to this function attempts to fill dst, but it may return fewer bytes than requested, e.g. if the underlying ciphertextSource does not provide the requested number of bytes or if the plaintext ended.Throws
IOExceptionif a MAC verification failed. TODO: Should we extend the interface with read(ByteBuffer dst, long position) to avoid race conditions?long size()Returns the size of the plaintext. TODO: Decide whether the result should be authenticated)SeekableByteChannel truncate(long size)throwsNonWritableChannelExceptionbecause the channel is read-only.int write(ByteBuffer src)throwsNonWritableChannelExceptionbecause the channel is read-only.close()closes the channelisOpen()
- Throws:
java.security.GeneralSecurityException- if the header of the ciphertext is corrupt or if associatedData is not correct.java.io.IOException- if an IOException occurred while reading from ciphertextDestination.
-
newDecryptingChannel
java.nio.channels.ReadableByteChannel newDecryptingChannel(java.nio.channels.ReadableByteChannel ciphertextSource, byte[] associatedData) throws java.security.GeneralSecurityException, java.io.IOException- Throws:
java.security.GeneralSecurityExceptionjava.io.IOException
-
newEncryptingStream
java.io.OutputStream newEncryptingStream(java.io.OutputStream ciphertextDestination, byte[] associatedData) throws java.security.GeneralSecurityException, java.io.IOExceptionReturns a wrapper aroundciphertextDestination, such that any write-operation via the wrapper results in AEAD-encryption of the written data, usingassociatedDataas associated authenticated data. The associated data is not included in the ciphertext and has to be passed in as parameter for decryption.- Throws:
java.security.GeneralSecurityExceptionjava.io.IOException
-
newDecryptingStream
java.io.InputStream newDecryptingStream(java.io.InputStream ciphertextSource, byte[] associatedData) throws java.security.GeneralSecurityException, java.io.IOExceptionReturns a wrapper aroundciphertextSource, such that any read-operation via the wrapper results in AEAD-decryption of the underlying ciphertext, usingassociatedDataas associated authenticated data.The returned InputStream may support
mark()/reset(), but does not have to do it --markSupported()provides the corresponding info.The returned InputStream supports
skip(), yet possibly in an inefficient way, i.e. by reading a sequence of blocks until the desired position. If a more efficientskip()-functionality is needed, the Channel-based API can be used.- Throws:
java.security.GeneralSecurityExceptionjava.io.IOException
-
-