| // Licensed to the Apache Software Foundation (ASF) under one |
| // or more contributor license agreements. See the NOTICE file |
| // distributed with this work for additional information |
| // regarding copyright ownership. The ASF licenses this file |
| // to you under the Apache License, Version 2.0 (the |
| // "License"); you may not use this file except in compliance |
| // with the License. You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, |
| // software distributed under the License is distributed on an |
| // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| // KIND, either express or implied. See the License for the |
| // specific language governing permissions and limitations |
| // under the License. |
| |
| using System.Security.Cryptography; |
| |
| namespace Apache.Iggy.Encryption; |
| |
| /// <summary> |
| /// AES-256-GCM based message encryptor for secure message encryption/decryption. |
| /// Uses AES-GCM (Galois/Counter Mode) which provides both confidentiality and authenticity. |
| /// </summary> |
| public sealed class AesMessageEncryptor : IMessageEncryptor |
| { |
| private readonly byte[] _key; |
| private const int NonceSize = 12; // 96 bits - recommended for GCM |
| private const int TagSize = 16; // 128 bits authentication tag |
| |
| /// <summary> |
| /// Creates a new AES message encryptor with the specified key. |
| /// </summary> |
| /// <param name="key">The encryption key. Must be 16, 24, or 32 bytes for AES-128, AES-192, or AES-256 respectively.</param> |
| /// <exception cref="ArgumentException">Thrown when key length is invalid</exception> |
| public AesMessageEncryptor(byte[] key) |
| { |
| if (key.Length != 16 && key.Length != 24 && key.Length != 32) |
| { |
| throw new ArgumentException("Key must be 16, 24, or 32 bytes for AES-128, AES-192, or AES-256", nameof(key)); |
| } |
| |
| _key = key; |
| } |
| |
| /// <summary> |
| /// Creates a new AES-256 message encryptor with the specified base64-encoded key. |
| /// </summary> |
| /// <param name="base64Key">The base64-encoded encryption key</param> |
| /// <returns>A new AesMessageEncryptor instance</returns> |
| public static AesMessageEncryptor FromBase64Key(string base64Key) |
| { |
| return new AesMessageEncryptor(Convert.FromBase64String(base64Key)); |
| } |
| |
| /// <summary> |
| /// Generates a new random AES-256 key. |
| /// </summary> |
| /// <returns>A 32-byte random key suitable for AES-256</returns> |
| public static byte[] GenerateKey() |
| { |
| var key = new byte[32]; |
| using var rng = RandomNumberGenerator.Create(); |
| rng.GetBytes(key); |
| return key; |
| } |
| |
| /// <summary> |
| /// Encrypts the provided plain data using AES-GCM. |
| /// Format: [12-byte nonce][encrypted data][16-byte authentication tag] |
| /// </summary> |
| /// <param name="plainData">The plain data to encrypt</param> |
| /// <returns>The encrypted data with nonce and tag</returns> |
| public byte[] Encrypt(byte[] plainData) |
| { |
| using var aesGcm = new AesGcm(_key, TagSize); |
| |
| var nonce = new byte[NonceSize]; |
| RandomNumberGenerator.Fill(nonce); |
| |
| var ciphertext = new byte[plainData.Length]; |
| var tag = new byte[TagSize]; |
| |
| aesGcm.Encrypt(nonce, plainData, ciphertext, tag); |
| |
| // Combine: nonce + ciphertext + tag |
| var result = new byte[NonceSize + ciphertext.Length + TagSize]; |
| Buffer.BlockCopy(nonce, 0, result, 0, NonceSize); |
| Buffer.BlockCopy(ciphertext, 0, result, NonceSize, ciphertext.Length); |
| Buffer.BlockCopy(tag, 0, result, NonceSize + ciphertext.Length, TagSize); |
| |
| return result; |
| } |
| |
| /// <summary> |
| /// Decrypts the provided encrypted data using AES-GCM. |
| /// Expected format: [12-byte nonce][encrypted data][16-byte authentication tag] |
| /// </summary> |
| /// <param name="encryptedData">The encrypted data with nonce and tag</param> |
| /// <returns>The decrypted plain data</returns> |
| /// <exception cref="ArgumentException">Thrown when encrypted data format is invalid</exception> |
| /// <exception cref="CryptographicException">Thrown when decryption or authentication fails</exception> |
| public byte[] Decrypt(byte[] encryptedData) |
| { |
| if (encryptedData.Length < NonceSize + TagSize) |
| { |
| throw new ArgumentException("Encrypted data is too short to contain nonce and tag", nameof(encryptedData)); |
| } |
| |
| using var aesGcm = new AesGcm(_key, TagSize); |
| |
| // Extract nonce, ciphertext, and tag |
| var nonce = new byte[NonceSize]; |
| var tag = new byte[TagSize]; |
| var ciphertextLength = encryptedData.Length - NonceSize - TagSize; |
| var ciphertext = new byte[ciphertextLength]; |
| |
| Buffer.BlockCopy(encryptedData, 0, nonce, 0, NonceSize); |
| Buffer.BlockCopy(encryptedData, NonceSize, ciphertext, 0, ciphertextLength); |
| Buffer.BlockCopy(encryptedData, NonceSize + ciphertextLength, tag, 0, TagSize); |
| |
| var plaintext = new byte[ciphertextLength]; |
| aesGcm.Decrypt(nonce, ciphertext, tag, plaintext); |
| |
| return plaintext; |
| } |
| } |