如何让Botan的RSA签名验证与PyCrypto匹配

0 投票
1 回答
2216 浏览
提问于 2025-04-17 12:12

我正在开发一个密钥生成器,它可以生成RSA签名,然后下载到客户端的电脑上。

在客户端的电脑上,我想用RSA签名和公钥来验证一个字符串。我想知道,如果你能帮忙的话,我应该使用什么算法来验证签名,或者我的代码有什么问题。

[编辑:根据建议更新了代码,但还是没有成功。]

以下是Python代码:

from Crypto.Signature import PKCS1_PSS
from Crypto.Hash import SHA
from Crypto.PublicKey import RSA
from Crypto import Random

key_priv = RSA.generate(1024)#, random_generator)
#key_priv = RSA.importKey(open('key.priv.pem.rsa').read())

key_pub  = key_priv.publickey()
n, e = key_pub.n, key_pub.e

p,q,d,u = key_priv.p, key_priv.q, key_priv.d, key_priv.u

print "char n[] = \"",n,"\";"
print "char e[] = \"",e,"\";"

#print "key_pub.exportKey(): ",key_pub.exportKey()

mac = '192.168.0.106'
plugin = 'Bluetooth'
text = plugin + mac

hash = SHA.new()
hash.update(text)

#signature = key_priv.sign(hash, None, 'PKCS1')[0]
#print "signature: ", signature

#random_generator = Random.new().read
#signature = key_priv.sign(hash, '')

signer    = PKCS1_PSS.new(key_priv)

# signature = signer.sign(hash)
signature = open('plugin_example.signature').read()

print "type(signature)", type(signature) #str
print "signature: ", signature

verifier = PKCS1_PSS.new(key_pub)
if verifier.verify(hash, signature):
    print "The signature is authentic."
else:
    print "The signature is not authentic."

fd = open("plugin_example.signature", "w")
fd.write(signature)
fd.close()

fd = open("key.pub.pem.rsa", "w")
fd.write(key_pub.exportKey())
fd.close()

fd = open("key.priv.pem.rsa", "w")
fd.write(key_priv.exportKey())
fd.close()

还有C++代码:

#include <string.h>
#include <assert.h>
#include <iostream>
#include <fstream>
#include <string>
#include <memory>
#include <vector>

#include <botan/botan.h>
#include <botan/look_pk.h>
#include <botan/rsa.h>

#include <QtCore>
#include "lib/debug.hpp"
#include <QDebug>

#define Q(AAA) qDebug() << #AAA <<" " << AAA << endl;
#define P(X) std::cout << #X <<" = " << X << " "<< std::endl;

using namespace Botan;

static BigInt to_bigint(const std::string& h)
{
    return BigInt::decode((const byte*)h.data(),
                          h.length(), BigInt::Hexadecimal);
}


int main(int argc, char ** argv) {

    Botan::LibraryInitializer init;

    QByteArray mac = "192.168.0.106";
    QByteArray plugin = "Bluetooth";
    QByteArray mac_and_plugin = plugin+mac;

    QByteArray mac_and_plugin_hex = QCryptographicHash::hash ( mac_and_plugin, QCryptographicHash::Sha1 ).toHex();

    QByteArray qByteArray_sig;
    QFile file ( argv[1] );
    file.open ( QIODevice::ReadOnly );
    if ( file.isReadable() )
    {
        qByteArray_sig = file.readAll();
    }
    file.close();

    QByteArray qByteArray_sig_hex = qByteArray_sig.toHex();

    char n[] = "137758869720100695031597743484335597584728606037599895664824678915370363634933922524373276431650126408515526550739072301333537631796375930381713667037665579467940926539847824669399430790335904629465572107797677521774814742987023253982675971904413266030976887012380999213491205226382726115118193377641942499979";
    char e[] = "65537";

    BigInt big_n = to_bigint(n);// mod
    BigInt big_e = to_bigint(e);// exp
    RSA_PublicKey pub_key(big_n,big_e);

    PK_Verifier* verifier = 0;

    QStringList l;
    l.push_back("EMSA1(SHA-1)");
    l.push_back("EMSA3(SHA-1)");
    l.push_back("EMSA4(SHA-1)");
    l.push_back("EMSA1(SHA-256)");
    l.push_back("EMSA3(SHA-256)");
    l.push_back("EMSA4(SHA-256)");
    l.push_back("EMSA3(MD5)");

    P(qByteArray_sig.length());

    for (int i = 0 ; i < l.size(); i++) {
        if (verifier)
            delete verifier;
        verifier = get_pk_verifier(pub_key, l[i].toStdString() );

        bool is_valid = verifier->verify_message(
                            mac_and_plugin_hex.data(),mac_and_plugin_hex.length(),
                            qByteArray_sig_hex.data(), qByteArray_sig_hex.length()
                        );
        P(is_valid);

        is_valid = verifier->verify_message(
                      mac_and_plugin_hex.data(),mac_and_plugin_hex.length(),
                      qByteArray_sig.data(), qByteArray_sig.length()
                  );
        P(is_valid);

        is_valid = verifier->verify_message(
                      mac_and_plugin.data(),mac_and_plugin.length(),
                      qByteArray_sig.data(), qByteArray_sig.length()
                  );
        P(is_valid);

    }

    Q(qByteArray_sig);
    Q(qByteArray_sig_hex);;
}

1 个回答

1

在这段Python代码中,你创建的RSA签名并没有遵循任何真实的协议或标准。换句话说,它是原始的,在大多数情况下并不安全。

相反,你应该使用像PSS这样的东西(可以使用pycrypto模块中的PKCS1_PSS)。在Botan代码中,可以通过EMSA4编码来验证。

另外,你也可以使用PKCS#1 v1.5。在Botan中,这对应的是EMSA3。

无论哪种情况,哈希算法在双方都必须保持一致。

撰写回答