Menu

#32 encryption works but decryption does not, Java 8 (JCE jars installed).

v1.9.x
closed-fixed
nobody
bug (1)
5
2019-06-07
2014-08-13
nobulletnav
No

For the following PBE algorithms decryption is not working throwing org.jasypt.exceptions.EncryptionOperationNotPossibleException:

PBEWITHHMACSHA1ANDAES_128   
PBEWITHHMACSHA1ANDAES_256   
PBEWITHHMACSHA224ANDAES_128 
PBEWITHHMACSHA224ANDAES_256 
PBEWITHHMACSHA256ANDAES_128 
PBEWITHHMACSHA256ANDAES_256 
PBEWITHHMACSHA384ANDAES_128 
PBEWITHHMACSHA384ANDAES_256 
PBEWITHHMACSHA512ANDAES_128 
PBEWITHHMACSHA512ANDAES_256

Tested on:
1. Oracle JDK (1.8.0_05) on Debian 3.2.54-2 x86_64
2. Oracle JDK (1.8.0) on Mac OS X 10.9.4 (13E28)

The output for the simple tests (code is below and in the attachment):

A. Without JCE jars installed:

--------------------------------------------------------------------------------
Version: 1.8.0, max key length: 128 (JCE: NO)
--------------------------------------------------------------------------------
Algorithm                       Result                        
--------------------------------------------------------------------------------
PBEWITHHMACSHA1ANDAES_128       NOT_POSSIBLE_DECRYPT          
PBEWITHHMACSHA1ANDAES_256       NOT_POSSIBLE                  
PBEWITHHMACSHA224ANDAES_128     NOT_POSSIBLE_DECRYPT          
PBEWITHHMACSHA224ANDAES_256     NOT_POSSIBLE                  
PBEWITHHMACSHA256ANDAES_128     NOT_POSSIBLE_DECRYPT          
PBEWITHHMACSHA256ANDAES_256     NOT_POSSIBLE                  
PBEWITHHMACSHA384ANDAES_128     NOT_POSSIBLE_DECRYPT          
PBEWITHHMACSHA384ANDAES_256     NOT_POSSIBLE                  
PBEWITHHMACSHA512ANDAES_128     NOT_POSSIBLE_DECRYPT          
PBEWITHHMACSHA512ANDAES_256     NOT_POSSIBLE                  
PBEWITHMD5ANDDES                OK                            
PBEWITHMD5ANDTRIPLEDES          NOT_POSSIBLE                  
PBEWITHSHA1ANDDESEDE            OK                            
PBEWITHSHA1ANDRC2_128           OK                            
PBEWITHSHA1ANDRC2_40            OK                            
PBEWITHSHA1ANDRC4_128           OK                            
PBEWITHSHA1ANDRC4_40            OK                           
--------------------------------------------------------------------------------

B. With JCE jars installed:


Version: 1.8.0, max key length: 2147483647 (JCE: YES)

Algorithm Result

PBEWITHHMACSHA1ANDAES_128 NOT_POSSIBLE_DECRYPT
PBEWITHHMACSHA1ANDAES_256 NOT_POSSIBLE_DECRYPT
PBEWITHHMACSHA224ANDAES_128 NOT_POSSIBLE_DECRYPT
PBEWITHHMACSHA224ANDAES_256 NOT_POSSIBLE_DECRYPT
PBEWITHHMACSHA256ANDAES_128 NOT_POSSIBLE_DECRYPT
PBEWITHHMACSHA256ANDAES_256 NOT_POSSIBLE_DECRYPT
PBEWITHHMACSHA384ANDAES_128 NOT_POSSIBLE_DECRYPT
PBEWITHHMACSHA384ANDAES_256 NOT_POSSIBLE_DECRYPT
PBEWITHHMACSHA512ANDAES_128 NOT_POSSIBLE_DECRYPT
PBEWITHHMACSHA512ANDAES_256 NOT_POSSIBLE_DECRYPT
PBEWITHMD5ANDDES OK
PBEWITHMD5ANDTRIPLEDES OK
PBEWITHSHA1ANDDESEDE OK
PBEWITHSHA1ANDRC2_128 OK
PBEWITHSHA1ANDRC2_40 OK
PBEWITHSHA1ANDRC4_128 OK
PBEWITHSHA1ANDRC4_40 OK


The code below lists all existing PBE algorithms with AlgorithmRegistry.getAllPBEAlgorithms() and applies a simple test for each algorithm (encrypt and the decrypt with the same StandardPBEStringEncryptor).

package com.nobullet.encryption.test;

import java.security.NoSuchAlgorithmException;
import java.util.ArrayList;
import java.util.List;
import java.util.Set;
import java.util.logging.Level;
import java.util.logging.Logger;
import javax.crypto.Cipher;
import org.jasypt.encryption.pbe.StandardPBEStringEncryptor;
import org.jasypt.registry.AlgorithmRegistry;

/**
 * Main encryption tests.
 *
 * @author nobulletnav
 */
public class Main {

    static final String DATA = "{json:{userId:'12345678901234567890'}}";
    static final Logger logger = Logger.getGlobal();

    public static void main(String[] args) {
        String format = "%s\t%s";
        String line = padTo("", '-', 80);
        int keyLength = getJCEMaxKeyLength();
        String jce = keyLength == Integer.MAX_VALUE ? "YES" : "NO";
        // Collect test results.
        Set<String> algorithms = (Set<String>) AlgorithmRegistry.getAllPBEAlgorithms();
        List<String> result = new ArrayList<>();
        for (String algorithm : algorithms) {
            AlgoritmTestResult works = testAlgorithm(algorithm);
            result.add(String.format(format, padTo(algorithm), padTo(works.toString())));
        }
        // Print response.
        System.out.println(line);
        System.out.println(String.format("Version: %s, max key length: %d (JCE: %s)",
                System.getProperty("java.version"), keyLength, jce) + "\n" + line);
        System.out.println(String.format(format, padTo("Algorithm"), padTo("Result"))
                + "\n" + line);
        for (String r : result) {
            System.out.println(r);
        }
    }

    public static int getJCEMaxKeyLength() {
        try {
            return Cipher.getMaxAllowedKeyLength("AES");
        } catch (NoSuchAlgorithmException ex) {
            return -1;
        }
    }

    public static AlgoritmTestResult testAlgorithm(String algorithm) {
        boolean isEncrypted = false;
        try {
            StandardPBEStringEncryptor encryptor = new StandardPBEStringEncryptor();
            encryptor.setPassword("wiu34we233[]weuokw/12340645798/3@#4");
            encryptor.setAlgorithm(algorithm);
            encryptor.setKeyObtentionIterations(1);
            String encrypted = encryptor.encrypt(DATA);
            isEncrypted = true;
            return DATA.equals(encryptor.decrypt(encrypted)) ? AlgoritmTestResult.OK : AlgoritmTestResult.DECRYPT_FAIL;
        } catch (org.jasypt.exceptions.EncryptionOperationNotPossibleException e) {
            logger.log(Level.WARNING, "Error while using " + algorithm + " ", e);
            return isEncrypted ? AlgoritmTestResult.NOT_POSSIBLE_DECRYPT : AlgoritmTestResult.NOT_POSSIBLE;
        } catch (Exception e) {
            logger.log(Level.WARNING, "Error while using " + algorithm + " ", e);
            return AlgoritmTestResult.UNKNOWN;
        }
    }

    public static String padTo(String s) {
        return padTo(s, 30);
    }

    public static String padTo(String s, char c, int length) {
        if (s.length() < length) {
            StringBuilder sb = new StringBuilder(s);
            for (int i = 0; i < length - s.length(); i++) {
                sb.append(c);
            }
            return sb.toString();
        }
        return s;
    }

    public static String padTo(String s, int length) {
        return padTo(s, ' ', length);
    }

    public static enum AlgoritmTestResult {

        OK,
        DECRYPT_FAIL,
        NOT_POSSIBLE,
        NOT_POSSIBLE_DECRYPT,
        UNKNOWN;
    }
}
1 Attachments

Discussion

1 2 > >> (Page 1 of 2)
  • nobulletnav

    nobulletnav - 2014-08-13

    Sorry, I can't find the edit button.

    B. With JCE jars installed (well formatted):

    Version: 1.8.0, max key length: 2147483647 (JCE: YES)
    --------------------------------------------------------------------------------
    Algorithm                       Result                        
    --------------------------------------------------------------------------------
    PBEWITHHMACSHA1ANDAES_128       NOT_POSSIBLE_DECRYPT          
    PBEWITHHMACSHA1ANDAES_256       NOT_POSSIBLE_DECRYPT          
    PBEWITHHMACSHA224ANDAES_128     NOT_POSSIBLE_DECRYPT          
    PBEWITHHMACSHA224ANDAES_256     NOT_POSSIBLE_DECRYPT          
    PBEWITHHMACSHA256ANDAES_128     NOT_POSSIBLE_DECRYPT          
    PBEWITHHMACSHA256ANDAES_256     NOT_POSSIBLE_DECRYPT          
    PBEWITHHMACSHA384ANDAES_128     NOT_POSSIBLE_DECRYPT          
    PBEWITHHMACSHA384ANDAES_256     NOT_POSSIBLE_DECRYPT          
    PBEWITHHMACSHA512ANDAES_128     NOT_POSSIBLE_DECRYPT          
    PBEWITHHMACSHA512ANDAES_256     NOT_POSSIBLE_DECRYPT          
    PBEWITHMD5ANDDES                OK                            
    PBEWITHMD5ANDTRIPLEDES          OK                            
    PBEWITHSHA1ANDDESEDE            OK                            
    PBEWITHSHA1ANDRC2_128           OK                            
    PBEWITHSHA1ANDRC2_40            OK                            
    PBEWITHSHA1ANDRC4_128           OK                            
    PBEWITHSHA1ANDRC4_40            OK                         
    --------------------------------------------------------------------------------
    
     
  • smithsdevin

    smithsdevin - 2014-12-19

    I found the same thing today. The actual exception gets swallowed though:

    java.security.InvalidAlgorithmParameterException: Missing parameter type: IV expected

     
  • Fedor

    Fedor - 2015-02-17

    Hello,

    Any plans to fix this bug soon? Looks like easy job - just add new IvParameterSpec config param when initialising/encrypting/decrypting

     
  • Liam Jones

    Liam Jones - 2015-03-02

    Also ran into this issue today while looking at Jasypt

     
  • jacoby

    jacoby - 2015-09-11
    Post awaiting moderation.
  • outofcoffee

    outofcoffee - 2016-01-24

    @jacoby any chance you can look at this soon? This makes strong encryption difficult on Java 8.

    Replicated with jasypt 1.9.2 on Java(TM) SE Runtime Environment (build 1.8.0_60-b27) for OS X, with JCE Unlimited Strength policies installed.

     

    Last edit: outofcoffee 2016-01-24
  • Andrew

    Andrew - 2016-02-06

    The attached patch can only be built/used Java >= 8, as the PBEParameterSpec constructor accepting additional AlgorithmParameterSpec appears to have been added in Java8.

    Hopefully this helps, in some way.

     
  • Brendan Collins

    Brendan Collins - 2017-04-03

    Any plans to release an update with this fix? If so is there a timeframe? Thanks

     
  • Preetam

    Preetam - 2017-04-05

    Yeah - came across this and looks like fix is simple - explicitely specify IV during both encryption and decryption.
    When the new version is planned?

     
  • Hoki Torres

    Hoki Torres - 2017-04-05

    We are working on this and we expect to have a new version soon, hopefully as soon as May.

     
  • Brendan Collins

    Brendan Collins - 2017-04-06

    Thanks for tth update Hoki!

     
  • Brendan Collins

    Brendan Collins - 2017-04-27

    Hoki, Can you offer any refinement on timeframe for a new jasypt release? Thanks!

     
  • Hoki Torres

    Hoki Torres - 2017-05-03

    We expect to release it for the week of May 29.

     
  • Mark Williams

    Mark Williams - 2017-05-18

    I took Andrews patch and applied it to jasypt-1.9.3-SNAPSHOT. I was trying to use PBEWithHmacSHA512AndAES_256 algorithm on apache ActiveMQ, which requires an "iv".
    Seems Jasypt / Spring has issues with mapping parameters to beans that are not named in camel case. So getIV()/setIV() basically make it impossible to map the values to the PBEConfig object. When I renamed these as getIv()/setIv() then spring was able to map them.

    There also seems to be an issue with setting the parameters to the PBEConfig object instead of directly to the StandardPBEStringEncryptor. So I think there is more work needed.

     
  • Mark Williams

    Mark Williams - 2017-05-18

    Modified Main.java example using PBEConfig.

     
  • Ryan Dawson

    Ryan Dawson - 2017-06-16

    I pointed my project at the latest snapshot and it looks like the fix from Mark Williams above isn't included right now. Is there a plan for when this will be included?

     
  • Tomasz Juchniewicz

    I'm also waiting for this patch. We can't you AES with Java 8 right now.

     
  • Ryan Dawson

    Ryan Dawson - 2017-07-11

    For what it's worth I found that using AES does work with Bouncy Castle. The bug only affects the Java8 built-in JCE. But naturally not everyone wants to use Bouncy Castle.

     
  • Tomasz Juchniewicz

    Right. But we want to use Java 8 support for x86 AES intrinsics built-in in SunJCE provider

     
  • Artem Astafyev

    Artem Astafyev - 2017-07-13

    Ryan, could you plese elaborate how did you manage to get AES with Bouncy Castle working? I get the same error "Operation not possible (Bad input or parameters)" both with built-in JCE and BC.

     
  • Mariusz Pacek

    Mariusz Pacek - 2017-07-18

    @Ryan Dawson thx it worked.
    Problem also occur in apache Karaf wiht jasyp properties module and we are witing for update

     
  • Artem Astafyev

    Artem Astafyev - 2017-07-18

    Thanks Ryan! I followed instructions of installing BC on their site and they didn't mention that "Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy" is required too. After installing it all works fine!

     
  • Martin Lichtin

    Martin Lichtin - 2018-01-13

    Wanted to ask if there's soon a new release with this fix in?

     
  • Melloware Inc

    Melloware Inc - 2018-07-18

    No releases in 4 years? This open issue preventing using encyrption algorithms in JAVA 8. Is this project dead? If so are the devleopers willing to turn it over to people willing to maintain and release it?

     
1 2 > >> (Page 1 of 2)

Log in to post a comment.