android随机数生成,所有Android版本的安全随机数生成

我目前正在研究涉及加密的android应用程序的想法.我打算在ctr模式下使用aes,并在带有漩涡的PBKDF2中使用键进行拉伸.

我将实现一个新的充气城堡实现,而不是旧实现中内置的android.为了确保它可以在任何Android版本上正常工作.

但是我在寻找一种可靠的方法来生成盐和密钥的随机数时遇到了一些问题.我读过某处文章说,在某些旧版本的android中,android中内置的安全随机性是不安全的,而且我还听说大多数android手机很难在开发/随机性和块中保持较高的熵.难道这对dev / urandom的安全性没有重大影响吗?

因此,我正在寻找使用手机上的传感器收集更多熵的好方法.

解决方法:

以下类应帮助您减轻Android SecureRandom类的问题.该代码不是文本,而是创建的,因为细节不多.

/**

* A strengthener that can be used to generate and re-seed random number

* generators that do not seed themselves appropriately.

*

* @author owlstead

*/

public class SecureRandomStrengthener {

private static final String DEFAULT_PSEUDO_RANDOM_NUMBER_GENERATOR = "SHA1PRNG";

private static final EntropySource TIME_ENTROPY_SOURCE = new EntropySource() {

final ByteBuffer timeBuffer = ByteBuffer.allocate(Long.SIZE / Byte.SIZE

* 2);

@Override

public ByteBuffer provideEntropy() {

this.timeBuffer.clear();

this.timeBuffer.putLong(System.currentTimeMillis());

this.timeBuffer.putLong(System.nanoTime());

this.timeBuffer.flip();

return this.timeBuffer;

}

};

private final String algorithm;

private final List entropySources = new LinkedList();

private final MessageDigest digest;

private final ByteBuffer seedBuffer;

/**

* Generates an instance of a {@link SecureRandomStrengthener} that

* generates and re-seeds instances of {@code "SHA1PRNG"}.

*

* @return the strengthener, never null

*/

public static SecureRandomStrengthener getInstance() {

return new SecureRandomStrengthener(

DEFAULT_PSEUDO_RANDOM_NUMBER_GENERATOR);

}

/**

* Generates an instance of a {@link SecureRandomStrengthener} that

* generates instances of the given argument. Note that the availability of

* the given algorithm arguments in not tested until generation.

*

* @param algorithm

* the algorithm indicating the {@link SecureRandom} instance to

* use

* @return the strengthener, never null

*/

public static SecureRandomStrengthener getInstance(final String algorithm) {

return new SecureRandomStrengthener(algorithm);

}

private SecureRandomStrengthener(final String algorithm) {

if (algorithm == null || algorithm.length() == 0) {

throw new IllegalArgumentException(

"Please provide a PRNG algorithm string such as SHA1PRNG");

}

this.algorithm = algorithm;

try {

this.digest = MessageDigest.getInstance("SHA1");

} catch (final NoSuchAlgorithmException e) {

throw new IllegalStateException(

"MessageDigest to create seed not available", e);

}

this.seedBuffer = ByteBuffer.allocate(this.digest.getDigestLength());

}

/**

* Add an entropy source, which will be called for each generation and

* re-seeding of the given random number generator.

*

* @param source

* the source of entropy

*/

public void addEntropySource(final EntropySource source) {

if (source == null) {

throw new IllegalArgumentException(

"EntropySource should not be null");

}

this.entropySources.add(source);

}

/**

* Generates and seeds a random number generator of the configured

* algorithm. Calls the {@link EntropySource#provideEntropy()} method of all

* added sources of entropy.

*

* @return the random number generator

*/

public SecureRandom generateAndSeedRandomNumberGenerator() {

final SecureRandom secureRandom;

try {

secureRandom = SecureRandom.getInstance(this.algorithm);

} catch (final NoSuchAlgorithmException e) {

throw new IllegalStateException("PRNG is not available", e);

}

reseed(secureRandom);

return secureRandom;

}

/**

* Re-seeds the random number generator. Calls the

* {@link EntropySource#provideEntropy()} method of all added sources of

* entropy.

*

* @param secureRandom

* the random number generator to re-seed

*/

public void reseed(final SecureRandom secureRandom) {

this.seedBuffer.clear();

secureRandom.nextBytes(this.seedBuffer.array());

for (final EntropySource source : this.entropySources) {

final ByteBuffer entropy = source.provideEntropy();

if (entropy == null) {

continue;

}

final ByteBuffer wipeBuffer = entropy.duplicate();

this.digest.update(entropy);

wipe(wipeBuffer);

}

this.digest.update(TIME_ENTROPY_SOURCE.provideEntropy());

this.digest.update(this.seedBuffer);

this.seedBuffer.clear();

// remove data from seedBuffer so it won't be retrievable

// reuse

try {

this.digest.digest(this.seedBuffer.array(), 0,

this.seedBuffer.capacity());

} catch (final DigestException e) {

throw new IllegalStateException(

"DigestException should not be thrown", e);

}

secureRandom.setSeed(this.seedBuffer.array());

wipe(this.seedBuffer);

}

private void wipe(final ByteBuffer buf) {

while (buf.hasRemaining()) {

buf.put((byte) 0);

}

}

}

这是EntropySource的小接口:

/**

* A simple interface that can be used to retrieve entropy from any source.

*

* @author owlstead

*/

public interface EntropySource {

/**

* Retrieves the entropy.

* The position of the ByteBuffer must be advanced to the limit by any users calling this method.

* The values of the bytes between the position and limit should be set to zero by any users calling this method.

*

* @return entropy within the position and limit of the given buffer

*/

ByteBuffer provideEntropy();

}

请注意,尚未对类的输出进行随机性测试(但这主要取决于返回的SecureRandom类,因此应该可以).

最后,由于我还没有准备好Android 1.6运行时,因此应该针对此版本或更低版本进行兼容性(!)测试.

标签:random,security,cryptography,android

来源: https://codeday.me/bug/20191123/2064778.html

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值