php mcrypt_encrypt加密与android AES-128加密不匹配


php mcrypt_encrypt encryption mismatch with android AES-128 encryption

我需要对所有api请求和响应进行加密,我正在使用以下代码。但php代码的加密值和android生成的不匹配。

function encrypt($input,$key) {
     $size = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC); 
     $input = $this->pkcs5_pad($input, $size); 
     $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_CBC, ''); 
     $iv = mcrypt_create_iv (mcrypt_enc_get_iv_size($td), MCRYPT_RAND); 
     mcrypt_generic_init($td, $key); 
     $data = mcrypt_generic($td, $input); 
     mcrypt_generic_deinit($td); 
     mcrypt_module_close($td); 
     $data = base64_encode($data); 
     return $data; 
}
function aesdecrypt($sStr,$sKey){
    $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_CBC, ''); 
     $iv = mcrypt_create_iv (mcrypt_enc_get_iv_size($td), MCRYPT_RAND); 
    $decrypted= mcrypt_decrypt(
        MCRYPT_RIJNDAEL_128,
        $sKey, 
        base64_decode($sStr), 
        MCRYPT_MODE_CBC
    );
    $dec_s = strlen($decrypted); 
    $padding = ord($decrypted[$dec_s-1]); 
    $decrypted = substr($decrypted, 0, -$padding);
    return $decrypted;
}

安卓代码(用于加密和解密):

public static String encode(String password, String text)
        throws NoPassGivenException, NoTextGivenException {
    /*if (password.length() == 0 || password == null) {
        throw new NoPassGivenException("Please give Password");
    }
    if (text.length() == 0 || text == null) {
        throw new NoTextGivenException("Please give text");
    }*/
    try {
        SecretKeySpec skeySpec = getKey(password);
        byte[] clearText = text.getBytes("UTF8");
        //IMPORTANT TO GET SAME RESULTS ON iOS and ANDROID
        final byte[] iv = new byte[16];
        Arrays.fill(iv, (byte) 0x00);
        IvParameterSpec ivParameterSpec = new IvParameterSpec(iv);
        //System.out.println(iv);
        // Cipher is not thread safe
        Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding");
        cipher.init(Cipher.ENCRYPT_MODE, skeySpec, ivParameterSpec);
        String encrypedValue = new Base64().encodeAsString(
                cipher.doFinal(clearText));
        //Log.d(TAG, "Encrypted: " + text + " -> " + encrypedValue);
        return encrypedValue;
    } catch (InvalidKeyException e) {
        e.printStackTrace();
    } catch (UnsupportedEncodingException e) {
        e.printStackTrace();
    } catch (NoSuchAlgorithmException e) {
        e.printStackTrace();
    } catch (BadPaddingException e) {
        e.printStackTrace();
    } catch (NoSuchPaddingException e) {
        e.printStackTrace();
    } catch (IllegalBlockSizeException e) {
        e.printStackTrace();
    } catch (InvalidAlgorithmParameterException e) {
        e.printStackTrace();
    }
    return "";
}
public static String decode(String password, String text)
        throws NoPassGivenException, NoTextGivenException {
    /*if (password.length() == 0 || password == null) {
        throw new NoPassGivenException("Please give Password");
    }
    if (text.length() == 0 || text == null) {
        throw new NoTextGivenException("Please give text");
    }*/
    try {
        SecretKey key = getKey(password);
        //IMPORTANT TO GET SAME RESULTS ON iOS and ANDROID
        final byte[] iv = new byte[16];
        Arrays.fill(iv, (byte) 0x00);
        IvParameterSpec ivParameterSpec = new IvParameterSpec(iv);
        //System.out.println(iv);
        byte[] encrypedPwdBytes = new Base64().decodeBase64(text);
        // cipher is not thread safe
        Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding");
        cipher.init(Cipher.DECRYPT_MODE, key, ivParameterSpec);
        byte[] decrypedValueBytes = (cipher.doFinal(encrypedPwdBytes));
        String decrypedValue = new String(decrypedValueBytes);
       // BigDecimal bd = new BigDecimal(decrypedValue);
        //Log.d(TAG, "Decrypted: " + text + " -> " + decrypedValue);
       // String data =  Long.toString(bd.longValue());
        return decrypedValue;
    } catch (InvalidKeyException e) {
        e.printStackTrace();
    } catch (UnsupportedEncodingException e) {
        e.printStackTrace();
    } catch (NoSuchAlgorithmException e) {
        e.printStackTrace();
    } catch (BadPaddingException e) {
        e.printStackTrace();
    } catch (NoSuchPaddingException e) {
        e.printStackTrace();
    } catch (IllegalBlockSizeException e) {
        e.printStackTrace();
    } catch (InvalidAlgorithmParameterException e) {
        e.printStackTrace();
    }
    return "";
}

密码文本应该与随机无法区分。这就是唯一IV或随机IV的主要原因。如果你使用静态IV(和相同的密钥),你会得到相同(第一块)明文的相同(第一个块)密文。换句话说,你就是在向攻击者泄露信息。

这就是为什么应该使用随机IV,您可以将其与密文安全地存储在一起。加密最好通过解密来测试。签名生成同样可以通过签名验证进行最佳测试。如果你成功地生成了两次相同的CBC密文,那么这表明有些事情是错误的,而不是正确的。