Arthur de Jong

Open Source / Free Software developer

summaryrefslogtreecommitdiffstats
path: root/docs/encryption.rst
blob: 23836dbb04d0ec76c0a48a5b439b9b8df913fd4b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
PSKC encryption
===============

.. module:: pskc.encryption

Some of the information in PSKC files (e.g. key material) can be encrypted
with either pre-shared keys, passphrase-based keys or asymmetric keys
(asymmetric keys are currently unimplemented).

Embedded PSKC encryption is handled inside the :class:`Encryption` class that
defines encryption key or means of deriving keys. It is accessed from the
:attr:`~pskc.PSKC.encryption` attribute of a :class:`~pskc.PSKC` instance::

   >>> from binascii import a2b_hex
   >>> from pskc import PSKC
   >>> pskc = PSKC('somefile.pskcxml')
   >>> pskc.encryption.key = a2b_hex('12345678901234567890123456789012')

or::

   >>> pskc.encryption.derive_key('qwerty')

Once the encryption key has been set up, any encrypted key values from the
PSKC file are available transparently.

If no key or an incorrect key has been configured, upon accessing encrypted
information (e.g. the :attr:`~pskc.key.Key.secret` attribute of a
:class:`~pskc.key.Key` instance) a :exc:`~pskc.exceptions.DecryptionError`
exception will be raised.

When writing out a PSKC file, encryption can be configured with the
:func:`~pskc.encryption.Encryption.setup_preshared_key()` or
:func:`~pskc.encryption.Encryption.setup_pbkdf2()` function::

   >>> from pskc import PSKC
   >>> pskc = PSKC()
   >>> pskc.encryption.setup_preshared_key(algorithm='AES256-CBC')

or::

   >>> pskc.encryption.setup_pbkdf2(password='verysecure')


The Encryption class
--------------------

.. class:: Encryption

   .. attribute:: id

      Optional identifier of the encryption key.

   .. attribute:: algorithm

      A URI of the encryption algorithm used. See the section
      :ref:`encryption-algorithms` below for a list of algorithms URIs.

      Assigned values to this attribute will be converted to the canonical
      URI for the algorithm if it is known. For instance, the value
      ``3DES-CBC`` will automatically be converted into
      ``http://www.w3.org/2001/04/xmlenc#tripledes-cbc``.


   .. attribute:: is_encrypted

      An indicator of whether the PSKC file requires an additional pre-shared
      key or passphrase to decrypt the contents of the file. Will be ``True``
      if a key or passphrase is needed, ``False`` otherwise.

   .. attribute:: key_names

      List of names provided for the encryption key.

   .. attribute:: key_name

      Since usually only one name is defined for a key but the schema allows
      for multiple names, this is a shortcut for accessing the first value of
      :attr:`key_names`. It will return ``None`` if no name is available.

   .. attribute:: key

      The binary value of the encryption key. In the case of pre-shared keys
      this value should be set before trying to access encrypted information
      in the PSKC file.

      When using key derivation the secret key is available in this attribute
      after calling :func:`derive_key`.

   .. function:: derive_key(password)

      Derive a key from the supplied password and information in the PSKC
      file (generally algorithm, salt, etc.).

      This function may raise a :exc:`~pskc.exceptions.KeyDerivationError`
      exception if key derivation fails for some reason.

   .. attribute:: fields

      A list of :class:`~pskc.key.Key` instance field names that will be
      encrypted when the PSKC file is written. List values can contain
      ``secret``, ``counter``, ``time_offset``, ``time_interval`` and
      ``time_drift``.

   .. function:: setup_preshared_key(...)

      Configure pre-shared key encryption when writing the file.

      :param bytes key: the encryption key to use
      :param str id: encryption key identifier
      :param str algorithm: encryption algorithm
      :param int key_length: encryption key length in bytes
      :param str key_name: a name for the key
      :param list key_names: a number of names for the key
      :param list fields: a list of fields to encrypt

      This is a utility function to easily set up encryption. Encryption can
      also be set up by manually by setting the
      :class:`~pskc.encryption.Encryption` properties.

      This method will generate a key if required and set the passed values.
      By default AES128-CBC encryption will be configured and unless a key is
      specified one of the correct length will be generated. If the algorithm
      does not provide integrity checks (e.g. CBC-mode algorithms) integrity
      checking in the PSKC file will be set up using
      :func:`~pskc.mac.MAC.setup()`.

      By default only the :attr:`~pskc.key.Key.secret` property will be
      encrypted when writing the file.

   .. function:: setup_pbkdf2(...)

      Configure password-based PSKC encryption when writing the file.

      :param str password: the password to use (required)
      :param str id: encryption key identifier
      :param str algorithm: encryption algorithm
      :param int key_length: encryption key length in bytes
      :param str key_name: a name for the key
      :param list key_names: a number of names for the key
      :param list fields: a list of fields to encrypt
      :param bytes salt: PBKDF2 salt
      :param int salt_length: used when generating random salt
      :param int iterations: number of PBKDF2 iterations
      :param function prf: PBKDF2 pseudorandom function

      Defaults for the above parameters are similar to those for
      :func:`setup_preshared_key()` but the password parameter is required.

      By default 12000 iterations will be used and a random salt with the
      length of the to-be-generated encryption key will be used.

   .. function:: remove_encryption()

      Decrypt all data stored in the PSKC file and remove the encryption
      configuration. This can be used to read and encrypted PSKC file,
      decrypt the file, remove the encryption and output an unencrypted PSKC
      file or to replace the encryption algorithm.


.. _encryption-algorithms:

Supported encryption algorithms
-------------------------------

The following encryption algorithms are currently supported by python-pskc.

+----------------------------------------------------+-----------------------------------------------------+
| URI                                                | Description                                         |
+====================================================+=====================================================+
| ``http://www.w3.org/2001/04/xmlenc#aes128-cbc``    | AES encryption in CBC mode with various key lengths |
| ``http://www.w3.org/2001/04/xmlenc#aes192-cbc``    |                                                     |
| ``http://www.w3.org/2001/04/xmlenc#aes256-cbc``    |                                                     |
+----------------------------------------------------+-----------------------------------------------------+
| ``http://www.w3.org/2001/04/xmlenc#kw-aes128``     | AES key wrap with various key lengths               |
| ``http://www.w3.org/2001/04/xmlenc#kw-aes192``     |                                                     |
| ``http://www.w3.org/2001/04/xmlenc#kw-aes256``     |                                                     |
+----------------------------------------------------+-----------------------------------------------------+
| ``http://www.w3.org/2001/04/xmlenc#tripledes-cbc`` | Triple DES (3DES) encryption in CBC mode            |
+----------------------------------------------------+-----------------------------------------------------+
| ``http://www.w3.org/2001/04/xmlenc#kw-tripledes``  | Triple DES (3DES) key wrap                          |
+----------------------------------------------------+-----------------------------------------------------+