-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathEncryption.py
More file actions
75 lines (56 loc) · 2.04 KB
/
Encryption.py
File metadata and controls
75 lines (56 loc) · 2.04 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
from Crypto.PublicKey import RSA
from Crypto.Random import get_random_bytes
from Crypto.Cipher import AES, PKCS1_OAEP
from Crypto.Signature import pkcs1_15
from Crypto.Hash import SHA256
# RSA
def generate_rsa_keys():
key = RSA.generate(2048)
private_key = key.export_key()
public_key = key.publickey().export_key()
return public_key, private_key
def encrypt_rsa(aes_key, public_key):
recipient_key = RSA.import_key(public_key)
cipher_rsa = PKCS1_OAEP.new(recipient_key)
enc_aes_key = cipher_rsa.encrypt(aes_key)
# enc_aes is a str type variable
return enc_aes_key.decode('latin-1')
def decrypt_rsa(enc_aes_key, private_key):
private_key = RSA.import_key(private_key)
cipher_rsa = PKCS1_OAEP.new(private_key)
aes_key = cipher_rsa.decrypt(enc_aes_key.encode('latin-1'))
# aes_key is bytes type variable
return aes_key
# AES
def generate_aes_key():
aes_key = get_random_bytes(16)
return aes_key
def encrypt_aes(message, aes_key):
cipher = AES.new(aes_key, AES.MODE_EAX)
ciphertext, tag = cipher.encrypt_and_digest(message.encode())
enc_mssge = [x for x in (cipher.nonce, tag, ciphertext)]
# enc_mssge is a lists
return enc_mssge
def decrypt_aes(enc_mssge, aes_key):
nonce, tag, ciphertext = enc_mssge[0], enc_mssge[1], enc_mssge[2]
cipher = AES.new(aes_key, AES.MODE_EAX, nonce)
message = cipher.decrypt_and_verify(ciphertext, tag)
return message.decode()
# RSA Digital Signature
def rsa_ds_signer(aes_key, rsa_priv_key):
message = aes_key
h = SHA256.new(message)
signature = pkcs1_15.new(RSA.import_key(rsa_priv_key)).sign(h)
return signature.decode('latin-1')
def rsa_ds_verifier(aes_key, signature, rsa_pub_key):
message = aes_key
h = SHA256.new(message)
try:
pkcs1_15.new(RSA.import_key(rsa_pub_key)).verify(
h, signature.encode('latin-1'))
print("verification sucess ", flush=True)
return True
except ValueError:
return False
def sha_md_create(value):
return SHA256.new(str(value).encode())