repo
stringlengths
1
191
file
stringlengths
23
351
code
stringlengths
0
5.32M
file_length
int64
0
5.32M
avg_line_length
float64
0
2.9k
max_line_length
int64
0
288k
extension_type
stringclasses
1 value
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/secureConfigsRSA/src/main/java/example/SecureConfig128bitsRSA_3072x384_2.java
package example; import javax.crypto.*; import java.security.*; import org.bouncycastle.jce.provider.*; public final class SecureConfig128bitsRSA_3072x384_2 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); int ksize = 3072; int hsize = 384; int maxLenBytes = (ksize - 2 * hsize) / 8 - 2; KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", "BC"); kpg.initialize(ksize); KeyPair kp = kpg.generateKeyPair(); Cipher c = Cipher.getInstance("RSA/None/OAEPwithSHA384andMGF1Padding", "BC"); Key pubk = kp.getPublic(); c.init(Cipher.ENCRYPT_MODE, pubk); byte[] pt1 = "demo text".substring(0, maxLenBytes).getBytes(); byte[] ct = c.doFinal(pt1); Key privk = kp.getPrivate(); c.init(Cipher.DECRYPT_MODE, privk); byte[] pt2 = c.doFinal(ct); } }
1,019
27.333333
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/secureConfigsRSA/src/main/java/example/SecureConfig128bitsRSA_4096x512_1.java
package example; import javax.crypto.*; import java.security.*; import java.security.spec.*; import javax.crypto.spec.*; import javax.crypto.spec.PSource; import org.bouncycastle.jce.provider.*; public final class SecureConfig128bitsRSA_4096x512_1 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); int ksize = 4096; int hsize = 512; int maxLenBytes = (ksize - 2 * hsize) / 8 - 2; KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", "BC"); kpg.initialize(ksize); KeyPair kp = kpg.generateKeyPair(); MGF1ParameterSpec mgf1ps = MGF1ParameterSpec.SHA512; OAEPParameterSpec OAEPps = new OAEPParameterSpec("SHA-512", "MGF1", mgf1ps, PSource.PSpecified.DEFAULT); Cipher c = Cipher.getInstance("RSA/None/OAEPPadding", "BC"); Key pubk = kp.getPublic(); c.init(Cipher.ENCRYPT_MODE, pubk, OAEPps); byte[] pt1 = "demo text".substring(0, maxLenBytes).getBytes(); byte[] ct = c.doFinal(pt1); Key privk = kp.getPrivate(); c.init(Cipher.DECRYPT_MODE, privk, OAEPps); byte[] pt2 = c.doFinal(ct); } }
1,272
29.309524
106
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/secureConfigsRSA/src/main/java/example/SecureConfig128bitsRSA_4096x512_2.java
package example; import javax.crypto.*; import java.security.*; import org.bouncycastle.jce.provider.*; public final class SecureConfig128bitsRSA_4096x512_2 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); int ksize = 4096; int hsize = 512; int maxLenBytes = (ksize - 2 * hsize) / 8 - 2; KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", "BC"); kpg.initialize(ksize); KeyPair kp = kpg.generateKeyPair(); Cipher c = Cipher.getInstance("RSA/None/OAEPwithSHA512andMGF1Padding", "BC"); Key pubk = kp.getPublic(); c.init(Cipher.ENCRYPT_MODE, pubk); byte[] pt1 = "demo text".substring(0, maxLenBytes).getBytes(); byte[] ct = c.doFinal(pt1); Key privk = kp.getPrivate(); c.init(Cipher.DECRYPT_MODE, privk); byte[] pt2 = c.doFinal(ct); } }
1,019
27.333333
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/secureConfigsRSA/src/main/java/example/SecureConfig192bitsRSA_7680x384_1.java
package example; import javax.crypto.*; import java.security.*; import java.security.spec.*; import javax.crypto.spec.*; import javax.crypto.spec.PSource; import org.bouncycastle.jce.provider.*; public final class SecureConfig192bitsRSA_7680x384_1 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); int ksize = 7680; int hsize = 384; int maxLenBytes = (ksize - 2 * hsize) / 8 - 2; KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", "BC"); kpg.initialize(ksize); KeyPair kp = kpg.generateKeyPair(); MGF1ParameterSpec mgf1ps = MGF1ParameterSpec.SHA384; OAEPParameterSpec OAEPps = new OAEPParameterSpec("SHA-384", "MGF1", mgf1ps, PSource.PSpecified.DEFAULT); Cipher c = Cipher.getInstance("RSA/None/OAEPPadding", "BC"); Key pubk = kp.getPublic(); c.init(Cipher.ENCRYPT_MODE, pubk, OAEPps); byte[] pt1 = "demo text".substring(0, maxLenBytes).getBytes(); byte[] ct = c.doFinal(pt1); Key privk = kp.getPrivate(); c.init(Cipher.DECRYPT_MODE, privk, OAEPps); byte[] pt2 = c.doFinal(ct); } }
1,272
29.309524
106
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/secureConfigsRSA/src/main/java/example/SecureConfig192bitsRSA_7680x384_2.java
package example; import javax.crypto.*; import java.security.*; import org.bouncycastle.jce.provider.*; public final class SecureConfig192bitsRSA_7680x384_2 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); int ksize = 7680; int hsize = 384; int maxLenBytes = (ksize - 2 * hsize) / 8 - 2; KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", "BC"); kpg.initialize(ksize); KeyPair kp = kpg.generateKeyPair(); Cipher c = Cipher.getInstance("RSA/None/OAEPwithSHA384andMGF1Padding", "BC"); Key pubk = kp.getPublic(); c.init(Cipher.ENCRYPT_MODE, pubk); byte[] pt1 = "demo text".substring(0, maxLenBytes).getBytes(); byte[] ct = c.doFinal(pt1); Key privk = kp.getPrivate(); c.init(Cipher.DECRYPT_MODE, privk); byte[] pt2 = c.doFinal(ct); } }
1,019
27.333333
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/secureConfigsRSA/src/main/java/example/SecureConfig192bitsRSA_7680x512_1.java
package example; import javax.crypto.*; import java.security.*; import java.security.spec.*; import javax.crypto.spec.*; import javax.crypto.spec.PSource; import org.bouncycastle.jce.provider.*; public final class SecureConfig192bitsRSA_7680x512_1 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); int ksize = 7680; int hsize = 512; int maxLenBytes = (ksize - 2 * hsize) / 8 - 2; KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", "BC"); kpg.initialize(ksize); KeyPair kp = kpg.generateKeyPair(); MGF1ParameterSpec mgf1ps = MGF1ParameterSpec.SHA512; OAEPParameterSpec OAEPps = new OAEPParameterSpec("SHA-512", "MGF1", mgf1ps, PSource.PSpecified.DEFAULT); Cipher c = Cipher.getInstance("RSA/None/OAEPPadding", "BC"); Key pubk = kp.getPublic(); c.init(Cipher.ENCRYPT_MODE, pubk, OAEPps); byte[] pt1 = "demo text".substring(0, maxLenBytes).getBytes(); byte[] ct = c.doFinal(pt1); Key privk = kp.getPrivate(); c.init(Cipher.DECRYPT_MODE, privk, OAEPps); byte[] pt2 = c.doFinal(ct); } }
1,272
29.309524
106
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/secureConfigsRSA/src/main/java/example/SecureConfig192bitsRSA_7680x512_2.java
package example; import javax.crypto.*; import java.security.*; import org.bouncycastle.jce.provider.*; public final class SecureConfig192bitsRSA_7680x512_2 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); int ksize = 7680; int hsize = 512; int maxLenBytes = (ksize - 2 * hsize) / 8 - 2; KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", "BC"); kpg.initialize(ksize); KeyPair kp = kpg.generateKeyPair(); Cipher c = Cipher.getInstance("RSA/None/OAEPwithSHA512andMGF1Padding", "BC"); Key pubk = kp.getPublic(); c.init(Cipher.ENCRYPT_MODE, pubk); byte[] pt1 = "demo text".substring(0, maxLenBytes).getBytes(); byte[] ct = c.doFinal(pt1); Key privk = kp.getPrivate(); c.init(Cipher.DECRYPT_MODE, privk); byte[] pt2 = c.doFinal(ct); } }
1,019
27.333333
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/secureStreamCipher/src/main/java/example/UseMacWithMaleableStream.java
package example; import java.security.*; import javax.crypto.*; import javax.crypto.spec.IvParameterSpec; import javax.crypto.spec.SecretKeySpec; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.util.Arrays; public final class UseMacWithMaleableStream { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); byte[] iv = new byte[16], k2 = new byte[16]; KeyGenerator g = KeyGenerator.getInstance("AES", "BC"); g.init(256); Key k1 = g.generateKey(); (new SecureRandom()).nextBytes(iv); (new SecureRandom()).nextBytes(k2); SecretKeySpec sks2 = new SecretKeySpec(k2, "HMACSHA256"); Cipher c = Cipher.getInstance("AES/CTR/NoPadding", "BC"); Mac m = Mac.getInstance("HMACSHA256", "BC"); byte[] pt1 = "text demo".getBytes(), X; boolean ok, ivo = true; String s = "Encrypt-then-MAC(EtM): calcula a tag do criptograma"; m.init(sks2); c.init(Cipher.ENCRYPT_MODE, k1, new IvParameterSpec(iv)); byte[] ct = c.doFinal(pt1); byte[] ctPlusIV = ct.clone(); Arrays.concatenate(ctPlusIV, iv); byte[] tag = m.doFinal(ctPlusIV); if (ivo) { X = "demo text 2".getBytes(); ct = "demo text 3".getBytes(); } ctPlusIV = ct.clone(); Arrays.concatenate(ctPlusIV, iv); ok = MessageDigest.isEqual(m.doFinal(ctPlusIV), tag); if (ok) { m.init(sks2); c.init(Cipher.DECRYPT_MODE, k1, new IvParameterSpec(iv)); byte[] ptBeto = c.doFinal(ct); } } }
1,654
29.648148
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_secp192k1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_secp192k1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("secp192k1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_secp192r1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_secp192r1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("secp192r1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_secp224k1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_secp224k1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("secp224k1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_secp224r1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_secp224r1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("secp224r1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_secp256k1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_secp256k1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("secp256k1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_secp256r1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_secp256r1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("secp256r1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_secp384r1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_secp384r1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("secp384r1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_secp521r1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_secp521r1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("secp521r1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_sect163k1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_sect163k1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("sect163k1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_sect163r1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_sect163r1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("sect163r1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_sect163r2.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_sect163r2 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("sect163r2"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_sect233k1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_sect233k1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("sect233k1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_sect233r1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_sect233r1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("sect233r1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_sect239k1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_sect239k1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("sect239k1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_sect283k1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_sect283k1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("sect283k1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_sect283r1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_sect283r1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("sect283r1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_sect409k1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_sect409k1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("sect409k1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_sect409r1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_sect409r1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("sect409r1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_sect571k1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_sect571k1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("sect571k1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/securecurves/src/main/java/example/SecureCurve_sect571r1.java
package example; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.ECGenParameterSpec; public final class SecureCurve_sect571r1 { public static void main(String argv[]) { try { ECGenParameterSpec ecps = new ECGenParameterSpec("sect571r1"); KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", "SunEC"); kpg.initialize(ecps); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | InvalidAlgorithmParameterException | NoSuchProviderException e) { } } }
694
27.958333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/ImproperKeyLen/src/main/java/pkm/ImproperKeyLen/ImproperKeySizeRSA1.java
package pkm.ImproperKeyLen; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; public final class ImproperKeySizeRSA1 { public static void main(String args[]) { try { KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", "SunJSSE"); kpg.initialize(512); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | NoSuchProviderException e) { } } }
498
23.95
73
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/ImproperKeyLen/src/main/java/pkm/ImproperKeyLen/ImproperKeySizeRSA2.java
package pkm.ImproperKeyLen; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; public final class ImproperKeySizeRSA2 { public static void main(String args[]) { try { KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", "SunJSSE"); kpg.initialize(1024); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | NoSuchProviderException e) { } } }
499
24
73
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/ImproperKeyLen/src/main/java/pkm/ImproperKeyLen/ImproperKeySizeRSA3.java
package pkm.ImproperKeyLen; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class ImproperKeySizeRSA3 { public static void main(String args[]) { try { Security.addProvider(new BouncyCastleProvider()); KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", "BC"); kpg.initialize(384); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | NoSuchProviderException e) { } } }
637
25.583333
68
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/ImproperKeyLen/src/main/java/pkm/ImproperKeyLen/ImproperKeySizeRSA4.java
package pkm.ImproperKeyLen; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; public final class ImproperKeySizeRSA4 { public static void main(String args[]) { try { KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", "SunJSSE"); kpg.initialize(768); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | NoSuchProviderException e) { } } }
499
22.809524
73
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/ImproperKeyLen/src/main/java/pkm/ImproperKeyLen/ImproperKeySizeRSA5.java
package pkm.ImproperKeyLen; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class ImproperKeySizeRSA5 { public static void main(String args[]) { try { Security.addProvider(new BouncyCastleProvider()); KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", "BC"); kpg.initialize(256); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | NoSuchProviderException e) { } } }
637
25.583333
68
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/ImproperKeyLen/src/main/java/pkm/ImproperKeyLen/ImproperKeySizeRSA6.java
package pkm.ImproperKeyLen; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class ImproperKeySizeRSA6 { public static void main(String args[]) { try { Security.addProvider(new BouncyCastleProvider()); KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", "BC"); kpg.initialize(128); KeyPair kp = kpg.generateKeyPair(); } catch (NoSuchAlgorithmException | NoSuchProviderException e) { } } }
637
25.583333
68
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenInsecureHash/src/main/java/wc/brokenInsecureHash/InsecureHashes1.java
package wc.brokenInsecureHash; import java.security.*; public final class InsecureHashes1 { static Object[] hashes = { "MD2", "MD5", "SHA" }; static MessageDigest md; public static void main(String[] a) { try { md = MessageDigest.getInstance("MD2", "SUN"); String input = ""; md.update(input.getBytes()); byte[] output = md.digest(); input = "abc"; md.update(input.getBytes()); output = md.digest(); input = "abcdefghijklmnopqrstuvwxyz"; md.update(input.getBytes()); output = md.digest(); md = MessageDigest.getInstance("MD5", "SUN"); input = ""; md.update(input.getBytes()); output = md.digest(); input = "abc"; md.update(input.getBytes()); output = md.digest(); input = "abcdefghijklmnopqrstuvwxyz"; md.update(input.getBytes()); output = md.digest(); md = MessageDigest.getInstance("SHA", "SUN"); input = ""; md.update(input.getBytes()); output = md.digest(); input = "abc"; md.update(input.getBytes()); output = md.digest(); input = "abcdefghijklmnopqrstuvwxyz"; md.update(input.getBytes()); output = md.digest(); } catch (NoSuchAlgorithmException | NoSuchProviderException e) { } } }
1,195
23.408163
66
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenInsecureHash/src/main/java/wc/brokenInsecureHash/InsecureHashes2.java
package wc.brokenInsecureHash; import java.security.*; public final class InsecureHashes2 { static Object[] hashes = {"MD2","MD5","SHA"}; static MessageDigest md[] = new MessageDigest[hashes.length]; public static void main(String[] a) { try { for (int i = 0; i < md.length; i++) { md[i] = MessageDigest.getInstance(hashes[i].toString(),"SUN"); String input = ""; md[i].update(input.getBytes()); byte[] output = md[i].digest(); input = "abc"; md[i].update(input.getBytes()); output = md[i].digest(); input = "abcdefghijklmnopqrstuvwxyz"; md[i].update(input.getBytes()); output = md[i].digest(); } } catch (NoSuchAlgorithmException | NoSuchProviderException e) { } } }
784
27.035714
70
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenInsecureHash/src/main/java/wc/brokenInsecureHash/InsecureHashes3.java
package wc.brokenInsecureHash; import java.security.*; public final class InsecureHashes3 { static MessageDigest md; public static void main(String[] a) { try { md = MessageDigest.getInstance("MD2","SUN"); String input = ""; md.update(input.getBytes()); byte[] output = md.digest(); input = "abc"; md.update(input.getBytes()); output = md.digest(); input = "abcdefghijklmnopqrstuvwxyz"; md.update(input.getBytes()); output = md.digest(); } catch (NoSuchAlgorithmException | NoSuchProviderException e) { } } }
591
22.68
68
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenInsecureHash/src/main/java/wc/brokenInsecureHash/InsecureHashes4.java
package wc.brokenInsecureHash; import java.security.*; public final class InsecureHashes4 { static MessageDigest md; public static void main(String[] a) { try { md = MessageDigest.getInstance("MD5","SUN"); String input = ""; md.update(input.getBytes()); byte[] output = md.digest(); input = "abc"; md.update(input.getBytes()); output = md.digest(); input = "abcdefghijklmnopqrstuvwxyz"; md.update(input.getBytes()); output = md.digest(); } catch (NoSuchAlgorithmException | NoSuchProviderException e) { } } }
591
22.68
68
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenInsecureHash/src/main/java/wc/brokenInsecureHash/InsecureHashes5.java
package wc.brokenInsecureHash; import java.security.*; public final class InsecureHashes5 { static MessageDigest md; public static void main(String[] a) { try { md = MessageDigest.getInstance("SHA","SUN"); String input = ""; md.update(input.getBytes()); byte[] output = md.digest(); input = "abc"; md.update(input.getBytes()); output = md.digest(); input = "abcdefghijklmnopqrstuvwxyz"; md.update(input.getBytes()); output = md.digest(); } catch (NoSuchAlgorithmException | NoSuchProviderException e) { } } }
591
22.68
68
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenInsecureMAC/src/main/java/wc/brokenInsecureMAC/InsecureMAC1.java
package wc.brokenInsecureMAC; import javax.crypto.*; import java.security.*; import javax.crypto.spec.*; public final class InsecureMAC1 { public static void main(String[] args) { try { KeyGenerator kg = KeyGenerator.getInstance("HMACMD5", "SunJCE"); SecretKey sk = kg.generateKey(); Mac mac = Mac.getInstance("HMACMD5", "SunJCE"); mac.init(sk); String msg = "demo msg"; mac.update(msg.getBytes()); byte[] result = mac.doFinal(); byte[] key2 = sk.getEncoded(); SecretKeySpec ks = new SecretKeySpec(key2, "HMACMD5"); Mac mac2 = Mac.getInstance("HMACMD5", "SunJCE"); mac2.init(ks); mac2.update(msg.getBytes()); byte[] result2 = mac2.doFinal(); kg = KeyGenerator.getInstance("HMACSHA1", "SunJCE"); sk = kg.generateKey(); mac = Mac.getInstance("HMACSHA1", "SunJCE"); mac.init(sk); msg = "demo msg 2"; mac.update(msg.getBytes()); result = mac.doFinal(); key2 = sk.getEncoded(); ks = new SecretKeySpec(key2, "HMACSHA1"); mac2 = Mac.getInstance("HMACSHA1", "SunJCE"); mac2.init(ks); mac2.update(msg.getBytes()); result2 = mac2.doFinal(); } catch (NoSuchAlgorithmException | InvalidKeyException | IllegalStateException | NoSuchProviderException e) { } } }
1,240
27.204545
112
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenInsecureMAC/src/main/java/wc/brokenInsecureMAC/InsecureMAC2.java
package wc.brokenInsecureMAC; import java.security.InvalidKeyException; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import javax.crypto.*; import javax.crypto.spec.*; public final class InsecureMAC2 { static Object[] macs = { "HMACSHA1", "HMACMD5" }; public static void main(String[] args) { for (int i = 0; i < macs.length; i++) { try { KeyGenerator kg = KeyGenerator.getInstance(macs[i].toString(), "SunJCE"); SecretKey sk = kg.generateKey(); Mac mac = Mac.getInstance(macs[i].toString(), "SunJCE"); mac.init(sk); String msg = "demo msg"; mac.update(msg.getBytes()); byte[] result = mac.doFinal(); byte[] key2 = sk.getEncoded(); SecretKeySpec ks = new SecretKeySpec(key2, macs[i].toString()); Mac mac2 = Mac.getInstance(macs[i].toString(), "SunJCE"); mac2.init(ks); mac2.update(msg.getBytes()); byte[] result2 = mac2.doFinal(); } catch (NoSuchAlgorithmException | InvalidKeyException | IllegalStateException | NoSuchProviderException e) { } } } }
1,076
28.916667
82
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenInsecureMAC/src/main/java/wc/brokenInsecureMAC/InsecureMAC3.java
package wc.brokenInsecureMAC; import javax.crypto.*; import java.security.*; import javax.crypto.spec.*; public final class InsecureMAC3 { public static void main(String[] args) { try { KeyGenerator kg = KeyGenerator.getInstance("HMACMD5", "SunJCE"); SecretKey sk = kg.generateKey(); Mac mac = Mac.getInstance("HMACMD5", "SunJCE"); mac.init(sk); String msg = "demo msg"; mac.update(msg.getBytes()); byte[] result = mac.doFinal(); byte[] key2 = sk.getEncoded(); SecretKeySpec ks = new SecretKeySpec(key2, "HMACMD5"); Mac mac2 = Mac.getInstance("HMACMD5", "SunJCE"); mac2.init(ks); mac2.update(msg.getBytes()); byte[] result2 = mac2.doFinal(); } catch (NoSuchAlgorithmException | InvalidKeyException | IllegalStateException | NoSuchProviderException e) { } } }
810
26.965517
112
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenInsecureMAC/src/main/java/wc/brokenInsecureMAC/InsecureMAC4.java
package wc.brokenInsecureMAC; import javax.crypto.*; import java.security.*; import javax.crypto.spec.*; public final class InsecureMAC4 { public static void main(String[] args) { try { KeyGenerator kg = KeyGenerator.getInstance("HMACSHA1", "SunJCE"); SecretKey sk = kg.generateKey(); Mac mac = Mac.getInstance("HMACSHA1", "SunJCE"); mac.init(sk); String msg = "demo msg"; mac.update(msg.getBytes()); byte[] result = mac.doFinal(); byte[] key2 = sk.getEncoded(); SecretKeySpec ks = new SecretKeySpec(key2, "HMACMD5"); Mac mac2 = Mac.getInstance("HMACMD5", "SunJCE"); mac2.init(ks); mac2.update(msg.getBytes()); byte[] result2 = mac2.doFinal(); } catch (NoSuchAlgorithmException | InvalidKeyException | IllegalStateException | NoSuchProviderException e) { } } }
813
26.133333
112
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenSSLorTLS/src/main/java/icv/brokenSSLorTLS/SSLClientDateCertValidation.java
package icv.brokenSSLorTLS; import java.security.InvalidKeyException; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Principal; import java.security.SignatureException; import java.security.cert.Certificate; import java.security.cert.CertificateExpiredException; import java.security.cert.CertificateNotYetValidException; import java.security.cert.X509Certificate; import javax.net.ssl.*; public final class SSLClientDateCertValidation { public static void main(String[] args) throws Exception { SSLSocket socket = null; boolean ok = true; try { SSLSocketFactory factory = (SSLSocketFactory) SSLSocketFactory.getDefault(); socket = (SSLSocket) factory.createSocket("www.google.com", 443); socket.startHandshake(); SSLSession session = socket.getSession(); Principal peerPrincipal = session.getPeerPrincipal(); Certificate[] peerCertificates = session.getPeerCertificates(); if (peerCertificates != null && peerCertificates.length >= 2) { ((X509Certificate) peerCertificates[0]).checkValidity(); peerCertificates[0].verify(peerCertificates[1].getPublicKey()); } } catch (CertificateExpiredException | CertificateNotYetValidException | NoSuchAlgorithmException | InvalidKeyException | NoSuchProviderException | SignatureException e) { ok = false; } } }
1,378
31.833333
99
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenSSLorTLS/src/main/java/icv/brokenSSLorTLS/SSLClientNoPeerValidation.java
package icv.brokenSSLorTLS; import java.security.Principal; import java.security.cert.Certificate; import javax.net.ssl.*; public final class SSLClientNoPeerValidation { public static void main(String[] args) throws Exception { SSLSocket socket = null; Boolean ok = true; try { SSLSocketFactory factory = (SSLSocketFactory) SSLSocketFactory.getDefault(); socket = (SSLSocket) factory.createSocket("www.google.com", 443); socket.startHandshake(); SSLSession session = socket.getSession(); Principal peerPrincipal = session.getPeerPrincipal(); Certificate[] peerCertificates = session.getPeerCertificates(); } catch (Exception e) { ok = false; } } }
688
23.607143
79
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenSSLorTLS/src/main/java/icv/brokenSSLorTLS/SSLClientOnlyCertPathValidation.java
package icv.brokenSSLorTLS; import java.security.InvalidAlgorithmParameterException; import java.security.NoSuchAlgorithmException; import java.security.Principal; import java.security.PublicKey; import java.security.cert.CertPath; import java.security.cert.CertPathValidator; import java.security.cert.CertPathValidatorException; import java.security.cert.Certificate; import java.security.cert.CertificateException; import java.security.cert.CertificateFactory; import java.security.cert.PKIXCertPathValidatorResult; import java.security.cert.PKIXParameters; import java.security.cert.PolicyNode; import java.security.cert.TrustAnchor; import java.security.cert.X509Certificate; import java.util.Arrays; import java.util.Collections; import java.util.List; import javax.net.ssl.*; public final class SSLClientOnlyCertPathValidation { public static void main(String[] args) throws Exception { SSLSocket socket = null; boolean ok = true; try { SSLSocketFactory factory = (SSLSocketFactory) SSLSocketFactory.getDefault(); socket = (SSLSocket) factory.createSocket("www.google.com", 443); socket.startHandshake(); SSLSession session = socket.getSession(); Principal peerPrincipal = session.getPeerPrincipal(); Certificate[] certs = session.getPeerCertificates(); X509Certificate[] x509certs = new X509Certificate[certs.length - 1]; for (int i = 0; i < certs.length - 1; i++) { x509certs[i] = (X509Certificate) certs[i]; } X509Certificate anchor = (X509Certificate) certs[certs.length - 1]; List l = Arrays.asList(x509certs); CertificateFactory cf = CertificateFactory.getInstance("X.509", "SUN"); CertPath cp = cf.generateCertPath(l); TrustAnchor ta = new TrustAnchor(anchor, null); PKIXParameters params = new PKIXParameters(Collections.singleton(ta)); params.setRevocationEnabled(false); CertPathValidator cpv = CertPathValidator.getInstance("PKIX", "SUN"); PKIXCertPathValidatorResult cpvr = (PKIXCertPathValidatorResult) cpv.validate(cp, params); PolicyNode policyTree = cpvr.getPolicyTree(); PublicKey subjectPK = cpvr.getPublicKey(); } catch (CertificateException | InvalidAlgorithmParameterException | NoSuchAlgorithmException | CertPathValidatorException e) { ok = false; } } }
2,278
34.609375
95
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenSSLorTLS/src/main/java/icv/brokenSSLorTLS/SSLClientOnlyCertValidation.java
package icv.brokenSSLorTLS; import java.io.IOException; import java.security.InvalidKeyException; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Principal; import java.security.SignatureException; import java.security.cert.Certificate; import java.security.cert.CertificateException; import javax.net.ssl.*; public final class SSLClientOnlyCertValidation { public static void main(String[] args) throws Exception { SSLSocket socket = null; boolean ok = true; try { SSLSocketFactory factory = (SSLSocketFactory) SSLSocketFactory.getDefault(); socket = (SSLSocket) factory.createSocket("www.google.com", 443); socket.startHandshake(); SSLSession session = socket.getSession(); Principal peerPrincipal = session.getPeerPrincipal(); Certificate[] peerCertificates = session.getPeerCertificates(); if (peerCertificates != null && peerCertificates.length >= 2) { peerCertificates[0].verify(peerCertificates[1].getPublicKey()); } } catch (IOException | CertificateException | NoSuchAlgorithmException | InvalidKeyException | NoSuchProviderException | SignatureException e) { ok = false; } } }
1,207
30.789474
94
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenSSLorTLS/src/main/java/icv/brokenSSLorTLS/SSLctxNoKeyMgmtNoTrustMgmt1.java
package icv.brokenSSLorTLS; import java.io.IOException; import java.security.KeyManagementException; import java.security.NoSuchAlgorithmException; import java.security.Principal; import java.security.SecureRandom; import java.security.cert.Certificate; import javax.net.ssl.*; public final class SSLctxNoKeyMgmtNoTrustMgmt1 { public static void main(String[] args) throws Exception { SSLSocket socket = null; Boolean ok = true; try { SSLContext sslctx = SSLContext.getInstance("TLS"); sslctx.init(new KeyManager[] {}, null, SecureRandom.getInstanceStrong()); SSLSocketFactory factory = sslctx.getSocketFactory(); socket = (SSLSocket) factory.createSocket("www.google.com", 443); socket.startHandshake(); SSLSession session = socket.getSession(); Principal peerPrincipal = session.getPeerPrincipal(); Certificate[] peerCertificates = session.getPeerCertificates(); } catch (NoSuchAlgorithmException | KeyManagementException | IOException e) { ok = false; } } }
1,009
27.055556
79
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenSSLorTLS/src/main/java/icv/brokenSSLorTLS/SSLctxNoKeyMgmtNoTrustMgmt2.java
package icv.brokenSSLorTLS; import java.io.IOException; import java.security.KeyManagementException; import java.security.NoSuchAlgorithmException; import java.security.Principal; import java.security.SecureRandom; import java.security.cert.Certificate; import javax.net.ssl.*; public final class SSLctxNoKeyMgmtNoTrustMgmt2 { public static void main(String[] args) throws Exception { SSLSocket socket = null; Boolean ok = true; try { SSLContext sslctx = SSLContext.getInstance("TLS"); sslctx.init(null, null, SecureRandom.getInstanceStrong()); SSLSocketFactory factory = sslctx.getSocketFactory(); socket = (SSLSocket) factory.createSocket("www.google.com", 443); socket.startHandshake(); SSLSession session = socket.getSession(); Principal peerPrincipal = session.getPeerPrincipal(); Certificate[] peerCertificates = session.getPeerCertificates(); } catch (NoSuchAlgorithmException | KeyManagementException | IOException e) { ok = false; } } }
994
26.638889
79
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenSSLorTLS/src/main/java/icv/brokenSSLorTLS/SSLctxNoKeyMgmtNoTrustMgmt3.java
package icv.brokenSSLorTLS; import java.io.IOException; import java.security.KeyManagementException; import java.security.NoSuchAlgorithmException; import java.security.Principal; import java.security.SecureRandom; import java.security.cert.Certificate; import java.security.cert.X509Certificate; import javax.net.ssl.*; public final class SSLctxNoKeyMgmtNoTrustMgmt3 { public static void main(String[] args) throws Exception { SSLSocket socket = null; Boolean ok = true; try { SSLContext sslctx = SSLContext.getInstance("TLS"); TrustManager[] tac = { new TrustAllCerts() }; sslctx.init(null, tac, SecureRandom.getInstanceStrong()); SSLSocketFactory factory = sslctx.getSocketFactory(); socket = (SSLSocket) factory.createSocket("www.google.com", 443); socket.startHandshake(); SSLSession session = socket.getSession(); Principal peerPrincipal = session.getPeerPrincipal(); Certificate[] peerCertificates = session.getPeerCertificates(); } catch (NoSuchAlgorithmException | KeyManagementException | IOException e) { ok = false; } } } class TrustAllCerts implements X509TrustManager { @Override public X509Certificate[] getAcceptedIssuers() { return null; } @Override public void checkClientTrusted(X509Certificate[] xcs, String string) { } @Override public void checkServerTrusted(X509Certificate[] xcs, String string) { } } class TrustAllHosts implements HostnameVerifier { @Override public boolean verify(final String hostname, final SSLSession session) { return true; } }
1,550
23.234375
79
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenSSLorTLS/src/main/java/icv/brokenSSLorTLS/SSLctxNoKeyMgmtNoTrustMgmt4.java
package icv.brokenSSLorTLS; import java.io.IOException; import java.security.KeyManagementException; import java.security.NoSuchAlgorithmException; import java.security.Principal; import java.security.SecureRandom; import java.security.cert.Certificate; import java.security.cert.X509Certificate; import javax.net.ssl.*; public final class SSLctxNoKeyMgmtNoTrustMgmt4 { public static void main(String[] args) throws Exception { SSLSocket socket = null; Boolean ok = true; try { SSLContext sslctx = SSLContext.getInstance("TLS"); TrustManager[] tacah = { new TrustAllCertsAndHosts() }; sslctx.init(null, tacah, SecureRandom.getInstanceStrong()); SSLSocketFactory factory = sslctx.getSocketFactory(); socket = (SSLSocket) factory.createSocket("www.google.com", 443); socket.startHandshake(); SSLSession session = socket.getSession(); Principal peerPrincipal = session.getPeerPrincipal(); Certificate[] peerCertificates = session.getPeerCertificates(); } catch (NoSuchAlgorithmException | KeyManagementException | IOException e) { ok = false; } } } class TrustAllCertsAndHosts implements X509TrustManager, HostnameVerifier { @Override public X509Certificate[] getAcceptedIssuers() { return null; } @Override public void checkClientTrusted(X509Certificate[] xcs, String string) { } @Override public void checkServerTrusted(X509Certificate[] xcs, String string) { } @Override public boolean verify(final String hostname, final SSLSession session) { return true; } }
1,534
24.583333
79
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenSSLorTLS/src/main/java/icv/brokenSSLorTLS/SSLctxNoKeyMgmtNoTrustMgmt5.java
package icv.brokenSSLorTLS; import java.io.IOException; import java.security.KeyManagementException; import java.security.NoSuchAlgorithmException; import java.security.Principal; import java.security.SecureRandom; import java.security.cert.Certificate; import java.security.cert.X509Certificate; import javax.net.ssl.*; public final class SSLctxNoKeyMgmtNoTrustMgmt5 { public static void main(String[] args) throws Exception { SSLSocket socket = null; Boolean ok = true; try { SSLContext sslctx = SSLContext.getInstance("TLS"); TrustManager[] tacah = { new TrustAllCertsAndHosts() }; sslctx.init(null, tacah, SecureRandom.getInstanceStrong()); SSLSocketFactory factory = sslctx.getSocketFactory(); socket = (SSLSocket) factory.createSocket("www.google.com", 443); socket.startHandshake(); SSLSession session = socket.getSession(); Principal peerPrincipal = session.getPeerPrincipal(); Certificate[] peerCertificates = session.getPeerCertificates(); } catch (NoSuchAlgorithmException | KeyManagementException | IOException e) { ok = false; } } class InnerTrustAllCertsAndHosts implements X509TrustManager, HostnameVerifier { @Override public X509Certificate[] getAcceptedIssuers() { return null; } @Override public void checkClientTrusted(X509Certificate[] xcs, String string) { } @Override public void checkServerTrusted(X509Certificate[] xcs, String string) { } @Override public boolean verify(final String hostname, final SSLSession session) { return true; } } }
1,556
24.52459
81
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/brokenSSLorTLS/src/main/java/icv/brokenSSLorTLS/SSLctxNoKeyMgmtNoTrustMgmt6.java
package icv.brokenSSLorTLS; import java.io.IOException; import java.security.KeyManagementException; import java.security.NoSuchAlgorithmException; import java.security.Principal; import java.security.SecureRandom; import java.security.cert.Certificate; import java.security.cert.X509Certificate; import javax.net.ssl.*; public final class SSLctxNoKeyMgmtNoTrustMgmt6 implements X509TrustManager, HostnameVerifier { public static void main(String[] args) throws Exception { SSLSocket socket = null; Boolean ok = true; try { SSLContext sslctx = SSLContext.getInstance("TLS"); TrustManager[] tacah = { new TrustAllCertsAndHosts() }; sslctx.init(null, tacah, SecureRandom.getInstanceStrong()); SSLSocketFactory factory = sslctx.getSocketFactory(); socket = (SSLSocket) factory.createSocket("www.google.com", 443); socket.startHandshake(); SSLSession session = socket.getSession(); Principal peerPrincipal = session.getPeerPrincipal(); Certificate[] peerCertificates = session.getPeerCertificates(); } catch (NoSuchAlgorithmException | KeyManagementException | IOException e) { ok = false; } } @Override public X509Certificate[] getAcceptedIssuers() { return null; } @Override public void checkClientTrusted(X509Certificate[] xcs, String string) { } @Override public void checkServerTrusted(X509Certificate[] xcs, String string) { } @Override public boolean verify(final String hostname, final SSLSession session) { return true; } }
1,501
25.350877
94
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/buggyIVgen/src/main/java/cib/buggyIVgen/BuggyIVGen1.java
package cib.buggyIVgen; import java.security.InvalidAlgorithmParameterException; import java.security.InvalidKeyException; import java.security.Key; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import javax.crypto.BadPaddingException; import javax.crypto.Cipher; import javax.crypto.IllegalBlockSizeException; import javax.crypto.KeyGenerator; import javax.crypto.NoSuchPaddingException; import javax.crypto.spec.IvParameterSpec; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class BuggyIVGen1 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); byte[] pt1 = ("demo text").getBytes(); byte[] iv = new byte[16]; KeyGenerator g = KeyGenerator.getInstance("AES", "BC"); g.init(128); Key k = g.generateKey(); String[] aes = { "AES/OFB/NoPadding", "AES/CFB/NoPadding", "AES/CTR/NoPadding" }; boolean fixIV = true; for (int a = 0; a < aes.length; a++) { Cipher enc = Cipher.getInstance(aes[a], "BC"); Cipher dec = Cipher.getInstance(aes[a], "BC"); byte[][] ct = new byte[2][]; for (int i = 0; i < 2; i++) { enc.init(Cipher.ENCRYPT_MODE, k, new IvParameterSpec(iv)); ct[i] = enc.doFinal(pt1); dec.init(Cipher.DECRYPT_MODE, k, new IvParameterSpec(iv)); byte[] pt2 = dec.doFinal(ct[i]); if (!fixIV) iv[iv.length - 1] = (byte) (iv[iv.length - 1] ^ 0x01); } } } }
1,660
32.897959
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/buggyIVgen/src/main/java/cib/buggyIVgen/BuggyIVGen2.java
package cib.buggyIVgen; import java.security.InvalidAlgorithmParameterException; import java.security.InvalidKeyException; import java.security.Key; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import java.util.Arrays; import javax.crypto.BadPaddingException; import javax.crypto.Cipher; import javax.crypto.IllegalBlockSizeException; import javax.crypto.KeyGenerator; import javax.crypto.NoSuchPaddingException; import javax.crypto.spec.IvParameterSpec; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class BuggyIVGen2 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); byte[] pt1 = ("demo text").getBytes(); byte[] iv = new byte[16]; Arrays.fill(iv, (byte) 0xAA); KeyGenerator g = KeyGenerator.getInstance("AES", "BC"); g.init(128); Key k = g.generateKey(); String[] aes = { "AES/OFB/NoPadding", "AES/CFB/NoPadding", "AES/CTR/NoPadding" }; boolean fixIV = true; for (int a = 0; a < aes.length; a++) { Cipher enc = Cipher.getInstance(aes[a], "BC"); Cipher dec = Cipher.getInstance(aes[a], "BC"); byte[][] ct = new byte[2][]; for (int i = 0; i < 2; i++) { enc.init(Cipher.ENCRYPT_MODE, k, new IvParameterSpec(iv)); ct[i] = enc.doFinal(pt1); dec.init(Cipher.DECRYPT_MODE, k, new IvParameterSpec(iv)); byte[] pt2 = dec.doFinal(ct[i]); if (!fixIV) iv[iv.length - 1] = (byte) (iv[iv.length - 1] ^ 0x01); } } } }
1,716
33.34
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/constPwd4PBE/src/main/java/pkm/constPwd4PBE/ConstPassword4PBE1.java
package pkm.constPwd4PBE; import javax.crypto.*; import java.security.*; import java.security.spec.InvalidKeySpecException; import javax.crypto.spec.PBEKeySpec; import org.bouncycastle.jce.provider.*; public final class ConstPassword4PBE1 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidKeySpecException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); char[] password = "secretpass".toCharArray(); byte[] salt = new byte[16]; (new SecureRandom()).nextBytes(salt); int iterationCount = 2048; PBEKeySpec pbeks = new PBEKeySpec(password, salt, iterationCount); SecretKeyFactory skf = SecretKeyFactory.getInstance("PBEWithSHA1And128BitAES-CBC-BC", "BC"); Key sk = skf.generateSecret(pbeks); Cipher c = Cipher.getInstance("AES/CBC/PKCS7Padding", "BC"); c.init(Cipher.ENCRYPT_MODE, sk); byte[] text1 = "demo text".getBytes(); byte[] ciphered = c.doFinal(text1); c.init(Cipher.DECRYPT_MODE, sk); byte[] text2 = c.doFinal(ciphered); } }
1,163
33.235294
117
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/constPwd4PBE/src/main/java/pkm/constPwd4PBE/ConstPassword4PBE2.java
package pkm.constPwd4PBE; import javax.crypto.*; import java.security.*; import java.security.spec.InvalidKeySpecException; import javax.crypto.spec.PBEKeySpec; import org.bouncycastle.jce.provider.*; public final class ConstPassword4PBE2 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidKeySpecException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); char[] password = new char[] { 'p', 'a', 's', 's', 'w', 'o', 'r', 'd' }; byte[] salt = new byte[16]; (new SecureRandom()).nextBytes(salt); int iterationCount = 2048; PBEKeySpec pbeks = new PBEKeySpec(password, salt, iterationCount); SecretKeyFactory skf = SecretKeyFactory.getInstance("PBEWithSHA1And128BitAES-CBC-BC", "BC"); Key sk = skf.generateSecret(pbeks); Cipher c = Cipher.getInstance("AES/CBC/PKCS7Padding", "BC"); c.init(Cipher.ENCRYPT_MODE, sk); byte[] text1 = "demo text".getBytes(); byte[] ciphered = c.doFinal(text1); c.init(Cipher.DECRYPT_MODE, sk); byte[] text2 = c.doFinal(ciphered); } }
1,190
34.029412
117
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/constantIV/src/main/java/ivm/constantIV/FixedIV1.java
package ivm.constantIV; import java.security.InvalidAlgorithmParameterException; import java.security.InvalidKeyException; import java.security.Key; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import javax.crypto.BadPaddingException; import javax.crypto.Cipher; import javax.crypto.IllegalBlockSizeException; import javax.crypto.KeyGenerator; import javax.crypto.NoSuchPaddingException; import javax.crypto.spec.IvParameterSpec; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class FixedIV1 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); byte[] pt1 = ("demo text").getBytes(); byte[] iv = "0123456789ABCDEF0123456789ABCDEF".getBytes(); KeyGenerator g = KeyGenerator.getInstance("AES", "BC"); g.init(128); Key k = g.generateKey(); String[] aes = { "AES/OFB/NoPadding", "AES/CFB/NoPadding", "AES/CTR/NoPadding" }; boolean fixIV = true; for (int a = 0; a < aes.length; a++) { Cipher enc = Cipher.getInstance(aes[a], "BC"); Cipher dec = Cipher.getInstance(aes[a], "BC"); byte[][] ct = new byte[2][]; for (int i = 0; i < 2; i++) { enc.init(Cipher.ENCRYPT_MODE, k, new IvParameterSpec(iv)); ct[i] = enc.doFinal(pt1); dec.init(Cipher.DECRYPT_MODE, k, new IvParameterSpec(iv)); byte[] pt2 = dec.doFinal(ct[i]); if (!fixIV) iv[iv.length - 1] = (byte) (iv[iv.length - 1] ^ 0x01); } } } }
1,687
35.695652
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/constantIV/src/main/java/ivm/constantIV/FixedIV2.java
package ivm.constantIV; import java.security.InvalidAlgorithmParameterException; import java.security.InvalidKeyException; import java.security.Key; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import javax.crypto.BadPaddingException; import javax.crypto.Cipher; import javax.crypto.IllegalBlockSizeException; import javax.crypto.KeyGenerator; import javax.crypto.NoSuchPaddingException; import javax.crypto.spec.IvParameterSpec; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class FixedIV2 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); byte[] pt1 = ("demo text").getBytes(); byte[] iv = new byte[] { (byte) 0x01, (byte) 0x23, (byte) 0x45, (byte) 0x67, (byte) 0x89, (byte) 0xAB, (byte) 0xCD, (byte) 0xEF, (byte) 0x01, (byte) 0x23, (byte) 0x45, (byte) 0x67, (byte) 0x89, (byte) 0xAB, (byte) 0xCD, (byte) 0xEF }; KeyGenerator g = KeyGenerator.getInstance("AES", "BC"); g.init(128); Key k = g.generateKey(); String[] aes = { "AES/OFB/NoPadding", "AES/CFB/NoPadding", "AES/CTR/NoPadding" }; boolean fixIV = true; for (int a = 0; a < aes.length; a++) { Cipher enc = Cipher.getInstance(aes[a], "BC"); Cipher dec = Cipher.getInstance(aes[a], "BC"); byte[][] ct = new byte[2][]; for (int i = 0; i < 2; i++) { enc.init(Cipher.ENCRYPT_MODE, k, new IvParameterSpec(iv)); ct[i] = enc.doFinal(pt1); dec.init(Cipher.DECRYPT_MODE, k, new IvParameterSpec(iv)); byte[] pt2 = dec.doFinal(ct[i]); if (!fixIV) iv[iv.length - 1] = (byte) (iv[iv.length - 1] ^ 0x01); } } } }
1,873
36.48
107
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/constantIV/src/main/java/ivm/constantIV/SimpleIVConstant.java
package ivm.constantIV; import javax.crypto.spec.IvParameterSpec; public class SimpleIVConstant { public static void main(String[] args) { byte[] iv = {1, 2, 0, 2, 1, 0, 8, 8, 1, 6, 1, 2, 1, 9, 9, 1}; IvParameterSpec constant = new IvParameterSpec(iv); } }
284
22.75
69
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/constantKey/src/main/java/pkm/constantKey/ConstantKey3DES.java
package pkm.constantKey; import java.security.InvalidAlgorithmParameterException; import java.security.InvalidKeyException; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.SecureRandom; import java.security.spec.*; import javax.crypto.*; import javax.crypto.spec.*; public final class ConstantKey3DES { public static void main(String[] a) { try { byte[] ck = "0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF".getBytes(); byte[] iv = new byte[8]; (new SecureRandom()).nextBytes(iv); byte[] msg = "demo text".getBytes(); KeySpec ks = new DESedeKeySpec(ck); SecretKeyFactory kf = SecretKeyFactory.getInstance("DESede", "SunJCE"); SecretKey k = kf.generateSecret(ks); Cipher c = Cipher.getInstance("DESede/CTR/NoPadding", "SunJCE"); AlgorithmParameterSpec aps = new IvParameterSpec(iv); c.init(Cipher.ENCRYPT_MODE, k, aps); byte[] ct = c.doFinal(msg); c.init(Cipher.DECRYPT_MODE, k, aps); byte[] pt = c.doFinal(ct); } catch (InvalidKeyException | NoSuchAlgorithmException | InvalidKeySpecException | NoSuchPaddingException | InvalidAlgorithmParameterException | IllegalBlockSizeException | BadPaddingException | NoSuchProviderException e) { } } }
1,268
35.257143
108
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/constantKey/src/main/java/pkm/constantKey/ConstantKeyAES1.java
package pkm.constantKey; import java.security.InvalidAlgorithmParameterException; import java.security.InvalidKeyException; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.SecureRandom; import java.security.spec.*; import javax.crypto.*; import javax.crypto.spec.*; public final class ConstantKeyAES1 { public static void main(String[] a) { try { byte[] ck = { (byte) 0x01, (byte) 0x23, (byte) 0x45, (byte) 0x67, (byte) 0x89, (byte) 0xAB, (byte) 0xCD, (byte) 0xEF, (byte) 0x01, (byte) 0x23, (byte) 0x45, (byte) 0x67, (byte) 0x89, (byte) 0xAB, (byte) 0xCD, (byte) 0xEF, (byte) 0x01, (byte) 0x23, (byte) 0x45, (byte) 0x67, (byte) 0x89, (byte) 0xAB, (byte) 0xCD, (byte) 0xEF, (byte) 0x01, (byte) 0x23, (byte) 0x45, (byte) 0x67, (byte) 0x89, (byte) 0xAB, (byte) 0xCD, (byte) 0xEF }; byte[] iv = new byte[16]; (new SecureRandom()).nextBytes(iv); byte[] msg = "demo text".getBytes(); SecretKeySpec ks = new SecretKeySpec(ck, "AES"); Cipher c = Cipher.getInstance("AES/CTR/NoPadding", "SunJCE"); AlgorithmParameterSpec aps = new IvParameterSpec(iv); c.init(Cipher.ENCRYPT_MODE, ks, aps); byte[] ct = c.doFinal(msg); c.init(Cipher.DECRYPT_MODE, ks, aps); byte[] pt = c.doFinal(ct); } catch (InvalidKeyException | NoSuchAlgorithmException | NoSuchPaddingException | InvalidAlgorithmParameterException | IllegalBlockSizeException | BadPaddingException | NoSuchProviderException e) { } } }
1,517
40.027027
107
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/constantKey/src/main/java/pkm/constantKey/ConstantKeyAES2.java
package pkm.constantKey; import java.security.InvalidAlgorithmParameterException; import java.security.InvalidKeyException; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.SecureRandom; import java.security.spec.*; import javax.crypto.*; import javax.crypto.spec.*; public final class ConstantKeyAES2 { public static void main(String[] a) { try { byte[] ck = "0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF".getBytes(); byte[] iv = new byte[16]; (new SecureRandom()).nextBytes(iv); byte[] msg = "demo text".getBytes(); SecretKeySpec ks = new SecretKeySpec(ck, "AES"); Cipher c = Cipher.getInstance("AES/CTR/NoPadding", "SunJCE"); AlgorithmParameterSpec aps = new IvParameterSpec(iv); c.init(Cipher.ENCRYPT_MODE, ks, aps); byte[] ct = c.doFinal(msg); c.init(Cipher.DECRYPT_MODE, ks, aps); byte[] pt = c.doFinal(ct); } catch (InvalidKeyException | NoSuchAlgorithmException | NoSuchPaddingException | InvalidAlgorithmParameterException | IllegalBlockSizeException | BadPaddingException | NoSuchProviderException e) { } } }
1,156
34.060606
93
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/constantKey/src/main/java/pkm/constantKey/ConstantKeyAES3.java
package pkm.constantKey; import java.security.InvalidAlgorithmParameterException; import java.security.InvalidKeyException; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.SecureRandom; import java.security.spec.*; import javax.crypto.*; import javax.crypto.spec.*; public final class ConstantKeyAES3 { public static void main(String[] a) { try { byte[] ck = "0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF".getBytes(); byte[] iv = new byte[16]; (new SecureRandom()).nextBytes(iv); byte[] msg = "demo text".getBytes(); SecretKeySpec ks = new SecretKeySpec(ck, "AES"); Cipher c = Cipher.getInstance("AES/CTR/NoPadding", "SunJCE"); AlgorithmParameterSpec aps = new IvParameterSpec(iv); c.init(Cipher.ENCRYPT_MODE, ks, aps); byte[] ct = c.doFinal(msg); SecretKeySpec ks1 = new SecretKeySpec(ks.getEncoded(), "AES"); c.init(Cipher.DECRYPT_MODE, ks1, aps); byte[] pt = c.doFinal(ct); } catch (InvalidKeyException | NoSuchAlgorithmException | NoSuchPaddingException | InvalidAlgorithmParameterException | IllegalBlockSizeException | BadPaddingException | NoSuchProviderException e) { } } }
1,223
35
93
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/constantKey/src/main/java/pkm/constantKey/ConstantKeyforMAC.java
package pkm.constantKey; import java.security.*; import javax.crypto.*; import javax.crypto.spec.SecretKeySpec; public final class ConstantKeyforMAC { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { byte[] ck = { (byte) 0x01, (byte) 0x23, (byte) 0x45, (byte) 0x67, (byte) 0x89, (byte) 0xAB, (byte) 0xCD, (byte) 0xEF, (byte) 0x01, (byte) 0x23, (byte) 0x45, (byte) 0x67, (byte) 0x89, (byte) 0xAB, (byte) 0xCD, (byte) 0xEF, (byte) 0x01, (byte) 0x23, (byte) 0x45, (byte) 0x67, (byte) 0x89, (byte) 0xAB, (byte) 0xCD, (byte) 0xEF, (byte) 0x01, (byte) 0x23, (byte) 0x45, (byte) 0x67, (byte) 0x89, (byte) 0xAB, (byte) 0xCD, (byte) 0xEF }; SecretKeySpec sks1 = new SecretKeySpec(ck, "HMACSHA256"); Mac m = Mac.getInstance("HMACSHA256", "SunJCE"); m.init(sks1); byte[] msg1 = "This is a test for MAC".getBytes(); byte[] tag = m.doFinal(msg1); SecretKeySpec sks = new SecretKeySpec(ck, "HMACSHA256"); m.init(sks); byte[] tag2 = m.doFinal(msg1); boolean ok = MessageDigest.isEqual(tag2, tag); } }
1,217
34.823529
107
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/constantKey/src/main/java/pkm/constantKey/HardCodedKey.java
package pkm.constantKey; import javax.crypto.spec.SecretKeySpec; public class HardCodedKey { public static void main(String[] args) { String a = "Key Part 1"; String b = "Key Part 2"; b = a + b; byte[] keyBytes = b.getBytes(); SecretKeySpec key = new SecretKeySpec(keyBytes, "AES"); } }
302
19.2
57
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/customCrypto/src/main/java/wc/customCrypto/Manual3DES.java
package wc.customCrypto; import java.security.InvalidKeyException; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.spec.*; import javax.crypto.*; import javax.crypto.spec.*; public final class Manual3DES { public static void main(String[] a) { try { String k1 = "0123456789ABCDEF"; String k2 = "1123456789ABCDEF"; String k3 = "2123456789ABCDEF"; byte[] k123 = (k1 + k2 + k3).getBytes(); byte[] iv = null; byte[] msg = "demo msg".getBytes(); KeySpec ks = new DESedeKeySpec(k123); SecretKeyFactory kf = SecretKeyFactory.getInstance("DESede", "SunJCE"); SecretKey k = kf.generateSecret(ks); Cipher c = Cipher.getInstance("DESede", "SunJCE"); c.init(Cipher.ENCRYPT_MODE, k); byte[] theCph = c.doFinal(msg); c.init(Cipher.DECRYPT_MODE, k); byte[] theClear = c.doFinal(theCph); } catch (InvalidKeyException | NoSuchAlgorithmException | InvalidKeySpecException | NoSuchPaddingException | IllegalBlockSizeException | BadPaddingException | NoSuchProviderException e) { } } }
1,091
30.2
108
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/customCrypto/src/main/java/wc/customCrypto/RawSignatureRSA.java
package wc.customCrypto; import java.security.*; public final class RawSignatureRSA { public static void main(String args[]) { byte[] msg = "demo msg".getBytes(); try { KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", "SunJSSE"); kpg.initialize(2048); KeyPair kp = kpg.generateKeyPair(); Signature sig = Signature.getInstance("SHA1WithRSA", "SunJSSE"); sig.initSign(kp.getPrivate()); sig.update(msg); byte[] signed = sig.sign(); sig.initVerify(kp.getPublic()); sig.update(msg); } catch (NoSuchAlgorithmException | NoSuchProviderException | InvalidKeyException | SignatureException e) { } } }
642
26.956522
109
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/customCrypto/src/main/java/wc/customCrypto/RawSignatureRSAwHash.java
package wc.customCrypto; import javax.crypto.Cipher; import java.security.*; import javax.crypto.BadPaddingException; import javax.crypto.IllegalBlockSizeException; import javax.crypto.NoSuchPaddingException; public final class RawSignatureRSAwHash { public static void main(String args[]) { byte[] msg = "demo msg".getBytes(); try { MessageDigest md = MessageDigest.getInstance("SHA-512", "SUN"); md.update(msg); byte[] digested = md.digest(); KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", "SunJSSE"); kpg.initialize(3072); KeyPair kp = kpg.generateKeyPair(); Cipher ciph = Cipher.getInstance("RSA", "SunJCE"); ciph.init(Cipher.ENCRYPT_MODE, kp.getPrivate()); byte[] ciphered = ciph.doFinal(digested); byte[] hashDigested = md.digest(msg); ciph.init(Cipher.DECRYPT_MODE, kp.getPublic()); byte[] hashOriginal = ciph.doFinal(ciphered); } catch (NoSuchAlgorithmException | NoSuchPaddingException | InvalidKeyException | IllegalBlockSizeException | BadPaddingException | NoSuchProviderException e) { } } }
1,071
31.484848
110
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/deterministicCrypto/src/main/java/pkc/enc/deterministicCrypto/DeterministicEncryptionRSA.java
package pkc.enc.deterministicCrypto; import java.security.InvalidKeyException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import javax.crypto.BadPaddingException; import javax.crypto.Cipher; import javax.crypto.IllegalBlockSizeException; import javax.crypto.NoSuchPaddingException; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class DeterministicEncryptionRSA { public static void main(String args[]) { try { Security.addProvider(new BouncyCastleProvider()); byte[] text1 = ("demo text").getBytes(); KeyPairGenerator g = KeyPairGenerator.getInstance("RSA", "BC"); g.initialize(512); KeyPair kp = g.generateKeyPair(); String[] rsa = { "RSA", "RSA/ECB/NoPadding", "RSA/None/NoPadding", "RSA/None/PKCS1Padding", "RSA/None/OAEPWithSHA1AndMGF1Padding" }; for (int a = 0; a < rsa.length; a++) { Cipher enc = Cipher.getInstance(rsa[a], "BC"); enc.init(Cipher.ENCRYPT_MODE, kp.getPublic()); Cipher dec = Cipher.getInstance(rsa[a], "BC"); dec.init(Cipher.DECRYPT_MODE, kp.getPrivate()); byte[][] bytearr = new byte[2][]; for (int i = 0; i < 2; i++) { bytearr[i] = enc.doFinal(text1); byte[] text2 = dec.doFinal(bytearr[i]); } } } catch (NoSuchAlgorithmException | NoSuchPaddingException | InvalidKeyException | IllegalBlockSizeException | BadPaddingException | NoSuchProviderException e) { } } }
1,547
35
110
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/deterministicCrypto/src/main/java/pkc/enc/deterministicCrypto/DeterministicEncryptionRSA1.java
package pkc.enc.deterministicCrypto; import java.security.InvalidKeyException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import javax.crypto.BadPaddingException; import javax.crypto.Cipher; import javax.crypto.IllegalBlockSizeException; import javax.crypto.NoSuchPaddingException; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class DeterministicEncryptionRSA1 { public static void main(String args[]) { try { Security.addProvider(new BouncyCastleProvider()); byte[] text1 = ("demo text").getBytes(); KeyPairGenerator g = KeyPairGenerator.getInstance("RSA", "BC"); g.initialize(512); KeyPair kp = g.generateKeyPair(); Cipher enc = Cipher.getInstance("RSA/ECB/NoPadding", "BC"); enc.init(Cipher.ENCRYPT_MODE, kp.getPublic()); Cipher dec = Cipher.getInstance("RSA/ECB/NoPadding", "BC"); dec.init(Cipher.DECRYPT_MODE, kp.getPrivate()); byte[][] bytearr = new byte[2][]; for (int i = 0; i < 2; i++) { bytearr[i] = enc.doFinal(text1); byte[] text2 = dec.doFinal(bytearr[i]); } } catch (NoSuchAlgorithmException | NoSuchPaddingException | InvalidKeyException | IllegalBlockSizeException | BadPaddingException | NoSuchProviderException e) { } } }
1,378
33.475
110
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/deterministicCrypto/src/main/java/pkc/enc/deterministicCrypto/DeterministicEncryptionRSA2.java
package pkc.enc.deterministicCrypto; import java.security.InvalidKeyException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import javax.crypto.BadPaddingException; import javax.crypto.Cipher; import javax.crypto.IllegalBlockSizeException; import javax.crypto.NoSuchPaddingException; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class DeterministicEncryptionRSA2 { public static void main(String args[]) { try { Security.addProvider(new BouncyCastleProvider()); byte[] text1 = ("demo text").getBytes(); KeyPairGenerator g = KeyPairGenerator.getInstance("RSA", "BC"); g.initialize(512); KeyPair kp = g.generateKeyPair(); Cipher enc = Cipher.getInstance("RSA/None/NoPadding", "BC"); enc.init(Cipher.ENCRYPT_MODE, kp.getPublic()); Cipher dec = Cipher.getInstance("RSA/None/NoPadding", "BC"); dec.init(Cipher.DECRYPT_MODE, kp.getPrivate()); byte[][] bytearr = new byte[2][]; for (int i = 0; i < 2; i++) { bytearr[i] = enc.doFinal(text1); byte[] text2 = dec.doFinal(bytearr[i]); } } catch (NoSuchAlgorithmException | NoSuchPaddingException | InvalidKeyException | IllegalBlockSizeException | BadPaddingException | NoSuchProviderException e) { } } }
1,380
33.525
110
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/deterministicCrypto/src/main/java/pkc/enc/deterministicCrypto/DeterministicEncryptionRSA3.java
package pkc.enc.deterministicCrypto; import java.security.InvalidKeyException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import javax.crypto.BadPaddingException; import javax.crypto.Cipher; import javax.crypto.IllegalBlockSizeException; import javax.crypto.NoSuchPaddingException; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class DeterministicEncryptionRSA3 { public static void main(String args[]) { try { Security.addProvider(new BouncyCastleProvider()); byte[] text1 = ("demo text").getBytes(); KeyPairGenerator g = KeyPairGenerator.getInstance("RSA", "BC"); g.initialize(512); KeyPair kp = g.generateKeyPair(); Cipher enc = Cipher.getInstance("RSA/NONE/NoPadding", "BC"); enc.init(Cipher.ENCRYPT_MODE, kp.getPublic()); Cipher dec = Cipher.getInstance("RSA/NONE/NoPadding", "BC"); dec.init(Cipher.DECRYPT_MODE, kp.getPrivate()); byte[][] bytearr = new byte[2][]; for (int i = 0; i < 2; i++) { bytearr[i] = enc.doFinal(text1); byte[] text2 = dec.doFinal(bytearr[i]); } } catch (NoSuchAlgorithmException | NoSuchPaddingException | InvalidKeyException | IllegalBlockSizeException | BadPaddingException | NoSuchProviderException e) { } } }
1,381
32.707317
110
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/deterministicSymEnc/src/main/java/wc/deterministicSymEnc/DeterministicEncryptionAESwECB1.java
package wc.deterministicSymEnc; import java.security.InvalidKeyException; import java.security.Key; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import javax.crypto.BadPaddingException; import javax.crypto.Cipher; import javax.crypto.IllegalBlockSizeException; import javax.crypto.KeyGenerator; import javax.crypto.NoSuchPaddingException; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class DeterministicEncryptionAESwECB1 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException { Security.addProvider(new BouncyCastleProvider()); byte[] text1 = ("demo text").getBytes(); KeyGenerator g = KeyGenerator.getInstance("AES", "BC"); g.init(256); Key k = g.generateKey(); Cipher enc = Cipher.getInstance("AES/ECB/NoPadding", "BC"); enc.init(Cipher.ENCRYPT_MODE, k); Cipher dec = Cipher.getInstance("AES/ECB/NoPadding", "BC"); dec.init(Cipher.DECRYPT_MODE, k); byte[][] bytearr = new byte[2][]; for (int i = 0; i < 2; i++) { bytearr[i] = enc.doFinal(text1); byte[] decrypted1 = dec.doFinal(bytearr[i]); } enc = Cipher.getInstance("AES/ECB/PKCS5Padding", "BC"); enc.init(Cipher.ENCRYPT_MODE, k); dec = Cipher.getInstance("AES/ECB/PKCS5Padding", "BC"); dec.init(Cipher.DECRYPT_MODE, k); bytearr = new byte[2][]; for (int i = 0; i < 2; i++) { bytearr[i] = enc.doFinal(text1); byte[] decrypted2 = dec.doFinal(bytearr[i]); } enc = Cipher.getInstance("AES/ECB/PKCS7Padding", "BC"); enc.init(Cipher.ENCRYPT_MODE, k); dec = Cipher.getInstance("AES/ECB/PKCS7Padding", "BC"); dec.init(Cipher.DECRYPT_MODE, k); bytearr = new byte[2][]; for (int i = 0; i < 2; i++) { bytearr[i] = enc.doFinal(text1); byte[] decrypted3 = dec.doFinal(bytearr[i]); } } }
1,957
31.633333
117
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/deterministicSymEnc/src/main/java/wc/deterministicSymEnc/DeterministicEncryptionAESwECB2.java
package wc.deterministicSymEnc; import java.security.InvalidKeyException; import java.security.Key; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import javax.crypto.BadPaddingException; import javax.crypto.Cipher; import javax.crypto.IllegalBlockSizeException; import javax.crypto.KeyGenerator; import javax.crypto.NoSuchPaddingException; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class DeterministicEncryptionAESwECB2 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException { Security.addProvider(new BouncyCastleProvider()); byte[] text1 = ("demo text").getBytes(); KeyGenerator g = KeyGenerator.getInstance("AES", "BC"); g.init(256); Key k = g.generateKey(); String[] aes = { "AES/ECB/NoPadding", "AES/ECB/PKCS5Padding", "AES/ECB/PKCS7Padding" }; for (int a = 0; a < aes.length; a++) { Cipher enc = Cipher.getInstance(aes[a], "BC"); enc.init(Cipher.ENCRYPT_MODE, k); Cipher dec = Cipher.getInstance(aes[a], "BC"); dec.init(Cipher.DECRYPT_MODE, k); byte[][] bytearr = new byte[2][]; for (int i = 0; i < 2; i++) { bytearr[i] = enc.doFinal(text1); byte[] decrypted = dec.doFinal(bytearr[i]); } } } }
1,399
34
117
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/fixedSeed/src/main/java/br/fixedSeed/FixedSeed1.java
package br.fixedSeed; import java.security.InvalidAlgorithmParameterException; import java.security.InvalidKeyException; import java.security.Key; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.SecureRandom; import java.security.Security; import javax.crypto.BadPaddingException; import javax.crypto.Cipher; import javax.crypto.IllegalBlockSizeException; import javax.crypto.KeyGenerator; import javax.crypto.NoSuchPaddingException; import javax.crypto.spec.IvParameterSpec; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class FixedSeed1 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); byte[] pt1 = ("demo text").getBytes(); byte[] seed = { (byte) 0x01, (byte) 0x23, (byte) 0x45, (byte) 0x67, (byte) 0x89, (byte) 0xAB, (byte) 0xCD, (byte) 0xEF, (byte) 0x01, (byte) 0x23, (byte) 0x45, (byte) 0x67, (byte) 0x89, (byte) 0xAB, (byte) 0xCD, (byte) 0xEF }; KeyGenerator g = KeyGenerator.getInstance("AES", "BC"); g.init(128); Key k = g.generateKey(); String[] aes = { "AES/OFB/NoPadding", "AES/CFB/NoPadding", "AES/CTR/NoPadding" }; for (int a = 0; a < aes.length; a++) { Cipher enc = Cipher.getInstance(aes[a], "BC"); Cipher dec = Cipher.getInstance(aes[a], "BC"); byte[][] ct = new byte[2][]; for (int i = 0; i < 2; i++) { SecureRandom sr1 = SecureRandom.getInstance("SHA1PRNG", "SUN"); sr1.setSeed(seed); enc.init(Cipher.ENCRYPT_MODE, k, sr1); ct[i] = enc.doFinal(pt1); dec.init(Cipher.DECRYPT_MODE, k, new IvParameterSpec(enc.getIV())); byte[] pt2 = dec.doFinal(ct[i]); } for (int i = 0; i < 2; i++) { SecureRandom sr2 = SecureRandom.getInstance("Windows-PRNG", "SunMSCAPI"); sr2.setSeed(seed); enc.init(Cipher.ENCRYPT_MODE, k, sr2); ct[i] = enc.doFinal(pt1); dec.init(Cipher.DECRYPT_MODE, k, new IvParameterSpec(enc.getIV())); byte[] pt2 = dec.doFinal(ct[i]); } } } }
2,201
36.322034
108
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/fixedSeed/src/main/java/br/fixedSeed/FixedSeed2.java
package br.fixedSeed; import java.security.SecureRandom; public final class FixedSeed2 { public static void main(String[] args) { try { final int fixedSeed = 10; SecureRandom r3 = SecureRandom.getInstanceStrong(); r3.setSeed(10); SecureRandom r4 = SecureRandom.getInstanceStrong(); r4.setSeed(fixedSeed); } catch (Exception e) { } } }
362
18.105263
54
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/fixedSeed/src/main/java/br/fixedSeed/FixedSeed3.java
package br.fixedSeed; import java.security.SecureRandom; public final class FixedSeed3 { public static void main(String[] args) { try { byte[] fixedSeed = { (byte) 0x01, (byte) 0x23, (byte) 0x45, (byte) 0x67, (byte) 0x89, (byte) 0xAB, (byte) 0xCD, (byte) 0xEF, (byte) 0x01, (byte) 0x23, (byte) 0x45, (byte) 0x67, (byte) 0x89, (byte) 0xAB, (byte) 0xCD, (byte) 0xEF }; SecureRandom r3 = SecureRandom.getInstanceStrong(); r3.setSeed(10); SecureRandom r4 = SecureRandom.getInstanceStrong(); r4.setSeed(fixedSeed); } catch (Exception e) { } } }
578
25.318182
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/fixedSeed/src/main/java/br/fixedSeed/FixedSeed4.java
package br.fixedSeed; import java.security.SecureRandom; public final class FixedSeed4 { public static void main(String[] args) { try { byte[] fixedSeed = "0123456789ABCDEF0123456789ABCDEF".getBytes(); SecureRandom r3 = SecureRandom.getInstanceStrong(); r3.setSeed(10); SecureRandom r4 = SecureRandom.getInstanceStrong(); r4.setSeed(fixedSeed); } catch (Exception e) { } } }
403
19.2
68
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/incompleteValidation/src/main/java/icv/incompleteValidation/NoValidationAtAll.java
package icv.incompleteValidation; import java.math.BigInteger; import java.security.InvalidKeyException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.PrivateKey; import java.security.PublicKey; import java.security.SecureRandom; import java.security.Security; import java.security.SignatureException; import java.security.cert.CertificateException; import java.security.cert.X509Certificate; import java.util.Date; import javax.security.auth.x500.X500Principal; import org.bouncycastle.asn1.x500.X500Name; import org.bouncycastle.asn1.x509.BasicConstraints; import org.bouncycastle.asn1.x509.Extension; import org.bouncycastle.asn1.x509.KeyUsage; import org.bouncycastle.cert.CertIOException; import org.bouncycastle.cert.X509v1CertificateBuilder; import org.bouncycastle.cert.X509v3CertificateBuilder; import org.bouncycastle.cert.jcajce.JcaX509CertificateConverter; import org.bouncycastle.cert.jcajce.JcaX509ExtensionUtils; import org.bouncycastle.cert.jcajce.JcaX509v1CertificateBuilder; import org.bouncycastle.cert.jcajce.JcaX509v3CertificateBuilder; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.operator.ContentSigner; import org.bouncycastle.operator.OperatorCreationException; import org.bouncycastle.operator.jcajce.JcaContentSignerBuilder; public final class NoValidationAtAll { private static final int oneSecond = 1000; private static final int oneMinute = oneSecond * 60; private static final int oneHour = oneMinute * 60; private static final int oneDay = oneHour * 24; private static final int oneWeek = oneDay * 7; private static final int validity = oneWeek; private static int serialNumberCounter = 1; public static boolean validate(X509Certificate cert, X509Certificate ca, X500Principal issuer, X500Principal subj, Date date) { boolean ok = false; ok = true; if (ok) { try { ok = false; cert.verify(ca.getPublicKey()); ok = true; } catch (CertificateException ex) { ok = false; } catch (NoSuchAlgorithmException | InvalidKeyException | NoSuchProviderException | SignatureException ex) { ok = false; } } return ok; } public static void main(String[] args) { Security.addProvider(new BouncyCastleProvider()); try { KeyPair rkp = genRSAKeyPair(); X509Certificate root = buildSelfSignedCert(rkp); KeyPair mkp = genRSAKeyPair(); X509Certificate middle = buildMiddleCert(mkp.getPublic(), "CN=Intermediate CA Certificate", rkp.getPrivate(), root); KeyPair ekp = genRSAKeyPair(); X509Certificate user = buildEndCert(ekp.getPublic(), "CN=End User Certificate", mkp.getPrivate(), middle); X500Principal issuer = new X500Principal("CN=Root Certificate"); X500Principal subj1 = new X500Principal("CN=Intermediate CA Certificate"); X500Principal subj2 = new X500Principal("CN=End User Certificate"); boolean ok = false; ok = validate(user, middle, subj1, subj2, null); } catch (Exception ex) { } } public static KeyPair genRSAKeyPair() throws Exception { KeyPairGenerator kpGen = KeyPairGenerator.getInstance("RSA", "BC"); kpGen.initialize(2048, new SecureRandom()); return kpGen.generateKeyPair(); } public static X509Certificate buildSelfSignedCert(KeyPair keyPair) throws Exception { X509v1CertificateBuilder certBldr = new JcaX509v1CertificateBuilder(new X500Name("CN=Root Certificate"), BigInteger.valueOf(1), new Date(System.currentTimeMillis()), new Date(System.currentTimeMillis() + oneWeek), new X500Name("CN=Root Certificate"), keyPair.getPublic()); JcaContentSignerBuilder jcsb = new JcaContentSignerBuilder("SHA256withRSA"); jcsb.setProvider("BC"); ContentSigner signer = jcsb.build(keyPair.getPrivate()); JcaX509CertificateConverter jX509c = new JcaX509CertificateConverter(); jX509c.setProvider("BC"); X509Certificate cert = jX509c.getCertificate(certBldr.build(signer)); return cert; } public static X509Certificate buildMiddleCert(PublicKey pk, String cn, PrivateKey caKey, X509Certificate cac) throws NoSuchAlgorithmException, CertIOException, OperatorCreationException, CertificateException { X509Certificate cert = null; X509v3CertificateBuilder cb = new JcaX509v3CertificateBuilder(cac.getSubjectX500Principal(), BigInteger.valueOf(serialNumberCounter++), new Date(System.currentTimeMillis()), new Date(System.currentTimeMillis() + validity), new X500Principal(cn), pk); JcaX509ExtensionUtils utils; utils = new JcaX509ExtensionUtils(); cb.addExtension(Extension.authorityKeyIdentifier, false, utils.createAuthorityKeyIdentifier(cac)); cb.addExtension(Extension.subjectKeyIdentifier, false, utils.createSubjectKeyIdentifier(pk)); cb.addExtension(Extension.basicConstraints, true, new BasicConstraints(0)); cb.addExtension(Extension.keyUsage, true, new KeyUsage(KeyUsage.digitalSignature | KeyUsage.keyCertSign | KeyUsage.cRLSign)); JcaContentSignerBuilder jcsb = new JcaContentSignerBuilder("SHA256withRSA"); jcsb.setProvider("BC"); ContentSigner signer = jcsb.build(caKey); JcaX509CertificateConverter jX509c = new JcaX509CertificateConverter(); jX509c.setProvider("BC"); cert = jX509c.getCertificate(cb.build(signer)); return cert; } public static X509Certificate buildEndCert(PublicKey pk, String cn, PrivateKey caKey, X509Certificate ca) { X509Certificate cert = null; try { X509v3CertificateBuilder cb = new JcaX509v3CertificateBuilder(ca.getSubjectX500Principal(), BigInteger.valueOf(serialNumberCounter++), new Date(System.currentTimeMillis()), new Date(System.currentTimeMillis() + validity), new X500Principal(cn), pk); JcaX509ExtensionUtils utils; utils = new JcaX509ExtensionUtils(); cb.addExtension(Extension.authorityKeyIdentifier, false, utils.createAuthorityKeyIdentifier(ca)); cb.addExtension(Extension.subjectKeyIdentifier, false, utils.createSubjectKeyIdentifier(pk)); cb.addExtension(Extension.basicConstraints, true, new BasicConstraints(false)); cb.addExtension(Extension.keyUsage, true, new KeyUsage(KeyUsage.digitalSignature | KeyUsage.keyEncipherment)); JcaContentSignerBuilder jcsb = new JcaContentSignerBuilder("SHA256withRSA"); jcsb.setProvider("BC"); ContentSigner signer = jcsb.build(caKey); JcaX509CertificateConverter jX509c = new JcaX509CertificateConverter(); jX509c.setProvider("BC"); cert = jX509c.getCertificate(cb.build(signer)); } catch (NoSuchAlgorithmException | CertIOException | OperatorCreationException | CertificateException ex) { } return cert; } }
6,690
37.901163
115
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/incompleteValidation/src/main/java/icv/incompleteValidation/NoValidationCaPubKey.java
package icv.incompleteValidation; import java.math.BigInteger; import java.security.InvalidKeyException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.PrivateKey; import java.security.PublicKey; import java.security.SecureRandom; import java.security.Security; import java.security.SignatureException; import java.security.cert.CertificateException; import java.security.cert.CertificateExpiredException; import java.security.cert.CertificateNotYetValidException; import java.security.cert.X509Certificate; import java.util.Date; import javax.security.auth.x500.X500Principal; import org.bouncycastle.asn1.x500.X500Name; import org.bouncycastle.asn1.x509.BasicConstraints; import org.bouncycastle.asn1.x509.Extension; import org.bouncycastle.asn1.x509.KeyUsage; import org.bouncycastle.cert.CertIOException; import org.bouncycastle.cert.X509v1CertificateBuilder; import org.bouncycastle.cert.X509v3CertificateBuilder; import org.bouncycastle.cert.jcajce.JcaX509CertificateConverter; import org.bouncycastle.cert.jcajce.JcaX509ExtensionUtils; import org.bouncycastle.cert.jcajce.JcaX509v1CertificateBuilder; import org.bouncycastle.cert.jcajce.JcaX509v3CertificateBuilder; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.operator.ContentSigner; import org.bouncycastle.operator.OperatorCreationException; import org.bouncycastle.operator.jcajce.JcaContentSignerBuilder; public final class NoValidationCaPubKey { private static final int oneSecond = 1000; private static final int oneMinute = oneSecond * 60; private static final int oneHour = oneMinute * 60; private static final int oneDay = oneHour * 24; private static final int oneWeek = oneDay * 7; private static final int validity = oneWeek; private static int serialNumberCounter = 1; public static boolean validate(X509Certificate cert, X509Certificate ca, X500Principal issuer, X500Principal subj, Date date) { boolean ok = false; try { if (date != null) { cert.checkValidity(date); } else { cert.checkValidity(); } ok = true; } catch (CertificateExpiredException | CertificateNotYetValidException ex) { ok = false; } if (ok) { try { ok = false; cert.verify(ca.getPublicKey()); ok = true; } catch (CertificateException ex) { ok = false; } catch (NoSuchAlgorithmException | InvalidKeyException | NoSuchProviderException | SignatureException ex) { ok = false; } } if (ok) { ok = false; if (cert.getIssuerX500Principal().equals(issuer)) { ok = true; } else { ok = false; } if (ok && cert.getSubjectX500Principal().equals(subj)) { ok = true; } else { ok = false; } } return ok; } public static void main(String[] args) { Security.addProvider(new BouncyCastleProvider()); try { KeyPair rkp = genRSAKeyPair(); X509Certificate root = buildSelfSignedCert(rkp); KeyPair mkp = genRSAKeyPair(); X509Certificate middle = buildMiddleCert(mkp.getPublic(), "CN=Intermediate CA Certificate", rkp.getPrivate(), root); KeyPair ekp = genRSAKeyPair(); X509Certificate user = buildEndCert(ekp.getPublic(), "CN=End User Certificate", mkp.getPrivate(), middle); X500Principal issuer = new X500Principal("CN=Root Certificate"); X500Principal subj1 = new X500Principal("CN=Intermediate CA Certificate"); X500Principal subj2 = new X500Principal("CN=End User Certificate"); boolean ok = false; ok = validate(user, middle, subj1, subj2, null); } catch (Exception ex) { } } public static KeyPair genRSAKeyPair() throws Exception { KeyPairGenerator kpGen = KeyPairGenerator.getInstance("RSA", "BC"); kpGen.initialize(2048, new SecureRandom()); return kpGen.generateKeyPair(); } public static X509Certificate buildSelfSignedCert(KeyPair keyPair) throws Exception { X509v1CertificateBuilder certBldr = new JcaX509v1CertificateBuilder(new X500Name("CN=Root Certificate"), BigInteger.valueOf(1), new Date(System.currentTimeMillis()), new Date(System.currentTimeMillis() + oneWeek), new X500Name("CN=Root Certificate"), keyPair.getPublic()); JcaContentSignerBuilder jcsb = new JcaContentSignerBuilder("SHA256withRSA"); jcsb.setProvider("BC"); ContentSigner signer = jcsb.build(keyPair.getPrivate()); JcaX509CertificateConverter jX509c = new JcaX509CertificateConverter(); jX509c.setProvider("BC"); X509Certificate cert = jX509c.getCertificate(certBldr.build(signer)); return cert; } public static X509Certificate buildMiddleCert(PublicKey pk, String cn, PrivateKey caKey, X509Certificate cac) throws NoSuchAlgorithmException, CertIOException, OperatorCreationException, CertificateException { X509Certificate cert = null; X509v3CertificateBuilder cb = new JcaX509v3CertificateBuilder(cac.getSubjectX500Principal(), BigInteger.valueOf(serialNumberCounter++), new Date(System.currentTimeMillis()), new Date(System.currentTimeMillis() + validity), new X500Principal(cn), pk); JcaX509ExtensionUtils utils; utils = new JcaX509ExtensionUtils(); cb.addExtension(Extension.authorityKeyIdentifier, false, utils.createAuthorityKeyIdentifier(cac)); cb.addExtension(Extension.subjectKeyIdentifier, false, utils.createSubjectKeyIdentifier(pk)); cb.addExtension(Extension.basicConstraints, true, new BasicConstraints(0)); cb.addExtension(Extension.keyUsage, true, new KeyUsage(KeyUsage.digitalSignature | KeyUsage.keyCertSign | KeyUsage.cRLSign)); JcaContentSignerBuilder jcsb = new JcaContentSignerBuilder("SHA256withRSA"); jcsb.setProvider("BC"); ContentSigner signer = jcsb.build(caKey); JcaX509CertificateConverter jX509c = new JcaX509CertificateConverter(); jX509c.setProvider("BC"); cert = jX509c.getCertificate(cb.build(signer)); return cert; } public static X509Certificate buildEndCert(PublicKey pk, String cn, PrivateKey caKey, X509Certificate ca) { X509Certificate cert = null; try { X509v3CertificateBuilder cb = new JcaX509v3CertificateBuilder(ca.getSubjectX500Principal(), BigInteger.valueOf(serialNumberCounter++), new Date(System.currentTimeMillis()), new Date(System.currentTimeMillis() + validity), new X500Principal(cn), pk); JcaX509ExtensionUtils utils; utils = new JcaX509ExtensionUtils(); cb.addExtension(Extension.authorityKeyIdentifier, false, utils.createAuthorityKeyIdentifier(ca)); cb.addExtension(Extension.subjectKeyIdentifier, false, utils.createSubjectKeyIdentifier(pk)); cb.addExtension(Extension.basicConstraints, true, new BasicConstraints(false)); cb.addExtension(Extension.keyUsage, true, new KeyUsage(KeyUsage.digitalSignature | KeyUsage.keyEncipherment)); JcaContentSignerBuilder jcsb = new JcaContentSignerBuilder("SHA256withRSA"); jcsb.setProvider("BC"); ContentSigner signer = jcsb.build(caKey); JcaX509CertificateConverter jX509c = new JcaX509CertificateConverter(); jX509c.setProvider("BC"); cert = jX509c.getCertificate(cb.build(signer)); } catch (NoSuchAlgorithmException | CertIOException | OperatorCreationException | CertificateException ex) { } return cert; } }
7,247
36.169231
115
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/incompleteValidation/src/main/java/icv/incompleteValidation/NoValidationCertDates.java
package icv.incompleteValidation; import java.math.BigInteger; import java.security.InvalidKeyException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.PrivateKey; import java.security.PublicKey; import java.security.SecureRandom; import java.security.Security; import java.security.SignatureException; import java.security.cert.CertificateException; import java.security.cert.X509Certificate; import java.util.Date; import javax.security.auth.x500.X500Principal; import org.bouncycastle.asn1.x500.X500Name; import org.bouncycastle.asn1.x509.BasicConstraints; import org.bouncycastle.asn1.x509.Extension; import org.bouncycastle.asn1.x509.KeyUsage; import org.bouncycastle.cert.CertIOException; import org.bouncycastle.cert.X509v1CertificateBuilder; import org.bouncycastle.cert.X509v3CertificateBuilder; import org.bouncycastle.cert.jcajce.JcaX509CertificateConverter; import org.bouncycastle.cert.jcajce.JcaX509ExtensionUtils; import org.bouncycastle.cert.jcajce.JcaX509v1CertificateBuilder; import org.bouncycastle.cert.jcajce.JcaX509v3CertificateBuilder; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.operator.ContentSigner; import org.bouncycastle.operator.OperatorCreationException; import org.bouncycastle.operator.jcajce.JcaContentSignerBuilder; public final class NoValidationCertDates { private static final int oneSecond = 1000; private static final int oneMinute = oneSecond * 60; private static final int oneHour = oneMinute * 60; private static final int oneDay = oneHour * 24; private static final int oneWeek = oneDay * 7; private static final int validity = oneWeek; private static int serialNumberCounter = 1; public static boolean validate(X509Certificate cert, X509Certificate ca, X500Principal issuer, X500Principal subj, Date date) { boolean ok = false; ok = true; if (ok) { try { ok = false; cert.verify(ca.getPublicKey()); ok = true; } catch (CertificateException ex) { ok = false; } catch (NoSuchAlgorithmException | InvalidKeyException | NoSuchProviderException | SignatureException ex) { ok = false; } } if (ok) { ok = false; if (cert.getIssuerX500Principal().equals(issuer)) { ok = true; } else { ok = false; } if (ok && cert.getSubjectX500Principal().equals(subj)) { ok = true; } else { ok = false; } } return ok; } public static void main(String[] args) { Security.addProvider(new BouncyCastleProvider()); try { KeyPair rkp = genRSAKeyPair(); X509Certificate root = buildSelfSignedCert(rkp); KeyPair mkp = genRSAKeyPair(); X509Certificate middle = buildMiddleCert(mkp.getPublic(), "CN=Intermediate CA Certificate", rkp.getPrivate(), root); KeyPair ekp = genRSAKeyPair(); X509Certificate user = buildEndCert(ekp.getPublic(), "CN=End User Certificate", mkp.getPrivate(), middle); X500Principal issuer = new X500Principal("CN=Root Certificate"); X500Principal subj1 = new X500Principal("CN=Intermediate CA Certificate"); X500Principal subj2 = new X500Principal("CN=End User Certificate"); boolean ok = false; ok = validate(middle, root, issuer, subj1, null); ok = validate(user, middle, subj1, subj2, null); } catch (Exception ex) { } } public static KeyPair genRSAKeyPair() throws Exception { KeyPairGenerator kpGen = KeyPairGenerator.getInstance("RSA", "BC"); kpGen.initialize(2048, new SecureRandom()); return kpGen.generateKeyPair(); } public static X509Certificate buildSelfSignedCert(KeyPair keyPair) throws Exception { X509v1CertificateBuilder certBldr = new JcaX509v1CertificateBuilder(new X500Name("CN=Root Certificate"), BigInteger.valueOf(1), new Date(System.currentTimeMillis()), new Date(System.currentTimeMillis() + oneWeek), new X500Name("CN=Root Certificate"), keyPair.getPublic()); JcaContentSignerBuilder jcsb = new JcaContentSignerBuilder("SHA256withRSA"); jcsb.setProvider("BC"); ContentSigner signer = jcsb.build(keyPair.getPrivate()); JcaX509CertificateConverter jX509c = new JcaX509CertificateConverter(); jX509c.setProvider("BC"); X509Certificate cert = jX509c.getCertificate(certBldr.build(signer)); return cert; } public static X509Certificate buildMiddleCert(PublicKey pk, String cn, PrivateKey caKey, X509Certificate cac) throws NoSuchAlgorithmException, CertIOException, OperatorCreationException, CertificateException { X509Certificate cert = null; X509v3CertificateBuilder cb = new JcaX509v3CertificateBuilder(cac.getSubjectX500Principal(), BigInteger.valueOf(serialNumberCounter++), new Date(System.currentTimeMillis()), new Date(System.currentTimeMillis() + validity), new X500Principal(cn), pk); JcaX509ExtensionUtils utils; utils = new JcaX509ExtensionUtils(); cb.addExtension(Extension.authorityKeyIdentifier, false, utils.createAuthorityKeyIdentifier(cac)); cb.addExtension(Extension.subjectKeyIdentifier, false, utils.createSubjectKeyIdentifier(pk)); cb.addExtension(Extension.basicConstraints, true, new BasicConstraints(0)); cb.addExtension(Extension.keyUsage, true, new KeyUsage(KeyUsage.digitalSignature | KeyUsage.keyCertSign | KeyUsage.cRLSign)); JcaContentSignerBuilder jcsb = new JcaContentSignerBuilder("SHA256withRSA"); jcsb.setProvider("BC"); ContentSigner signer = jcsb.build(caKey); JcaX509CertificateConverter jX509c = new JcaX509CertificateConverter(); jX509c.setProvider("BC"); cert = jX509c.getCertificate(cb.build(signer)); return cert; } public static X509Certificate buildEndCert(PublicKey pk, String cn, PrivateKey caKey, X509Certificate ca) { X509Certificate cert = null; try { X509v3CertificateBuilder cb = new JcaX509v3CertificateBuilder(ca.getSubjectX500Principal(), BigInteger.valueOf(serialNumberCounter++), new Date(System.currentTimeMillis()), new Date(System.currentTimeMillis() + validity), new X500Principal(cn), pk); JcaX509ExtensionUtils utils; utils = new JcaX509ExtensionUtils(); cb.addExtension(Extension.authorityKeyIdentifier, false, utils.createAuthorityKeyIdentifier(ca)); cb.addExtension(Extension.subjectKeyIdentifier, false, utils.createSubjectKeyIdentifier(pk)); cb.addExtension(Extension.basicConstraints, true, new BasicConstraints(false)); cb.addExtension(Extension.keyUsage, true, new KeyUsage(KeyUsage.digitalSignature | KeyUsage.keyEncipherment)); JcaContentSignerBuilder jcsb = new JcaContentSignerBuilder("SHA256withRSA"); jcsb.setProvider("BC"); ContentSigner signer = jcsb.build(caKey); JcaX509CertificateConverter jX509c = new JcaX509CertificateConverter(); jX509c.setProvider("BC"); cert = jX509c.getCertificate(cb.build(signer)); } catch (NoSuchAlgorithmException | CertIOException | OperatorCreationException | CertificateException ex) { } return cert; } }
6,984
36.756757
115
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/incompleteValidation/src/main/java/icv/incompleteValidation/NoValidationIssuerOrSubject.java
package icv.incompleteValidation; import java.math.BigInteger; import java.security.InvalidKeyException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.PrivateKey; import java.security.PublicKey; import java.security.SecureRandom; import java.security.Security; import java.security.SignatureException; import java.security.cert.CertificateException; import java.security.cert.CertificateExpiredException; import java.security.cert.CertificateNotYetValidException; import java.security.cert.X509Certificate; import java.util.Date; import javax.security.auth.x500.X500Principal; import org.bouncycastle.asn1.x500.X500Name; import org.bouncycastle.asn1.x509.BasicConstraints; import org.bouncycastle.asn1.x509.Extension; import org.bouncycastle.asn1.x509.KeyUsage; import org.bouncycastle.cert.CertIOException; import org.bouncycastle.cert.X509v1CertificateBuilder; import org.bouncycastle.cert.X509v3CertificateBuilder; import org.bouncycastle.cert.jcajce.JcaX509CertificateConverter; import org.bouncycastle.cert.jcajce.JcaX509ExtensionUtils; import org.bouncycastle.cert.jcajce.JcaX509v1CertificateBuilder; import org.bouncycastle.cert.jcajce.JcaX509v3CertificateBuilder; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.operator.ContentSigner; import org.bouncycastle.operator.OperatorCreationException; import org.bouncycastle.operator.jcajce.JcaContentSignerBuilder; public final class NoValidationIssuerOrSubject { private static final int oneSecond = 1000; private static final int oneMinute = oneSecond * 60; private static final int oneHour = oneMinute * 60; private static final int oneDay = oneHour * 24; private static final int oneWeek = oneDay * 7; private static final int validity = oneWeek; private static int serialNumberCounter = 1; public static boolean validate(X509Certificate cert, X509Certificate ca, X500Principal issuer, X500Principal subj, Date date) { boolean ok = false; try { if (date != null) { cert.checkValidity(date); } else { cert.checkValidity(); } ok = true; } catch (CertificateExpiredException | CertificateNotYetValidException ex) { ok = false; } if (ok) { try { ok = false; cert.verify(ca.getPublicKey()); ok = true; } catch (CertificateException ex) { ok = false; } catch (NoSuchAlgorithmException | InvalidKeyException | NoSuchProviderException | SignatureException ex) { ok = false; } } return ok; } public static void main(String[] args) { Security.addProvider(new BouncyCastleProvider()); try { KeyPair rkp = genRSAKeyPair(); X509Certificate root = buildSelfSignedCert(rkp); KeyPair mkp = genRSAKeyPair(); X509Certificate middle = buildMiddleCert(mkp.getPublic(), "CN=Intermediate CA Certificate", rkp.getPrivate(), root); KeyPair ekp = genRSAKeyPair(); X509Certificate user = buildEndCert(ekp.getPublic(), "CN=End User Certificate", mkp.getPrivate(), middle); X500Principal issuer = new X500Principal("CN=Root Certificate"); X500Principal subj1 = new X500Principal("CN=Intermediate CA Certificate"); X500Principal subj2 = new X500Principal("CN=End User Certificate"); boolean ok = false; ok = validate(middle, root, issuer, subj1, null); ok = validate(user, middle, subj1, subj2, null); } catch (Exception ex) { } } public static KeyPair genRSAKeyPair() throws Exception { KeyPairGenerator kpGen = KeyPairGenerator.getInstance("RSA", "BC"); kpGen.initialize(2048, new SecureRandom()); return kpGen.generateKeyPair(); } public static X509Certificate buildSelfSignedCert(KeyPair keyPair) throws Exception { X509v1CertificateBuilder certBldr = new JcaX509v1CertificateBuilder(new X500Name("CN=Root Certificate"), BigInteger.valueOf(1), new Date(System.currentTimeMillis()), new Date(System.currentTimeMillis() + oneWeek), new X500Name("CN=Root Certificate"), keyPair.getPublic()); JcaContentSignerBuilder jcsb = new JcaContentSignerBuilder("SHA256withRSA"); jcsb.setProvider("BC"); ContentSigner signer = jcsb.build(keyPair.getPrivate()); JcaX509CertificateConverter jX509c = new JcaX509CertificateConverter(); jX509c.setProvider("BC"); X509Certificate cert = jX509c.getCertificate(certBldr.build(signer)); return cert; } public static X509Certificate buildMiddleCert(PublicKey pk, String cn, PrivateKey caKey, X509Certificate cac) throws NoSuchAlgorithmException, CertIOException, OperatorCreationException, CertificateException { X509Certificate cert = null; X509v3CertificateBuilder cb = new JcaX509v3CertificateBuilder(cac.getSubjectX500Principal(), BigInteger.valueOf(serialNumberCounter++), new Date(System.currentTimeMillis()), new Date(System.currentTimeMillis() + validity), new X500Principal(cn), pk); JcaX509ExtensionUtils utils; utils = new JcaX509ExtensionUtils(); cb.addExtension(Extension.authorityKeyIdentifier, false, utils.createAuthorityKeyIdentifier(cac)); cb.addExtension(Extension.subjectKeyIdentifier, false, utils.createSubjectKeyIdentifier(pk)); cb.addExtension(Extension.basicConstraints, true, new BasicConstraints(0)); cb.addExtension(Extension.keyUsage, true, new KeyUsage(KeyUsage.digitalSignature | KeyUsage.keyCertSign | KeyUsage.cRLSign)); JcaContentSignerBuilder jcsb = new JcaContentSignerBuilder("SHA256withRSA"); jcsb.setProvider("BC"); ContentSigner signer = jcsb.build(caKey); JcaX509CertificateConverter jX509c = new JcaX509CertificateConverter(); jX509c.setProvider("BC"); cert = jX509c.getCertificate(cb.build(signer)); return cert; } public static X509Certificate buildEndCert(PublicKey pk, String cn, PrivateKey caKey, X509Certificate ca) { X509Certificate cert = null; try { X509v3CertificateBuilder cb = new JcaX509v3CertificateBuilder(ca.getSubjectX500Principal(), BigInteger.valueOf(serialNumberCounter++), new Date(System.currentTimeMillis()), new Date(System.currentTimeMillis() + validity), new X500Principal(cn), pk); JcaX509ExtensionUtils utils; utils = new JcaX509ExtensionUtils(); cb.addExtension(Extension.authorityKeyIdentifier, false, utils.createAuthorityKeyIdentifier(ca)); cb.addExtension(Extension.subjectKeyIdentifier, false, utils.createSubjectKeyIdentifier(pk)); cb.addExtension(Extension.basicConstraints, true, new BasicConstraints(false)); cb.addExtension(Extension.keyUsage, true, new KeyUsage(KeyUsage.digitalSignature | KeyUsage.keyEncipherment)); JcaContentSignerBuilder jcsb = new JcaContentSignerBuilder("SHA256withRSA"); jcsb.setProvider("BC"); ContentSigner signer = jcsb.build(caKey); JcaX509CertificateConverter jX509c = new JcaX509CertificateConverter(); jX509c.setProvider("BC"); cert = jX509c.getCertificate(cb.build(signer)); } catch (NoSuchAlgorithmException | CertIOException | OperatorCreationException | CertificateException ex) { } return cert; } }
7,064
37.818681
115
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/incompleteValidation/src/main/java/icv/incompleteValidation/ValidateCertChainButNoCRL.java
package icv.incompleteValidation; import java.math.BigInteger; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.PrivateKey; import java.security.PublicKey; import java.security.SecureRandom; import java.security.Security; import java.security.cert.CertPath; import java.security.cert.CertPathValidator; import java.security.cert.CertPathValidatorException; import java.security.cert.Certificate; import java.security.cert.CertificateException; import java.security.cert.CertificateFactory; import java.security.cert.PKIXCertPathValidatorResult; import java.security.cert.PKIXParameters; import java.security.cert.TrustAnchor; import java.security.cert.X509Certificate; import java.util.Arrays; import java.util.Collections; import java.util.Date; import java.util.List; import javax.security.auth.x500.X500Principal; import org.bouncycastle.asn1.x500.X500Name; import org.bouncycastle.asn1.x509.BasicConstraints; import org.bouncycastle.asn1.x509.Extension; import org.bouncycastle.asn1.x509.KeyUsage; import org.bouncycastle.cert.CertIOException; import org.bouncycastle.cert.X509v1CertificateBuilder; import org.bouncycastle.cert.X509v3CertificateBuilder; import org.bouncycastle.cert.jcajce.JcaX509CertificateConverter; import org.bouncycastle.cert.jcajce.JcaX509ExtensionUtils; import org.bouncycastle.cert.jcajce.JcaX509v1CertificateBuilder; import org.bouncycastle.cert.jcajce.JcaX509v3CertificateBuilder; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.operator.ContentSigner; import org.bouncycastle.operator.OperatorCreationException; import org.bouncycastle.operator.jcajce.JcaContentSignerBuilder; public final class ValidateCertChainButNoCRL { private static final int oneSecond = 1000; private static final int oneMinute = oneSecond * 60; private static final int oneHour = oneMinute * 60; private static final int oneDay = oneHour * 24; private static final int oneWeek = oneDay * 7; private static final int validity = oneWeek; private static int serialNumberCounter = 1; public static void main(String[] args) { Security.addProvider(new BouncyCastleProvider()); try { List certList = getCertificateList(); CertificateFactory cf = CertificateFactory.getInstance("X.509", "SUN"); CertPath cp = cf.generateCertPath(certList); TrustAnchor a = new TrustAnchor(rootCA, null); PKIXParameters params = new PKIXParameters(Collections.singleton(a)); params.setRevocationEnabled(false); CertPathValidator cpv = CertPathValidator.getInstance("PKIX", "SUN"); PKIXCertPathValidatorResult cpvr = (PKIXCertPathValidatorResult) cpv.validate(cp, params); } catch (InvalidAlgorithmParameterException | CertPathValidatorException | CertificateException | NoSuchAlgorithmException e) { } catch (Exception e) { } } static KeyPair rootKP; static X509Certificate rootCA; static List getCertificateList() throws Exception { getRootCert(); KeyPair mkp1 = genRSAKeyPair(); X509Certificate middle1 = buildMiddleCert(mkp1.getPublic(), "CN=Intermediate CA Certificate", rootKP.getPrivate(), rootCA); KeyPair mkp2 = genRSAKeyPair(); X509Certificate middle2 = buildMiddleCert(mkp2.getPublic(), "CN=Intermediate CA Certificate", mkp1.getPrivate(), middle1); KeyPair ekp = genRSAKeyPair(); X509Certificate user = buildEndCert(ekp.getPublic(), "CN=End User Certificate", mkp2.getPrivate(), middle2); Certificate[] certs = new Certificate[] { user, middle2, middle1, rootCA }; List certList = Arrays.asList(certs); return certList; } static X509Certificate getRootCert() throws Exception { if (rootCA == null) { rootKP = genRSAKeyPair(); rootCA = buildSelfSignedCert(rootKP); } return rootCA; } public static KeyPair genRSAKeyPair() throws Exception { KeyPairGenerator kpGen = KeyPairGenerator.getInstance("RSA", "BC"); kpGen.initialize(2048, new SecureRandom()); return kpGen.generateKeyPair(); } public static X509Certificate buildMiddleCert(PublicKey pk, String cn, PrivateKey caKey, X509Certificate cac) throws NoSuchAlgorithmException, CertIOException, OperatorCreationException, CertificateException { X509Certificate cert = null; X509v3CertificateBuilder cb = new JcaX509v3CertificateBuilder(cac.getSubjectX500Principal(), BigInteger.valueOf(serialNumberCounter++), new Date(System.currentTimeMillis()), new Date(System.currentTimeMillis() + validity), new X500Principal(cn), pk); JcaX509ExtensionUtils utils; utils = new JcaX509ExtensionUtils(); cb.addExtension(Extension.authorityKeyIdentifier, false, utils.createAuthorityKeyIdentifier(cac)); cb.addExtension(Extension.subjectKeyIdentifier, false, utils.createSubjectKeyIdentifier(pk)); cb.addExtension(Extension.basicConstraints, true, new BasicConstraints(0)); cb.addExtension(Extension.keyUsage, true, new KeyUsage(KeyUsage.digitalSignature | KeyUsage.keyCertSign | KeyUsage.cRLSign)); JcaContentSignerBuilder jcsb = new JcaContentSignerBuilder("SHA256withRSA"); jcsb.setProvider("BC"); ContentSigner signer = jcsb.build(caKey); JcaX509CertificateConverter jX509c = new JcaX509CertificateConverter(); jX509c.setProvider("BC"); cert = jX509c.getCertificate(cb.build(signer)); return cert; } public static X509Certificate buildEndCert(PublicKey pk, String cn, PrivateKey caKey, X509Certificate ca) { X509Certificate cert = null; try { X509v3CertificateBuilder cb = new JcaX509v3CertificateBuilder(ca.getSubjectX500Principal(), BigInteger.valueOf(serialNumberCounter++), new Date(System.currentTimeMillis()), new Date(System.currentTimeMillis() + validity), new X500Principal(cn), pk); JcaX509ExtensionUtils utils; utils = new JcaX509ExtensionUtils(); cb.addExtension(Extension.authorityKeyIdentifier, false, utils.createAuthorityKeyIdentifier(ca)); cb.addExtension(Extension.subjectKeyIdentifier, false, utils.createSubjectKeyIdentifier(pk)); cb.addExtension(Extension.basicConstraints, true, new BasicConstraints(false)); cb.addExtension(Extension.keyUsage, true, new KeyUsage(KeyUsage.digitalSignature | KeyUsage.keyEncipherment)); JcaContentSignerBuilder jcsb = new JcaContentSignerBuilder("SHA256withRSA"); jcsb.setProvider("BC"); ContentSigner signer = jcsb.build(caKey); JcaX509CertificateConverter jX509c = new JcaX509CertificateConverter(); jX509c.setProvider("BC"); cert = jX509c.getCertificate(cb.build(signer)); } catch (NoSuchAlgorithmException | CertIOException | OperatorCreationException | CertificateException ex) { } return cert; } public static X509Certificate buildSelfSignedCert(KeyPair keyPair) throws Exception { X509v1CertificateBuilder certBldr = new JcaX509v1CertificateBuilder(new X500Name("CN=Root Certificate"), BigInteger.valueOf(1), new Date(System.currentTimeMillis()), new Date(System.currentTimeMillis() + oneWeek), new X500Name("CN=Root Certificate"), keyPair.getPublic()); JcaContentSignerBuilder jcsb = new JcaContentSignerBuilder("SHA256withRSA"); jcsb.setProvider("BC"); ContentSigner signer = jcsb.build(keyPair.getPrivate()); JcaX509CertificateConverter jX509c = new JcaX509CertificateConverter(); jX509c.setProvider("BC"); X509Certificate cert = jX509c.getCertificate(certBldr.build(signer)); return cert; } }
7,451
39.064516
114
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/insecureComboHashEnc/src/main/java/pdf/insecureComboHashEnc/ManualComboEncryptAndHash.java
package pdf.insecureComboHashEnc; import java.security.*; import javax.crypto.*; import javax.crypto.spec.IvParameterSpec; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class ManualComboEncryptAndHash { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); byte[] iv = new byte[16]; KeyGenerator g = KeyGenerator.getInstance("AES", "BC"); g.init(256); Key k = g.generateKey(); (new SecureRandom()).nextBytes(iv); Cipher c = Cipher.getInstance("AES/CTR/NoPadding", "BC"); MessageDigest md = MessageDigest.getInstance("SHA256", "BC"); byte[] pt1 = "demo text".getBytes(), X, Y; boolean ok, ivo = true; String s = "Encrypt-and-Hash (E&H)"; md.reset(); c.init(Cipher.ENCRYPT_MODE, k, new IvParameterSpec(iv)); byte[] ct = c.doFinal(pt1); byte[] hash = md.digest(pt1); if (ivo) { X = "demo text 1".getBytes(); ct = "demo text 2".getBytes(); hash = md.digest("digested text".getBytes()); } md.reset(); c.init(Cipher.DECRYPT_MODE, k, new IvParameterSpec(iv)); byte[] pt2 = c.doFinal(ct); ok = MessageDigest.isEqual(md.digest(pt2), hash); } }
1,353
28.434783
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/insecureComboHashEnc/src/main/java/pdf/insecureComboHashEnc/ManualComboEncryptThenHash1.java
package pdf.insecureComboHashEnc; import java.security.*; import javax.crypto.*; import javax.crypto.spec.IvParameterSpec; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class ManualComboEncryptThenHash1 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); byte[] iv = new byte[16]; KeyGenerator g = KeyGenerator.getInstance("AES", "BC"); g.init(256); Key k = g.generateKey(); (new SecureRandom()).nextBytes(iv); Cipher c = Cipher.getInstance("AES/CTR/NoPadding", "BC"); MessageDigest md = MessageDigest.getInstance("SHA256", "BC"); byte[] pt1 = "demo text".getBytes(), X, Y; boolean ok, ivo = true; String s = "Encrypt-then-Hash(EtH)"; md.reset(); c.init(Cipher.ENCRYPT_MODE, k, new IvParameterSpec(iv)); byte[] ct = c.doFinal(pt1); byte[] hash = md.digest(ct); if (ivo) { X = "demo text 1".getBytes(); ct = "demo text 2".getBytes(); hash = md.digest(ct); } ok = MessageDigest.isEqual(md.digest(ct), hash); if (ok) { md.reset(); c.init(Cipher.DECRYPT_MODE, k, new IvParameterSpec(iv)); byte[] pt2 = c.doFinal(ct); } } }
1,346
28.282609
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/insecureComboHashEnc/src/main/java/pdf/insecureComboHashEnc/ManualComboEncryptThenHash2.java
package pdf.insecureComboHashEnc; import java.security.*; import javax.crypto.*; import javax.crypto.spec.IvParameterSpec; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.util.Arrays; public final class ManualComboEncryptThenHash2 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); byte[] iv = new byte[16]; KeyGenerator g = KeyGenerator.getInstance("AES", "BC"); g.init(256); Key k = g.generateKey(); (new SecureRandom()).nextBytes(iv); Cipher c = Cipher.getInstance("AES/CTR/NoPadding", "BC"); MessageDigest md = MessageDigest.getInstance("SHA256", "BC"); byte[] pt1 = "demo text".getBytes(), X, Y; boolean ok, ivo = true; String s = "Encrypt-then-Hash(EtH)"; md.reset(); c.init(Cipher.ENCRYPT_MODE, k, new IvParameterSpec(iv)); byte[] ct = c.doFinal(pt1); byte[] ctPlusIV = ct.clone(); Arrays.concatenate(ctPlusIV, iv); byte[] hash = md.digest(ctPlusIV); if (ivo) { X = "demo text 1".getBytes(); ct = "demo text 2".getBytes(); hash = md.digest(ct); } md.reset(); c.init(Cipher.DECRYPT_MODE, k, new IvParameterSpec(iv)); byte[] pt2 = c.doFinal(ct); ctPlusIV = ct.clone(); Arrays.concatenate(ctPlusIV, iv); ok = MessageDigest.isEqual(md.digest(ctPlusIV), hash); } }
1,506
29.14
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/insecureComboHashEnc/src/main/java/pdf/insecureComboHashEnc/ManualComboHashThenEncrypt.java
package pdf.insecureComboHashEnc; import java.security.*; import javax.crypto.*; import javax.crypto.spec.IvParameterSpec; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.util.Arrays; public final class ManualComboHashThenEncrypt { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); byte[] iv = new byte[16]; KeyGenerator g = KeyGenerator.getInstance("AES", "BC"); g.init(256); Key k = g.generateKey(); (new SecureRandom()).nextBytes(iv); Cipher c = Cipher.getInstance("AES/CTR/NoPadding", "BC"); MessageDigest md = MessageDigest.getInstance("SHA256", "BC"); byte[] pt1 = "demo text".getBytes(), X, Y; boolean ok, ivo = true; String s = "Hash-then-Encrypt(HtE)"; md.reset(); c.init(Cipher.ENCRYPT_MODE, k, new IvParameterSpec(iv)); byte[] hash = md.digest(pt1); byte[] concatArrays = Arrays.concatenate(pt1, hash); byte[] ct = c.doFinal(concatArrays); if (ivo) { X = "demo text 2".getBytes(); byte[] cryptoText = Arrays.copyOfRange(ct, 0, 16); byte[] cryptoTag = Arrays.copyOfRange(ct, 16, ct.length); md.reset(); byte[] t1 = md.digest("digested1".getBytes()); md.reset(); byte[] t2 = md.digest("digested2".getBytes()); Y = "demo text 3".getBytes(); ct = Arrays.concatenate(cryptoText, cryptoTag); } md.reset(); c.init(Cipher.DECRYPT_MODE, k, new IvParameterSpec(iv)); concatArrays = c.doFinal(ct); byte[] pt2 = Arrays.copyOfRange(concatArrays, 0, 16); hash = Arrays.copyOfRange(concatArrays, 16, concatArrays.length); ok = MessageDigest.isEqual(md.digest(pt2), hash); } }
1,825
32.814815
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/insecureComboMacEnc/src/main/java/pdf/insecureComboMacEnc/ManualComboEncryptAndMAC.java
package pdf.insecureComboMacEnc; import java.security.*; import javax.crypto.*; import javax.crypto.spec.IvParameterSpec; import javax.crypto.spec.SecretKeySpec; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class ManualComboEncryptAndMAC { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); byte[] iv = new byte[16], k2 = new byte[16]; KeyGenerator g = KeyGenerator.getInstance("AES", "BC"); g.init(256); Key k1 = g.generateKey(); (new SecureRandom()).nextBytes(iv); (new SecureRandom()).nextBytes(k2); SecretKeySpec sks2 = new SecretKeySpec(k2, "HMACSHA256"); Cipher c = Cipher.getInstance("AES/CTR/NoPadding", "BC"); Mac m = Mac.getInstance("HMACSHA256", "BC"); byte[] pt1 = "demo text".getBytes(), X; boolean ok, ivo = false; String s = "Encrypt-and-MAC (E&M)"; m.init(sks2); c.init(Cipher.ENCRYPT_MODE, k1, new IvParameterSpec(iv)); byte[] ct = c.doFinal(pt1); byte[] tag = m.doFinal(pt1); if (ivo) { X = "demo text 1".getBytes(); ct = "demo text 2".getBytes(); } m.init(sks2); c.init(Cipher.DECRYPT_MODE, k1, new IvParameterSpec(iv)); byte[] pt2 = c.doFinal(ct); ok = MessageDigest.isEqual(m.doFinal(pt2), tag); } }
1,442
30.369565
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/insecureComboMacEnc/src/main/java/pdf/insecureComboMacEnc/ManualComboEncryptThenMAC1.java
package pdf.insecureComboMacEnc; import java.security.*; import javax.crypto.*; import javax.crypto.spec.IvParameterSpec; import javax.crypto.spec.SecretKeySpec; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class ManualComboEncryptThenMAC1 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); byte[] iv = new byte[16], k2 = new byte[16]; KeyGenerator g = KeyGenerator.getInstance("AES", "BC"); g.init(256); Key k1 = g.generateKey(); (new SecureRandom()).nextBytes(iv); (new SecureRandom()).nextBytes(k2); SecretKeySpec sks2 = new SecretKeySpec(k2, "HMACSHA256"); Cipher c = Cipher.getInstance("AES/CTR/NoPadding", "BC"); Mac m = Mac.getInstance("HMACSHA256", "BC"); byte[] text1 = "demo text".getBytes(), X; boolean ok, ivo = false; String s = "Encrypt-then-MAC(EtM)"; m.init(sks2); c.init(Cipher.ENCRYPT_MODE, k1, new IvParameterSpec(iv)); byte[] ciphered = c.doFinal(text1); byte[] tag = m.doFinal(ciphered); if (ivo) { X = "demo text 1".getBytes(); ciphered = "demo text 2".getBytes(); } ok = MessageDigest.isEqual(m.doFinal(ciphered), tag); if (ok) { m.init(sks2); c.init(Cipher.DECRYPT_MODE, k1, new IvParameterSpec(iv)); byte[] textoclaroBeto = c.doFinal(ciphered); } } }
1,506
30.395833
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/insecureComboMacEnc/src/main/java/pdf/insecureComboMacEnc/ManualComboEncryptThenMAC2.java
package pdf.insecureComboMacEnc; import java.security.*; import javax.crypto.*; import javax.crypto.spec.IvParameterSpec; import javax.crypto.spec.SecretKeySpec; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.util.Arrays; public final class ManualComboEncryptThenMAC2 { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); byte[] iv = new byte[16], k2 = new byte[16]; KeyGenerator g = KeyGenerator.getInstance("AES", "BC"); g.init(256); Key k1 = g.generateKey(); (new SecureRandom()).nextBytes(iv); (new SecureRandom()).nextBytes(k2); SecretKeySpec sks2 = new SecretKeySpec(k2, "HMACSHA256"); Cipher c = Cipher.getInstance("AES/CTR/NoPadding", "BC"); Mac m = Mac.getInstance("HMACSHA256", "BC"); byte[] pt1 = "demo text".getBytes(), X; boolean ok, ivo = false; String s = "Encrypt-then-MAC(EtM)"; m.init(sks2); c.init(Cipher.ENCRYPT_MODE, k1, new IvParameterSpec(iv)); byte[] ct = c.doFinal(pt1); byte[] ctPlusIV = ct.clone(); Arrays.concatenate(ctPlusIV, iv); byte[] tag = m.doFinal(ctPlusIV); m.init(sks2); c.init(Cipher.DECRYPT_MODE, k1, new IvParameterSpec(iv)); byte[] pt2 = c.doFinal(ct); ctPlusIV = ct.clone(); Arrays.concatenate(ctPlusIV, iv); ok = MessageDigest.isEqual(m.doFinal(ctPlusIV), tag); } }
1,536
31.702128
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/insecureComboMacEnc/src/main/java/pdf/insecureComboMacEnc/ManualComboMACThenEncrypt.java
package pdf.insecureComboMacEnc; import java.security.*; import javax.crypto.*; import javax.crypto.spec.IvParameterSpec; import javax.crypto.spec.SecretKeySpec; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.util.Arrays; public final class ManualComboMACThenEncrypt { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); byte[] iv = new byte[16], k2 = new byte[16]; KeyGenerator g = KeyGenerator.getInstance("AES", "BC"); g.init(256); Key k1 = g.generateKey(); (new SecureRandom()).nextBytes(iv); (new SecureRandom()).nextBytes(k2); SecretKeySpec sks2 = new SecretKeySpec(k2, "HMACSHA256"); Cipher c = Cipher.getInstance("AES/CTR/NoPadding", "BC"); Mac m = Mac.getInstance("HMACSHA256", "BC"); byte[] pt1 = "demo text".getBytes(), X; boolean ok, ivo = false; String s = "MAC-then-Encrypt (MtE)"; m.init(sks2); c.init(Cipher.ENCRYPT_MODE, k1, new IvParameterSpec(iv)); byte[] tag = m.doFinal(pt1); byte[] pack = Arrays.concatenate(pt1, tag); byte[] ct = c.doFinal(pack); m.init(sks2); c.init(Cipher.DECRYPT_MODE, k1, new IvParameterSpec(iv)); pack = c.doFinal(ct); byte[] ptBeto = Arrays.copyOfRange(pack, 0, 16); tag = Arrays.copyOfRange(pack, 16, pack.length); ok = MessageDigest.isEqual(m.doFinal(ptBeto), tag); } }
1,543
32.565217
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/insecureDefault/src/main/java/pdf/insecureDefault/InsecureDefault3DES.java
package pdf.insecureDefault; import javax.crypto.*; import java.security.*; public final class InsecureDefault3DES { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException { byte[] msg = "demo msg".getBytes(); KeyGenerator kg = KeyGenerator.getInstance("DESede", "SunJCE"); kg.init(168); Key key = kg.generateKey(); Cipher ciph = Cipher.getInstance("DESede", "SunJCE"); ciph.init(Cipher.ENCRYPT_MODE, key); byte[] ciphered = ciph.doFinal(msg); ciph.init(Cipher.DECRYPT_MODE, key); byte[] deciphered = ciph.doFinal(ciphered); } }
690
30.409091
117
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/insecureDefault/src/main/java/pdf/insecureDefault/InsecureDefaultAES.java
package pdf.insecureDefault; import javax.crypto.*; import java.security.*; public final class InsecureDefaultAES { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException { byte[] msg = "demo msg".getBytes(); KeyGenerator kg = KeyGenerator.getInstance("AES", "SunJCE"); kg.init(256); Key key = kg.generateKey(); Cipher ciph = Cipher.getInstance("AES", "SunJCE"); ciph.init(Cipher.ENCRYPT_MODE, key); byte[] ciphered = ciph.doFinal(msg); ciph.init(Cipher.DECRYPT_MODE, key); byte[] deciphered = ciph.doFinal(ciphered); } }
682
31.52381
117
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/insecureDefault/src/main/java/pdf/insecureDefault/InsecureDefaultOAEP.java
package pdf.insecureDefault; import javax.crypto.*; import java.security.*; import java.security.spec.*; import javax.crypto.spec.*; import javax.crypto.spec.PSource; import org.bouncycastle.jce.provider.*; public final class InsecureDefaultOAEP { public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); int ksize = 384; int hsize = 160; String rsaName = "RSA/None/OAEPPadding"; int maxLenBytes = (ksize - 2 * hsize) / 8 - 2; KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", "BC"); kpg.initialize(ksize); KeyPair kp = kpg.generateKeyPair(); MGF1ParameterSpec mgf1ps = MGF1ParameterSpec.SHA1; OAEPParameterSpec OAEPps = new OAEPParameterSpec("SHA1", "MGF1", mgf1ps, PSource.PSpecified.DEFAULT); Cipher c = Cipher.getInstance(rsaName, "BC"); c.init(Cipher.ENCRYPT_MODE, kp.getPublic(), OAEPps); byte[] pt1 = "This is a demo text".substring(0, maxLenBytes).getBytes(); byte[] ct = c.doFinal(pt1); c.init(Cipher.DECRYPT_MODE, kp.getPrivate(), OAEPps); byte[] pt2 = c.doFinal(ct); } }
1,262
29.804878
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/insecureDefault/src/main/java/pdf/insecureDefault/InsecureDefaultPBE.java
package pdf.insecureDefault; import javax.crypto.*; import java.security.*; import java.security.spec.InvalidKeySpecException; import javax.crypto.spec.PBEKeySpec; import org.bouncycastle.jce.provider.*; // public final class InsecureDefaultPBE { @SuppressWarnings("empty-statement") public static void main(String args[]) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException, NoSuchProviderException, InvalidKeySpecException, InvalidAlgorithmParameterException { Security.addProvider(new BouncyCastleProvider()); if (args != null) { char[] password = args[0].toCharArray(); byte[] salt = new byte[16]; (new SecureRandom()).nextBytes(salt); int iterationCount = 2048; PBEKeySpec pbeks = new PBEKeySpec(password, salt, iterationCount); SecretKeyFactory skf = SecretKeyFactory.getInstance("PBE", "SunJCE"); Key sk = skf.generateSecret(pbeks); } } }
964
28.242424
117
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/insecureDefault/src/main/java/pdf/insecureDefault/InsecureDefaultPRNG.java
package pdf.insecureDefault; import java.security.SecureRandom; public final class InsecureDefaultPRNG { public static void main(String[] args) { try { SecureRandom r1 = new SecureRandom(); SecureRandom r2 = new SecureRandom(); } catch (Exception e) { } } }
277
15.352941
41
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/insecureDefault/src/main/java/pdf/insecureDefault/InsecureDefaultRSA.java
package pdf.insecureDefault; import java.security.InvalidKeyException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import javax.crypto.BadPaddingException; import javax.crypto.Cipher; import javax.crypto.IllegalBlockSizeException; import javax.crypto.NoSuchPaddingException; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class InsecureDefaultRSA { public static void main(String args[]) { try { Security.addProvider(new BouncyCastleProvider()); byte[] msg1 = ("Insecure default RSA.").getBytes(); KeyPairGenerator g = KeyPairGenerator.getInstance("RSA", "BC"); g.initialize(2048); KeyPair kp = g.generateKeyPair(); Cipher enc = Cipher.getInstance("RSA", "BC"); enc.init(Cipher.ENCRYPT_MODE, kp.getPublic()); Cipher dec = Cipher.getInstance("RSA", "BC"); dec.init(Cipher.DECRYPT_MODE, kp.getPrivate()); byte[][] ct = new byte[2][]; for (int i = 0; i < 2; i++) { ct[i] = enc.doFinal(msg1); byte[] pt2 = dec.doFinal(ct[i]); } } catch (NoSuchAlgorithmException | NoSuchPaddingException | InvalidKeyException | IllegalBlockSizeException | BadPaddingException | NoSuchProviderException e) { } } }
1,328
31.414634
110
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/insecurePadding/src/main/java/pkc/enc/insecurePadding/InsecurePaddingRSA1.java
package pkc.enc.insecurePadding; import java.security.InvalidKeyException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import javax.crypto.BadPaddingException; import javax.crypto.Cipher; import javax.crypto.IllegalBlockSizeException; import javax.crypto.NoSuchPaddingException; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class InsecurePaddingRSA1 { public static void main(String args[]) { try { Security.addProvider(new BouncyCastleProvider()); byte[] msg1 = ("demo msg").getBytes(); KeyPairGenerator g = KeyPairGenerator.getInstance("RSA", "BC"); g.initialize(2048); KeyPair kp = g.generateKeyPair(); Cipher enc = Cipher.getInstance("RSA/ECB/NoPadding", "BC"); enc.init(Cipher.ENCRYPT_MODE, kp.getPublic()); Cipher dec = Cipher.getInstance("RSA/ECB/NoPadding", "BC"); dec.init(Cipher.DECRYPT_MODE, kp.getPrivate()); byte[][] ct = new byte[2][]; for (int i = 0; i < 2; i++) { ct[i] = enc.doFinal(msg1); byte[] deciphered = dec.doFinal(ct[i]); } } catch (NoSuchAlgorithmException | NoSuchPaddingException | InvalidKeyException | IllegalBlockSizeException | BadPaddingException | NoSuchProviderException e) { } } }
1,355
32.073171
110
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptomisuses/insecurePadding/src/main/java/pkc/enc/insecurePadding/InsecurePaddingRSA2.java
package pkc.enc.insecurePadding; import java.security.InvalidKeyException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import javax.crypto.BadPaddingException; import javax.crypto.Cipher; import javax.crypto.IllegalBlockSizeException; import javax.crypto.NoSuchPaddingException; import org.bouncycastle.jce.provider.BouncyCastleProvider; public final class InsecurePaddingRSA2 { public static void main(String args[]) { try { Security.addProvider(new BouncyCastleProvider()); byte[] msg1 = ("demo msg").getBytes(); KeyPairGenerator g = KeyPairGenerator.getInstance("RSA", "BC"); g.initialize(2048); KeyPair kp = g.generateKeyPair(); Cipher enc = Cipher.getInstance("RSA/None/NoPadding", "BC"); enc.init(Cipher.ENCRYPT_MODE, kp.getPublic()); Cipher dec = Cipher.getInstance("RSA/None/NoPadding", "BC"); dec.init(Cipher.DECRYPT_MODE, kp.getPrivate()); byte[][] ct = new byte[2][]; for (int i = 0; i < 2; i++) { ct[i] = enc.doFinal(msg1); byte[] deciphered = dec.doFinal(ct[i]); } } catch (NoSuchAlgorithmException | NoSuchPaddingException | InvalidKeyException | IllegalBlockSizeException | BadPaddingException | NoSuchProviderException e) { } } }
1,357
32.121951
110
java