1*e7b1675dSTing-Kang Chang /** 2*e7b1675dSTing-Kang Chang * Copyright 2021 Google LLC 3*e7b1675dSTing-Kang Chang * 4*e7b1675dSTing-Kang Chang * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except 5*e7b1675dSTing-Kang Chang * in compliance with the License. You may obtain a copy of the License at 6*e7b1675dSTing-Kang Chang * 7*e7b1675dSTing-Kang Chang * http://www.apache.org/licenses/LICENSE-2.0 8*e7b1675dSTing-Kang Chang * 9*e7b1675dSTing-Kang Chang * Unless required by applicable law or agreed to in writing, software distributed under the License 10*e7b1675dSTing-Kang Chang * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express 11*e7b1675dSTing-Kang Chang * or implied. See the License for the specific language governing permissions and limitations under 12*e7b1675dSTing-Kang Chang * the License. 13*e7b1675dSTing-Kang Chang */ 14*e7b1675dSTing-Kang Chang // [START encrypted-keyset-example] 15*e7b1675dSTing-Kang Chang package encryptedkeyset; 16*e7b1675dSTing-Kang Chang 17*e7b1675dSTing-Kang Chang import static java.nio.charset.StandardCharsets.UTF_8; 18*e7b1675dSTing-Kang Chang 19*e7b1675dSTing-Kang Chang import com.google.crypto.tink.Aead; 20*e7b1675dSTing-Kang Chang import com.google.crypto.tink.KeysetHandle; 21*e7b1675dSTing-Kang Chang import com.google.crypto.tink.TinkJsonProtoKeysetFormat; 22*e7b1675dSTing-Kang Chang import com.google.crypto.tink.aead.AeadConfig; 23*e7b1675dSTing-Kang Chang import com.google.crypto.tink.aead.KmsAeadKeyManager; 24*e7b1675dSTing-Kang Chang import com.google.crypto.tink.aead.PredefinedAeadParameters; 25*e7b1675dSTing-Kang Chang import com.google.crypto.tink.integration.gcpkms.GcpKmsClient; 26*e7b1675dSTing-Kang Chang import java.nio.file.Files; 27*e7b1675dSTing-Kang Chang import java.nio.file.Path; 28*e7b1675dSTing-Kang Chang import java.nio.file.Paths; 29*e7b1675dSTing-Kang Chang import java.util.Optional; 30*e7b1675dSTing-Kang Chang 31*e7b1675dSTing-Kang Chang /** 32*e7b1675dSTing-Kang Chang * A command-line utility for working with encrypted keysets. 33*e7b1675dSTing-Kang Chang * 34*e7b1675dSTing-Kang Chang * <p>It requires the following arguments: 35*e7b1675dSTing-Kang Chang * 36*e7b1675dSTing-Kang Chang * <ul> 37*e7b1675dSTing-Kang Chang * <li>mode: Can be "generate", "encrypt" or "decrypt". If mode is "generate", it will generate a 38*e7b1675dSTing-Kang Chang * keyset, encrypt it and store it in the key-file argument. If mode is "encrypt" or 39*e7b1675dSTing-Kang Chang * "decrypt", it will read and decrypt an keyset from the key-file argument, and use it to 40*e7b1675dSTing-Kang Chang * encrypt or decrypt the input-file argument. 41*e7b1675dSTing-Kang Chang * <li>kek-uri: Use this Cloud KMS' key as the key-encrypting-key for envelope encryption. 42*e7b1675dSTing-Kang Chang * <li>gcp-credential-file: Use this JSON credential file to connect to Cloud KMS. 43*e7b1675dSTing-Kang Chang * <li>input-file: If mode is "encrypt" or "decrypt", read the input from this file. 44*e7b1675dSTing-Kang Chang * <li>output-file: If mode is "encrypt" or "decrypt", write the result to this file. 45*e7b1675dSTing-Kang Chang */ 46*e7b1675dSTing-Kang Chang public final class EncryptedKeysetExample { 47*e7b1675dSTing-Kang Chang private static final String MODE_ENCRYPT = "encrypt"; 48*e7b1675dSTing-Kang Chang private static final String MODE_DECRYPT = "decrypt"; 49*e7b1675dSTing-Kang Chang private static final String MODE_GENERATE = "generate"; 50*e7b1675dSTing-Kang Chang private static final byte[] EMPTY_ASSOCIATED_DATA = new byte[0]; 51*e7b1675dSTing-Kang Chang main(String[] args)52*e7b1675dSTing-Kang Chang public static void main(String[] args) throws Exception { 53*e7b1675dSTing-Kang Chang if (args.length != 4 && args.length != 6) { 54*e7b1675dSTing-Kang Chang System.err.printf("Expected 4 or 6 parameters, got %d\n", args.length); 55*e7b1675dSTing-Kang Chang System.err.println( 56*e7b1675dSTing-Kang Chang "Usage: java EncryptedKeysetExample generate/encrypt/decrypt key-file kek-uri" 57*e7b1675dSTing-Kang Chang + " gcp-credential-file input-file output-file"); 58*e7b1675dSTing-Kang Chang System.exit(1); 59*e7b1675dSTing-Kang Chang } 60*e7b1675dSTing-Kang Chang String mode = args[0]; 61*e7b1675dSTing-Kang Chang if (!MODE_ENCRYPT.equals(mode) && !MODE_DECRYPT.equals(mode) && !MODE_GENERATE.equals(mode)) { 62*e7b1675dSTing-Kang Chang System.err.print("The first argument should be either encrypt, decrypt or generate"); 63*e7b1675dSTing-Kang Chang System.exit(1); 64*e7b1675dSTing-Kang Chang } 65*e7b1675dSTing-Kang Chang Path keyFile = Paths.get(args[1]); 66*e7b1675dSTing-Kang Chang String kekUri = args[2]; 67*e7b1675dSTing-Kang Chang String gcpCredentialFilename = args[3]; 68*e7b1675dSTing-Kang Chang 69*e7b1675dSTing-Kang Chang // Initialise Tink: register all AEAD key types with the Tink runtime 70*e7b1675dSTing-Kang Chang AeadConfig.register(); 71*e7b1675dSTing-Kang Chang 72*e7b1675dSTing-Kang Chang // Read the GCP credentials and set up client 73*e7b1675dSTing-Kang Chang GcpKmsClient.register(Optional.of(kekUri), Optional.of(gcpCredentialFilename)); 74*e7b1675dSTing-Kang Chang 75*e7b1675dSTing-Kang Chang // From the key-encryption key (KEK) URI, create a remote AEAD primitive for encrypting Tink 76*e7b1675dSTing-Kang Chang // keysets. 77*e7b1675dSTing-Kang Chang KeysetHandle kekHandle = KeysetHandle.generateNew(KmsAeadKeyManager.createKeyTemplate(kekUri)); 78*e7b1675dSTing-Kang Chang Aead kekAead = kekHandle.getPrimitive(Aead.class); 79*e7b1675dSTing-Kang Chang 80*e7b1675dSTing-Kang Chang if (MODE_GENERATE.equals(mode)) { 81*e7b1675dSTing-Kang Chang // [START generate-a-new-keyset] 82*e7b1675dSTing-Kang Chang KeysetHandle handle = KeysetHandle.generateNew(PredefinedAeadParameters.AES128_GCM); 83*e7b1675dSTing-Kang Chang // [END generate-a-new-keyset] 84*e7b1675dSTing-Kang Chang 85*e7b1675dSTing-Kang Chang // [START encrypt-a-keyset] 86*e7b1675dSTing-Kang Chang String serializedEncryptedKeyset = 87*e7b1675dSTing-Kang Chang TinkJsonProtoKeysetFormat.serializeEncryptedKeyset( 88*e7b1675dSTing-Kang Chang handle, kekAead, EMPTY_ASSOCIATED_DATA); 89*e7b1675dSTing-Kang Chang Files.write(keyFile, serializedEncryptedKeyset.getBytes(UTF_8)); 90*e7b1675dSTing-Kang Chang // [END encrypt-a-keyset] 91*e7b1675dSTing-Kang Chang return; 92*e7b1675dSTing-Kang Chang } 93*e7b1675dSTing-Kang Chang 94*e7b1675dSTing-Kang Chang // Use the primitive to encrypt/decrypt files 95*e7b1675dSTing-Kang Chang 96*e7b1675dSTing-Kang Chang // Read the encrypted keyset 97*e7b1675dSTing-Kang Chang KeysetHandle handle = 98*e7b1675dSTing-Kang Chang TinkJsonProtoKeysetFormat.parseEncryptedKeyset( 99*e7b1675dSTing-Kang Chang new String(Files.readAllBytes(keyFile), UTF_8), kekAead, EMPTY_ASSOCIATED_DATA); 100*e7b1675dSTing-Kang Chang 101*e7b1675dSTing-Kang Chang // Get the primitive 102*e7b1675dSTing-Kang Chang Aead aead = handle.getPrimitive(Aead.class); 103*e7b1675dSTing-Kang Chang 104*e7b1675dSTing-Kang Chang Path inputFile = Paths.get(args[4]); 105*e7b1675dSTing-Kang Chang Path outputFile = Paths.get(args[5]); 106*e7b1675dSTing-Kang Chang 107*e7b1675dSTing-Kang Chang if (MODE_ENCRYPT.equals(mode)) { 108*e7b1675dSTing-Kang Chang byte[] plaintext = Files.readAllBytes(inputFile); 109*e7b1675dSTing-Kang Chang byte[] ciphertext = aead.encrypt(plaintext, EMPTY_ASSOCIATED_DATA); 110*e7b1675dSTing-Kang Chang Files.write(outputFile, ciphertext); 111*e7b1675dSTing-Kang Chang } else if (MODE_DECRYPT.equals(mode)) { 112*e7b1675dSTing-Kang Chang byte[] ciphertext = Files.readAllBytes(inputFile); 113*e7b1675dSTing-Kang Chang byte[] plaintext = aead.decrypt(ciphertext, EMPTY_ASSOCIATED_DATA); 114*e7b1675dSTing-Kang Chang Files.write(outputFile, plaintext); 115*e7b1675dSTing-Kang Chang } 116*e7b1675dSTing-Kang Chang } 117*e7b1675dSTing-Kang Chang EncryptedKeysetExample()118*e7b1675dSTing-Kang Chang private EncryptedKeysetExample() {} 119*e7b1675dSTing-Kang Chang } 120*e7b1675dSTing-Kang Chang // [END encrypted-keyset-example] 121