In the following sections, we will use different cryptographic primitives to implement parts of the PAD protocol. Here we provide a cryptoUtil.js script with these cryptographic primitives.
The secret sharing library is forked from secrets.js-grempe, with slight modifications for react native. The source code is provided in the bottom of this page.
import { RSA, KeyPair } from'react-native-rsa-native';import { NativeModules } from'react-native';importtype { Aes as AesType } from'react-native-aes-crypto';import { encode as btoa } from'base-64';import { toByteArray, fromByteArray } from'base64-js';import*as sss from'./secrets.js';constAes:any=NativeModules.Aes;constEPHEMERAL_KEY_SIZE=16;constBITS='8';exportasyncfunctionsplit( secret:string, numShare:number, threshold:number,):Promise<string[]> {return (awaitsss.split(secret, numShare, threshold)).map(share =>share.substring(1));}exportfunctioncombine(shares:string[]):string {returnsss.combine(shares.map(share =>BITS+ share));}exportinterfaceSymCiphertext { ciphertext:string; iv:string;}exportinterfaceHybridCiphertext { encryptedMessage:SymCiphertext; encryptedEphemeralKey:string;}exportfunctionrandomBytes(length:number):Promise<string> {returnAes.randomKey(length);}functiongenerateRsaKeyPair(keySize:number=4096):Promise<KeyPair> {returnRSA.generateKeys(keySize);}exportfunctiongenerateEncryptionKeyPair( options: { type:'rsa'; keySize:number } = { type:'rsa', keySize:4096 },):Promise<KeyPair> {if (options.type ==='rsa') {returngenerateRsaKeyPair(options.keySize); }thrownewError(`Unsupported type ${options.type}`);}exportfunctiongenerateSigningKeyPair( options: { type:'rsa'; keySize:number } = { type:'rsa', keySize:4096 },):Promise<KeyPair> {returngenerateEncryptionKeyPair(options);}exportasyncfunctionencryptSym( data:string, symKey:string, algorithm:AesType.Algorithms='aes-128-cbc',) {constiv=awaitAes.randomKey(16);constciphertext=awaitAes.encrypt(data, symKey, iv, algorithm);return { ciphertext, iv:hexToBase64(iv), };}exportfunctiondecryptSym( ciphertext:SymCiphertext, symKey:string, algorithm:AesType.Algorithms='aes-128-cbc',):Promise<string> {constiv=base64ToHex(ciphertext.iv);returnAes.decrypt(ciphertext.ciphertext, symKey, iv, algorithm);}exportasyncfunctionencryptAsym( data:string, encKey:string,):Promise<string|HybridCiphertext> {try {returnawaitRSA.encrypt64(data, encKey); } catch (err:unknown) {// if error indicates plaintext too big// avoid infinite recursive callsif (data.length<=EPHEMERAL_KEY_SIZE) {thrownewError('Ephemeral key size is too large for the encryption key type', ); }returnencryptHybrid(data, encKey); }}exportfunctiondecryptAsym( ciphertext:string|HybridCiphertext, decKey:string,):Promise<string> {if (typeof ciphertext ==='string') {returnRSA.decrypt64(ciphertext, decKey); }returndecryptHybrid(ciphertext, decKey);}exportasyncfunctionencryptHybrid( data:string, encKey:string,):Promise<HybridCiphertext> {constephemeralKey=awaitAes.randomKey(EPHEMERAL_KEY_SIZE);constencryptedMessage=awaitencryptSym(data, ephemeralKey);constencryptedEphemeralKey=awaitencryptAsym(ephemeralKey, encKey);if (typeof encryptedEphemeralKey !=='string') {thrownewError('Ephemeral key size is too large for the encryption key type', ); }// encryptedEphemeralKey must be returned by crypto.publicEncrypt, i.e. a Uint8Arrayreturn { encryptedMessage, encryptedEphemeralKey };}exportasyncfunctiondecryptHybrid( ciphertext:HybridCiphertext, decKey:string,):Promise<string> {const { encryptedEphemeralKey } = ciphertext;constephemeralKey=awaitdecryptAsym(encryptedEphemeralKey, decKey);const { encryptedMessage } = ciphertext;returndecryptSym(encryptedMessage, ephemeralKey);}exportfunctionsign(data:string, signingKey:string):Promise<string> {returnRSA.sign(data, signingKey);}exportfunctionverify( data:string, verificationKey:string, signature:string,):Promise<boolean> {returnRSA.verify(signature, data, verificationKey);}exportfunctionhash(...data:string[]):Promise<string> {returnAes.sha256(data.join(''));}exportfunctionxor(a:string, b:string):string {constbChunks=split2(b);returnsplit2(a).map((byteHex, i) =>// eslint-disable-next-line no-bitwise (parseInt(byteHex,16) ^parseInt(bChunks[i],16)).toString(16).padStart(2,'0'), ).join('');}functionsplit2(str:string):string[] {constchunks=str.match(/\w{2}/g);if (chunks ===null) {thrownewError('Invalid encoding'); }return chunks;}exportfunctionhexToBase64(hex:string):string {constchunks=split2(hex);returnbtoa(chunks.map(byteHex =>String.fromCharCode(parseInt(byteHex,16))).join(''), );}exportfunctionbase64ToHex(b64:string):string {returnbinToHex(toByteArray(b64));}exportfunctionhexToBin(hex:string):Uint8Array {constchunks=split2(hex);returnUint8Array.from(chunks.map(byteHex =>parseInt(byteHex,16)));}exportfunctionbinToHex(bin:Uint8Array):string {returnbin.reduce( (str, byte) => str +byte.toString(16).padStart(2,'0'),'', );}export { toByteArray as base64ToBin, fromByteArray as BinToBase64 };exportfunctionhexToUtf8(hex:string):string {returnsss.hex2str(hex);}exportfunctionutf8ToHex(a:string):string {returnsss.str2hex(a);}exportfunctionbinToUtf8(bin:Uint8Array):string {returnString.fromCharCode(...bin);}exportfunctionutf8ToBin(a:string):Uint8Array {returnUint8Array.from(a.split('').map(byte =>byte.charCodeAt(0)));}exportfunctionbase64ToUtf8(b64:string):string {returnbinToUtf8(toByteArray(b64));}exportfunctionutf8ToBase64(a:string):string {returnfromByteArray(utf8ToBin(a));}
EPHEMERAL_KEY_SIZE (global variable): is the number of random bytes of the ephemeral keys used in a hybrid (symmetric & asymmetric) encryption.
randomBytes (function): generates random bytes encoded in hexidecimal.
encryptSym (function): performs a symmetric encryption. Algorithm: AES-128-CBC.
decryptSym (function): performs a symmetric decryption. Algorithm: AES-128-CBC
encryptAsym (function): performs an asymmetric encryption. If the data to be encrypted is too large, it uses a hybrid encryption instead. Algorithm: RSA
decryptAsym (function): performs an asymmetric decryption. If the ciphertext is a result from a hybrid encryption, then it uses hybrid decryption; Otherwise, it uses asymmetric decryption. Algorithm: RSA
encryptHybrid (function): performs a hybrid encryption: performs a symmetric encryption on the data with an ephemeral key, then performs an asymmetric encryption on the ephemeral key with the encryption key.
decryptHybrid (function): performs a hybrid decryption: retrieve the ephemeral key with an asymmetric decryption. Then it performs a symmetric decryption on the payload with the ephemeral key.
sign (function): digitally signs a piece of data with a signing key. Algorithm: depends on input key type; data is first hashed with SHA512;
verify (function): verifies if a signature matches with the alleged data and verification key. Algorithm: depends on input key type; data is first hashed with SHA512.
hash (function): hashes the data in the argument list. Algorithm: SHA256
xor (function): performs exclusive-or on two binary arrays
hexToBase64 (function): transforms the encoding of binary data from hexidecimal to base64
base64ToHex (function): transforms the encoding of binary data from base64 to hexidecimal
hexToBin (function): decodes a hexidecimal-encoded string to a Uint8Array
binToHex (function): encodes a Uint8Array to hexidecimal
base64ToBin (function): decodes a base64-encoded string to a Uint8Array
binToBase64 (function): encodes a Uint8Array to base64
Encrypting
An Encryption is a JSON object that has the following form:
The encryption phase involves the encryptor sending an Encryption to the PAD server. Thus, it is essential to understand how it is created. We will go through its properties one by one.
"description": Description of the encryption. This can be an arbitrary string.
"tokenHash": Hased value of a token. tokenHash = SHA256(token).
"ciphertext": The ciphertext of the secret encrypted with the decryptor's public key and the symmetric key k.
"trusteeShares": A dictionary containing all the encrypted and hashed trustee shares.
[trusteeId]: A dictionary entry where the key is a trustee's ID, and the value is an object of encrypted and hashed trustee shares.
"encrypted": The trustee's share of the masked symmetric key k \oplus R used to encrypt the secret, encoded as a base64 string.
"hashed": SHA256 of the trustee's share, encoded as a hex string.
"validatorShares": A dictionary containing all the encrypted validator shares.
[validatorId]: A dictionary entry where the key is a validator's ID, and the value is an object of encrypted validator shares.
"encrypted": The validator's share of the mask R to the symmetric key used to encrypt the secret together with the decryptor's public key. Since the public key is large, the validator's shares are large too. Thus, the encryption of a validator's share uses an ephemeral key as a symmetric key. k and decryptor's key.
Creating token and tokenHash
A token is a random number sent from the encryptor to the decryptor for her to later request for a piece of encryptor's data. It is essential to keep it secret between the encryptor and decryptor until the data request phase. An encryption's ID is tokenHash, the hash value of token. For portability and readability, both token and tokenHash are represented as hexadecimal strings.
Important: note that token should be taken as a lowercase string when hashed into tokenHash.
// create-ciphertext-second-step.jsimport {sign, encryptHybrid, SymCiphertext, HybridCiphertext} from'./cryptoUtil';constc:SymCiphertext=/* from create-ciphertext-first-step.js */;constencryptorSigningKey:string=/* from some keystore */;constdecryptorEncryptionKey:string=/* from some keystore */;constpayload:string=JSON.stringify(c);constsignature:string=awaitcrypto.sign(payload, encryptorSigningKey);constsignedPayload:string=JSON.stringify({payload, signature});constciphertext:HybridCiphertext=awaitencryptHybrid(signedPayload, decryptorEncryptionKey);
Creating trusteeShares
To create trusteeShares, the encryptor should first have knowledge about the settings of the instance, including the trustee threshold and the list of trustees referencing the instance (check out GET /metadata and GET /all-trustees/{trustee-id}. These information are also in one of the first few blocks on the ledger). The symmetric key k is then masked with a random number. This masked symmetric key is the secret shared among the trustees. After that, each share of trustees' is encrypted with their individual encryption key (the mapping between secret sharing index and trustee does not matter, but we recommend following the order in the instance's metadata. For example, trustee1 may hold a share of index 00 in an encryption, but hold another share of index 01 in another encryption). For auditing purposes, the hash of each share before encrypting should also be included, so that after a trustee post her share, consistency can be checked.
import { split, hexToBase64, hexToUtf8, encryptAsym, isHybridCiphertext, hash, Shares } from'./cryptoUtil';typeTrusteeShares= { [trusteeId:string]: { encrypted:string, hashed:string, },};async function createTrusteeShares(maskedSymKey: string, trustees: Object, trusteeThreshold: number): Promise<TrusteeShares> {
constn=Object.keys(trustees).length;constshares:Shares=awaitsplit(maskedSymKey, n, trusteeThreshold);consttrusteeShares:TrusteeShares= {};for (const [i, [trusteeId, {encryptionKey}]] ofObject.entries(trustees).entries()) {constshareBase64=hexToBase64(shares[i]);constshareUtf8=hexToUtf8(shares[i]);constencryptedShare=awaitencryptAsym(shareBase64, encryptionKey);if (isHybridCiphertext(encryptedShare)) {thrownewError('share is too large'); }consthashedShare=awaithash(shareUtf8); trusteeShares[trusteeId] = { encrypted: encryptedShare, hashed: hashedShare, }; }return trusteeShares;}constk=/* from create-ciphertext-first-step.js */;constR=crypto.randomBytes(16);// the masked symmetric key maskedK is the secret to be sharedconstmaskedK=xor(k,R);consttrustees= {'trustee1': { encryptionKey:/* trustee1's encryption key */, },'trustee2': { encryptionKey:/* trustee2's encryption key */, },};consttrusteeThreshold=2;consttrusteeShares=awaitcreateTrusteeShares(maskedK, trustees, trusteeThreshold);
Creating validatorShares
This is similar to creating trusteeShares, except the secret shared among the validators is the mask R together with the decryptor's public key to identify him.
You will also need a signing key pair for creating the new channel. This ensures that only the encryptor can modify the Encryption object using endpoint for updating an Encryption in a channel.
This channel key pair should be generated freshly and must not be the key pair that identifies the encryptor. Only the public (verification) key is sent to the server. The encryptor should keep the private (signing) key so long as she would update the Encryption therein.
That's it! We have gone through the steps of creating a new channel. Recall that the encryption is being sent to the PAD service server and the token is then shared with the decryptor out-of-band. The encryption channel allows the encryptor to update the secret which is useful in some use cases.
Updating Encryption object
Using the channel signing key and the token-hash, the encryptor can update her Encryption object in the channel associated with the token. The following code snippets show how one create encryptionPayload and signature required for the operation.
import {sign} from'./cryptoUtil';constchannelSigningKey=/* from generate-channel-key.js */constnewEncryption= {// the new encryption content...};constencryptionPayload=JSON.stringify(newEncryption);constsignature=awaitsign(encryptionPayload, channelSigningKey);
Decrypting
The decryption phase happens after the encryption has been uploaded, a data request has been posted, and sufficient number of trustees and validators, respectivelly, have responded. At this stage, the decryptor has enough information to decrypt the encryptor's secret.
Verifying responses correctness
It is important for the decryptor to check correctness and integrity of the trustee and validator responses. Checking correctness can be done by checking consistency between a response and its hash submitted by the encryptor at encryption time. Checking integrity involves verifying a signature against the response payload.
/* verify-responses.js */// Work in progress
Verifying ciphertext integrity
Recall that the ciphertext payload includes the encryptor's signature before encrypted with decryptor's encryption key. This ensures that the payload is not modified by third party, including the PAD server. The signature needs to be verified before decrypting.
/* verify-ciphertext.js */import {decryptHybrid, verify, HybridCiphertext, SymCiphertext} from'./cryptoUtil';function decryptVerifyCiphertext(ciphertext: HybridCiphertext, decryptorDecryptionKey: string, encryptorVerificationKey: string): SymCiphertext {
constdecrypted=decryptHybrid(ciphertext, decryptorDecryptionKey);const {payload,signature} =JSON.parse(decrypted);if (!verify(payload, encryptorVerificationKey, signature)) {thrownewError('Signature not match with payload'); }constinnerCiphertext=JSON.parse(payload);return innerCiphertext;}const {ciphertext} =/* from GET /encryptions/{token-hash}/ciphertext */;constdecryptorDecryptionKey=/* from some key store */;constencryptorVerificationKey=/* from some key store */;constc=decryptVerifyCiphertext( ciphertext, decryptorDecryptionKey, encryptorVerificationKey,);
Reconstructing masked symmetric key from trustees
To perform the symmetric decryption we need sufficient responses from trustees and validators, respectively. Then those will combine to the masked symmetric key and the masked. We show how to reconstruct the masked symmetric key from trustees' responses in this section. Obviously, it has redundancy with our previous example. In actual implementation, these scripts can be merged. For example, parse the response, push the share to an array only if it is valid, then combine those later.
/* reconstruct-masked-k.js */import {base64ToHex, combine} from'./cryptoUtil';const {trusteeResponses} =/* from GET /data-requests/{token}/trustee-responses */;consttrusteeShares=Object.values(trusteeResponses).map((signed) => {consttrusteeResponse=JSON.parse(signed.trusteeResponse);constshare=base64ToHex(trusteeResponse.trusteeShare);return share;});constmaskedK=combine(trusteeShares);
Reconstructing the mask from validators
/* resconstruct-r.js */import {base64ToHex, hexToUtf8, combine} from'./cryptoUtil';const {validatorResponses} =/* from GET /data-requests/{token}/validator-responses */;constvalidatorShares=Object.values(validatorResponses).map((signed) => {constvalidatorResponse=JSON.parse(signed.validatorResponse);constshare=base64ToHex(validatorResponse.validatorShare);return share;});constRAndBvkPayload=combine(validatorShares);constRAndBvkString=hexToUtf8(RAndBvkPayload)();constRAndBvkJson=JSON.parse(RAndBvkString);constR=base64ToHex(RAndBvkJson.mask);
Decrypting!
The decryptor now has everything to retrieve the encryptor's secret.
import {xor, decryptSym} from'./cryptoUtil';constmaskedK=/* from reconstruct-masked-k.js */;constR=/* from reconstruct-r.js */;constc=/* from verify-ciphertext.js */;constk=xor(maskedK,R);constdecrypted=decryptSym(c, k);constdataJson=JSON.parse(decrypted);const {token,secret} = dataJson;if (token !==/* token */) {thrownewError('Token mismatch');}console.log(secret); // my_secret
The ciphertext part of an encryption should be encrypted with the symmetric key first, then the decryptor's encryption key. To ensure integrity, a digital signature from the encryptor against the ciphertext in the first encryption should be attached before the second encryption. In general, the first step creates the ciphertext c=SymEnck​(token,s) Then the second step creates AsymEncBek​(c,SignAsk​(c)) For example, suppose secret = "my_secret" is the encryptor's secret, the following code snippet generates c.