-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathcrypto_utils.py
More file actions
436 lines (362 loc) · 15.6 KB
/
crypto_utils.py
File metadata and controls
436 lines (362 loc) · 15.6 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
#!/usr/bin/env python3
"""
Encryption utilities for Akademie KI Suite
Provides AES-256-GCM + optional Post-Quantum (Kyber-512) encryption
"""
import os
import base64
from typing import Optional, Tuple
from pathlib import Path
# Use VPS path if available, otherwise the directory this file lives in
_VPS_DIR = "/var/www/transkript_app"
_APP_DIR = _VPS_DIR if os.path.isdir(_VPS_DIR) else str(Path(__file__).parent)
import secrets # noqa: E402
from cryptography.hazmat.primitives.ciphers.aead import AESGCM # noqa: E402
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC # noqa: E402
from cryptography.hazmat.primitives import hashes # noqa: E402
from cryptography.hazmat.backends import default_backend # noqa: E402
from cryptography.fernet import Fernet # noqa: E402
import logging # noqa: E402
# Drop-in replacement for the old pyCrypto helper
def get_random_bytes(n: int) -> bytes: # noqa: E402
"""Cryptographically secure random bytes (replaces pyCrypto.Random.get_random_bytes)."""
return secrets.token_bytes(n)
logger = logging.getLogger(__name__)
# Try to import post-quantum crypto
HAS_PQ = False
try:
from pqcrypto.kem.kyber512 import generate_keypair, encrypt as pq_encrypt, decrypt as pq_decrypt
# Test if it actually works (binary extensions present)
try:
test_pk, test_sk = generate_keypair()
HAS_PQ = True
logger.info("✅ Post-Quantum encryption (Kyber-512) available and functional")
except Exception as e:
logger.warning(f"⚠️ pqcrypto installed but non-functional: {e}")
HAS_PQ = False
except ImportError as e:
logger.warning(f"⚠️ pqcrypto not installed: {e}")
HAS_PQ = False
class KeyWrapper:
"""
Handles Per-User Key Wrapping (Filen.io / Bitwarden Style).
Concept:
1. User Master Key (UMK): Random key that encrypts data. Never changes.
2. Wrapper Key (WK): Derived from password. Encrypts the UMK.
"""
def __init__(self):
self.backend = default_backend()
def generate_salt(self) -> bytes:
return os.urandom(16)
def derive_wrapper_key(self, password: str, salt: bytes) -> bytes:
"""Derives the Wrapper Key (WK) from Password + Salt"""
kdf = PBKDF2HMAC(
algorithm=hashes.SHA256(),
length=32,
salt=salt,
iterations=200000, # High iteration count for security
backend=self.backend
)
# Returns urlsafe b64 encoded key for Fernet
return base64.urlsafe_b64encode(kdf.derive(password.encode()))
def create_user_keychain(self, password: str):
"""
Run this on User Registration.
Generates the constant UMK and locks it with the password.
"""
salt = self.generate_salt()
# 1. Generate the UMK (This key encrypts the actual database rows)
raw_umk = get_random_bytes(32) # 256 bits for AES
# 2. Derive Wrapper Key from password
wrapper_key = self.derive_wrapper_key(password, salt)
# 3. Encrypt the UMK (The Lockbox)
f = Fernet(wrapper_key)
encrypted_master_key = f.encrypt(raw_umk)
return {
"salt": base64.b64encode(salt).decode('utf-8'),
"encrypted_master_key": encrypted_master_key.decode('utf-8'),
"decrypted_master_key": raw_umk # Keep this in RAM session immediately after register
}
def unlock_user_keychain(self, password: str, salt_b64: str, encrypted_key_b64: str):
"""
Run this on User Login.
Unlocks the Lockbox to get the UMK.
"""
try:
salt = base64.b64decode(salt_b64)
wrapper_key = self.derive_wrapper_key(password, salt)
f = Fernet(wrapper_key)
# This returns the raw bytes of the UMK
user_master_key = f.decrypt(encrypted_key_b64.encode())
return user_master_key
except Exception as e:
logger.error(f"Keychain unlock failed: {e}")
return None
def rewrap_keychain(self, old_password: str, new_password: str, salt_b64: str, encrypted_key_b64: str):
"""
Run this on Password Change.
1. Unlock UMK with old pass.
2. Generate NEW salt/wrapper with new pass.
3. Re-encrypt the SAME UMK.
Result: Data in DB does NOT need to be re-encrypted.
"""
# 1. Unlock with old password
umk = self.unlock_user_keychain(old_password, salt_b64, encrypted_key_b64)
if not umk:
raise ValueError("Altes Passwort ist falsch (Key konnte nicht entschlüsselt werden).")
# 2. Generate NEW salt and NEW wrapper for the new password
new_salt = self.generate_salt()
new_wrapper_key = self.derive_wrapper_key(new_password, new_salt)
# 3. Re-encrypt the SAME UMK
f = Fernet(new_wrapper_key)
new_encrypted_master_key = f.encrypt(umk)
return {
"salt": base64.b64encode(new_salt).decode('utf-8'),
"encrypted_master_key": new_encrypted_master_key.decode('utf-8')
}
class CryptoManager:
"""Manages encryption/decryption operations"""
def __init__(self):
"""Initialize with master key from environment or generate new"""
# Fallback global key for legacy data or admin ops if needed
self.global_key = self._load_or_create_master_key()
# "master_key" attribute kept for backward compatibility
self.master_key = self._load_or_create_master_key()
# Post-quantum keypair (optional)
self.pq_public_key = None
self.pq_secret_key = None
if HAS_PQ:
self._init_pq_keys()
def encrypt_bytes(self, data: bytes, key: Optional[bytes] = None) -> bytes:
"""
Encrypt raw bytes (e.g. images) using AES-256-GCM.
Allows passing a specific User Key.
"""
if not data:
return b""
# Use provided user key, otherwise fallback to global master key
use_key = key if key else self.master_key
try:
nonce = get_random_bytes(12)
aesgcm = AESGCM(use_key)
# cryptography's AESGCM appends the 16-byte tag to the ciphertext.
# To preserve the legacy on-disk layout (nonce | tag | ciphertext)
# we split the tag back out so older blobs remain decryptable.
ct_and_tag = aesgcm.encrypt(nonce, data, None)
ciphertext, tag = ct_and_tag[:-16], ct_and_tag[-16:]
return nonce + tag + ciphertext
except Exception as e:
logger.error(f"Byte encryption error: {e}")
raise
def decrypt_bytes(self, data: bytes, key: Optional[bytes] = None) -> bytes:
"""
Decrypt raw bytes using AES-256-GCM.
"""
if not data:
return b""
use_key = key if key else self.master_key
try:
# Extract components (legacy layout: nonce | tag | ciphertext)
nonce = data[:12]
tag = data[12:28]
ciphertext = data[28:]
aesgcm = AESGCM(use_key)
# Re-assemble cryptography's expected (ciphertext + tag) layout
return aesgcm.decrypt(nonce, ciphertext + tag, None)
except Exception as e:
logger.error(f"Byte decryption error: {e}")
raise
def _load_or_create_master_key(self) -> bytes:
"""Load master key from environment or create new one"""
key_file = os.path.join(_APP_DIR, ".master_key")
# Try environment variable first
env_key = os.environ.get("MASTER_ENCRYPTION_KEY")
if env_key:
try:
return base64.b64decode(env_key)
except Exception as e:
logger.error(f"Invalid MASTER_ENCRYPTION_KEY in environment: {e}")
# Try file
if os.path.exists(key_file):
try:
with open(key_file, 'rb') as f:
return f.read()
except Exception as e:
logger.error(f"Could not read key file: {e}")
# Generate new key
logger.warning("⚠️ No master key found. Generating new one...")
new_key = get_random_bytes(32) # 256 bits
try:
with open(key_file, 'wb') as f:
f.write(new_key)
os.chmod(key_file, 0o600) # Read/write for owner only
logger.info(f"✅ New master key created: {key_file}")
except Exception as e:
logger.error(f"Could not save master key: {e}")
return new_key
def _init_pq_keys(self):
"""Initialize post-quantum keypair"""
key_file = os.path.join(_APP_DIR, ".pq_keypair")
if os.path.exists(key_file):
try:
with open(key_file, 'rb') as f:
data = f.read()
# Split stored keypair (public is first 800 bytes for Kyber-512)
self.pq_public_key = data[:800]
self.pq_secret_key = data[800:]
logger.info("✅ Loaded existing PQ keypair")
return
except Exception as e:
logger.warning(f"Could not load PQ keypair: {e}")
# Generate new keypair
try:
self.pq_public_key, self.pq_secret_key = generate_keypair()
with open(key_file, 'wb') as f:
f.write(self.pq_public_key + self.pq_secret_key)
os.chmod(key_file, 0o600)
logger.info("✅ Generated new PQ keypair")
except Exception as e:
logger.error(f"PQ keypair generation failed: {e}")
def encrypt_text(self, plaintext: str, key: Optional[bytes] = None, allow_fallback=False) -> str:
if not plaintext:
return ""
# STRICT MODE: Only use global key if explicitly allowed (for system settings)
if key is None:
if allow_fallback:
use_key = self.global_key
else:
raise ValueError("Security Error: Attempted to encrypt user data without a User Key!")
else:
use_key = key
try:
nonce = get_random_bytes(12)
aesgcm = AESGCM(use_key)
ct_and_tag = aesgcm.encrypt(nonce, plaintext.encode('utf-8'), None)
ciphertext, tag = ct_and_tag[:-16], ct_and_tag[-16:]
return base64.b64encode(nonce + tag + ciphertext).decode('utf-8')
except Exception as e:
logger.error(f"Encryption error: {e}")
raise
def decrypt_text(self, encrypted_b64: str, key: Optional[bytes] = None) -> str:
"""
Decrypts text using specific user key (UMK) or falls back to global key.
"""
if not encrypted_b64:
return ""
# Use provided key or fallback to global
use_key = key if key else self.global_key
try:
encrypted = base64.b64decode(encrypted_b64)
nonce = encrypted[:12]
tag = encrypted[12:28]
ciphertext = encrypted[28:]
aesgcm = AESGCM(use_key)
return aesgcm.decrypt(nonce, ciphertext + tag, None).decode('utf-8')
except Exception as e:
logger.error(f"Decryption error: {e}")
return "[Decryption Failed]"
def encrypt_file(self, file_path: str, output_path: Optional[str] = None) -> Tuple[str, dict]:
"""
Encrypt file with optional post-quantum protection
Returns:
(encrypted_file_path, metadata_dict)
"""
if not os.path.exists(file_path):
raise FileNotFoundError(f"File not found: {file_path}")
# Output path
if not output_path:
output_path = file_path + ".enc"
# Read file
with open(file_path, 'rb') as f:
plaintext = f.read()
# Generate nonce and encrypt
nonce = get_random_bytes(12)
aesgcm = AESGCM(self.master_key)
ct_and_tag = aesgcm.encrypt(nonce, plaintext, None)
ciphertext, tag = ct_and_tag[:-16], ct_and_tag[-16:]
# Metadata
metadata = {
"algorithm": "AES-256-GCM",
"version": 1,
"original_size": len(plaintext),
"pq_protected": False
}
# Optional: Add post-quantum layer
if HAS_PQ and self.pq_public_key:
try:
# Encrypt the AES key using PQ
pq_ciphertext, pq_shared_secret = pq_encrypt(self.pq_public_key, self.master_key)
metadata["pq_protected"] = True
metadata["pq_ciphertext"] = base64.b64encode(pq_ciphertext).decode('utf-8')
except Exception as e:
logger.warning(f"PQ encryption failed: {e}")
# Write encrypted file
with open(output_path, 'wb') as f:
f.write(nonce + tag + ciphertext)
return output_path, metadata
def decrypt_file(self, encrypted_path: str, output_path: Optional[str] = None,
metadata: Optional[dict] = None) -> str:
"""
Decrypt encrypted file
Returns:
Path to decrypted file
"""
if not os.path.exists(encrypted_path):
raise FileNotFoundError(f"Encrypted file not found: {encrypted_path}")
# Output path
if not output_path:
output_path = encrypted_path.replace(".enc", "_decrypted")
# Read encrypted file
with open(encrypted_path, 'rb') as f:
data = f.read()
# Split components
nonce = data[:12]
tag = data[12:28]
ciphertext = data[28:]
# Handle PQ if present
key_to_use = self.master_key
if metadata and metadata.get("pq_protected") and HAS_PQ:
try:
pq_ciphertext_b64 = metadata.get("pq_ciphertext")
if pq_ciphertext_b64:
pq_ciphertext = base64.b64decode(pq_ciphertext_b64)
key_to_use = pq_decrypt(self.pq_secret_key, pq_ciphertext)
except Exception as e:
logger.warning(f"PQ decryption failed, using master key: {e}")
# Decrypt
aesgcm = AESGCM(key_to_use)
plaintext = aesgcm.decrypt(nonce, ciphertext + tag, None)
# Write decrypted file
with open(output_path, 'wb') as f:
f.write(plaintext)
return output_path
# Global instance
crypto = CryptoManager()
key_wrapper = KeyWrapper()
# Quick test
if __name__ == "__main__":
print("🔐 Testing CryptoManager...")
# Test text encryption
original = "Sensitive church data: Gottesdienst 2025"
encrypted = crypto.encrypt_text(original)
decrypted = crypto.decrypt_text(encrypted)
print(f"Original: {original}")
print(f"Encrypted: {encrypted[:50]}...")
print(f"Decrypted: {decrypted}")
print(f"✅ Match: {original == decrypted}")
# Test file encryption
import tempfile
with tempfile.NamedTemporaryFile(mode='w', delete=False, suffix='.txt') as f:
f.write("Secret document content")
test_file = f.name
enc_file, metadata = crypto.encrypt_file(test_file)
dec_file = crypto.decrypt_file(enc_file, metadata=metadata)
with open(dec_file, 'r') as fh:
dec_content = fh.read()
print(f"\n📄 File encryption: {dec_content}")
print(f"✅ PQ Protected: {metadata.get('pq_protected', False)}")
# Cleanup
os.remove(test_file)
os.remove(enc_file)
os.remove(dec_file)
print("\n✅ All tests passed!")