English | 中文
Tencent Kona Crypto is a Java security provider, which is named KonaCrypto
. Per the associated China's specifications, it implements the following ShangMi algorithms:
- SM2, which is Elliptic Curve Cryptography (ECC)-based public key algorithm. It complies with the below national specifications:
- GB/T 32918.1-2016 Part 1:General
- GB/T 32918.2-2016 Part 2:Digital signature algorithm
- GB/T 32918.3-2016 Part 3:Key exchange protocol
- GB/T 32918.4-2016 Part 4:Public key encryption algorithm
- GB/T 32918.5-2017 Part 5:Parameter definition
- SM3, which is a cryptographic hash algorithm. It complies with the below national specification:
- GB/T 32905-2016 SM3 cryptographic hash algorithm
- SM4, which is a block encryption algorithm. It complies with the below national specification:
- GB/T 32907-2016 SM4 block cipher algorithm
For providing the above features, KonaCrypto
implements the JDK-specified Service Provider Interfaces (SPIs), such as KeyPairGeneratorSpi,SignatureSpi,CipherSpi,MessageDigestSpi,MacSpi and KeyAgreementSpi.
Tencent Kona Crypto provides pure Java-based SM2, SM3 and SM4, and also JNI and OpenSSL-based SM3 and SM4 (SM2 implementation is on the way). The latter supports Linux x86_64/aarch64 platforms. OpenSSL version 3.3.2 is used by default, but versions 3.0 and later can be supported.
The pure Java-based implementations is enabled. The java system property com.tencent.kona.useNativeCrypto
can be used to enable the OpenSSL-based implementation. The additional system property com.tencent.kona.openssl.crypto.lib.path
is used to specify an alternative local OpenSSL crypto lib file (libcrypto.so
). The value of this property is a local absolute path.
Now that KonaCrypto
is based on JCA framework, then the usages are the same as other JCA implementations, such as SunJCE and SunEC. Understanding the design and coding style on JCA really helps for applying KonaCrypto
, please read the official JCA reference.
Before using any feature in KonaCrypto
, it has to load KonaCryptoProvider
.
Security.addProvider(new KonaCryptoProvider());
The above line adds this provider at the bottom of the provider list. That means its privilege is the lowest. If necessary, it can insert the provider at specific positions, like the below,
Security.insertProviderAt(new KonaCryptoProvider(), position);
the less the position is, the higher the priority is. The minimum value is 1. However, it's not recommended to prioritize this provider. So, Security.addProvider
is recommended.
Generating SM2 key pair is the same as generating the key pairs on other EC curves. It just needs to invoke the standard JDK APIs. KonaCrypto
provides two KeyPairGenerator
implementations for generating SM2 key pair:
- The JDK builtin
ECKeyPairGenerator
. In the key pair generated by this implementation, the format of private key isPKCS#8
and the format of public key isX.509
. - A new introduced
SM2KeyPairGenerator
. In the key pair generated by this implementation, the format of the both keys isRAW
. The length of private key is 32-bytes. The length of public key is 65-bytes, The format is04||x||y
.04
represents the uncompressed format;x
andy
are the coordinates of the public point in the curve, and both are 32-bytes.
Create KeyPairGenerator
implementation on ECKeyPairGenerator
.
KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance("EC);
keyPairGenerator.initialize(spec);
spec
can be SM2ParameterSpec
(use SM2ParameterSpec.instance()
to create the instance) or ECGenParameterSpec
(use new ECGenParameterSpec("curveSM2")
to create the instance).
If create KeyPairGenerator
implementation on SM2KeyPairGenerator
, the codes are the belows,
KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance("SM2);
Generate key pair.
KeyPair keyPair = keyPairGenerator.generateKeyPair();
ECPublicKey publicKey = (ECPublicKey) keyPair.getPublic();
ECPrivateKey privateKey = (ECPrivateKey) keyPair.getPrivate();
SM2 key pair is also EC key pair, so the public key and private key are also ECPublicKey and ECPrivateKey respectively.
SM2 public key is 65-bytes length.
byte[] encodedPublicKey = publicKey.getEncoded();
SM2 private key is 32-bytes length without any format.
byte[] encodedPrivateKey = privateKey.getEncoded();
For more information on key pair generation, please refer to the official KeyPairGenerator docs.
Generally, in the signing and encrypting operations, the key pairs are already generated. They are not generated on the runtime. It just reads the existing public key and private key to create PublicKey and PrivateKey instances respectively.
byte[] encodedPublicKey = <public key>;
byte[] encodedPrivateKey = <private key>;
KeyFactory keyFactory = KeyFactory.getInstance("SM2");
SM2PublicKeySpec publicKeySpec = new SM2PublicKeySpec(encodedPublicKey);
PublicKey publicKey = keyFactory.generatePublic(publicKeySpec);
SM2PrivateKeySpec privateKeySpec = new SM2PrivateKeySpec(encodedPrivateKey);
PrivateKey privateKey = keyFactory.generatePrivate(privateKeySpec);
Using SM2 signature is the same as using other existing signatures, like ECDSA, though the parameters are different.
Create Signature instance.
Signature signature = Signature.getInstance("SM2);
Initialize the Signature instance with the private key for signing.
signature.initSign(privateKey);
Behind the above initialization, it uses the default SM2 ID, exactly 1234567812345678
. It also derives the public key from the private key. According to the associated specification, public key must be used for generating SM2 signature data. This is a significant difference between the international algorithms, like ECDSA, and SM2 signature algorithm. Note that calculating the public key leads to some overhead. That is harmful for the performance.
If not using the default ID or expect to eliminate the cost on calculating public key, it would provide an AlgorithmParameterSpec, exactly SM2SignatureParameterSpec, instance.
byte[] altID = <custom ID>;
ECPublicKey publicKey = <public key>;
SM2SignatureParameterSpec paramSpec = new SM2SignatureParameterSpec(altID, publicKey);
signature.setParameter(paramSpec);
signature.initSign(privateKey);
After parameter setup and initialization, it is time to pass the message data in.
byte[] message = <the message>;
signature.update(message);
Generate signature data.
byte[] sign = signature.sign();
The SM2 signature data is ASN.1-encoded. The length is between 71 and 73 bytes.
Initialize the Signature instance with public key for verifying.
signature.initVerify(publicKey);
Pass the message in.
byte[] message = <the message>;
signature.update(message);
Pass the signature data in.
boolean verified = signature.verify(sign);
If the verification is successful, the result is true, otherwise false.
It has to know that the private key is used for signing and the public key is used for verifying. For detailed information about Signature APIs, please refer to the official Signature docs.
Because of the performance concern, public key encryption is only used for encrypting short but critical data. The same to SM2 encryption.
Create Cipher instance.
Cipher cipher = Cipher.getInstance("SM2");
Initialize the Cipher instance with public key and set the mode to encryption.
cipher.init(Cipher.ENCRYPT_MODE, publicKey);
Pass the message in and generate the ciphertext.
byte[] message = <the message>;
byte[] ciphertext = cipher.doFinal(message);
Initialize the Cipher instance with private key and set the mode to decryption.
cipher.init(Cipher.DECRYPT_MODE, privateKey);
Pass the ciphertext in and generate the plaintext.
byte[] cleartext = cipher.doFinal(ciphertext);
It has to know that public key is used for encryption, however the private key is used for decryption. For detailed information on Cipher APIs, please refer to the official Cipher docs.
Using SM3 hash algorithm is the same as using other existing hash algorithm, like SHA-256. It only invokes JDK APIs to generate the message digest (hash).
Create MessageDigest instance.
MessageDigest md = MessageDigest.getInstance("SM3");
It can pass all the message in and generate the digest.
byte[] message = <the message>;
byte[] digest = md.digest(message);
It also can pass the message segments, and finally generate the digest.
byte[] messageSegment1 = <the message segment1>;
byte[] messageSegment2 = <the message segment2>;
// Pass the message segments in
md.update(messageSegment1);
md.update(messageSegment2);
// Finally generate the digest
byte[] digest = md.digest();
For detailed information about MessageDigest APIs, please refer to the official MessageDigest docs.
Using HmacSM3 algorithm is the same as using other existing MAC algorithm, like HmacSHA256. It only invokes JDK APIs to generate the message authentication code.
Prepare a 16-bytes key.
byte[] key = <the key>;
SecretKey secretKey = new SecretKeySpec(key, "SM4");
Create Mac instance.
Mac hmac = Mac.getInstance("HmacSM3");
Initialize the Mac instance with the key.
hmac.init(secretKey);
Pass all the message in and generate message authentication code. The code is 32-bytes length.
byte[] message = <the message>;
byte[] mac = hmac.doFinal(message);
It also can pass the message segments, and finally generate the message authentication code.
byte[] messageSegment1 = <the message segment1>;
byte[] messageSegment2 = <the message segment2>;
// Pass the message segments in
hmac.update(messageSegment1);
hmac.update(messageSegment2);
// Finally generate the message authentication code
byte[] mac = hmac.doFinal();
For the detailed information about Mac APIs, please refer to the official Mac docs.
Using SM4 cipher algorithm is the same as using other existing block cipher algorithm, like AES. It only invokes JDK APIs to do encryption and decryption. KonaCrypto
supports four operation modes, including CBC, CTR, ECB and GCM. It also supports PKCS#7 padding specification.
Prepare a 16-bytes key.
byte[] key = <the key>;
SecretKey secretKey = new SecretKeySpec(key, "SM4");
Create Cipher instance.
Cipher cipher = Cipher.getInstance(transformation);
The transformation consists of algorithm name, operation mode and padding type. A symbol /
is used as separator between the parts.
The following transformations are supported:
- SM4/CBC/NoPadding: The operation mode is CBC. No padding is needed. It requires the input must be 16x bytes.
- SM4/CBC/PKCS7Padding: The operation mode is CBC. PKCS#7 padding is used. It doesn't require that the input must be 16x bytes.
- SM4/CTR/NoPadding: The operation mode is CBC. No padding is needed. It doesn't require that the input must be 16x bytes.
- SM4/ECB/NoPadding: The operation mode is ECB. No padding is needed. It requires the input must be 16x bytes.
- SM4/ECB/PKCS7Padding: The operation mode is ECB. PKCS#7 padding is used. It doesn't require that the input must be 16x bytes.
- SM4/GCM/NoPadding: The operation mode is GCM. No padding is needed. It doesn't require that the input must be 16x bytes.
Create the algorithm parameters.
AlgorithmParameterSpec paramSpec = <the parameter parameter instance>;
Different operation modes may need different AlgorithmParameterSpec types,
- CBC and CTR modes use IvParameterSpec. This parameter type needs a 16-bytes as Initialization Vector (IV).
- GCM mode uses GCMParameterSpec. This parameter type needs a 12-bytes as Initialization Vector (IV) and specifies the tag length to 12-bytes.
Initialize the Cipher instance with the key and parameter type and set the mode to encryption.
cipher.init(Cipher.ENCRYPT_MODE, secretKey, paramSpec);
Pass all the message in and generate the ciphertext.
byte[] ciphertext = cipher.doFinal(message);
Initialize the Cipher instance with the key and parameter type and set the mode to decryption.
cipher.init(Cipher.DECRYPT_MODE, secretKey);
Pass all the ciphertext in and generate the plaintext.
byte[] cleartext = cipher.doFinal(ciphertext);
It also can receive the plaintext/ciphertext segments in, and then generate the ciphertext/plaintext segments.
byte[] input1 = <segment1>;
byte[] input2 = <segment2>;
// Pass the plaintext/ciphertext segments in
byte[] output1 = cipher.update(input1);
byte[] output2 = cipher.update(input2);
// Generate the ciphertext/plaintext segments
byte[] outputFinal = cipher.doFinal();
For the detailed information about Cipher APIs, please refer to the official Cipher docs.