1*e7b1675dSTing-Kang Chang /** 2*e7b1675dSTing-Kang Chang * Copyright 2021 Google LLC 3*e7b1675dSTing-Kang Chang * 4*e7b1675dSTing-Kang Chang * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except 5*e7b1675dSTing-Kang Chang * in compliance with the License. You may obtain a copy of the License at 6*e7b1675dSTing-Kang Chang * 7*e7b1675dSTing-Kang Chang * http://www.apache.org/licenses/LICENSE-2.0 8*e7b1675dSTing-Kang Chang * 9*e7b1675dSTing-Kang Chang * Unless required by applicable law or agreed to in writing, software distributed under the License 10*e7b1675dSTing-Kang Chang * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express 11*e7b1675dSTing-Kang Chang * or implied. See the License for the specific language governing permissions and limitations under 12*e7b1675dSTing-Kang Chang * the License. 13*e7b1675dSTing-Kang Chang */ 14*e7b1675dSTing-Kang Chang // [START envelope-example] 15*e7b1675dSTing-Kang Chang package envelopeaead; 16*e7b1675dSTing-Kang Chang 17*e7b1675dSTing-Kang Chang import static java.nio.charset.StandardCharsets.UTF_8; 18*e7b1675dSTing-Kang Chang 19*e7b1675dSTing-Kang Chang import com.google.crypto.tink.Aead; 20*e7b1675dSTing-Kang Chang import com.google.crypto.tink.KmsClient; 21*e7b1675dSTing-Kang Chang import com.google.crypto.tink.aead.AeadConfig; 22*e7b1675dSTing-Kang Chang import com.google.crypto.tink.aead.KmsEnvelopeAead; 23*e7b1675dSTing-Kang Chang import com.google.crypto.tink.aead.PredefinedAeadParameters; 24*e7b1675dSTing-Kang Chang import com.google.crypto.tink.integration.gcpkms.GcpKmsClient; 25*e7b1675dSTing-Kang Chang import java.io.File; 26*e7b1675dSTing-Kang Chang import java.io.FileOutputStream; 27*e7b1675dSTing-Kang Chang import java.nio.file.Files; 28*e7b1675dSTing-Kang Chang import java.nio.file.Paths; 29*e7b1675dSTing-Kang Chang import java.security.GeneralSecurityException; 30*e7b1675dSTing-Kang Chang 31*e7b1675dSTing-Kang Chang /** 32*e7b1675dSTing-Kang Chang * A command-line utility for encrypting small files with envelope encryption. 33*e7b1675dSTing-Kang Chang * 34*e7b1675dSTing-Kang Chang * <p>It requires the following arguments: 35*e7b1675dSTing-Kang Chang * 36*e7b1675dSTing-Kang Chang * <ul> 37*e7b1675dSTing-Kang Chang * <li>mode: Can be "encrypt" or "decrypt" to encrypt/decrypt the input to the output. 38*e7b1675dSTing-Kang Chang * <li>kek-uri: Use this Cloud KMS' key as the key-encrypting-key for envelope encryption. 39*e7b1675dSTing-Kang Chang * <li>gcp-credential-file: Use this JSON credential file to connect to Cloud KMS. 40*e7b1675dSTing-Kang Chang * <li>input-file: Read the input from this file. 41*e7b1675dSTing-Kang Chang * <li>output-file: Write the result to this file. 42*e7b1675dSTing-Kang Chang * <li>[optional] associated-data: Associated data used for the encryption or decryption. 43*e7b1675dSTing-Kang Chang */ 44*e7b1675dSTing-Kang Chang public final class EnvelopeAeadExample { 45*e7b1675dSTing-Kang Chang private static final String MODE_ENCRYPT = "encrypt"; 46*e7b1675dSTing-Kang Chang private static final String MODE_DECRYPT = "decrypt"; 47*e7b1675dSTing-Kang Chang main(String[] args)48*e7b1675dSTing-Kang Chang public static void main(String[] args) throws Exception { 49*e7b1675dSTing-Kang Chang if (args.length != 5 && args.length != 6) { 50*e7b1675dSTing-Kang Chang System.err.printf("Expected 5 or 6 parameters, got %d\n", args.length); 51*e7b1675dSTing-Kang Chang System.err.println( 52*e7b1675dSTing-Kang Chang "Usage: java EnvelopeAeadExample encrypt/decrypt kek-uri gcp-credential-file" 53*e7b1675dSTing-Kang Chang + " input-file output-file [associated-data]"); 54*e7b1675dSTing-Kang Chang System.exit(1); 55*e7b1675dSTing-Kang Chang } 56*e7b1675dSTing-Kang Chang String mode = args[0]; 57*e7b1675dSTing-Kang Chang String kekUri = args[1]; 58*e7b1675dSTing-Kang Chang String gcpCredentialFilename = args[2]; 59*e7b1675dSTing-Kang Chang byte[] input = Files.readAllBytes(Paths.get(args[3])); 60*e7b1675dSTing-Kang Chang File outputFile = new File(args[4]); 61*e7b1675dSTing-Kang Chang byte[] associatedData = new byte[0]; 62*e7b1675dSTing-Kang Chang if (args.length == 6) { 63*e7b1675dSTing-Kang Chang System.out.println("Associated data!"); 64*e7b1675dSTing-Kang Chang associatedData = args[5].getBytes(UTF_8); 65*e7b1675dSTing-Kang Chang } 66*e7b1675dSTing-Kang Chang // Initialise Tink: register all AEAD key types with the Tink runtime 67*e7b1675dSTing-Kang Chang AeadConfig.register(); 68*e7b1675dSTing-Kang Chang 69*e7b1675dSTing-Kang Chang // Read the GCP credentials and create a remote AEAD object. 70*e7b1675dSTing-Kang Chang Aead remoteAead = null; 71*e7b1675dSTing-Kang Chang try { 72*e7b1675dSTing-Kang Chang KmsClient kmsClient = new GcpKmsClient().withCredentials(gcpCredentialFilename); 73*e7b1675dSTing-Kang Chang remoteAead = kmsClient.getAead(kekUri); 74*e7b1675dSTing-Kang Chang } catch (GeneralSecurityException ex) { 75*e7b1675dSTing-Kang Chang System.err.println("Error initializing GCP client: " + ex); 76*e7b1675dSTing-Kang Chang System.exit(1); 77*e7b1675dSTing-Kang Chang } 78*e7b1675dSTing-Kang Chang 79*e7b1675dSTing-Kang Chang // Create envelope AEAD primitive using AES256 GCM for encrypting the data 80*e7b1675dSTing-Kang Chang Aead aead = KmsEnvelopeAead.create(PredefinedAeadParameters.AES256_GCM, remoteAead); 81*e7b1675dSTing-Kang Chang 82*e7b1675dSTing-Kang Chang // Use the primitive to encrypt/decrypt files. 83*e7b1675dSTing-Kang Chang if (MODE_ENCRYPT.equals(mode)) { 84*e7b1675dSTing-Kang Chang byte[] ciphertext = aead.encrypt(input, associatedData); 85*e7b1675dSTing-Kang Chang try (FileOutputStream stream = new FileOutputStream(outputFile)) { 86*e7b1675dSTing-Kang Chang stream.write(ciphertext); 87*e7b1675dSTing-Kang Chang } 88*e7b1675dSTing-Kang Chang } else if (MODE_DECRYPT.equals(mode)) { 89*e7b1675dSTing-Kang Chang byte[] plaintext = aead.decrypt(input, associatedData); 90*e7b1675dSTing-Kang Chang try (FileOutputStream stream = new FileOutputStream(outputFile)) { 91*e7b1675dSTing-Kang Chang stream.write(plaintext); 92*e7b1675dSTing-Kang Chang } 93*e7b1675dSTing-Kang Chang } else { 94*e7b1675dSTing-Kang Chang System.err.println("The first argument must be either encrypt or decrypt, got: " + mode); 95*e7b1675dSTing-Kang Chang System.exit(1); 96*e7b1675dSTing-Kang Chang } 97*e7b1675dSTing-Kang Chang 98*e7b1675dSTing-Kang Chang System.exit(0); 99*e7b1675dSTing-Kang Chang } 100*e7b1675dSTing-Kang Chang EnvelopeAeadExample()101*e7b1675dSTing-Kang Chang private EnvelopeAeadExample() {} 102*e7b1675dSTing-Kang Chang } 103*e7b1675dSTing-Kang Chang // [END envelope-example] 104