Skip to content

Latest commit

 

History

History
48 lines (34 loc) · 3.42 KB

README.md

File metadata and controls

48 lines (34 loc) · 3.42 KB

TR31Keyblock

Creates Ansi X9.24 TR31 key blocks taking inputs of the Key Block Protection Key (KBPK) and the clear key.

This is the Java implementation of work done here https://github.com/peterfillmore/pyTR31. It was used as a starting point and the spec was eventually implemented. Python files are also available in the python folder in the repo and work with python 2.7.

The original python implementation is dated and incomplete (understandably, as it's 8+ years old).

This code implements TR31 keyblock types

  1. A :VARIANT BINDING
  2. B :TDEA KEY DERIVATION BINDING
    1. Double length 128 bits KBPK
    2. Triple length 192 bits KBPK
  3. C :TDEA KEY VARIANT BINDING
  4. D : AES KEY DERIVATION
    1. 128 bits KBPK
    2. 192 bits KBPK
    3. 256 bits KBPK

There is a validation implementation, when you get an encrypted keyblock and a KBPK and need to validate the TR31 keyblock received. It will generate all keys for the KBPK supplied, extract the clear key from the TR31 keyblock, generate the MAC from the encrypted block and compare it to the one received.

The Main.java has tests for the various keyblock and key length combinations and is the best place to start and step through the code to understand its inner working.

This keyblocks generated have been tested with the EFTLABS BP-tools simulator by generating the keyblock using the code and pasting the output of (header+encryptedkey+mac) into the simulator to see if it can parse it and show you the clear key that you had encrypted. EFTLAB BP-TOOLS was also used to generate keyblocks and used for validity testing in the code. The samples provided in the ANSI X9 TR 31-2018 have been tested and outputs matched.

The code does padding of the pan, it uses 0x0 to pad (spec says use random values). Byte 0x0 was used to make it deterministic for every run, it can be easily changed to populate the padding array with a secure random generation. Also, the EFTLAB tool uses random bytes, so it may appear the data is not consistent when compared to the code's output as it will vary for each time you generate the keyblock for the same keys. As long as the clear key is fine, and the MAC can be validated, you are good.

EFTLABS tool used to be freely available, but now its licence has changed, and you need to fill out a form requesting it. I haven't received any response after filling out the form to download an updated version of their tool.

Usecase

  1. You need to receive a known TR31 keyblock from an external entity.
  2. You need to send a known TR31 keyblock to an external entity.
  3. Implement functionality in your HSM emulator to generate TR31 keyblock. (either you don't have access to an HSM that can do this for you or your HSM doesn't have the licences required from the vendor for this functionality.)
  4. Useful for local internal testing. (Never use this in production.)

Note :

Currently, optional header blocks are not supported. Thales keyblock is work in progress. Currently, Thales DES keyblock is supported. Thales AES keyblock is not working.

Useful documents to refer to

  1. Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
  2. NIST SP 800-108 Recommendation for Key Derivation Using Pseudorandom Functions (Revised)
  3. ASC X9 TR 31-2018 (purchase required from ANSI store).