I'm trying to encrypt a payload starting from a password using Bouncy Castle 1.58 (org.bouncycastle:bcprov-jdk15on:1.58):
import org.bouncycastle.jce.provider.BouncyCastleProvider;
import javax.crypto.Cipher;
import javax.crypto.SecretKey;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.PBEKeySpec;
import javax.crypto.spec.PBEParameterSpec;
import java.security.SecureRandom;
import java.security.Security;
public class Scratch {
public static void main(String[] args) throws Exception {
Security.addProvider(new BouncyCastleProvider());
String password = "password";
SecureRandom randomGenerator = new SecureRandom();
byte[] salt = randomGenerator.generateSeed(256);
PBEKeySpec keySpec = new PBEKeySpec(password.toCharArray(), salt, 65536, 32);
SecretKeyFactory f = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1");
SecretKey passwordKey = f.generateSecret(keySpec);
Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding", "BC");
PBEParameterSpec parSpec = new PBEParameterSpec(salt, 65536);
cipher.init(Cipher.ENCRYPT_MODE, passwordKey, parSpec);
}
}
and this is the error I get:
Exception in thread "main" org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher$InvalidKeyOrParametersException: Key length not 128/192/256 bits.
at org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineInit(Unknown Source)
at javax.crypto.Cipher.init(Cipher.java:1394)
at javax.crypto.Cipher.init(Cipher.java:1327)
at tech.dashman.dashman.Scratch.main(Scratch.java:30)
Caused by: java.lang.IllegalArgumentException: Key length not 128/192/256 bits.
at org.bouncycastle.crypto.engines.AESEngine.generateWorkingKey(Unknown Source)
at org.bouncycastle.crypto.engines.AESEngine.init(Unknown Source)
at org.bouncycastle.crypto.modes.GCMBlockCipher.init(Unknown Source)
at org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher$AEADGenericBlockCipher.init(Unknown Source)
... 4 more
If I change the key length in the call to PBKeySpec to 256, like this:
import org.bouncycastle.jce.provider.BouncyCastleProvider;
import javax.crypto.Cipher;
import javax.crypto.SecretKey;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.PBEKeySpec;
import javax.crypto.spec.PBEParameterSpec;
import java.security.SecureRandom;
import java.security.Security;
public class Scratch {
public static void main(String[] args) throws Exception {
Security.addProvider(new BouncyCastleProvider());
String password = "password";
SecureRandom randomGenerator = new SecureRandom();
byte[] salt = randomGenerator.generateSeed(256);
PBEKeySpec keySpec = new PBEKeySpec(password.toCharArray(), salt, 65536, 256);
SecretKeyFactory f = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1");
SecretKey passwordKey = f.generateSecret(keySpec);
Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding", "BC");
PBEParameterSpec parSpec = new PBEParameterSpec(salt, 65536);
cipher.init(Cipher.ENCRYPT_MODE, passwordKey, parSpec);
}
}
then I get this error:
Exception in thread "main" java.security.InvalidKeyException: Illegal key size
at javax.crypto.Cipher.checkCryptoPerm(Cipher.java:1039)
at javax.crypto.Cipher.init(Cipher.java:1393)
at javax.crypto.Cipher.init(Cipher.java:1327)
at tech.dashman.dashman.Scratch.main(Scratch.java:29)
What am I missing here? What size should be the key?