14.9.1 Problem
14.9.2 Solution
Store the additional information required to decrypt the data
(such as algorithm, cipher mode, and initialization vector) along with the
encrypted information, but not the key:
// encrypt data
$alg = MCRYPT_BLOWFISH;
$mode = MCRYPT_MODE_CBC;
$iv = mcrypt_create_iv(mcrypt_get_iv_size($alg,$mode),MCRYPT_DEV_URANDOM);
$ciphertext = mcrypt_encrypt($alg,$_REQUEST['key'],$_REQUEST['data'],$mode,$iv);
// save encrypted data
$dbh->query('INSERT INTO noc_list (algorithm,mode,iv,data) values (?,?,?,?)',
array($alg,$mode,$iv,$ciphertext));
To decrypt, retrieve a key from the user and use it with the
saved data:
$row = $dbh->getRow('SELECT * FROM noc_list WHERE id = 27');
$plaintext = mcrypt_decrypt($row->algorithm,$_REQUEST['key'],$row->data,
$row->mode,$row->iv);
14.9.3 Discussion
Example 14-2. save-crypt.php
function show_form() {
print<<<_FORM_
<form method="post" action="$_SERVER[PHP_SELF]">
<textarea name="data" rows="10" cols="40">
Enter data to be encrypted here.
</textarea>
<br>
Encryption Key: <input type="text" name="key">
<input name="submit" type="submit" value="save">
</form>
_FORM_;
}
function save_form() {
$alg = MCRYPT_BLOWFISH;
$mode = MCRYPT_MODE_CBC;
// encrypt data
$iv = mcrypt_create_iv(mcrypt_get_iv_size($alg,$mode),MCRYPT_DEV_URANDOM);
$ciphertext = mcrypt_encrypt($alg, $_REQUEST['key'],
$_REQUEST['data'], $mode, $iv);
// save encrypted data
$filename = tempnam('/tmp','enc') or die($php_errormsg);
$fh = fopen($filename,'w') or die($php_errormsg);
if (false === fwrite($fh,$iv.$ciphertext)) {
fclose($fh);
die($php_errormsg);
}
fclose($fh) or die($php_errormsg);
return $filename;
}
if ($_REQUEST['submit']) {
$file = save_form();
print "Encrypted data saved to file: $file";
} else {
show_form();
}
Example 14-3
shows the corresponding program, get-crypt.php , that
accepts a filename and key and produces the decrypted data.
Example 14-3. get-crypt.php
function show_form() {
print<<<_FORM_
<form method="post" action="$_SERVER[PHP_SELF]">
Encrypted File: <input type="text" name="file">
<br>
Encryption Key: <input type="text" name="key">
<input name="submit" type="submit" value="display">
</form>
_FORM_;
}
function display() {
$alg = MCRYPT_BLOWFISH;
$mode = MCRYPT_MODE_CBC;
$fh = fopen($_REQUEST['file'],'r') or die($php_errormsg);
$iv = fread($fh,mcrypt_get_iv_size($alg,$mode));
$ciphertext = fread($fh,filesize($_REQUEST['file']));
fclose($fh);
$plaintext = mcrypt_decrypt($alg,$_REQUEST['key'],$ciphertext,$mode,$iv);
print "<pre>$plaintext</pre>";
}
if ($_REQUEST['submit']) {
display();
} else {
show_form();
}
These two programs have their encryption algorithm and mode hardcoded in them, so there's no need to store this
information in the file. The file consists of the initialization vector
immediately followed by the encrypted data. There's no need for a delimiter
after the initialization vector (IV), because
mcrypt_get_iv_size( ) returns exactly how many
bytes the decryption program needs to read to get the whole IV. Everything after
that in the file is encrypted data.
Encrypting files using the method in this recipe offers
protection if an attacker gains access to the server on which the files are
stored. Without the appropriate key or tremendous amounts of computing power,
the attacker won't be able to read the files. However, the security that these
encrypted file provides is undercut if the data to be encrypted and the
encryption keys travel between your server and your users' web browsers in the
clear. Someone who can intercept or monitor network traffic can see data before
it even gets encrypted. To prevent this kind of eavesdropping, use SSL.
An additional risk when your web server
encrypts data as in this recipe comes from how the data is visible before it's
encrypted and written to a file. Someone with root or administrator access to
the server can look in the memory the web server process is using and snoop on
the unencrypted data and the key. If the operating system swaps the memory image
of the web server process to disk, the unencrypted data might also be accessible
in this swap file. This kind of attack can be difficult to pull off but can be
devastating. Once the encrypted data is in a file, it's unreadable even to an
attacker with root access to the web server, but if the attacker can peek at the
unencrypted data before it's in that file, the encryption offers little
protection.