Hello,

I try to understand the encryption of a private rsa key. It was generated
with

> openssl genpkey -aes-256-cbc -algorithm rsa -out mykey.enc
    -pkeyopt rsa_keygen_bits:2048

(pw: 'admin', file attached)

according to pkcs#8 the result is

EncryptedPrivateKeyInfo ::= SEQUENCE {
    encryptionAlgorithm AlgorithmIdentifier {{KeyEncryptionAlgorithms}},
    encryptedData EncryptedData
}

parsing through 'encryptionAlgorithm' i got

> openssl asn1parse - in mykey.enc -strparse 4
0: d=0 hl=2 l=73 cons : SEQUENCE
2: d=1 hl=2 l=9 prim : OBJECT: PBES2
13: d=1 hl=2 l=60 cons : SEQUENCE
15: d=2 hl=2 l=27 cons : SEQUENCE
17: d=3 hl=2 l=9 prim :OBJECT: PBKDF2
28: d=3 hl=2 l=14 cons :SEQUENCE
30: d=4 hl=2 l=8 prim :OCTET STRING
    [ HEX DUMP ]:7C4B1587B12A7705
40: d=4 hl=2 l=2 prim :INTEGER: 0800
44: d=2 hl=2 l= 29 cons :SEQUENCE
46: d=3 hl=2 l=9 prim :OBJECT :aes-256-cbc
57: d=3 hl=2 l=16 prim :OCTET STRING
    [ HEX DUMP ]: 4850BA5F76BA9CD5574F0121D8C0C657.

as i understood the rare documenation, offset 30 is the salt for PBKDF2
and offset 57 is the IV for aes.

as result of PKCS5_PBKDF2_HMAC_SHA1 fed with the salt from above,
pw:'admin' and ic:2048 (offset 40 above) i got:

K  = dc55f54889fe64153fb1b181e89ec5c08a864ef5f777d6aa1d0be9ff82dd8b3a
iv = 11be3aafd0768fd9fdbc7880936ad2c4

decryption with this key (and any of those ivs) fails.

How can i reproduce the data in offset 57? if its really an iv why is it
written explicitly if it could be calculated a result of PBKDF2?

Does anyone have some hints?

  thanks a lot..  stephan

Attachment: mykey.enc
Description: Binary data

Reply via email to