File Viewer, Part 5
Handling a particular form of encryption in the
FileDumper
program is not hard. Handling the
general case is not. It’s not that decryption is difficult. In
fact, it’s quite easy. However, most encryption schemes require
more than simply providing a key. You also need to know an assortment
of algorithm parameters, like initialization vector, salt, iteration
count, and more. Higher-level protocols are usually used to pass this
information between the encryption program and the decryption
program. The most common type of protocol is to simply store the
information unencrypted at the beginning of the encrypted file. You
saw an example of this in the FileDecryptor
and
FileEncryptor
programs. The
FileEncryptor
chose a random initialization vector
and placed its length and the vector itself at the beginning of the
encrypted file so the decryptor could easily find it.
For the next iteration of the FileDumper
program,
I am going to use the simplest available encryption scheme, DES in
ECB mode with PKCS5Padding. Furthermore, the key will simply be the
first eight bytes of the password. This is probably the least secure
algorithm discussed in this chapter; however, it doesn’t
require an initialization vector, salt, or other meta-information to
be passed between the encryptor and the decryptor. Because of the
nature of filter streams, it is relatively straightforward to add
decryption services to the FileDumper
program, assuming you know the format in which the encrypted ...
Get Java I/O now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.