• Lucid Multi-Key Deputies Require Commitment

    This isn’t (necessarily) a security vulnerability; merely an observation that I don’t think has been articulated adequately within the cryptography community.

    I thought it would be worth capturing somewhere public so that others can benefit from a small insight when designing cryptosystems.

    Background

    Once upon a time, there was Symmetric Encryption, which provided confidentiality, but no integrity; and Symmetric Authentication, which provided integrity, but no confidentiality.

    Soon, cryptanalysts realized that, in the digital world, “no integrity” often implies “no confidentiality”, and began to consult various Oracles of arcane nature (Padding, Error, etc.).

    The cryptographers were very cross with this discovery, and proposed several paradigms of combining Encryption and Authentication to prevent adaptive chosen-ciphertext attacks.

    This was called, Authenticated Encryption (AE).

    There were three flavors of AE that cryptographers debated. Moxie Marlinspike attempted to settle this debate with the Cryptographic Doom Principle, which lauded Encrypt then MAC as the safest way to combine the two algorithms.

    However, not all MAC algorithms are created equally. Cryptographers sought fast message authentication algorithms to prevent denial-of-service attacks for encryption in transit. To that end, several fast message authentication codes were proposed, including GHASH (used today in AES-GCM) and Poly1305 (used with ChaCha20).

    Furthermore, cryptographers wanted standardized algorithms that didn’t just authenticate some given ciphertext and nothing else.

    Why? There is an entire class of attack against cryptosystems (which is easier to describe against an Encryption at Rest system than Encryption in Transit) called a Confused Deputy Attack.

    Confused Deputies

    A Confused Deputy can refer to a lot of attacks in computer security. When discussing cryptography, I mostly mean this:

    1. Take two ciphertexts encrypted under the same key. For example, two fields from the same database record, or the same field from two separate records.
    2. Swap them.
    3. Does the application decrypt them without any fuss?

    If so, you can (as a legitimate unprivileged user of a system with read/write access to an otherwise encrypted database) simply swap records around and the application will happily decrypt them for you.

    The application that performs the decryption is the deputy, and it is vulnerable to confusion.

    However, this requires that all fields use the same symmetric key. One mitigation strategy is to derive a per-row or per-field key. Another is to properly use an AEAD mode.

    AEAD Saves the Day

    The context of a message is often important in decisions concerning whether or not it should be decrypted.

    To that end, we don’t have many generic AE constructions that aren’t also AEAD constructions: Authenticated Encryption with Associated Data.

    To protect against confusion, simply include the relevant context (i.e. database primary key and/or field name) as the Additional Associated Data parameter when encrypting or decrypting the record.

    If an attacker tries to fiddle with these values, they will simply fail to decrypt even though the ciphertext is valid.

    Invisible Salamanders

    Much has been written about the Invisible Salamanders problem, so I’ll be brief: It’s easy to, when using fast MAC algorithms like GHASH and Poly1305, construct a situation wherein:

    • Encrypt(k_1, m_1) \rightarrow c_1, t_1
    • Encrypt(k_2, m_2) \rightarrow c_2, t_2
    • c_1 = c_2, t_1 = t_2

    If your intuition for how message authenticators work is “HMAC but fast”, this is astonishing. On the decrypt path, if you can trick multiple parties into using different keys (k_1 for you, k_2 for them), you can trick them into decrypting very different plaintexts without any clue that anything is amiss.

    There are several papers that discuss mitigating this risk, but it almost always involves somehow publishing a commitment of (at least) the key alongside the ciphertext. Any collision-resistant hash function of sufficient length and security can fulfill this purpose.

    For example: If you’re using a Key Derivation Function in your protocol, you might include one more KDF output with a static “info” parameter. On the decrypt path, you would recalculate this from the input key material and compare it with that’s stored (in constant-time!) before proceeding with the normal decrypt procedure.

    Towards Lucid Deputies

    If you’re designing a system that stores encrypted data, and you intend to protect against the types of Confused Deputy attacks described above, there is a hidden trap that you can fall into one of two ways.

    1. If your mitigation strategy involves deriving a distinct key per record (or per field on a record) from one input key
    2. If you’re building a multi-tenant data warehouse where every customer’s data is encrypted under a per-customer key

    (There are some variations of the above scenario that might also be valid, but those are the two primary ones.)

    If you’re using a standard AEAD mode in such a setup (wherein multiple keys are used), and you aren’t including key-commitment in your protocol design, you’re almost certainly prone to Invisible Salamanders.

    The entire reason the Invisible Salamanders attack works is because AEAD modes were designed for the key to be held constant (and secret!) while the nonce, AAD, and plaintext/ciphertext are variable. By making the key variable (and especially by making it attacker-influenced), you’ve exited the scope of the security properties of the algorithms.

    AEAD modes are only vulnerable when the key varies.

    The moment you make your key variable, and you’re only using a naked AEAD mode without any additional overhead? Invisible salamanders.

    Should We Worry?

    The good news: Exploiting this without access to the raw key material isn’t trivial (especially if you use AES-GCM-SIV).

    Even better news: Exploiting this often results in garbage plaintext rather than anything meaningful, which more often leads to errors and crashes than code execution.

    However, it’s still something your cryptographer should keep in mind when you consult them about your encrypted data storage designs.

    (You do have a cryptographer on your payroll, don’t you?)

  • We Need Non-Interactive Post-Quantum KEMs

    Design a system that allows you to encrypt data online, but only decrypt it offline (i.e. in an airgapped environment).

    If you’re in the world of symmetric cryptography, this is impossible. Fortunately, we can use asymmetric cryptography to accomplish this goal.

    In the 2000’s, your design might have looked like this:

    1. Generate a 128-bit random key k.
    2. Encrypt k with an RSA public key p to obtain w.
    3. Encrypt the message m with k, using AES-CBC, to obtain c.
    4. Store w, c for offline decryption, wipe k from memory.

    Since 2015, your approach might have shifted a bit:

    1. Generate an ephemeral ECDH keypair (sk_e, pk_e).
    2. Perform a scalar multiplication of the ephemeral secret key sk_e with the recipient’s public key pk.
    3. Hash the output of step 2 as a 256-bit random key, k.
    4. Encrypt the message m with k, using an AEAD mode, to yield (c, t).
    5. Store (pk_e, c, t) for offline decryption, wipe k from memory.

    Different approaches, different algorithms, but the same workflow works in both cases. We’re using asymmetric cryptography to somehow manage the symmetric key used for actual message encryption. As long as our asymmetric algorithms are secure, and our keys are kept away from attackers, this approach is secure.

    This was made possible because RSA encryption and ECDH key agreement are both non-interactive protocols that operate with static keypairs.

    The CRQC Has Entered the Facility

    Unfortunately, a Cryptography-Relevant Quantum Computer (CRQC) defeats both RSA and ECDH and renders the above algorithms insecure.

    NIST and Post-Quantum Cryptography

    In response to the looming threat of a CRQC, NIST has been working with the cryptography community to standardize post-quantum asymmetric cryptography (KEMs and signature algorithms).

    At the end of Round 3, some algorithms are being standardized and a few more are being studied.

    NIST Post-Quantum Round 3 Finalists

    • KEMs:
      • CRYSTALS-Kyber
    • Signatures:
      • CRYSTALS-Dilithium
      • FALCON
      • SPHINCS+

    NIST Post-Quantum Round 4 Candidates

    • KEMs
      • BIKE
      • Classic McEliece
      • HQC
      • SIKE

    Which KEMs Are Non-Interactive?

    Let’s start with the Round 3 KEM finalist: Kyber. From this document:

    Using IND-CCA2 security by default makes it safe to use Kyber with static keys and as a consequence also to re-use ephemeral keys for some time.

    If you can use Kyber with static keys, it logically follows that you can use Kyber in a non-interactive setting without facing insecurity.

    So, y’know, good job, NIST!

    However, this isn’t true of many Round 4 candidates.

    BIKE

    Key reuse or adapting BIKE to asynchronous protocols (e.g. email) require to secure long term static keys. Those usage models are possible but no longer provides forward secrecy and require IND-CCA security. Note that they are not compliant with BIKE’s current specification.

    BIKE Specification

    Static keys are a no-go with BIKE.

    Classic McEliece

    The cryptanalysis literature is unclear on the security of Classic McEliece with static keys, but the authors claim IND-CCA2.

    However, the enormous public key sizes make it less attractive than alternatives.

    HQC

    Static keys are discussed briefly by the specification, but there are attacks against static keys against HQC and BIKE.

    SIKE

    You should not use SIKE with static keys.

    Considerations for Round 4 and Beyond

    Although it’s currently believed that CRYSTALS-Kyber is sufficient for non-interactive use cases, we’re putting a lot of eggs in one basket.

    If Kyber is ever broken by cryptanalytic advancement, then we will need to ensure the alternatives we consider aren’t limited to the TLS use-case.

    As it stands today, Classic McEliece is the only Round 4 candidate that might be safe for these use cases if Kyber is broken.

    Do We Really Need Offline Decryption?

    Yes, and for reasons beyond keeping email encryption on life support.

    A lot of systems implement this today with RSA. You’re leaving a lot of commercial use-cases in the dark if you don’t support non-interactive key exchanges in your scope.

    Post-Quantum security is important for TLS, and I don’t want to diminish the work that’s been done already, but it’s not important for only TLS.

  • Toward Hybrid Post-Quantum Signatures

    Toward Hybrid Post-Quantum Signatures

    The state-of-the-art digital signature algorithm, which is widely used and widely recommended by cryptography and security experts, is Ed25519.

    Ed25519 is a specific type of an algorithm called EdDSA, instantiated over the edwards25519 elliptic curve. The other standard of EdDSA is Ed448.

    EdDSA was created in response to security issues that plagued the incumbent elliptic curve signature algorithm (ECDSA). Overall, it greatly improved the security of elliptic curve signatures across the Internet. Consequently, many things use Ed25519.

    Of course, Ed25519 isn’t perfect. Here’s just a few ways to make Ed25519 insecure.

    Double Public Key Vulnerability

    If you develop a cryptography library that feeds in an Ed25519 secret key and an Ed25519 public key as distinct inputs, and an attacker can ever influence the choice of the public key input, you can leak the secret key.

    Mitigation

    Treat Ed25519 secret keys as the tuple of (secret seed, public key) rather than independent inputs. This is what NaCl and libsodium do.

    For high-level protocols and libraries, consider validating that the public key portion is the correct public key for a given seed. You don’t necessarily have to do this by default (since it costs an extra scalar multiplication), but exposing the API can mitigate against this sort of key-leaking misuse.

    Fault Attacks

    In embedded systems, you can also use hardware faults to exploit the deterministic nature of Ed25519 to leak the secret key.

    Kudelski Security’s article (linked above) does a phenomenal job explaining this attack vector. I won’t belabor the point here.

    Mitigations

    The simplest way to mitigate fault attacks is to make it non-deterministic, but that puts back into ECDSA insecurity territory.

    An improved strategy is to implement so-called “hedged signatures“: Keep the determinism, but inject additional randomness to the process. In the event of a random number generator failure, this additional randomness is at least as secure as deterministic algorithms.

    However, this path is fraught with patent peril.

    Cryptography-Relevant Quantum Computers

    If you have a cryptography-relevant quantum computer, Ed25519 (and, indeed, all other ECC algorithms in use today that aren’t based on supersingular isogeny math) are rendered completely insecure.

    Mitigation

    Use post-quantum cryptography.

    Hybrid Post-Quantum Cryptography

    Post-Quantum Cryptography

    NIST recently selected its Round 3 finalists for post-quantum cryptography, while several other candidates moved onto the 4th round for further cryptanalysis.

    However, if you’re an attacker, the first round of “real” cryptanalysis begins once the algorithm has become a standard. (Why waste time on a losing candidate?)

    Additionally, we don’t know if or when a cryptography-relevant quantum computer will be developed. It could be 10 years away, it could be 100.

    When confronted with extremely abstract risks, it’s often difficult to establish the direction of the inequality operator.

    Split the Room from Jackbox

    What’s more likely to happen first?

    • The arrival of a cryptography-relevant quantum computer, OR
    • An advancement in cryptanalysis that breaks the standardized algorithm

    Why Not Both?

    Hybrid post-quantum cryptography, while controversial, is a straightforward solution to the uncertainty and ambiguity of the risks involved.

    Hybrid Post-Quantum KEMs

    The idea here is simple: Perform multiple independent asymmetric key encapsulations, then feed both values into a key derivation function.

    For example:

    function hybridKeyExchange(
      sk1: X25519SecretKey, 
      sk2: KyberSecretKey,
      pk1: X25519PublicKey,
      pk2: KyberPublicKey
    ): CryptoKey {
      const ikm1: Buffer = crypto_kem_x25519(sk1, pk1)
      const ikm2: Buffer = crypto_kem_kyber76890s(sk2, pk2)
      return new CryptoKey(crypto_kdf_hkdfhmacsha384(
        ikm = Buffer.concat([ikm1, ikm2]),
        salt = NULL,
        info = PROTOCOL_DOMAIN_SEPARATION_CONSTANT,
        length = 32
      ))
    }
    

    Hybrid Post-Quantum Signatures

    Same idea, but instead of feeding both values into another operation, you simply append the two together.

    function hybridSign(
      message: Buffer,
      sk1: Ed25519SecretKey, 
      sk2: DilithiumSecretKey,
      pk1: Ed25519PublicKey,
      pk2: DilithiumPublicKey
    ): Buffer {
      const sign1: Buffer = crypto_sign_ed25519(sk1, message)
      const sign2: Buffer = crypto_sign_dilithium3(sk2, message)
      return Buffer.concat([sign1, sign2])
    }
    
    function hybridVerify(
      message: Buffer,
      signature: Buffer,
      pk1: Ed25519PublicKey,
      pk2: DilithiumPublicKey
    ): boolean {
      const sign1: Buffer = signature.slice(0, 64)
      const sign2: Buffer = signature.slice(64)
      const valid1: boolean = crypto_sign_verify_ed25519(pk1, message)
      const valid2: boolean = crypto_sign_verify_dilithium3(pk2, message)
      return (valid1 && valid2)
    }
    

    This works, but I think we can do a little better.

    Hedging Your Hybrid Signatures

    If the cryptography community ever decides that hybrid signatures are the way to go (as opposed to a direct migration towards post-quantum signatures without any classical counterparts), why not also mitigate EdDSA’s fault attacks and misuse-prone APIs while we’re at it?

    To avoid the semi-deterministic digital signature patent (which directly affects the construction of the “nonce”), we can simply use deterministic signatures as-is, but simply prepend 32 random bytes to the actual “message” that Ed25519 sees. These same random bytes will simply be appended to the Ed25519 signature (which is now 96 bytes, from the API perspective).

    This is the best of many worlds:

    • If your RNG fails, you still have the security properties of a deterministic signature algorithm.
    • Fault attack mitigations are baked-in.

    To satisfy the misuse-prone API requirement, simply add a MUST to the specifications for the mitigation discussed above.

    However, it does come at the cost of extra bandwidth. Compared to post-quantum signatures, this extra bandwidth isn’t much, but it’s nonzero.

    In Summary

    If we ever explore the standardization of hybrid approaches, we should also consider choosing hedged classical signature algorithms (deterministic with additional randomness), instead of non-hedged classical signature algorithms.

    In most applications, the extra bandwidth is a small price to pay for better security across a myriad use-cases.

  • Police CyberAlarm Uses Alarming Cryptography

    Today we’re going to be talking about this code, shared on Twitter by Paul Moore.

    It’s worth noting that this code snippet was after Paul attempted to alert them to security issues with the previous iteration of their encryption software, which looked like this:

    If you’re interested in a deeper dive into the insecurity of their software, Paul published a series of posts about this topic.

    I’m not going to be as harsh as Paul–not out of any particular sentiment towards law enforcement, but because there’s enough vitriol in the security industry. I don’t feel like joining the incumbent tone or risk making a neophyte’s impostor syndrome worse than it already is.

    The Code in Question

    I have transcribed their source code from the screenshot on Twitter below.

    <?php
    
    function pervade_encrypt($data)
    {
        $encryption_key = (defined('NEW_PERVADE_KEY') ? NEW_PERVADE_KEY : PERVADE_KEY);
        $iv = openssl_random_pseudo_bytes(openssl_cipher_iv_length('aes-256-cbc'), $csprng_check);
    
        while((strpos($iv, '::') !== false) || !$csprng_check) {
            $iv = openssl_random_pseudo_bytes(openssl_cipher_iv_length('aes-256-cbc'), $csprng_check);
        }
    
        $encrypted = openssl_encrypt($data, 'aes-256-cbc', $encryption_key, 0, $iv);
        $length = strlen($encrypted);
        $hash = hash_hmac('sha256', $encrypted . $iv, $encryption_key);
        return base64_encode($encrypted . '::' . $length . '-' . $hash . '::' . $iv);
    }
    
    function pervade_decrypt($data)
    {
        $encryption_key = (defined('NEW_PERVADE_KEY') ? NEW_PERVADE_KEY : PERVADE_KEY);
        $exp = explode('::', base64_decode($data), 3);
    
        if (isset($exp[2])) {
            $encrypted_data = $exp[0];
            $length = $exp[1];
            $iv = $exp[2];
            $lenexp = explode('-', $length);
    
            if (isset($lenexp[1])) {
                $hmac = str_replace($lenexp[0] . '-', '', $length);
                $length = $lenexp[0];
            }
            else {
                $hmac = hash_hmac('sha256', $encrypted_data . $iv, $encryption_key);
            }
    
            $hashcheck = hash_hmac('sha256', $encrypted_data . $iv, $encryption_key);
            if ((strlen($encrypted_data) == $length) && ($hmac == $hashcheck)) {
                return @openssl_decrypt($encrypted_data, 'aes-256-cbc', $encryption_key, 0, $iv);
            }
        }
        else if (isset($exp[1])) {
            $encrypted_data = $exp[0];
            $iv = $exp[1];
            return @openssl_decrypt($encrypted_data, 'aes-256-cbc', $encryption_key, 0, $iv);
        }
    }
    

    If you’re interested in Paul’s challenge, take a moment to read this PHP code carefully and see if you can spot the flaws. There’s more than one.


    How to Review Cryptographic Protocols

    Whenever you are confronted with a novel cryptographic implementation (be it a custom protocol or a greenfield implementation of a standard design), always start with the reader, not the writer.

    • With encryption, this means starting with the decrypt function.
    • With digital signatures or symmetric authenticators, this means starting with the verify function.

    The reasoning is simple: In most threat models, attackers have control over the data being fed into the reader. This lets them perform far more impactful attacks (e.g. padding oracle attacks) than passing information to the writer would reveal (i.e. chosen-plaintext attacks, which overwhelmingly aren’t relevant for protocols that use standard cryptographic algorithms; i.e. AES).

    In this case, the pervade_decrypt() function is clearly written in order to support a data format migration from the original implementation to the new format.

    To their credit, pervade_encrypt() only writes the new format, so they clearly intended to retire the old message format eventually. However, they never took the time to learn the proper way to handle cryptographic migrations.

    Vulnerabilities in the Decrypt Function

    Downgrade Attack

    Take an encrypted message that you’re interested in decrypting.

    Zis1Q2FkbFVmYzRJbEMwczc0MWdyTFdvSWtGbWp3dkVMT0d6MVp2Q1lWST06OjQ0LThlODI2ZTFiZDVjZDM1YmYwZmQ5MzlkYmM5NDZlNjk4MzA0ZTIzN2FhMWI0ZTIyOTA4Mzk2MGI0ZjA5MThhOGE6OgVzUPsnsRFbrFySXaWdNt0=

    Base64-decode it. Remove the value between the first :: and the second :: (including one of the separators).

    Re-encode it with base64, then feed this altered message into the system.

    Zis1Q2FkbFVmYzRJbEMwczc0MWdyTFdvSWtGbWp3dkVMT0d6MVp2Q1lWST06OgVzUPsnsRFbrFySXaWdNt0=

    Exploit Code

    function exploit1(string $chosen): string {
        $pieces = explode('::', base64_decode($chosen));
        unset($pieces[1]);
        return base64_encode(implode('::', $pieces));
    }
    

    Now you’ve successfully downgraded the message to the legacy format, which didn’t provide any authentication over the ciphertext.

    Update (2022-07-05): Actually, this story is worse than I thought.

    HMAC Verification Bypass

    Take an encrypted message that you’re interested in decrypting.

    Zis1Q2FkbFVmYzRJbEMwczc0MWdyTFdvSWtGbWp3dkVMT0d6MVp2Q1lWST06OjQ0LThlODI2ZTFiZDVjZDM1YmYwZmQ5MzlkYmM5NDZlNjk4MzA0ZTIzN2FhMWI0ZTIyOTA4Mzk2MGI0ZjA5MThhOGE6OgVzUPsnsRFbrFySXaWdNt0=

    Base64-decode it. After the first ::, remove the length of the message and the hyphen.

    Zis1Q2FkbFVmYzRJbEMwczc0MWdyTFdvSWtGbWp3dkVMT0d6MVp2Q1lWST06OjQ0LThlODI2ZTFiZDVjZDM1YmYwZmQ5MzlkYmM5NDZlNjk4MzA0ZTIzN2FhMWI0ZTIyOTA4Mzk2MGI0ZjA5MThhOGE6OgVzUPsnsRFbrFySXaWdNt0=

    Exploit Code

    function exploit2(string $chosen): string {
        $pieces = explode('::', base64_decode($chosen));
    	$pieces[1] = preg_replace('/^\-+/', '', $pieces[1]);
        return base64_encode(implode('::', $pieces));
    }
    

    Why does this work?

    Because this will put your verification logic into a separate branch that will compare the HMAC it computes… against the HMAC it computes, rather than the one provided.

    $lenexp = explode('-', $length);
    // If this isset() call returns FALSE...
    if (isset($lenexp[1])) {
        $hmac = str_replace($lenexp[0] . '-', '', $length);
        $length = $lenexp[0];
    }
    else {
         // ...then the value of $hmac...
         $hmac = hash_hmac('sha256', $encrypted_data . $iv, $encryption_key);
    }
    // ...will always be equal to $hashcheck
    $hashcheck = hash_hmac('sha256', $encrypted_data . $iv, $encryption_key);
    if ((strlen($encrypted_data) == $length) && ($hmac == $hashcheck)) {
        return @openssl_decrypt($encrypted_data, 'aes-256-cbc', $encryption_key, 0, $iv);
    }
    

    With this method, we can completely bypass the HMAC check without stripping the HMAC off the message. Removing the length prefix is sufficient to defeat this security control.

    Padding Oracle Attack on AES-CBC Decryption

    Using either of the two methods, with the HMAC check completely bypassed, you’ve reduced the security of this construction to unauthenticated AES-CBC mode, which is vulnerable to a Padding Oracle Attack.

    To exploit the padding oracle attack against pervade_decrypt(), you need the ability to provide a modified ciphertext to their application. When a padding error occurs, pervade_decrypt() will return false instead of a string value, so you also need some observable behavioral change (e.g. as simple as a page load time difference) to leak this information back to the attacker.

    Timing Attack on HMAC Validation

    Not that it matters much, since you can just bypass the security control entirely, but == is not the correct way to compare hash function outputs.

    You want hash_equals() instead.

    Confused Deputy Attack

    Modern encryption-at-rest software allows users to specify some Additional Authenticated Data to prevent ciphertexts from being reordered or replayed in an incorrect context.

    The encryption used by Police CyberAlarm doesn’t expose an Additional Authenticated Data mechanism. All fields are also encrypted with the same, static, hard-coded key.

    Imagine a situation where a user’s ZIP code and legal name are encrypted with pervade_encrypt(). You, as an attacker, have access to the database, but not to the source code.

    You also have a limited access user account that lets you view zip codes in a directory listing, but not legal name.

    To exploit this, simply overwrite the user’s zip_code field with their encrypted legal_name field and refresh your directory listing. Bob’s your uncle.

    To mitigate confused deputy attacks, an AEAD construction is recommended.

    It’s also possible to implement a custom protocol using AES-CBC and HMAC-SHA256 that includes AAD support, but extra care must be taken to prevent canonicalization attacks.

    Other Cryptography Design Flaws

    Using the Same Key for Multiple Algorithms

    Police CyberAlarm uses the same encryption key for both AES-CBC encryption and for HMAC-SHA256. This violates one of the tenets of cryptography protocol design: Never use the same key for more than one purpose.

    If you ever fail to uphold this tenet, you introduce the risk of related key and cross-protocol attacks in your application. While this isn’t currently known to be exploitable with AES and HMAC, it is very much exploitable in some setups using AES and CBC-MAC.

    Instead of reusing $encryption_key for both openssl_encrypt() and hash_hmac(), the correct thing to do is use a key derivation function (i.e. HKDF) to split the incoming key into two different keys: One for encryption, the other for authentication.

    $ikm = (defined('NEW_PERVADE_KEY') ? NEW_PERVADE_KEY : PERVADE_KEY);
    $encryption_key = hash_hkdf('sha256', $ikm, 32, 'encryption');
    $hmac_key = hash_hkdf('sha256', $ikm, 32, 'hmac');
    

    OpenSSL CSPRNG Check Infinite Loop

    If this code sets $csprng_check to false, you will DoS your own application.

    $iv = openssl_random_pseudo_bytes(openssl_cipher_iv_length('aes-256-cbc'), $csprng_check);
    
    while((strpos($iv, '::') !== false) || !$csprng_check) {
        $iv = openssl_random_pseudo_bytes(openssl_cipher_iv_length('aes-256-cbc'), $csprng_check);
    

    The reason is subtle: $csprng_check is kind of a useless feature. It’s vestigal to OpenSSL’s RAND_pseudo_bytes() API. In PHP, if the value is ever set to false, it will continue to be false for the duration of the process.

    It’s also a superfluous check: If OpenSSL’s RNG is insecure (i.e. the Debian weak key debacle), would you trust OpenSSL to be aware of its insecurity?

    If you’re not familiar with PHP’s OpenSSL extension, you might be tempted to say, “You didn’t understand the purpose of this loop! It’s just meant to prevent a separator (::) from appearing in the random IV,” but this is what the code is actually doing:

    1. Generate 16 random bytes from OpenSSL’s fork-unsafe API, setting the value of $csprng_check to a boolean (passed by-reference).
    2. If the random bytes contain a :: separator -OR- $csprng_check is false: Go back to step 1.

    Regardless of what the authors may have intended, the effect of their code is that it’s doing both what I said and what you said.

    And since $csprng_check will remain false forever, this creates an infinite loop.

    Recommendation

    You want random_bytes() here. For PHP 5, paragonie/random_compat.

    With random_bytes(), if the RNG fails, an Exception will be thrown. This will fail closed and prevent the application from proceeding with insecure randomness.

    Summary

    The cryptography used by Police CyberAlarm is not secure and should be replaced with something more secure.

    A much better implementation is ext/sodium (PHP 7.2+) or paragonie/sodium_compat (PHP 5.2+) provides the NaCl/libsodium default that other experts recommend. To get started, refer to this Quick Reference page.

    Alternatively, defuse/php-encryption supports PHP 5 and provides authenticated encryption.

    Update (2022-07-05)

    u/disclosure5 points out:

    Ahh but if the server supports the new key (defined('NEW_PERVADE_KEY')) it’ll only ever use it, so it can’t actually decrypt legacy messages even if it supports the packing format used with the older key.

    The problem with looking at a fractal of incorrectness is that you’re liable to overlook an element of what they got wrong.

    They will never use the old key to decrypt data, so any notion of supporting a legacy message format is, therefore, moot. They could have simply enforced the HMAC entirely.

Blog at WordPress.com.