from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.primitives import constant_time
from cryptography.hazmat.backends import default_backend
import os
import binascii
# ===============================
# AES-192-GCM 加密函数
# ===============================
def aes_192_gcm_encrypt(key: bytes, plaintext: bytes, associated_data: bytes = b""):
"""
使用 AES-192-GCM 进行加密
:param key: 24 字节密钥
:param plaintext: 明文数据
:param associated_data: 附加认证数据(可选)
:return: (nonce, ciphertext, tag)
"""
if len(key) != 24:
raise ValueError("AES-192 需要 24 字节密钥")
# 生成 12 字节随机 nonce(GCM 推荐长度)
nonce = os.urandom(12)
encryptor = Cipher(
algorithms.AES(key),
modes.GCM(nonce),
backend=default_backend()
).encryptor()
# 添加 AAD(可选)
encryptor.authenticate_additional_data(associated_data)
# 执行加密
ciphertext = encryptor.update(plaintext) + encryptor.finalize()
# 返回 nonce、密文、tag
return nonce, ciphertext, encryptor.tag
# ===============================
# AES-192-GCM 解密函数
# ===============================
def aes_192_gcm_decrypt(key: bytes, nonce: bytes, tag: bytes, ciphertext: bytes, associated_data: bytes = b""):
"""
使用 AES-192-GCM 进行解密
:param key: 24 字节密钥
:param nonce: 加密时的随机 nonce
:param tag: GCM 认证标签
:param ciphertext: 密文数据
:param associated_data: 附加认证数据(可选)
:return: plaintext
"""
decryptor = Cipher(
algorithms.AES(key),
modes.GCM(nonce, tag),
backend=default_backend()
).decryptor()
decryptor.authenticate_additional_data(associated_data)
# 执行解密
plaintext = decryptor.update(ciphertext) + decryptor.finalize()
return plaintext
# ===============================
# 示例测试
# ===============================
if __name__ == "__main__":
key_hex = "35FE9BD1DFF7FD1939382935F4AEEF62E2C7895D8F441305"
key = bytes.fromhex(key_hex)
plaintext = b"Hello, AES-192-GCM Encryption!"
aad = b"optional_authenticated_data"
print("原文:", plaintext)
# 加密
nonce, ciphertext, tag = aes_192_gcm_encrypt(key, plaintext, aad)
print("Nonce:", nonce.hex())
print("Ciphertext:", ciphertext.hex())
print("Tag:", tag.hex())
# 解密
decrypted = aes_192_gcm_decrypt(key, nonce, tag, ciphertext, aad)
print("解密结果:", decrypted)
# 校验
print("是否一致:", constant_time.bytes_eq(plaintext, decrypted))
PC微信协议之AES-192-GCM算法
AiXed2025-11-17 2:04
相关推荐
NineData2 小时前
NineData 迁移评估功能正式上线万少2 小时前
HarmonyOS 开发必会 5 种 Builder 详解橙序员小站4 小时前
Agent Skill 是什么?一文讲透 Agent Skill 的设计与实现炫饭第一名7 小时前
速通Canvas指北🦮——基础入门篇NineData7 小时前
数据库迁移总踩坑?用 NineData 迁移评估,提前识别所有兼容性风险王晓枫7 小时前
flutter接入三方库运行报错:Error running pod install符方昊7 小时前
React 19 对比 React 16 新特性解析ssshooter7 小时前
又被 Safari 差异坑了:textContent 拿到的值居然没换行?曲折7 小时前
Cesium-气象要素PNG色斑图叠加Forever7_8 小时前
Electron 淘汰!新的桌面端框架 更强大、更轻量化