====== NativeCryptoProvider ====== **Namespace:** ''WvdS.System.Security.Cryptography.Providers'' P/Invoke-bazirani kripto-provider za serverske i desktop aplikacije. Komunicira izravno s OpenSSL 3.6 putem Platform Invocation Services. ===== Pregled ===== ''NativeCryptoProvider'' je standardni provider za: * Blazor Server * ASP.NET Core * Desktop aplikacije (Windows, Linux, macOS) * Konzolne aplikacije * Windows Services / Linux Daemons ===== Svojstva ===== ^ Svojstvo ^ Tip ^ Opis ^ | ''Name'' | string | ''%%"Native (P/Invoke)"%%'' | | ''IsAvailable'' | bool | ''true'' ako je OpenSSL 3.6 dostupan | ===== Inicijalizacija ===== using WvdS.System.Security.Cryptography.Providers; // Stvaranje providera var provider = new NativeCryptoProvider(); // Inicijalizacija (učitava OpenSSL) await provider.InitializeAsync(); // Provjera dostupnosti if (provider.IsAvailable) { Console.WriteLine($"Provider: {provider.Name}"); Console.WriteLine($"OpenSSL: {provider.GetOpenSslVersion()}"); } ===== ML-DSA Operacije ===== ==== GenerateMlDsaKeyPairAsync ==== Generira ML-DSA par ključeva. var (publicKey, privateKey) = await provider.GenerateMlDsaKeyPairAsync("ML-DSA-65"); // Podržani algoritmi: // - "ML-DSA-44" (NIST Level 1) // - "ML-DSA-65" (NIST Level 3, preporučeno) // - "ML-DSA-87" (NIST Level 5) ==== SignMlDsaAsync ==== Potpisuje podatke s ML-DSA. byte[] data = Encoding.UTF8.GetBytes("Važni podaci"); byte[] signature = await provider.SignMlDsaAsync(data, privateKey); ==== VerifyMlDsaAsync ==== Verificira ML-DSA potpis. bool isValid = await provider.VerifyMlDsaAsync(data, signature, publicKey); ===== ML-KEM Operacije ===== ==== GenerateMlKemKeyPairAsync ==== Generira ML-KEM par ključeva. var (publicKey, privateKey) = await provider.GenerateMlKemKeyPairAsync("ML-KEM-768"); // Podržani algoritmi: // - "ML-KEM-512" (NIST Level 1) // - "ML-KEM-768" (NIST Level 3, preporučeno) // - "ML-KEM-1024" (NIST Level 5) ==== EncapsulateAsync ==== Enkapsulira dijeljenu tajnu s javnim ključem. var (sharedSecret, ciphertext) = await provider.EncapsulateAsync(recipientPublicKey); // sharedSecret: 32 bajta simetričnog ključa // ciphertext: Šalje se primatelju ==== DecapsulateAsync ==== Dekapsulira dijeljenu tajnu. byte[] sharedSecret = await provider.DecapsulateAsync(ciphertext, privateKey); ===== Operacije s certifikatima ===== ==== CreateEphemeralCertificateAsync ==== Stvara kratkotrajni ML-DSA certifikat. var (pubKey, privKey) = await provider.GenerateMlDsaKeyPairAsync(); byte[] certBytes = await provider.CreateEphemeralCertificateAsync( "CN=Ephemeral Test", TimeSpan.FromHours(24), privKey); var cert = new X509Certificate2(certBytes); ==== SignCertificateAsync ==== Potpisuje TBS podatke certifikata s ML-DSA. byte[] tbsCertificate = GetTbsCertificate(); byte[] signedCert = await provider.SignCertificateAsync(tbsCertificate, privateKey); ===== Pregled metoda ===== ^ Metoda ^ Parametri ^ Povratna vrijednost ^ | ''InitializeAsync()'' | - | Task | | ''GetOpenSslVersion()'' | - | string | | ''GenerateMlDsaKeyPairAsync'' | string algorithm | Task<(byte[], byte[])> | | ''SignMlDsaAsync'' | byte[] data, byte[] privateKey | Task | | ''VerifyMlDsaAsync'' | byte[] data, byte[] signature, byte[] publicKey | Task | | ''GenerateMlKemKeyPairAsync'' | string algorithm | Task<(byte[], byte[])> | | ''EncapsulateAsync'' | byte[] publicKey | Task<(byte[], byte[])> | | ''DecapsulateAsync'' | byte[] ciphertext, byte[] privateKey | Task | | ''CreateEphemeralCertificateAsync'' | string subject, TimeSpan validity, byte[] privateKey | Task | | ''SignCertificateAsync'' | byte[] tbsCertificate, byte[] privateKey | Task | ===== Konfiguracija OpenSSL putanje ===== // Prije InitializeAsync() postaviti putanju CryptoConfig.OpenSslPath = @"C:\OpenSSL\bin"; var provider = new NativeCryptoProvider(); await provider.InitializeAsync(); **Standardne putanje pretraživanja:** ^ Operacijski sustav ^ Putanje ^ | Windows | ''%%.\%%'', ''%%C:\OpenSSL\bin%%'', ''%%PATH%%'' | | Linux | ''%%/usr/local/lib64%%'', ''%%/usr/lib/x86_64-linux-gnu%%'' | | macOS | ''%%/opt/homebrew/lib%%'', ''%%/usr/local/lib%%'' | ===== Napomene o performansama ===== **P/Invoke Performanse:** * Sinkrono izvršavanje u nativnom kodu * Task-wrapper za API konzistenciju s WasmCryptoProvider * Minimalni overhead kroz izravan pristup memoriji * Thread-safe putem OpenSSL-ove interne sinkronizacije ===== Potpuni primjer ===== using WvdS.System.Security.Cryptography.Providers; // 1. Inicijalizacija providera var provider = new NativeCryptoProvider(); await provider.InitializeAsync(); Console.WriteLine($"OpenSSL: {provider.GetOpenSslVersion()}"); // 2. ML-KEM Key Exchange var (alicePublic, alicePrivate) = await provider.GenerateMlKemKeyPairAsync(); var (bobPublic, bobPrivate) = await provider.GenerateMlKemKeyPairAsync(); // Alice enkapsulira za Boba var (aliceSecret, ciphertext) = await provider.EncapsulateAsync(bobPublic); // Bob dekapsulira var bobSecret = await provider.DecapsulateAsync(ciphertext, bobPrivate); // Dijeljene tajne su identične Console.WriteLine($"Keys match: {aliceSecret.SequenceEqual(bobSecret)}"); // 3. ML-DSA Potpis var (sigPubKey, sigPrivKey) = await provider.GenerateMlDsaKeyPairAsync(); byte[] message = Encoding.UTF8.GetBytes("Važna poruka"); byte[] signature = await provider.SignMlDsaAsync(message, sigPrivKey); bool isValid = await provider.VerifyMlDsaAsync(message, signature, sigPubKey); Console.WriteLine($"Signature valid: {isValid}"); ===== Sigurnosne napomene ===== * Zahtijeva OpenSSL 3.6.0 ili noviji s PQ algoritmima * Privatni ključevi se drže u procesnoj memoriji * Po završetku aplikacije ključevi se ne brišu automatski * Za najvišu sigurnost: Ključeve eksplicitno obrisati s ''CryptographicOperations.ZeroMemory'' ===== Vidi također ===== * [[.:start|Providers Namespace]] * [[.:icryptoprovider|ICryptoProvider]] * [[.:wasmcryptoprovider|WasmCryptoProvider]] * [[.:cryptoproviderfactory|CryptoProviderFactory]] * [[..:interop:opensslinterop|OpenSslInterop]] ---- //Wolfgang van der Stille @ EMSR DATA d.o.o. - Post-Quantum Cryptography Professional//