我正在编写一个允许用户上传文件和下载文件的网络应用程序。允许使用 doc 或 jpeg 等文件。文件在上传过程中被加密,在下载过程中被解密。
我使用 AES 作为算法,所有文件使用一个密钥,但每个文件使用不同的盐。我还确保加密和解密方法都使用相同的密钥和填充方法。
但是,当网站尝试解密文件时,它会创建一个比原始文件更大的损坏文件。
所以我不确定加密或解密过程是否会弄乱文件。
这是源代码:
//Encryption method
private bool SaveEnryptFile(FileUpload fileUp)
{
try
{
string fName = fileUp.PostedFile.FileName;
string outputDir = Path.Combine(ConfigurationManager.AppSettings["clientDocFolder"] + CurrentUser.Name);
DirectoryInfo di = new DirectoryInfo(outputDir);
di.Create();
string outputFile = Path.Combine(outputDir, fName);
if (File.Exists(outputFile))
{
throw new Exception("File already exists");
}
else
{
byte[] file = new byte[fileUp.PostedFile.ContentLength];
fileUp.PostedFile.InputStream.Read(file, 0, fileUp.PostedFile.ContentLength);
//get the key string from web.config
var key = ConfigurationManager.AppSettings["keyFile"];
//randomly create a salt
byte[] salt = new byte[8];
var rng = new RNGCryptoServiceProvider();
rng.GetBytes(salt);
var derivedBytes = new Rfc2898DeriveBytes(key, salt);
using (AesCryptoServiceProvider alg = new AesCryptoServiceProvider())
{
alg.Key = derivedBytes.GetBytes(alg.KeySize / 8);
alg.IV = derivedBytes.GetBytes(alg.BlockSize / 8);
alg.Padding = PaddingMode.Zeros;
// Create a decrytor to perform the stream transform.
using (ICryptoTransform encryptor = alg.CreateEncryptor())
{
using (var fs = File.Create(outputFile))
{
//store the salt in the encrypted file
fs.Write(salt, 0, 8);
//write encrypted bytes to encrypted file
using (CryptoStream cs = new CryptoStream(fs, encryptor, CryptoStreamMode.Write))
{
cs.Write(file, 0, file.Length);
cs.FlushFinalBlock();
}
}
}
}
return true;
}
}
catch (Exception ex)
{
throw new Exception(ex.Message);
}
}
//解密方法:
var path = Path.Combine(ConfigurationManager.AppSettings["clientDocFolder"] + CurrentUser.Name + "\\" + ((WebControl)sender).Attributes["DocumentID"]);
if (File.Exists(path))
{
using (FileStream fs = new FileStream(path, FileMode.Open, FileAccess.Read))
{
//Get the salt from the encrypted file
byte[] salt = new byte[8];
fs.Read(salt, 0, salt.Length);
//get key string from web.config file
string key = ConfigurationManager.AppSettings["keyFile"];
var derivedBytes = new Rfc2898DeriveBytes(key, salt);
AesCryptoServiceProvider alg = new AesCryptoServiceProvider();
alg.Key = derivedBytes.GetBytes(alg.KeySize / 8);
alg.IV = derivedBytes.GetBytes(alg.BlockSize / 8);
alg.Padding = PaddingMode.Zeros;
using (ICryptoTransform decryptor = alg.CreateDecryptor())
{
//byte array to store encrypted bytes.
//I use fs.Length-8 because first 8 bytes were used to store salt
byte[] encryptedBytes = new byte[fs.Length - 8];
int encryptedByteCnt = fs.Read(encryptedBytes, 0, encryptedBytes.Length);
using (MemoryStream ms = new MemoryStream(encryptedBytes))
{
byte[] plainBytes = new byte[encryptedByteCnt];
using (CryptoStream cs = new CryptoStream(ms, decryptor, CryptoStreamMode.Read))
{
//decrypt encrypted bytes into a byte array
int decryptedByteCnt = cs.Read(plainBytes, 0, plainBytes.Length);
}
//Write decrypted bytes in response stream
Response.ContentType = "application/octet-stream";
Response.AddHeader("content-disposition", "attachment; filename=" + Path.GetFileName(path));
Response.OutputStream.Write(plainBytes, 0, plainBytes.Length);
Response.Flush();
}
}
}
}
else
{
ScriptManager.RegisterStartupScript(this, this.GetType(), "DownloadDocument", "alert('" + String.Format("There is no file such as {0} exists. Please contact us if you face this problem.);", ((WebControl)sender).Attributes["DocumentID"]) + "'", true);
return;
}