Reference

Block Ciphers

Zend\Crypt\BlockCipher implements encrypt-then-authenticate mode using HMAC to provide authentication.

The symmetric cipher can be chosen with a specific adapter that implements Zend\Crypt\Symmetric\SymmetricInterface. We support the symmmetric encryption algorithms offered by OpenSSL and Mcrypt extensions.

In the following code, we detail an example of using the BlockCipher class to encrypt-then-authenticate a string using the AES-256 block cipher and the HMAC algorithm (using the SHA-256 hash function).

Mcrypt

The Mcrypt extension is based on the libmcrypt library. Unfortunately, at the time of writing, the project is dead, having been unmaintained for around 8 years, with the last release (version 2.5.8) having occurred in February 2007.

Starting with PHP 7.1, the Mcrypt extension will be considered deprecated. For these reasons, we strongly suggest using only the Openssl adapter.

Starting with zend-crypt 3.0, the Openssl adapter is the default (for example, by Zend\Crypt\FileCipher), and all examples now only demonstrate that adapter.

use Zend\Crypt\BlockCipher;

$blockCipher = BlockCipher::factory('openssl', array('algo' => 'aes'));
$blockCipher->setKey('encryption key');
$result = $blockCipher->encrypt('this is a secret message');
echo "Encrypted text: $result\n";

The BlockCipher instance is initialized using a factory method with the name of the cipher adapter to use (e.g., openssl) and the parameters to pass to the adapter (the AES algorithm). In order to encrypt a string, we need to specify an encryption key, which we do via the setKey() method. Encryption is performed with the encrypt() method.

The output of encryption is a string, encoded in Base64 (default), containing the HMAC value, the IV vector, and the encrypted text. The encryption mode used is CBC (with a random IV by default), with the default HMAC hash algorithm of SHA256. The Openssl adapter encrypts using the PKCS#7 padding mechanism by default. You can specify a different padding method using a special adapter (Zend\Crypt\Symmetric\Padding). The encryption and authentication keys used by BlockCipher are generated with the PBKDF2 algorithm, used as the key derivation function from the user's key specified using the setKey() method.

Key Size

BlockCipher always attempts to use the longest key size for the specified cipher. For instance, for the AES algorithm it uses 256 bits, and for the Blowfish algorithm it uses 448 bits.

You can change all the default settings by passing the values to the factory parameters. For instance, if you want to use the Blowfish algorithm, with the CFB mode and the HMAC SHA512 hash function, initialize the class as follows:

use Zend\Crypt\BlockCipher;

$blockCipher = BlockCipher::factory(
    'openssl',
    [
        'algo' => 'blowfish',
        'mode' => 'cfb',
        'hash' => 'sha512'
    ]
);

Recommendation

If you are not familiar with symmetric encryption techniques, we strongly suggest using the default values of the BlockCipher class. The default values are: AES algorithm, CBC mode, HMAC with SHA256, PKCS#7 padding.

To decrypt a string we can use the decrypt() method. In order to successfully decrypt a string, we must configure the BlockCipher with the same parameters used during encryption.

We can also initialize the BlockCipher manually without using the factory method; we can inject the symmetric cipher adapter directly via the constructor. For instance, we can rewrite the previous example as follows:

use Zend\Crypt\BlockCipher;
use Zend\Crypt\Symmetric\Openssl;

$blockCipher = new BlockCipher(new Openssl(['algo' => 'aes']));
$blockCipher->setKey('encryption key');
$result = $blockCipher->encrypt('this is a secret message');
echo "Encrypted text: $result \n";

Using GCM or CCM Mode from PHP 7.1+

If you are using PHP 7.1+ you can choose the GCM or CCM mode for authenticated encryption with OpenSSL. These modes provide authenticated encryption by itself, without the usage of HMAC as described in the previous section.

GCM is Galois/Counter Mode and CCM is Counter with CBC-MAC. For more information on the usage of this encryption modes in PHP we suggest to read this blog post.

If you want to use the GCM or CCM mode with BlockCipher you can just specify the mode in the factory. For instance, the following is an example of aes-256-gcm encryption with OpenSSL:

use Zend\Crypt\BlockCipher;

$blockCipher = BlockCipher::factory(
    'openssl',
    [
        'algo' => 'aes',
        'mode' => 'gcm'
    ]
);

And below is an example demonstrating the factory for aes-256-ccm algorithm:

use Zend\Crypt\BlockCipher;

$blockCipher = BlockCipher::factory(
    'openssl',
    [
        'algo' => 'aes',
        'mode' => 'ccm'
    ]
);

Recommendation

GCM mode is about 3x faster than CCM, we recommend using GCM unless you have requirements that dictate CCM.

Found a mistake or want to contribute to the documentation? Edit this page on GitHub!