• Technology
  • by Piotr Galbas
  • 06/02/2018

Secure serializing objects using sealedobject class

When creating Android applications many of the developers at some point will face a problem of storing a large amount of data. Android gives us multiple ways of saving them, but when storing user’s sensitive data we should always come up with safest solutions.

Concise Software blog thinking Android Secure serializing objects using SealedObject

In this article we’ll take the approach of serializing and deserializing objects, with symmetric cryptographic key usage. Most articles describing that topic, require from developer to store inside application additional data, which are required to decrypt data. I’m going to show you how we can achieve the same goal with easier approach, by using SealedObject class.

Generating key

Data encryption is taking place in few steps. Firstly, we are going to generate cryptographic key using AES standard. It’ll give us the possibility to easily encrypt large amount of data.

We have passed a few parameters here:

  • KEY_PROVIDER – provider instance in which Android should look up for AES implementation
  • KEY_ALIAS – alias under which key could be found later we gave our key a purpose to encrypt & decrypt data
  • BLOCK_MODE_CBC – cryptographic block mode with which our key can be used
  • ENCRYPTION_PADDING_PKCS7 – default padding scheme with which our key can be used

On Android 6.0 and above our newly generated key would become automatically saved in provided Keystore for further use. Android Keystore System gives the possibility to store cryptographic keys in a secure way, without any chance of exporting them from the device.

Cipher initialization

Our next step is going to initialize Cipher object, which will encrypt our data. We’ll create it by passing transformation parameters used when generating our AES key. Then, we’ll initialize it with our key in Encryption mode.

Up to that point, everything is pretty similar to what you can find in other articles, but here comes the difference. In code above we intentionally omitted passing Initialization Vector parameter, which is required when using CBC block mode. When encrypting data using CBC mode, each data block is being encrypted with block from previous iteration, as presented in diagram below. For first iteration however, we have to pass a set of random values called Initialization Vector.

There are many disadvantages for this solution:

  1. It’s required to store used IV, so that data decryption would be possible.
  2. We should never use the same vector more than once for the same key.

Because we haven’t passed IV intentionally, we’re letting Cipher to generate new vector each time when it tries to encrypt data, by using random data provided by SecureRandom object.

So how we’re going to decrypt our data without remembering Initialization Vector then? Here’s when SealedObject comes into play.


This is how SealedObject constructor looks like:

SealedObject(Serializable data, Cipher c)

First parameter is object data, which implement Serializable interface. Second is Cipher object, which we initialized before using our SecretKey. Data which we’re going to pass will become encrypted inside SealedObject. It’ll also remember parameters used to initialize Cipher. Because SealedObject class also implements Serializable interface, we can easily replace our current saving data implementation, e.g.:

Decoding data is even simpler. Because SealedObject stores all parameters required to reinitialize Cipher instance, we only have to pass our SecretKey stored inside device into SealedObject:

And that’s it! All of our data would remain encrypted in device memory, and thanks to storing SecretKey inside Keystore, and generating new Initialization Vector with each encryption we minimize the risk of decoding our data.

Do you like article?

Piotr Galbas

Since last four years he is working with passion on creating best mobile apps. Still eager for knowledge, new challenges, well written code and more satisfied users. Privately musician, husband and a proud father.

Let's work together.

Are you ready to build the future together?