Android AES 16字节加解密
代码运行结果
private static final String KEY = "asdfghjklqwertyu";
// 加密
String encrypt128 = AESUtils.encrypt128("http://blog.csdn.net/xiaxl", KEY);
Log.e("xiaxl: ", "encrypt128: " + encrypt128);
// 解密
String decrypt128 = AESUtils.decrypt128(encrypt128, KEY);
Log.e("xiaxl: ", "decrypt128: " + decrypt128);
代码片段
/**
* Android AES 16字节加解密
*/
public class AESUtils {
// 加密
public static String encrypt128(String sSrc, String sKey) throws Exception {
if (sKey == null) {
return null;
}
// 判断Key是否为16位
if (sKey.length() != 16) {
return null;
}
byte[] raw = sKey.getBytes("utf-8");
SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");
Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");//"算法/模式/补码方式"
cipher.init(Cipher.ENCRYPT_MODE, skeySpec);
byte[] encrypted = cipher.doFinal(sSrc.getBytes("utf-8"));
return Base64.encodeToString(encrypted, Base64.DEFAULT);//此处使用BASE64做转码功能,同时能起到2次加密的作用。
}
// 解密
public static String decrypt128(String sSrc, String sKey) throws Exception {
try {
// 判断Key是否正确
if (sKey == null) {
return null;
}
// 判断Key是否为16位
if (sKey.length() != 16) {
return null;
}
byte[] raw = sKey.getBytes("utf-8");
SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");
// "AES/ECB/PKCS5Padding"解密 android 4.3以上有bug,详情见:
// https://www.cnblogs.com/suxiaoqi/p/7874635.html
//Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
Cipher cipher = Cipher.getInstance("AES/ECB/ZeroBytePadding");
cipher.init(Cipher.DECRYPT_MODE, skeySpec);
byte[] encrypted1 = Base64.decode(sSrc.getBytes("utf-8"), Base64.DEFAULT);
try {
byte[] original = cipher.doFinal(encrypted1);
String originalString = new String(original, "utf-8");
return originalString;
} catch (Exception e) {
e.printStackTrace();
System.out.println(e.toString());
return null;
}
} catch (Exception ex) {
ex.printStackTrace();
System.out.println(ex.toString());
return null;
}
}
}
期间遇到javax.crypto.BadPaddingException
android 上AES解密是报错javax.crypto.BadPaddingException: pad block corrupted
将Cipher cipher = Cipher.getInstance("AES");
修改为Cipher cipher = Cipher.getInstance("AES/ECB/ZeroBytePadding");
后问题解决