第一次和IOS调试,由于能力有限,只发现java自动填充的密码长度算法和IOS的不一样,导致两边加密内容不一致。
解决的方案是,两边同时采用自定义的补码方式来补全密码的长度。
AES算法支持的Key的长度限制为:128, 192 or 256 bits 也就是 (16, 24 ,32 bytes)
package com.secret.api.util.inner;
import javax.crypto.*;
import javax.crypto.spec.SecretKeySpec;
import java.io.UnsupportedEncodingException;
import java.security.InvalidKeyException;
import java.security.NoSuchAlgorithmException;
/**
* AES工具类
* @author zzw
* @date 2015-11-19
*/
public class AESTool {
/**
* 加密(这种加密方式有两种限制)
* 1.密钥必须是16位的
* @param content 需要加密的内容
* @param password 加密密码
* @return
*/
public static byte[] encrypt(String content, String password) {
try {
SecretKeySpec key = new SecretKeySpec(generatorKey(password), "AES");
Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
byte[] byteContent = content.getBytes("utf-8");
cipher.init(Cipher.ENCRYPT_MODE, key);// 初始化
byte[] result = cipher.doFinal(byteContent);
return result; // 加密
} catch (NoSuchAlgorithmException e) {
e.printStackTrace();
} catch (NoSuchPaddingException e) {
e.printStackTrace();
} catch (InvalidKeyException e) {
e.printStackTrace();
} catch (UnsupportedEncodingException e) {
e.printStackTrace();
} catch (IllegalBlockSizeException e) {
e.printStackTrace();
} catch (BadPaddingException e) {
e.printStackTrace();
}
return null;
}
/**
* AES(256)解密
* @param content 待解密内容
* @param password 解密密钥
* @return 解密之后
* @throws Exception
*/
public static byte[] decrypt(byte[] content, String password) throws Exception {
try {
//获得一个密钥
byte[] enCodeFormat = generatorKey(password);
//根据给定的字节数组(enCodeFormat)构造一个密钥。
SecretKeySpec key = new SecretKeySpec(enCodeFormat, "AES");
// 创建密码器
Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
// 初始化解码器
cipher.init(Cipher.DECRYPT_MODE, key);
byte[] result = cipher.doFinal(content);
return result;
} catch (Exception e) {
e.printStackTrace();
throw new Exception("解密失败!内容-->" + AESTool.parseByte2HexStr(content) + ";key-->" + password + ";" + e.getMessage());
}
}
/**
* 将key转为128, 192 or 256 bits (16, 24 and 32 bytes)
* @param password
* @return
*/
public static byte[] generatorKey(String password){
byte[] bs = password.getBytes();
//128, 192 or 256 bits (16, 24 and 32 bytes)
int len = bs.length;
int t = 32;
len = len > t ? t : len;
byte[] bsf = new byte[t];
for(int i=0; i<len; i++){
bsf[i] = bs[i];
}
System.out.println("---" + bsf.length);
return bsf;
}
/**将二进制转换成16进制
* @param buf
* @return
*/
public static String parseByte2HexStr(byte buf[]) {
StringBuffer sb = new StringBuffer();
for (int i = 0; i < buf.length; i++) {
String hex = Integer.toHexString(buf[i] & 0xFF);
if (hex.length() == 1) {
hex = '0' + hex;
}
sb.append(hex.toUpperCase());
}
return sb.toString();
}
/**将16进制转换为二进制
* @param hexStr
* @return
*/
public static byte[] parseHexStr2Byte(String hexStr) {
if (hexStr.length() < 1)
return null;
byte[] result = new byte[hexStr.length()/2];
for (int i = 0;i< hexStr.length()/2; i++) {
int high = Integer.parseInt(hexStr.substring(i*2, i*2+1), 16);
int low = Integer.parseInt(hexStr.substring(i*2+1, i*2+2), 16);
result[i] = (byte) (high * 16 + low);
}
return result;
}
public static void main(String[] args) throws Exception {
String s = "54";
String k = "+zgNXjFkimGPxIBo95Sfc0m5Vb0IhvE1wQatMU3uHLs="; //270D3D44C66219E122AAA6FE2F5BE30A
//CC09093886B1C4E62CAEF7DD1162ACB9
System.out.println(k.length());
s = AESTool.parseByte2HexStr(AESTool.encrypt(s, k));
System.out.println(s);
s = new String(AESTool.decrypt(parseHexStr2Byte(s), k));
System.out.println(s);
}
}