上一篇文章里面,AES加密算法的测试用的加密密钥是1234567812345678,正好是128bit的,如果密钥不是128bit呢,该怎么填充?
先看以下代码:
- package encryption;
- import java.io.UnsupportedEncodingException;
- import java.security.InvalidKeyException;
- import java.security.NoSuchAlgorithmException;
- import java.security.SecureRandom;
- import javax.crypto.BadPaddingException;
- import javax.crypto.Cipher;
- import javax.crypto.IllegalBlockSizeException;
- import javax.crypto.KeyGenerator;
- import javax.crypto.NoSuchPaddingException;
- import javax.crypto.SecretKey;
- import javax.crypto.spec.SecretKeySpec;
- public class AESTest {
- public static void main(String args[]){
- String content = "test";
- String password = "12345678";
- //加密
- System.out.println("加密前:" + content);
- byte[] encryptResult = encrypt(content, password);
- System.out.println("加密后:" + parseByte2HexStr(encryptResult));
- //解密
- byte[] decryptResult = decrypt(encryptResult,password);
- System.out.println("解密后:" + new String(decryptResult));
- }
- /**
- * 加密
- *
- * @param content 需要加密的内容
- * @param password 加密密码
- * @return
- */
- public static byte[] encrypt(String content, String password) {
- try {
- KeyGenerator kgen = KeyGenerator.getInstance("AES");
- kgen.init(128, new SecureRandom(password.getBytes()));
- SecretKey secretKey = kgen.generateKey();
- byte[] enCodeFormat = secretKey.getEncoded();
- SecretKeySpec key = new SecretKeySpec(enCodeFormat, "AES");
- Cipher cipher = Cipher.getInstance("AES");// 创建密码器
- byte[] byteContent = content.getBytes("utf-8");
- cipher.init(Cipher.ENCRYPT_MODE, key);// 初始化
- byte[] result = cipher.doFinal(byteContent);
- return result; // 加密
- } catch (NoSuchAlgorithmException e) {
- e.printStackTrace();
- } catch (NoSuchPaddingException e) {
- e.printStackTrace();
- } catch (InvalidKeyException e) {
- e.printStackTrace();
- } catch (UnsupportedEncodingException e) {
- e.printStackTrace();
- } catch (IllegalBlockSizeException e) {
- e.printStackTrace();
- } catch (BadPaddingException e) {
- e.printStackTrace();
- }
- return null;
- }
- /**解密
- * @param content 待解密内容
- * @param password 解密密钥
- * @return
- */
- public static byte[] decrypt(byte[] content, String password) {
- try {
- KeyGenerator kgen = KeyGenerator.getInstance("AES");
- kgen.init(128, new SecureRandom(password.getBytes()));
- SecretKey secretKey = kgen.generateKey();
- byte[] enCodeFormat = secretKey.getEncoded();
- SecretKeySpec key = new SecretKeySpec(enCodeFormat, "AES");
- Cipher cipher = Cipher.getInstance("AES");// 创建密码器
- cipher.init(Cipher.DECRYPT_MODE, key);// 初始化
- byte[] result = cipher.doFinal(content);
- return result; // 加密
- } catch (NoSuchAlgorithmException e) {
- e.printStackTrace();
- } catch (NoSuchPaddingException e) {
- e.printStackTrace();
- } catch (InvalidKeyException e) {
- e.printStackTrace();
- } catch (IllegalBlockSizeException e) {
- e.printStackTrace();
- } catch (BadPaddingException e) {
- e.printStackTrace();
- }
- return null;
- }
- /**将二进制转换成16进制
- * @param buf
- * @return
- */
- public static String parseByte2HexStr(byte buf[]) {
- StringBuffer sb = new StringBuffer();
- for (int i = 0; i < buf.length; i++) {
- String hex = Integer.toHexString(buf[i] & 0xFF);
- if (hex.length() == 1) {
- hex = '0' + hex;
- }
- sb.append(hex.toUpperCase());
- }
- return sb.toString();
- }
- /**将16进制转换为二进制
- * @param hexStr
- * @return
- */
- public static byte[] parseHexStr2Byte(String hexStr) {
- if (hexStr.length() < 1)
- return null;
- byte[] result = new byte[hexStr.length()/2];
- for (int i = 0;i< hexStr.length()/2; i++) {
- int high = Integer.parseInt(hexStr.substring(i*2, i*2+1), 16);
- int low = Integer.parseInt(hexStr.substring(i*2+1, i*2+2), 16);
- result[i] = (byte) (high * 16 + low);
- }
- return result;
- }
- }
12345678只有64位,AES的密钥不是最低要求128位吗,为什么依旧能加密功能呢?
原因就出在下面这段代码上:
- KeyGenerator kgen = KeyGenerator.getInstance("AES");
- kgen.init(128, new SecureRandom(password.getBytes()));
- SecretKey secretKey = kgen.generateKey();
- byte[] enCodeFormat = secretKey.getEncoded();
别的算法没有研究过,AES算法中SecureRandom使用的算法是SHA1PRNG
- System.out.println("KeyGenerator 结果:");
- try {
- KeyGenerator kgen = KeyGenerator.getInstance("AES");
- kgen.init(128, new SecureRandom(password.getBytes()));
- SecretKey secretKey = kgen.generateKey();
- byte[] enCodeFormat = secretKey.getEncoded();
- for (int i = 0; i < enCodeFormat.length; i++) {
- System.out.print(" "+enCodeFormat[i]);
- }
- } catch (NoSuchAlgorithmException e) {
- // TODO Auto-generated catch block
- e.printStackTrace();
- }
- System.out.println();
- System.out.println("SecureRandom 结果:");
- try {
- SecureRandom sr = SecureRandom.getInstance("SHA1PRNG");
- sr.setSeed(password.getBytes());
- byte[] keyByte = new byte[16];
- sr.nextBytes(keyByte);
- for (int i = 0; i < keyByte.length; i++) {
- System.out.print(" "+keyByte[i]);
- }
- } catch (NoSuchAlgorithmException e) {
- // TODO Auto-generated catch block
- e.printStackTrace();
- }
- KeyGenerator 结果:
- -47 6 101 -53 -53 -88 -29 -12 68 -93 -1 -77 22 -102 87 23
- SecureRandom 结果:
- -47 6 101 -53 -53 -88 -29 -12 68 -93 -1 -77 22 -102 87 23
这说明AES就是调用了SecureRandom的nextBytes方法来实现密钥填充的。
用Delphi来实现SecureRandom,太过复杂,也没有必要,我们只要保证加密的时候密钥填充方式一致,加密的结果肯定也会一样的。
于是,Delphi和Java的密钥填充就都定为密钥不够就补零。
网上还有一些人说加密解密中文出现乱码,这个应该注意加密和解密的编码格式,我电脑上面java文件的编码格式是GBK,Delphi的版本是Delphi7,编码格式也是GBK,这样就没有中文乱码问题了。
java和Delphi通用的加密和解密,代码下载地址:http://download.csdn.net/detail/kunlun122/7539147