.NET生成RSA公钥和私钥-加密解密示例

我们每一个人的一生中都会难免有缺憾和不如意,也许我们无力改变这个事实,而我们可以改变的只是看待这些事情的态度。用平和的态度去对待生活中的缺憾和苦难。


Form1.cs代码:

  public partial class Form1 : Form
    {
        private const int RsaKeySize = 2048;
        private const string publicKeyFileName = "RSA.Pub";
        private const string privateKeyFileName = "RSA.Private";

        private string basePathToStoreKeys;

        public Form1()
        {
            InitializeComponent();

            basePathToStoreKeys = Directory.GetCurrentDirectory();
        }

        //生成密钥
        private void button1_Click(object sender, EventArgs e)
        {
            GenerateKeys(basePathToStoreKeys);
        }

        //加密文本框内容
        private void button2_Click(object sender, EventArgs e)
        {
            var encryptedString = Encrypt(textBox1.Text, Path.Combine(basePathToStoreKeys, publicKeyFileName));

            textBox2.Text = encryptedString;
        }

        //解密文本框内容
        private void button3_Click(object sender, EventArgs e)
        {
            var decryptedString = Decrypt(textBox2.Text, Path.Combine(basePathToStoreKeys, privateKeyFileName));

            textBox2.Text = decryptedString;
        }

        /// <summary>
        ///在给定路径中生成XML格式的私钥和公钥。
        /// </summary>
        public void GenerateKeys(string path)
        {
            using (var rsa = new RSACryptoServiceProvider(RsaKeySize))
            {
                try
                {
                    // 获取私钥和公钥。
                    var publicKey = rsa.ToXmlString(false);
                    var privateKey = rsa.ToXmlString(true);

                    // 保存到磁盘
                    File.WriteAllText(Path.Combine(path, publicKeyFileName), publicKey);
                    File.WriteAllText(Path.Combine(path, privateKeyFileName), privateKey);

                    MessageBox.Show(string.Format("生成的RSA密钥的路径: {0}\\ [{1}, {2}]", path, publicKeyFileName, privateKeyFileName));
                }
                finally
                {
                    rsa.PersistKeyInCsp = false;
                }
            }
        }

        /// <summary>
        /// 用给定路径的RSA公钥文件加密纯文本。
        /// </summary>
        /// <param name="plainText">要加密的文本</param>
        /// <param name="pathToPublicKey">用于加密的公钥路径.</param>
        /// <returns>表示加密数据的64位编码字符串.</returns>
        public string Encrypt(string plainText, string pathToPublicKey)
        {
            using (var rsa = new RSACryptoServiceProvider(RsaKeySize))
            {
                try
                {
                    //加载公钥
                    var publicXmlKey = File.ReadAllText(pathToPublicKey);
                    rsa.FromXmlString(publicXmlKey);

                    var bytesToEncrypt = System.Text.Encoding.Unicode.GetBytes(plainText);

                    var bytesEncrypted = rsa.Encrypt(bytesToEncrypt, false);

                    return Convert.ToBase64String(bytesEncrypted);
                }
                finally
                {
                    rsa.PersistKeyInCsp = false;
                }
            }
        }

        /// <summary>
        /// Decrypts encrypted text given a RSA private key file path.给定路径的RSA私钥文件解密 加密文本
        /// </summary>
        /// <param name="encryptedText">加密的密文</param>
        /// <param name="pathToPrivateKey">用于加密的私钥路径.</param>
        /// <returns>未加密数据的字符串</returns>
        public string Decrypt(string encryptedText, string pathToPrivateKey)
        {
            using (var rsa = new RSACryptoServiceProvider(RsaKeySize))
            {
                try
                {
                    var privateXmlKey = File.ReadAllText(pathToPrivateKey);
                    rsa.FromXmlString(privateXmlKey);

                    var bytesEncrypted = Convert.FromBase64String(encryptedText);

                    var bytesPlainText = rsa.Decrypt(bytesEncrypted, false);

                    return System.Text.Encoding.Unicode.GetString(bytesPlainText);
                }
                finally
                {
                    rsa.PersistKeyInCsp = false;
                }
            }
        }
    }

生成的RSA.Private的内容:

<?xml version="1.0" encoding="utf-8"?>

<RSAKeyValue>
  <Modulus>veJTjzABfYl9/9YbOOw+EcfIZ1jajWiGPAXW+G/2uIUYh9L9WSyLPghl3oMZM2GDxp9f+chdc0k9lrNbJwsIaereleTiOcl2u/rq+jS8r2WhTfk8bIMWeAO/B5S0IjIbmKXdymRNZFw/KjuY99HdYk6nB1MZ1AJ/e3xJKwWJrXp55Y4DlX9sGTORS9kcy1q4fuxjJHUFAYsasV/vnsjlaau4sp6xBcDIfT1tRkxMZriDPW3J7qH7/qI2X4+iQZQIfAyFpSlqi+4GI9FajogEareCS7d1vc+OYdGc+jX1h0erHsRtlvFHzLcqBmZQ0Gz0XdZxOwJf5vhxUvvoK9BmBw==</Modulus>
  <Exponent>AQAB</Exponent>
  <P>9Dq9A5cVGeBKib4WNSUBQqp25J4p0IUX1foc+zrX6/ZuSgDeXxIKiFmQPcl9R2RTwXQxFYWSkGW4gQis+AMnQJL98kHJXnG2FAiEsEhYUDUEKx29OA+/y/hNoyEbztcggru8Ebn8v4Aq6BMBvM9Q+Q5lIl2I8SRQnDfVnuwdaSc=</P>
  <Q>xwkVjnwN0m9K6EyHT5vrOJbw/0cTdcCtoFU7wDawOHJeDj872dR3vs3rf+YinnMNOo47VgH5CQaFEbhgmiAjYlaz+tPFqD/TiiHp0ceqfN3XjUqDx+TkPYq+gGreeh+XE43lP/Z2YUscLq0x/uHPky2EWIxvqqphvW1Xh7ECaCE=</Q>
  <DP>cH6Zz4yIyKl6S+YFvqbz5Kw2JWoA4q5bY1FYhhP9nw+cj3PE+c+KkHGIsh0cGoVI2wPVFA+5ic+A49aGLZruOp06YZsR0PHZp3KhA73fB9rTt7R0Et2WP7J4uFoov+ZxcCZfI18i32Z+3PTcSQbJSl7qEKE60bAjfUFuoUwq4+M=</DP>
  <DQ>D5hPnxVrQ9TCiscMRxmRaaKyCV55UN2i/RAQmXPvhMy5P+aGev/hzgp2bFQM3FtpavAgCBIpgCKJpKTMtObVvuvKOFoFf7RYj9cuaeh6HESJkiGHh88Qbx4C5S76dZkqDjctAkD+b4siDyo046Kvz/leCE4gpb+p3tzFYfVlmeE=</DQ>
  <InverseQ>ux0qhR3AqWMzOsSnwLtj7OGZR7p8hrga6TEr9V5nuvCovHLUcMcwAjXHm/+ZEWXCuQBnoQC82yQbyICuIUbLkYUSfPE59mxAgxrInqHY3j3IDQ09APyJJ1sIelyB0DZOpFa2ERydH0PcthPcS9/d42vADIuE3Z5k6Y9JVyGqmKQ=</InverseQ>
  <D>kbp2OKk2K5tu2P8AC3K7vDegpTg7G1XB16T/s9Fx/3EeP3d9OogGIUierePdXmKTmMdOCExu9ACcxODHrzI3ddpsk4uC16i3eFN9LSN2QAJ2hnomln0QrHDrlizZBnmAVmnNyvuprcFiNM5ieqdVCZKle+iaJOz529Kp8NuiK0FExKkv10WYSSsSf6T17eNnGqRqaCEnP8LSgu1WbPiKZ1oIEjt6WThGWIN6d9++InqhbXaCdglnA0U7kXXuWuAnlOf0uBlcUwrGBU6IKqmgrMwgqHKMuSSuJ65UoHYp3RTG+ECmtAHTe7YBBNnjOo8QSCEtdUpSdfKtT5YjVJhOwQ==</D>
</RSAKeyValue>

生成的RSA.Pub的内容:

<?xml version="1.0" encoding="utf-8"?>

<RSAKeyValue>
  <Modulus>veJTjzABfYl9/9YbOOw+EcfIZ1jajWiGPAXW+G/2uIUYh9L9WSyLPghl3oMZM2GDxp9f+chdc0k9lrNbJwsIaereleTiOcl2u/rq+jS8r2WhTfk8bIMWeAO/B5S0IjIbmKXdymRNZFw/KjuY99HdYk6nB1MZ1AJ/e3xJKwWJrXp55Y4DlX9sGTORS9kcy1q4fuxjJHUFAYsasV/vnsjlaau4sp6xBcDIfT1tRkxMZriDPW3J7qH7/qI2X4+iQZQIfAyFpSlqi+4GI9FajogEareCS7d1vc+OYdGc+jX1h0erHsRtlvFHzLcqBmZQ0Gz0XdZxOwJf5vhxUvvoK9BmBw==</Modulus>
  <Exponent>AQAB</Exponent>
</RSAKeyValue>

运行结果如图:

这里写图片描述


这里写图片描述

RSA是一种非对称加密算法,其公钥私钥是成对生成的。以下是RSA生成公钥私钥以及加解密的步骤: 1. 生成RSA公钥私钥: 首先需要随机生成两个大素数p和q,计算n = p * q,再选取一个整数e(一般为65537),计算d = e^-1 mod ((p-1) * (q-1))。 生成公钥为(n, e),私钥为(n, d)。 2. RSA加密: 假设要将明文M加密为密文C,使用公钥(n, e)进行加密,计算C = M^e mod n。 3. RSA解密: 使用私钥(n, d)进行解密,计算M = C^d mod n。 以下是一个简单的RSA解密的C语言实现示例: ```c #include <stdio.h> #include <stdlib.h> #include <string.h> #include <openssl/bio.h> #include <openssl/rsa.h> #include <openssl/pem.h> int main() { // 生成RSA公钥私钥 RSA *rsa = RSA_generate_key(2048, 65537, NULL, NULL); if (rsa == NULL) { printf("Failed to generate RSA key pair.\n"); return -1; } // 获取公钥私钥 BIO *pubBio = BIO_new(BIO_s_mem()); BIO *priBio = BIO_new(BIO_s_mem()); PEM_write_bio_RSAPublicKey(pubBio, rsa); PEM_write_bio_RSAPrivateKey(priBio, rsa, NULL, NULL, 0, NULL, NULL); // 获取公钥私钥字符串 char pubKey[1024] = {0}; char priKey[4096] = {0}; BIO_read(pubBio, pubKey, sizeof(pubKey)); BIO_read(priBio, priKey, sizeof(priKey)); // 输出公钥私钥 printf("Public Key:\n%s\n", pubKey); printf("Private Key:\n%s\n", priKey); // 加密明文 char *plaintext = "Hello World!"; int plaintextLen = strlen(plaintext) + 1; char ciphertext[4096] = {0}; int ciphertextLen = RSA_public_encrypt(plaintextLen, (unsigned char *)plaintext, (unsigned char *)ciphertext, rsa, RSA_PKCS1_PADDING); if (ciphertextLen == -1) { printf("Failed to encrypt plaintext.\n"); return -1; } // 输出密文 printf("Ciphertext:\n"); for (int i = 0; i < ciphertextLen; i++) { printf("%02x", ciphertext[i]); } printf("\n"); // 解密密文 char decrypted[4096] = {0}; int decryptedLen = RSA_private_decrypt(ciphertextLen, (unsigned char *)ciphertext, (unsigned char *)decrypted, rsa, RSA_PKCS1_PADDING); if (decryptedLen == -1) { printf("Failed to decrypt ciphertext.\n"); return -1; } // 输出解密后的明文 printf("Decrypted plaintext: %s\n", decrypted); // 释放资源 RSA_free(rsa); BIO_free_all(pubBio); BIO_free_all(priBio); return 0; } ```
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值