IBM-JDK与Sun-JDK加密算法提供者差异


最近为客户做了一个工具,需求:客户在命令行下,通过这个工具下载数据包;下载的数据包已加密,只有已登录的用户,才允许解密并使用数据包。


实现并不复杂,流程:

1、用户登录时,采用sha-1+n位随机码加密用户密码,提交服务器验证。

2、数据包已在服务器(PBEWithSHA1AndDESede)加密,用户根据数据包概要信息选择并下载数据包。

3、安装数据包时,需求用户输入密码,确认后执行解密+使用数据包。


在公司windows+linux测试后,到用户现场测试(AIX机器),发现程序报错,查来查去 发现IBM-JDK与Sun-JDK采用不同的加密提供者,采用Sun-JDK加密算法写的代码 在AIX要么加密算法提供者无法找到,要么密钥长度不对。


以下是两种jdk加密算法提供者信息,能看出明显不同。

---------------sun jdk1.5 加密算法提供信息
SUN 1.5 SUN (DSA key/parameter generation; DSA signing; SHA-1, MD5 digests; SecureRandom; X.509 certificates; JKS keystore; PKIX CertPathValidator; PKIX CertPathBuilder; LDAP, Collection CertStores)
SunRsaSign 1.5 Sun RSA signature provider
SunJSSE 1.5 Sun JSSE provider(PKCS12, SunX509 key/trust factories, SSLv3, TLSv1)
SunJCE 1.5 SunJCE Provider (implements RSA, DES, Triple DES, AES, Blowfish, ARCFOUR, RC2, PBE, Diffie-Hellman, HMAC)
SunJGSS 1.0 Sun (Kerberos v5)
SunSASL 1.5 Sun SASL provider(implements client mechanisms for: DIGEST-MD5, GSSAPI, EXTERNAL, PLAIN, CRAM-MD5; server mechanisms for: DIGEST-MD5, GSSAPI, CRAM-MD5)


---------------aix jdk1.5 加密算法提供信息
IBMJSSE2 1.5 IBM JSSE provider2 (implements IbmX509 key/trust factories, SSLv3,
TLSv1)
IBMJCE 1.2 IBMJCE Provider implements the following: HMAC-SHA1, MD2, MD5, MARS,
SHA, MD2withRSA, MD5withRSA, SHA1withRSA, RSA, SHA1withDSA, RC2, RC4, Seal)imple
ments the following:
Signature algorithms               : SHA1withDSA, SHA1withRSA, MD5withRSA, MD2wi
thRSA,
                                       SHA2withRSA, SHA3withRSA, SHA5withRSA
Cipher algorithms                  : Blowfish, AES, DES, TripleDES, PBEWithMD2An
dDES,
                                       PBEWithMD2AndTripleDES, PBEWithMD2AndRC2,

                                       PBEWithMD5AndDES, PBEWithMD5AndTripleDES,

                                       PBEWithMD5AndRC2, PBEWithSHA1AndDES
                                       PBEWithSHA1AndTripleDES, PBEWithSHA1AndRC
2
                                       PBEWithSHAAnd40BitRC2, PBEWithSHAAnd128Bi
tRC2
                                       PBEWithSHAAnd40BitRC4, PBEWithSHAAnd128Bi
tRC4
                                       PBEWithSHAAnd2KeyTripleDES, PBEWithSHAAnd
3KeyTripleDES
                                       Mars, RC2, RC4, ARCFOUR
                                       RSA, Seal
Message authentication code (MAC)  : HmacSHA1, HmacSHA256, HmacSHA384, HmacSHA51
2, HmacMD2, HmacMD5
Key agreement algorithm            : DiffieHellman
Key (pair) generator               : Blowfish, DiffieHellman, DSA, AES, DES, Tri
pleDES, HmacMD5,
                                       HmacSHA1, Mars, RC2, RC4, RSA, Seal, ARCF
OUR
Message digest                     : MD2, MD5, SHA-1, SHA-256, SHA-384, SHA-512
Algorithm parameter generator      : DiffieHellman, DSA
Algorithm parameter                : Blowfish, DiffieHellman, AES, DES, TripleDE
S, DSA, Mars,
                                       PBEwithMD5AndDES, RC2
Key factory                        : DiffieHellman, DSA, RSA
Secret key factory                 : Blowfish, AES, DES, TripleDES, Mars, RC2, R
C4, Seal, ARCFOUR
                                       PKCS5Key, PBKDF1 and PBKDF2(PKCS5Derived
Key).
Certificate                        : X.509
Secure random                      : IBMSecureRandom
Key store                          : JCEKS, PKCS12KS (PKCS12), JKS

IBMJGSSProvider 1.5 IBMJGSSProvider supports Kerberos V5 Mechanism
IBMCertPath 1.1 IBMCertPath Provider implements the following:
CertificateFactory                : X.509
CertPathValidator              : PKIX
CertStore                      : Collection, LDAP
CertPathBuilder                : PKIX

IBMSASL 1.5 IBM SASL provider(implements client mechanisms for: DIGEST-MD5, GSSA
PI, EXTERNAL, PLAIN, CRAM-MD5; server mechanisms for: DIGEST-MD5, GSSAPI, CRAM-M
D5)




解决方法:

1、为IBM-JDK写专用程序,用IBM加密算法。 这种方法可能存在两种jdk加密结果不同的风险。

2、把Sun-JDK加密算法包加载到AIX(Java运行)环境中。 采用此方法。


第2种方法,在AIX上需要针对加密算法加载Sun-JDK/JRE的加密算法包

jre/lib/ext/sunjce_provider.jar、jre/lib/jce.jar下有SunJCE提供者(PBEWithSHA1AndDESede算法需要);jdk/lib/rt.jar下有SUN提供者(SHA-1算法需要) 


代码修改

显式加载加密算法提供者

static{
		if(null==Security.getProvider("SunJCE")){
			Security.addProvider(new com.sun.crypto.provider.SunJCE());
		}
		
		if(null==Security.getProvider("SUN")){
			Security.addProvider(new sun.security.provider.Sun());
		}
	}



加密算法使用时需要显式指出提供者名称

/**
	 * 基于口令的加密方法
	 * @param src
	 * @return
	 */
	public static 
	byte[] encrypt(byte[] src){
		byte[] res = null;
		
		try{
            PBEKeySpec keySpec = new PBEKeySpec(secretPasswd);  
            SecretKeyFactory keyFactory = SecretKeyFactory.getInstance("PBEWithSHA1AndDESede", "SunJCE");  //,"SunJCE"
            Key passwdKey = keyFactory.generateSecret(keySpec);            
            PBEParameterSpec paramSpec = new PBEParameterSpec(secretSalt, secretIterations);

            Cipher cip = Cipher.getInstance("PBEWithSHA1AndDESede", "SunJCE");//, "SunJCE"
            cip.init(Cipher.ENCRYPT_MODE, passwdKey, paramSpec);
            //数据加密
            res = cip.doFinal(src);
		}catch(Exception ex){
			ex.printStackTrace();
		}
		
		return res;
	}	

	/**
	 * 基于口令的解密方法
	 * @param data
	 * @return
	 */
	public static 
	byte[] decrypt(byte[] data){
		byte[] res = null;
		
		try{
			PBEKeySpec keySpec = new PBEKeySpec(secretPasswd);  
            SecretKeyFactory keyFactory = SecretKeyFactory.getInstance("PBEWithSHA1AndDESede", "SunJCE");  //,"SunJCE"
            Key passwdKey = keyFactory.generateSecret(keySpec);            
            PBEParameterSpec paramSpec = new PBEParameterSpec(secretSalt, secretIterations);

            Cipher cip = Cipher.getInstance("PBEWithSHA1AndDESede", "SunJCE");//, "SunJCE"
            cip.init(Cipher.DECRYPT_MODE, passwdKey, paramSpec);
            //数据加密
            res = cip.doFinal(data);
		}catch(Exception ex){
			ex.printStackTrace();
		}
		
		return res;
	}

	/**
	 * 返回16进制sha-1加密后信息
	 * @param btInput
	 * @return
	 */
	public static String sha1Hex(byte[] btInput){
		final char hexDigits[]={'0','1','2','3','4','5','6','7','8','9','A','B','C','D','E','F'};
		try {
			MessageDigest mdInst = MessageDigest.getInstance("SHA-1", "SUN");
			mdInst.update(btInput);
			byte[] md = mdInst.digest();
			// 把密文转换成十六进制的字符串形式
            int j = md.length;
            char str[] = new char[j * 2];
            
            for (int i=0,k=0; i < j; i++) {
                byte byte0 = md[i];
                str[k++] = hexDigits[byte0 >>> 4 & 0xf];
                str[k++] = hexDigits[byte0 & 0xf];
            }
            
            return new String(str);            
		} catch (Exception e) {
			e.printStackTrace();
			return "";
		}
	}


  • 6
    点赞
  • 9
    收藏
    觉得还不错? 一键收藏
  • 2
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 2
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值