java对称加密和非对称加密(PBE、DH、RSA)

1. 什么是对称式加密和非对称式加密

对称式加密:解密方式是加密方式的逆运算,即加密和解密使用的是同一个密钥(初等加密算法)。

非对称式加密:加密和解密需要两个密钥进行,这两个密钥是公钥和私钥(高等加密算法)。

2. 对称式加密和非对称式加密的主要实现方式

对称式加密主要实现方式:

1) DES(Data Encryption Standard):安全性较差,一般不建议使用。

2) 3DES:三重DES,针对DES密钥长度较短的问题,3DES可以实现最少112位、最高168位密钥长度。

3) AES:相比于3DES拥有更好的安全性。

4) PBE(Password Based Encryption):基于口令的加密,结合了DES和AES的优点。

非对称式加密主要实现方式:

1) DH(Diffie-Hellman):密钥交换算法。

2) RSA:基于因子分解。

3) ElGamal:基于离散对数。

4) ECC(Elliptical Curve Cryptography):椭圆曲线加密。

3. 对称式加密和非对称式加密的对比

非对称加密与对称加密相比,其安全性更好:对称加密的通信双方使用相同的秘钥,如果一方的秘钥遭泄露,那么整个通信就会被破解。而非对称加密使用一对秘钥,一个用来加密,一个用来解密,而且公钥是公开的,秘钥是自己保存的,不需要像对称加密那样在通信之前要先同步密钥。
4. 对称式加密在Java中的实现(PBE加密):

public class PBE {

    private static Stringsrc="security with PBE";

    public static void main(String[]args){

        jdkPBE();

    }

 

    public static void jdkPBE(){

        try {

            //初始化盐(扰码)

            SecureRandom random=newSecureRandom();

            byte[]salt=random.generateSeed(8);

 

            //口令与密钥

            Stringpassword="CSDN";

            PBEKeySpecpbeKeySpec=new PBEKeySpec(password.toCharArray());

            SecretKeyFactoryfactory=SecretKeyFactory.getInstance("PBEWITHMD5andEDS");

            Keykey=factory.generateSecret(pbeKeySpec);

 

            //加密

            PBEParameterSpecpbeParameterSpec=new PBEParameterSpec(salt,100);//参数1.盐,参数2.迭代次数

            Cipher cipher=Cipher.getInstance("PBEWITHMD5andEDS");

           cipher.init(Cipher.ENCRYPT_MODE,key,pbeParameterSpec);

            byte[]result=cipher.doFinal(src.getBytes());

           System.out.println("jdk pbe encrypt:" +Base64.encodeToString(result,1));

 

            //解密

           cipher.init(Cipher.DECRYPT_MODE,key,pbeParameterSpec);

           result=cipher.doFinal(result);

           System.out.println("jdk pbe decrypt:"+new String(result));

        } catch (Exception e) {

            e.printStackTrace();

        }

    }
}

5. 非对称式加密在JAVA中的实现(DH加密):

public class DH {

    private static Stringsrc="security with DH";

    public static void main(String[]args){

        jdkDH();

    }

 

    public static void jdkDH(){

        try {

            //初始化发送方密钥

            KeyPairGeneratorsenderKeyPairGenerator=KeyPairGenerator.getInstance("DH");

           senderKeyPairGenerator.initialize(512);

            KeyPairsenderKeyPair=senderKeyPairGenerator.generateKeyPair();

            byte[]senderPublicKeyEnc=senderKeyPair.getPublic().getEncoded();

 

            //初始化接收方密钥

            KeyFactoryreceiverKeyFactory=KeyFactory.getInstance("DH");

            X509EncodedKeySpecx509EncodedKeySpec=new X509EncodedKeySpec(senderPublicKeyEnc);

            PublicKeyreceiverPublicKey=receiverKeyFactory.generatePublic(x509EncodedKeySpec);

            DHParameterSpecdhParameterSpec=((DHPublicKey)receiverPublicKey).getParams();

            KeyPairGeneratorreceiverKeyPairGenerator=KeyPairGenerator.getInstance("DH");

           receiverKeyPairGenerator.initialize(dhParameterSpec);

            KeyPairreceiverKeyPair=receiverKeyPairGenerator.generateKeyPair();

            PrivateKeyreceiverPrivateKey=receiverKeyPair.getPrivate();

            byte[]receiverPublicKeyEnc =receiverKeyPair.getPublic().getEncoded();

 

            //密钥构建

            KeyAgreementreceiverKeyAgreement = KeyAgreement.getInstance("DH");

           receiverKeyAgreement.init(receiverPrivateKey);

            receiverKeyAgreement.doPhase(receiverPublicKey,true);

            SecretKeyreceiverDesKey=receiverKeyAgreement.generateSecret("DES");

 

            KeyFactorysenderKeyFactory=KeyFactory.getInstance("DH");

            x509EncodedKeySpec=newX509EncodedKeySpec(receiverPublicKeyEnc);

            PublicKeysenderPublicKey=senderKeyFactory.generatePublic(x509EncodedKeySpec);

            KeyAgreementsenderKeyAgreement=KeyAgreement.getInstance("DH");

           senderKeyAgreement.init(senderKeyPair.getPrivate());

           senderKeyAgreement.doPhase(senderPublicKey, true);

            SecretKeysenderDesKey=senderKeyAgreement.generateSecret("DES");

           if(Objects.equals(receiverDesKey,senderDesKey)){

               System.out.println("双方密钥相同");

            }

 

            //加密

            Ciphercipher=Cipher.getInstance("DES");

           cipher.init(Cipher.ENCRYPT_MODE,senderDesKey);

            byte[]result=cipher.doFinal(src.getBytes());

           System.out.println("jdk dhencrypt:"+Base64.encodeToString(result,1));

 

            //解密

           cipher=Cipher.getInstance("DES");

           cipher.init(Cipher.DECRYPT_MODE,receiverDesKey);

           result=cipher.doFinal(result);

            System.out.println("jdk dhencrypt:"+new String(result));

 

        } catch (Exception e) {

            e.printStackTrace();

        }

    }

}

6. 非对称式加密在JAVA中的实现(RSA加密):

public class RSA {

    private static Stringsrc="security with rsa";

    public static void main(String[]args){

        jdkRSA();

    }

 

    public static void jdkRSA(){

        try {

            //初始化密钥

            KeyPairGeneratorkeyPairGenerator=KeyPairGenerator.getInstance("RSA");

           keyPairGenerator.initialize(512);//64的整倍数,512~65536

            KeyPairkeyPair=keyPairGenerator.generateKeyPair();

            RSAPrivateKeyrsaPrivateKey= (RSAPrivateKey) keyPair.getPrivate();

            RSAPublicKeyrsaPublicKey= (RSAPublicKey) keyPair.getPublic();

           System.out.println("Public key:"+Base64.encodeToString(rsaPrivateKey.getEncoded(),1));

           System.out.println("Private key:"+ Base64.encodeToString(rsaPrivateKey.getEncoded(),1));

 

            //私钥加密,公钥解密——加密

            PKCS8EncodedKeySpecpkcs8EncodedKeySpec=new PKCS8EncodedKeySpec(rsaPrivateKey.getEncoded());

            KeyFactorykeyFactory=KeyFactory.getInstance("RSA");

            PrivateKeyprivateKey=keyFactory.generatePrivate(pkcs8EncodedKeySpec);

            Ciphercipher=Cipher.getInstance("RSA");

           cipher.init(Cipher.ENCRYPT_MODE, privateKey);

            byte[]result=cipher.doFinal(src.getBytes());

            System.out.println("私钥加密,公钥解密——加密:"+Base64.encodeToString(result,1));

 

            //私钥加密,公钥解密——解密

            X509EncodedKeySpecx509EncodedKeySpec=new X509EncodedKeySpec(rsaPublicKey.getEncoded());

           keyFactory=KeyFactory.getInstance("RSA");

            PublicKeypublicKey=keyFactory.generatePublic(x509EncodedKeySpec);

           cipher=Cipher.getInstance("RSA");

           cipher.init(Cipher.DECRYPT_MODE,publicKey);

           result=cipher.doFinal(result);

            System.out.println(newString(result));

 

            //公钥加密,私钥解密——加密

            x509EncodedKeySpec=newX509EncodedKeySpec(rsaPublicKey.getEncoded());

           keyFactory=KeyFactory.getInstance("RSA");

           publicKey=keyFactory.generatePublic(x509EncodedKeySpec);

           cipher=Cipher.getInstance("RSA");

           cipher.init(Cipher.ENCRYPT_MODE,publicKey);

           result=cipher.doFinal(src.getBytes());

           System.out.println("钥加密,私钥解密——加密:"+Base64.encodeToString(result,1));

 

            //公钥加密,私钥解密——解密

            pkcs8EncodedKeySpec=newPKCS8EncodedKeySpec(rsaPrivateKey.getEncoded());

           keyFactory=KeyFactory.getInstance("RSA");

           privateKey=keyFactory.generatePrivate(pkcs8EncodedKeySpec);

            cipher=Cipher.getInstance("RSA");

           cipher.init(Cipher.DECRYPT_MODE,privateKey);

            cipher.doFinal(result);

           System.out.println("公钥加密,私钥解密——解密:" + Base64.encodeToString(result, 1));

 

        } catch (Exception e) {

            e.printStackTrace();

        }

    }

}
  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
好的,我会尽力回答您的问题。 PBE(Password-Based Encryption)口令加密是一种基于口令的加密方式,它通过使用用户输入的口令来生成加密密钥,从而实现数据加密。PBE口令加密算法有很多,其中包括使用MD5消息摘要算法和TripleDES对称加密算法的PBE口令加密算法。下面我将简单介绍一下这种算法的实现和验证过程。 1. 算法实现 首先,我们需要使用MD5消息摘要算法对口令进行摘要处理,生成128位的摘要值。然后,我们使用生成的摘要值作为密钥,使用TripleDES对称加密算法对要加密的数据进行加密。 下面是一个简单的Java实现示例: ```java import javax.crypto.Cipher; import javax.crypto.SecretKey; import javax.crypto.SecretKeyFactory; import javax.crypto.spec.DESedeKeySpec; import java.security.MessageDigest; import java.security.SecureRandom; public class PBECipher { private static final int ITERATIONS = 1000; private static final int KEY_LENGTH = 192; public static byte[] encrypt(String password, byte[] data) throws Exception { SecureRandom random = new SecureRandom(); byte[] salt = new byte[8]; random.nextBytes(salt); SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1"); SecretKey key = factory.generateSecret(new DESedeKeySpec(getKey(password.toCharArray(), salt))); Cipher cipher = Cipher.getInstance("DESede"); cipher.init(Cipher.ENCRYPT_MODE, key); byte[] encrypted = cipher.doFinal(data); MessageDigest md = MessageDigest.getInstance("MD5"); md.update(password.getBytes()); md.update(salt); md.update(encrypted); byte[] digest = md.digest(); byte[] output = new byte[encrypted.length + digest.length + salt.length]; System.arraycopy(encrypted, 0, output, 0, encrypted.length); System.arraycopy(digest, 0, output, encrypted.length, digest.length); System.arraycopy(salt, 0, output, encrypted.length + digest.length, salt.length); return output; } public static boolean verify(String password, byte[] encryptedData) throws Exception { byte[] encrypted = new byte[encryptedData.length - 16 - 8]; byte[] digest = new byte[16]; byte[] salt = new byte[8]; System.arraycopy(encryptedData, 0, encrypted, 0, encryptedData.length - 16 - 8); System.arraycopy(encryptedData, encryptedData.length - 16 - 8, digest, 0, 16); System.arraycopy(encryptedData, encryptedData.length - 8, salt, 0, 8); SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1"); SecretKey key = factory.generateSecret(new DESedeKeySpec(getKey(password.toCharArray(), salt))); MessageDigest md = MessageDigest.getInstance("MD5"); md.update(password.getBytes()); md.update(salt); md.update(encrypted); byte[] newDigest = md.digest(); if (!MessageDigest.isEqual(digest, newDigest)) { return false; } Cipher cipher = Cipher.getInstance("DESede"); cipher.init(Cipher.DECRYPT_MODE, key); byte[] decrypted = cipher.doFinal(encrypted); return MessageDigest.isEqual(decrypted, encryptedData); } private static byte[] getKey(char[] password, byte[] salt) throws Exception { SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1"); return factory.generateSecret(new DESedeKeySpec(password)).getEncoded(); } } ``` 2. 算法验证 为了验证这个算法是否正确,我们需要编写一个测试程序,生成随机的数据,使用口令加密后再进行解密,并与原始数据进行比较。如果解密后的数据与原始数据相同,则说明加密算法正确。 下面是一个简单的Java测试程序示例: ```java import java.security.SecureRandom; import java.util.Arrays; public class PBECipherTest { public static void main(String[] args) throws Exception { SecureRandom random = new SecureRandom(); byte[] data = new byte[1024]; random.nextBytes(data); String password = "password"; byte[] encrypted = PBECipher.encrypt(password, data); System.out.println("Original Data: " + Arrays.toString(data)); System.out.println("Encrypted Data: " + Arrays.toString(encrypted)); boolean verified = PBECipher.verify(password, encrypted); System.out.println("Verification Result: " + verified); } } ``` 运行测试程序后,如果输出的Verification Result为true,则说明这个算法实现是正确的。 希望这个回答能够帮到您。如果您还有任何问题,请随时提出。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值