RSA加解密工具类讲解(Java实现)

这里我写了一个工具类:

import java.security.KeyFactory;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.NoSuchAlgorithmException;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.SecureRandom;
import java.security.interfaces.RSAPrivateKey;
import java.security.interfaces.RSAPublicKey;
import java.security.spec.PKCS8EncodedKeySpec;
import java.security.spec.X509EncodedKeySpec;

import javax.crypto.Cipher;

import org.apache.commons.codec.binary.Base64;

/**
 * RSA加解密工具类
 * @author QiuFeihu
 *
 */
public class RSAUtil {

    public static String publicKey;  //公钥
    public static String privateKey; //私钥

    /**
     * 生成公钥和私钥
     */
    public static void generateKey(){
        //1.初始化秘钥
        KeyPairGenerator keyPairGenerator;
        try {
            keyPairGenerator = KeyPairGenerator.getInstance("RSA");
            SecureRandom sr = new SecureRandom();  //随机数生成器
            keyPairGenerator.initialize(512,sr);   //设置512位长的秘钥
            KeyPair keyPair = keyPairGenerator.generateKeyPair(); //开始创建
            RSAPublicKey rsaPublicKey = (RSAPublicKey)keyPair.getPublic(); 
            RSAPrivateKey rsaPrivateKey = (RSAPrivateKey)keyPair.getPrivate();
            //进行转码
            publicKey = Base64.encodeBase64String(rsaPublicKey.getEncoded());
            //进行转码
            privateKey = Base64.encodeBase64String(rsaPrivateKey.getEncoded()); 
        } catch (NoSuchAlgorithmException e) {
            // TODO Auto-generated catch block
            e.printStackTrace();
        }
    }

    /**
     * 私钥匙加密或解密
     * @param content
     * @param privateKeyStr
     * @return
     */
    public static String encryptByprivateKey(String content,
            String privateKeyStr,int opmode){
        //私钥要用PKCS8进行处理
        PKCS8EncodedKeySpec pkcs8EncodedKeySpec = 
                new PKCS8EncodedKeySpec(Base64.decodeBase64(privateKeyStr));
        KeyFactory keyFactory;
        PrivateKey privateKey;
        Cipher cipher;
        byte[] result;
        String text = null;
        try {
            keyFactory = KeyFactory.getInstance("RSA");
            //还原Key对象
            privateKey = keyFactory.generatePrivate(pkcs8EncodedKeySpec); 
            cipher = Cipher.getInstance("RSA");
            cipher.init(opmode, privateKey);
            if(opmode == Cipher.ENCRYPT_MODE){  //加密
                result = cipher.doFinal(content.getBytes());
                text = Base64.encodeBase64String(result);
            }else if(opmode == Cipher.DECRYPT_MODE){  //解密
                result = cipher.doFinal(Base64.decodeBase64(content));
                text = new String(result,"UTF-8");
            }

        } catch (Exception e) {
            // TODO Auto-generated catch block
            e.printStackTrace();
        }
        return text;
    }

    /**
     * 公钥匙加密或解密
     * @param content
     * @param privateKeyStr
     * @return
     */
    public static String encryptByPublicKey(String content,
            String publicKeyStr,int opmode){
        //公钥要用X509进行处理
        X509EncodedKeySpec x509EncodedKeySpec = 
                new X509EncodedKeySpec(Base64.decodeBase64(publicKeyStr));
        KeyFactory keyFactory;
        PublicKey publicKey;
        Cipher cipher;
        byte[] result;
        String text = null;
        try {
            keyFactory = KeyFactory.getInstance("RSA");
            //还原Key对象
            publicKey = keyFactory.generatePublic(x509EncodedKeySpec);  
            cipher = Cipher.getInstance("RSA");
            cipher.init(opmode, publicKey);
            if(opmode == Cipher.ENCRYPT_MODE){  //加密
                result = cipher.doFinal(content.getBytes());
                text = Base64.encodeBase64String(result);
            }else if(opmode == Cipher.DECRYPT_MODE){  //解密
                result = cipher.doFinal(Base64.decodeBase64(content));
                text = new String(result,"UTF-8");
            }
        } catch (Exception e) {
            // TODO Auto-generated catch block
            e.printStackTrace();
        }
        return text;
    }
}

测试代码:

    /**
     * 测试方法
     * @param args
     */
    public static void main(String[] args) {

        /**
         * 注意:
         *   私钥加密必须公钥解密
         *   公钥加密必须私钥解密
         */
         System.out.println("-------------生成两对秘钥,分别发送方和接收方保管-------------");
         RSAUtil.generateKey();
         System.out.println("公钥匙给接收方:"+RSAUtil.publicKey);
         System.out.println("私钥给发送方:"+RSAUtil.privateKey);

         System.out.println("-------------第一个栗子,私钥加密公钥解密-------------");
         String textsr = "早啊,你吃早饭了吗?O(∩_∩)O~";
         //私钥加密
         String cipherText = RSAUtil.encryptByprivateKey(textsr, 
                 RSAUtil.privateKey, Cipher.ENCRYPT_MODE);
         System.out.println("发送方用私钥加密后:"+cipherText);
         //公钥解密
         String text = RSAUtil.encryptByPublicKey(cipherText, 
                 RSAUtil.publicKey, Cipher.DECRYPT_MODE);
         System.out.println("接收方用公钥解密后:"+text);

         System.out.println("-------------第二个栗子,公钥加密私钥解密-------------");
         //公钥加密
         textsr = "吃过啦!你吃了吗?O(∩_∩)O~";
         cipherText = RSAUtil.encryptByPublicKey(textsr, 
                 RSAUtil.publicKey, Cipher.ENCRYPT_MODE);
         System.out.println("接收方用公钥加密后:"+cipherText);
         //公钥解密
         text = RSAUtil.encryptByprivateKey(cipherText, 
                 RSAUtil.privateKey, Cipher.DECRYPT_MODE);
         System.out.print("发送方用私钥解密后:"+text);

    }

结果:

-------------生成两对秘钥,分别发送方和接收方保管-------------
公钥匙给接收方:MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBALS0HFJUPrdpLfzKvzbM9Pr+8NuMaxTcR4E2Y121WbAR9d9ADhV+XLsatd612fvCWsfjZRFCo6nG97Cn+s6fWl0CAwEAAQ==
私钥给发送方:MIIBVQIBADANBgkqhkiG9w0BAQEFAASCAT8wggE7AgEAAkEAtLQcUlQ+t2kt/Mq/Nsz0+v7w24xrFNxHgTZjXbVZsBH130AOFX5cuxq13rXZ+8Jax+NlEUKjqcb3sKf6zp9aXQIDAQABAkBGalEG+/Ecg436Df+JGUD1ddbhlsw7asMqZMk/wOVcKFufOiRxhYr6qkx3oAt0/ALEhymopZDgyj6GbtiG+DvBAiEA5BUmq4oi3wDgfOVoq35CiGFVe7gBaxNldVaadILawnkCIQDK0lyNB9bI4yx/fEDmqn5cXo5AHua04oi7JH1JITJ+BQIgQkmfZoWMIvHXTJVD+WuFnKtlM8LDrsIBX7vewfPx7kkCIQCH1q4f0pE6yFPEKn75PlUVHksdjNStb09uL3ktomtD1QIhALcZ6AKA7TMj5ZNc32C4EYet6dzEhX52AMcPFNK1UaWR
-------------第一个栗子,私钥加密公钥解密-------------
发送方用私钥加密后:lMNTCZJ/0E0wrD1IdmTt0/+Mz/WUYUQZB1D3aayU8YjePm4W9Ex1oVzoHCAXrbunJAwPFKIMvS/Y0Q67j4QRVA==
接收方用公钥解密后:早啊,你吃早饭了吗?O(∩_∩)O~
-------------第二个栗子,公钥加密私钥解密-------------
接收方用公钥加密后:Me7ruIqFekwRhImasoZ0FR4ieN0TrXJJ/QLdKKkyWa6ENYNdLKK3ikvTK/rI4KWjCj/n5aMpvOHSH9O0lZwdEA==
发送方用私钥解密后:吃过啦!你吃了吗?O(∩_∩)O~
  • 0
    点赞
  • 2
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值