RES 签名/加解密

需要额外包commons-codec-2.0-20130428.202122-59.jar

package com.testJava;

import java.security.Key;
import java.security.KeyFactory;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.Signature;
import java.security.interfaces.RSAPrivateKey;
import java.security.interfaces.RSAPublicKey;
import java.security.spec.PKCS8EncodedKeySpec;
import java.security.spec.X509EncodedKeySpec;
import java.util.HashMap;
import java.util.Map;

import javax.crypto.Cipher;

import org.apache.commons.codec.binary.Base64;
import org.apache.commons.codec.binary.Hex;

/**
 * RSA安全编码组件
 * 
 * @author admin
 *
 */
public class RSACoder {
	// 非对称加密秘钥算法
	private static final String KEY_ALGORITHM = "RSA";
	// 公钥
	private static final String PUBLIC_KEY = "RSAPublicKey";
	// 私钥
	private static final String PRIVATE_KEY = "RSAPrivateKey";
	// RSA秘钥长度 默认1024
	private static final int KEY_SIZE = 1024;

	private static byte[] privateKey;// 字节 私钥

	private static byte[] publicKey;// 字节 公钥

	private static String privateKeyString = "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";

	private static String publicKeyString = "30819f300d06092a864886f70d010101050003818d0030818902818100820afd22bdd36cb75ef8db1a970d50ca352d57eecaa28779a559f626bf9182f0f986a2ea251f76040616032dc739e8558c0dfdfa82bef0203e8412bb2cb0dcaf7f568f100ce05f7bb239a6a4cbd7c1ed8041ea6f3b0c641c94f71228320584ba871012df218799b09f638478b9233bf594faa22d30d792a46b58459a52a1e1ef0203010001";

	// 私钥解密
	/**
	 * @param data
	 *            待解密的数据
	 * @param key
	 *            私钥
	 * @return byte[] 解密数据
	 * @throws Exception
	 */
	public static byte[] decryptByPrivateKey(byte[] data, byte[] key) throws Exception {
		// 取的私钥
		PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(key);
		KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
		// 生产私钥对象
		PrivateKey privateKey = keyFactory.generatePrivate(pkcs8KeySpec);

		// 对数据解密
		Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
		cipher.init(Cipher.DECRYPT_MODE, privateKey);

		// 执行
		return cipher.doFinal(data);
	}

	/**
	 * @param data
	 *            待加密数据
	 * @param key
	 *            公钥
	 * @return byte[] 加密数据
	 * @throws Exception
	 */
	public static byte[] encryptByPublicKey(byte[] data, byte[] key) throws Exception {
		// 取的公钥
		X509EncodedKeySpec X509KeySpec = new X509EncodedKeySpec(key);
		KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
		// 生产公钥对象
		PublicKey publicKey = keyFactory.generatePublic(X509KeySpec);
		// 对数据进行加密
		Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
		cipher.init(Cipher.ENCRYPT_MODE, publicKey);
		// 执行
		return cipher.doFinal(data);
	}

	/**
	 * 取的私钥
	 * 
	 * @param keyMap
	 *            秘钥map
	 * @return byte[] 私钥
	 */
	public static byte[] getPrivateKey(Map<String, Object> keyMap) {
		Key key = (Key) keyMap.get(PRIVATE_KEY);
		return key.getEncoded();
	}

	/**
	 * 取的公钥
	 * 
	 * @param keyMap
	 *            秘钥map
	 * @return byte[] 公钥
	 */
	public static byte[] getPublicKey(Map<String, Object> keyMap) {
		Key key = (Key) keyMap.get(PUBLIC_KEY);
		return key.getEncoded();
	}

	private static Map<String, Object> initKey() throws Exception {
		// 实例化秘钥生产器
		KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance(KEY_ALGORITHM);
		// 初始化秘钥生产器
		keyPairGen.initialize(KEY_SIZE);
		// 生产秘钥对
		KeyPair keyPair = keyPairGen.generateKeyPair();
		// 公钥
		RSAPublicKey publicKey = (RSAPublicKey) keyPair.getPublic();
		// 秘钥
		RSAPrivateKey privateKey = (RSAPrivateKey) keyPair.getPrivate();

		// 封装秘钥
		Map<String, Object> keyMap = new HashMap<String, Object>();
		keyMap.put(PUBLIC_KEY, publicKey);
		keyMap.put(PRIVATE_KEY, privateKey);
		return keyMap;
	}

	/**
	 * 将16进制字符串还原为字节数组.
	 */
	private static final byte[] hexStrToBytes(String s) {
		byte[] bytes;

		bytes = new byte[s.length() / 2];

		for (int i = 0; i < bytes.length; i++) {
			bytes[i] = (byte) Integer.parseInt(s.substring(2 * i, 2 * i + 2), 16);
		}

		return bytes;
	}

	/**
	 * 本方法使用SHA1withRSA签名算法产生签名
	 *
	 * @param String
	 *            priKey 签名时使用的私钥(16进制编码)
	 * @param String
	 *            src 签名的原字符串
	 * @return String 签名的返回结果(16进制编码)。当产生签名出错的时候,返回null。
	 */
	public static String generateSHA1withRSASigature(String priKey, String src) {
		try {

			Signature sigEng = Signature.getInstance("SHA1withRSA");

			byte[] pribyte = hexStrToBytes(priKey.trim());

			PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(pribyte);
			KeyFactory fac = KeyFactory.getInstance("RSA");

			RSAPrivateKey privateKey = (RSAPrivateKey) fac.generatePrivate(keySpec);
			sigEng.initSign(privateKey);
			sigEng.update(src.getBytes());

			byte[] signature = sigEng.sign();
			return new String(Hex.encodeHex(signature));
		} catch (Exception e) {
			e.printStackTrace();
			return null;
		}
	}

	/**
	 * 本方法使用SHA1withRSA签名算法验证签名
	 *
	 * @param String
	 *            pubKey 验证签名时使用的公钥(16进制编码)
	 * @param String
	 *            sign 签名结果(16进制编码)
	 * @param String
	 *            src 签名的原字符串
	 * @return String 签名的返回结果(16进制编码)
	 */
	public static boolean verifySHA1withRSASigature(String pubKey, String sign, String src) {
		try {
			Signature sigEng = Signature.getInstance("SHA1withRSA");

			byte[] pubbyte = hexStrToBytes(pubKey.trim());

			X509EncodedKeySpec keySpec = new X509EncodedKeySpec(pubbyte);
			KeyFactory fac = KeyFactory.getInstance("RSA");
			RSAPublicKey rsaPubKey = (RSAPublicKey) fac.generatePublic(keySpec);

			sigEng.initVerify(rsaPubKey);
			sigEng.update(src.getBytes());

			byte[] sign1 = hexStrToBytes(sign);
			return sigEng.verify(sign1);

		} catch (Exception e) {
			return false;
		}
	}

	public static void main(String[] args) throws Exception {
		/*
		 * Map<String,Object> keyMap = RSACoder.initKey(); byte[] privateKey =
		 * RSACoder.getPrivateKey(keyMap); byte[] publicKey =
		 * RSACoder.getPublicKey(keyMap);
		 * 
		 * //Hex.encodeHex 做16进制编码处理 System.out.println("16进制 公钥字符串:\t"+new
		 * String(Hex.encodeHex(publicKey)));
		 * System.out.println("16进制 私钥字符串:\t"+new
		 * String(Hex.encodeHex(privateKey)));
		 */

		privateKey = hexStrToBytes(privateKeyString);

		publicKey = hexStrToBytes(publicKeyString);

		String str = "RSAAA";
		byte[] inputStr = str.getBytes();
		System.out.println("原文:\t" + str);

		/*
		 * //进行数据签名 String sign =
		 * generateSHA1withRSASigature(privateKeyString,str);
		 * System.out.println("签名值:\t"+sign);
		 * 
		 * Boolean falg = verifySHA1withRSASigature(publicKeyString,sign,str);
		 * System.out.println("签名状态:\t"+falg); if(falg){
		 * 
		 * System.out.println("公钥:\t"+Base64.encodeBase64String(publicKey));
		 * System.out.println("私钥:\t"+Base64.encodeBase64String(privateKey));
		 * 
		 * //公钥加密 byte[] endcryptData = RSACoder.encryptByPublicKey(inputStr,
		 * publicKey);
		 * System.out.println("加密后:\t"+Base64.encodeBase64String(endcryptData));
		 * 
		 * //私钥解密 byte[] decryptData =
		 * RSACoder.decryptByPrivateKey(endcryptData, privateKey); String
		 * decryptStr = new String(decryptData);
		 * System.out.println("解密后:\t"+decryptStr); }
		 * 
		 * System.out.println("签名验证不通过...end");
		 */

		// 以下是先通过私钥对原始数据进行加密,再进行签名
		// 公钥加密
		byte[] endcryptData = RSACoder.encryptByPublicKey(inputStr, publicKey);
		System.out.println("加密后:\t" + Base64.encodeBase64String(endcryptData));

		// 进行数据签名
		String endcryptDataStr = new String(Hex.encodeHex(endcryptData));
		String sign = generateSHA1withRSASigature(privateKeyString, endcryptDataStr);
		System.out.println("签名值:\t" + sign);

		verifySign(sign, endcryptDataStr);
	}

	/**
	 * 验证签名
	 * 
	 * @param sign
	 *            签名值
	 * @param data
	 *            加密数据
	 * @throws Exception
	 */
	private static void verifySign(String sign, String data) throws Exception {
		// 验证签名
		Boolean falg = verifySHA1withRSASigature(publicKeyString, sign, data);
		System.out.println("签名状态:\t" + falg);

		if (falg) {
			byte[] endcryptData = hexStrToBytes(data);
			// 私钥解密
			byte[] decryptData = RSACoder.decryptByPrivateKey(endcryptData, privateKey);
			String decryptStr = new String(decryptData);
			System.out.println("解密后:\t" + decryptStr);
		}

	}
}

转载: https://blog.csdn.net/u013791374/article/details/51983770

  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值