java实现RSA+AES的简单加密解密

本文介绍了如何使用Java实现RSA和AES的结合加密解密。通过RSAUtil和AESUtil两个类,详细阐述了加密解密的过程,并提供了运行结果展示。
摘要由CSDN通过智能技术生成

TestAesAndRsa

package com.zhuyun.test;

import java.security.KeyPair;
import java.security.PrivateKey;
import java.security.PublicKey;

import javax.crypto.SecretKey;

import org.junit.Test;

import com.zhuyun.aes.AESUtil;
import com.zhuyun.rsa.RSAUtil;

public class TestAesAndRsa {

	//测试RSA与AES的结合。
	//					客户端用公钥加密AES秘钥,AES秘钥加密实际内容;
	//					服务端用私钥解密AES秘钥,AES秘钥解密实际内容
	@Test
	public void testAesAndRsa() throws Exception {
		//===============生成公钥和私钥,公钥传给客户端,私钥服务端保留==================
		//生成RSA公钥和私钥,并Base64编码,生成一次以后,就写死在配置文件或代码中,下次不再重新生成
		KeyPair keyPair = RSAUtil.getKeyPair();
		String publicKeyStr = RSAUtil.getPublicKey(keyPair);
		String privateKeyStr = RSAUtil.getPrivateKey(keyPair);
		System.out.println("RSA公钥Base64编码:" + publicKeyStr);
		System.out.println("RSA私钥Base64编码:" + publicKeyStr);
		
		//=================客户端=================
		//hello, i am infi, good night!  需要加密的实际内容
		String message = "hello, i am infi, good night!";
		//将Base64编码后的公钥转换成PublicKey对象
		PublicKey publicKey = RSAUtil.string2PublicKey(publicKeyStr);
		//生成AES秘钥,并Base64编码
		String aesKeyStr = AESUtil.genKeyAES();
		System.out.println("AES秘钥Base64编码:" + aesKeyStr);
		//用公钥加密AES秘钥
		byte[] publicEncrypt = RSAUtil.publicEncrypt(aesKeyStr.getBytes(), publicKey);
		//公钥加密AES秘钥后的内容Base64编码
		String publicEncryptStr = RSAUtil.byte2Base64(publicEncrypt);
		System.out.println("公钥加密AES秘钥并Base64编码的结果:" + publicEncryptStr);
		
		//将Base64编码后的AES秘钥转换成SecretKey对象
		SecretKey aesKey = AESUtil.loadKeyAES(aesKeyStr);
		//用AES秘钥加密实际的内容
		byte[] encryptAES = AESUtil.encryptAES(message.getBytes(), aesKey);
		//AES秘钥加密后的内容Base64编码
		String encryptAESStr = AESUtil.byte2Base64(encryptAES);
		System.out.println("AES秘钥加密实际的内容并Base64编码的结果:" + encryptAESStr);
		
		
		//##############	网络上传输的内容有Base64编码后的公钥加密AES秘钥的结果 和 Base64编码后的AES秘钥加密实际内容的结果   #################
		//##############	即publicEncryptStr和encryptAESStr	###################
		
		
		//===================服务端================
		//将Base64编码后的私钥转换成PrivateKey对象
		PrivateKey privateKey = RSAUtil.string2PrivateKey(privateKeyStr);
		//公钥加密AES秘钥后的内容(Base64编码),进行Base64解码
		byte[] publicEncrypt2 = RSAUtil.base642Byte(publicEncryptStr);
		//用私钥解密,得到aesKey
		byte[] aesKeyStrBytes = RSAUtil.privateDecrypt(publicEncrypt2, privateKey);
		//解密后的aesKey
		String aesKeyStr2 = new String(aesKeyStrBytes);
		System.out.println("解密后的aesKey(Base64编码): " + aesKeyStr2);
		
		//将Base64编码后的AES秘钥转换成SecretKey对象
		SecretKey aesKey2 = AESUtil.loadKeyAES(aesKeyStr2);
		//AES秘钥加密后的内容(Base64编码),进行Base64解码
		byte[] encryptAES2 = AESUtil.base642Byte(encryptAESStr);
		//用AES秘钥解密实际的内容
		byte[] decryptAES = AESUtil.decryptAES(encryptAES2, aesKey2);
		//解密后的实际内容
		System.out.println("解密后的实际内容: " + new String(decryptAES));
		
	}

}


关于RSAUtil 和AESUtil这两个类,详见我的前面两篇博客《java实现RSA的简单加密解密》和 《java实现AES的简单加密解密》

运行结果如下:

RSA公钥Base64编码:MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3edVb1wjqKNucCPW7/0Ct4lFBVdEVZyD
tT+cbzncvnHokEzNj2bRUSk0sR4YBUscPyR5H8c5p2MgRcuLLMWzXBpUS4TO+NHfLzzj30WPcqIL
MaO6nIMCqH6zn3Bz0my56Gx7hHUI+D7ija/JtroLQiI9Z69pljtxjEfX7Oa7EgDWc0uhPh+grhHD
LCsdibn5Czpc+GkkRYOV9iPIaia3+h2Eqyj9WOOxd6czsgGEjO8+g28Kl7CLKzwE1RUYEZmu+Tch
U2417ejpAjyhR/2rdE1l9US75Tz0/6RFDCTTo13ZLsN/PSVfyZtZ0CLjsCAjimDq2GR1qVU0K7XE
SBrDuwIDAQAB
RSA私钥Base64编码:MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQDd51VvXCOoo25wI9bv/QK3iUUF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AES秘钥Base64编码:3aNZH0W9NAeFAJx66rf/Pw==
公钥加密AES秘钥并Base64编码的结果:A17kkwTbz7p7UP6Z56cau3f0OoF+yZCngbJTQDUUsGwdj89alHIKg05tT7t4Nh8hq7l/1KkhNw6Y
RWiQ3LmoU55H82xzZWpj19YzqDCNyceIJKO7YafYI40uqiBrzSX9ruwrNMlv9AQi8RYKcXzX/89E
BJuSHSOttfgoXaEOmqgNDNAeipqMxHMCrqi4D6ST32WpttKlYm9NsxgqDuUfLrXQRoPusUfPk1ZI
N4mVvHX39n+WuOfMLjo2BGXddyDj8p6I3dD2v7OiLC5wiB6LYlB6yftX2xLdy077FpkJW6yyki2Y
O+mktov3ZSRflgBn5mjnGagJeqw5PXj4F3uo0w==
AES秘钥加密实际的内容并Base64编码的结果:z307ajQDSY6zC9WyPMOZiUvPyRZWUbJv2k44Ee3/kiQ=
解密后的aesKey(Base64编码): 3aNZH0W9NAeFAJx66rf/Pw==
解密后的实际内容: hello, i am infi, good night!





  • 0
    点赞
  • 10
    收藏
    觉得还不错? 一键收藏
  • 1
    评论
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值