JAVA AES/ECB/PKCS5Padding 加解密源码

import java.security.InvalidKeyException;

import java.security.NoSuchAlgorithmException;

import java.util.Base64;

import java.util.Map;

import javax.crypto.BadPaddingException;

import javax.crypto.Cipher;

import javax.crypto.IllegalBlockSizeException;

import javax.crypto.KeyGenerator;

import javax.crypto.NoSuchPaddingException;

import javax.crypto.SecretKey;

import javax.crypto.spec.SecretKeySpec;

import lombok.extern.slf4j.Slf4j;

import org.springframework.boot.autoconfigure.condition.ConditionalOnProperty;

import org.springframework.stereotype.Component;

import edu.emory.mathcs.backport.java.util.Arrays;

public class AesMqttEncryptor {

    private static final String AES_KEY_ALGORITHM = "AES";

    private static final String AES_ALGORITHM = "AES/ECB/PKCS5Padding";

    private static final String ROOT_SECRET = "VMvNI3RZvAMdK5asMCwMqQ==";

    //private final ConfigManager configManager;

    private final SecretKey rootKey;

    private volatile SecretKey dynamicKey;

    public AesMqttEncryptor() {

//this.configManager = configManager;

        this.rootKey = this.decode(ROOT_SECRET);

        

        SecretKeySpec secretKeySpec = new SecretKeySpec(Base64.getDecoder().decode(ROOT_SECRET), "AES");

        System.out.println(secretKeySpec.toString());

        

        byte[] aesKey = rootKey.getEncoded();

        System.out.println("aesKey length: " + aesKey.length);        

        System.out.println("aesKey:" + aesKey);

        String aesKeyBase64 = Base64.getEncoder().encodeToString(aesKey);

        System.out.println("aesKeyBase64: " + aesKeyBase64);

        

        String dynamicSecret = null;//configManager.getConfigByGroup(GROUP_PLATFORM).get(PLATFORM_DYNAMIC_SECRET);

        if (dynamicSecret == null) {

            this.resetDynamicSecret();

        } else {

            this.dynamicKey = this.decode(dynamicSecret);

        }

    }

    //@Override

    public String getDynamicSecret() {

        return encode(dynamicKey);

    }

    //@Override

    public void resetDynamicSecret() {

        KeyGenerator generator = null;

        try {

            generator = KeyGenerator.getInstance(AES_KEY_ALGORITHM);

        } catch (NoSuchAlgorithmException e) {

            //log.error("cannot get the key generator of {}", AES_KEY_ALGORITHM);

            //throw new SystemException();

        }

        generator.init(128);

        SecretKey key = generator.generateKey();

        //configManager.setConfigByGroup(GROUP_PLATFORM, Map.of(PLATFORM_DYNAMIC_SECRET, encode(key)));

        this.dynamicKey = key;

byte[] aesKey = key.getEncoded();

        System.out.println("aesKey length: " + aesKey.length);

        System.out.println("aesKey:" + aesKey);

        String aesKeyBase64 = Base64.getEncoder().encodeToString(aesKey);

        System.out.println("aesKeyBase64: " + aesKeyBase64);

    }

    

    /**

     * Base64编码

     */

    private String encode(SecretKey key) {

        byte[] bytes = Base64.getEncoder().encode(key.getEncoded());

        return new String(bytes);

    }

    /**

     * Base64解码

     */

    private SecretKey decode(String secret) {

        byte[] bytes = Base64.getDecoder().decode(secret.getBytes());

        return new SecretKeySpec(bytes, AES_KEY_ALGORITHM);

    }

    public byte[] encrypt(byte[] plainBytes, boolean dynamic)

        throws InvalidKeyException, IllegalBlockSizeException, BadPaddingException {

        SecretKey key = dynamic ? dynamicKey : rootKey;

        Cipher cipher;

        try {

            cipher = Cipher.getInstance(AES_ALGORITHM);

        } catch (NoSuchAlgorithmException | NoSuchPaddingException e) {

            e.printStackTrace();

            throw new RuntimeException(e);

        }

        cipher.init(Cipher.ENCRYPT_MODE, key);

        byte[] cipherBytes = cipher.doFinal(plainBytes);

        return Base64.getEncoder().encode(cipherBytes);

    }

    public byte[] decrypt(byte[] encodedBytes, boolean dynamic)

        throws InvalidKeyException, IllegalBlockSizeException, BadPaddingException {

        Cipher cipher;

        try {

            cipher = Cipher.getInstance(AES_ALGORITHM);

        } catch (NoSuchAlgorithmException | NoSuchPaddingException e) {

            e.printStackTrace();

            throw new RuntimeException(e);

        }

        SecretKey key = dynamic ? dynamicKey : rootKey;

        cipher.init(Cipher.DECRYPT_MODE, key);

        byte[] cipherBytes = Base64.getDecoder().decode(encodedBytes);

        return cipher.doFinal(cipherBytes);

    }

    

    public static void main(String[] args) {

    AesMqttEncryptor ttt=new AesMqttEncryptor();

    //ttt.resetDynamicSecret();

    String strFrist="{\"requestId";

    try {

    //System.out.printf("strFrist:%s%n", strFrist);

    byte[] bytes=ttt.encrypt(strFrist.getBytes(),false);

    String strValue=new String(bytes);

    System.out.printf("加密后 strValue:%s%n", strValue);

    bytes=ttt.decrypt(strValue.getBytes(),false);

    strValue=new String(bytes);

    System.out.printf("解密后 strValue:%s%n", strValue);

    

    } catch (InvalidKeyException e) {

    // TODO Auto-generated catch block

    e.printStackTrace();

    } catch (IllegalBlockSizeException e) {

    // TODO Auto-generated catch block

    e.printStackTrace();

    } catch (BadPaddingException e) {

    // TODO Auto-generated catch block

    e.printStackTrace();

    }

    }

}

  • 27
    点赞
  • 23
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
好的,下面是Java实现AES/ECB/PKCS5Padding密和解密的示例代码: ``` import javax.crypto.Cipher; import javax.crypto.spec.SecretKeySpec; import java.nio.charset.StandardCharsets; import java.util.Base64; public class AESUtil { private static final String ALGORITHM = "AES"; private static final String TRANSFORMATION = "AES/ECB/PKCS5Padding"; // 密 public static String encrypt(String data, String key) throws Exception { SecretKeySpec secretKeySpec = new SecretKeySpec(key.getBytes(StandardCharsets.UTF_8), ALGORITHM); Cipher cipher = Cipher.getInstance(TRANSFORMATION); cipher.init(Cipher.ENCRYPT_MODE, secretKeySpec); byte[] encrypted = cipher.doFinal(data.getBytes()); return Base64.getEncoder().encodeToString(encrypted); } // 解密 public static String decrypt(String encryptedData, String key) throws Exception { SecretKeySpec secretKeySpec = new SecretKeySpec(key.getBytes(StandardCharsets.UTF_8), ALGORITHM); Cipher cipher = Cipher.getInstance(TRANSFORMATION); cipher.init(Cipher.DECRYPT_MODE, secretKeySpec); byte[] decrypted = cipher.doFinal(Base64.getDecoder().decode(encryptedData)); return new String(decrypted); } } ``` 使用示例: ``` public static void main(String[] args) throws Exception { String data = "Hello, world!"; String key = "0123456789abcdef"; String encryptedData = AESUtil.encrypt(data, key); String decryptedData = AESUtil.decrypt(encryptedData, key); System.out.println("密前:" + data); System.out.println("密后:" + encryptedData); System.out.println("解密后:" + decryptedData); } ``` 输出: ``` 密前:Hello, world! 密后:qVeqhVSSSmYZQgz6H+JYUA== 解密后:Hello, world! ``` 注意事项: 1. key 长度必须为16位。 2. 为了方便起见,这里使用了 Base64 编码。如果需要更高的安全性,可以使用 Hex 编码。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值