JSEncrypt前端加密以及java后端解密

本文介绍了一种使用非对称RSA加密技术在前端实现数据加密的方法,包括JS代码导入、公钥存储、加密函数实现及解密注意事项。同时,提供了封装的工具类用于加密数据组织和解密接收数据,涉及对称加密、SHA256消息摘要和RSA签名。
摘要由CSDN通过智能技术生成

1.前端代码

1.1  导入js

<script src="js/jquery.js" type="text/javascript"></script>

<!-- 引入非对称RSA加密工具 -->
<script src="js/encrypt/csoft_encrypt.min.js"></script>

1.2 html 页面存放公钥

<!-- 公钥区域 公钥通过JDK生成 也可通过后端的CsoftSecurityUtil.createKeyPairs() 生成 --><textarea id="publickey" rows="20" cols="60" style="display:none">
	     -----BEGIN PUBLIC KEY-----
	MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyvrVNCDKcN9sGujXqAdj
	a3L9hYl76Tx/hiWxCvtVE+kgUSZFOPpSHA0hbX3S/+fGh1kGR989IETLRNhn860W
	4WOrbtPFSFRQP1uGseH8Of3dU5v+XrZBVuhicSFXhfnGgJpig+Lkx
	tlGpy01H5XA2Q7iyi2Oa7BCrSx0sb/CfGjFpKTyEmQqkgUw3C2NJkgwjCG9CrJiI
	jt2W5xdhdazP3jPWRRemx5bE+GtkhvZETFErIkUb55vNiXc/rYZWOa3+SZpw8oey
	pQIDAQAB
		-----END PUBLIC KEY-----
</textarea>

 

    function qyzx(nbxh,url,ff){
  
        // 获取公钥
        var publicKey = $('#publickey').val();
            
	    // 创建加密实例
        var jsencrypt = new JSEncrypt();

		// 初始化公钥
        jsencrypt.setPublicKey(publicKey);
			
	    // 加密数据
        nbxh =jsencrypt.encrypt(nbxh);
                
 	    var e = document.createElement("a");

 		e.href = url+"xxxx.do?method="+ff+"&nbxh="+nbxh+"&bqz=hz";

        e.target="_blank";

 		document.body.appendChild(e);

 		e.click();
 	}

 

 

 

注意:Http请求特殊符号变空格的问题:参数经过Base64编码会有'+'加号,后端request.request.getParameter(name)获取的值中+号变成了空格(解决办法:request.getParameter(nms).replaceAll(" ", "+"));

2.1 封装工具类(jdk1.7.0)

(请自行测试,选择适合的自己的方法)

package com.centralsoft.core.utils;


import java.io.UnsupportedEncodingException;
import java.nio.charset.StandardCharsets;
import java.security.InvalidAlgorithmParameterException;
import java.security.InvalidKeyException;
import java.security.Key;
import java.security.KeyFactory;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.NoSuchAlgorithmException;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.SecureRandom;
import java.security.interfaces.RSAPrivateKey;
import java.security.interfaces.RSAPublicKey;
import java.security.spec.InvalidKeySpecException;
import java.security.spec.PKCS8EncodedKeySpec;
import java.util.Map;
import java.util.Map.Entry;
import java.util.TreeMap;

import javax.crypto.BadPaddingException;
import javax.crypto.Cipher;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.KeyGenerator;
import javax.crypto.NoSuchPaddingException;
import javax.crypto.SecretKey;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;

import org.apache.commons.codec.DecoderException;
import org.apache.commons.codec.binary.Base64;
import org.apache.commons.codec.digest.DigestUtils;

import com.alibaba.fastjson.JSON;
import com.alibaba.fastjson.JSONObject;

 /**
  *  @Description: 中研通用加密工具 RSA+ASE+SHA256(非对称加密(对称秘钥),对称加密数据,Sha256消息摘要,RSA签名)
  *  @author  wh.huang  DateTime 2018年11月15日 下午3:00:21 
  *  @version 1.0
  */
public class CsoftSecurityUtil {
    
	// 加密数据和秘钥的编码方式
    public static final String UTF_8 = "UTF-8";
    
	// 填充方式
    public static final String AES_ALGORITHM = "AES/CFB/PKCS5Padding";
    public static final String RSA_ALGORITHM = "RSA/ECB/PKCS1Padding";
    public static final String RSA_ALGORITHM_NOPADDING = "RSA";
    
     /**
      *  Description: 解密接收数据
      *  @author  wh.huang  DateTime 2018年11月15日 下午5:06:42
      *  @param externalPublicKey
      *  @param selfPrivateKey
      *  @param receivedMap
      *  @throws InvalidKeyException
      *  @throws NoSuchPaddingException
      *  @throws NoSuchAlgorithmException
      *  @throws BadPaddingException
      *  @throws IllegalBlockSizeException
      *  @throws UnsupportedEncodingException
      *  @throws InvalidAlgorithmParameterException
      *  @throws DecoderException
      */
    public static String decryptReceivedData(PublicKey externalPublicKey, PrivateKey selfPrivateKey, String receiveData) throws InvalidKeyException, NoSuchPaddingException, NoSuchAlgorithmException, BadPaddingException, IllegalBlockSizeException, UnsupportedEncodingException, InvalidAlgorithmParameterException, DecoderException {
        
    	@SuppressWarnings("unchecked")
    	Map<String, String> receivedMap = (Map<String, String>) JSON.parse(receiveData);
    	
    	// receivedMap为请求方通过from urlencoded方式,请求过来的参数列表
        String inputSign = receivedMap.get("sign");
        
        // 用请求方提供的公钥验签,能配对sign,说明来源正确
        inputSign = decryptRSA(externalPublicKey, inputSign);
        
        // 校验sign是否一致
        String sign = sha256(receivedMap);
        if (!sign.equals(inputSign)) {
            // sign校验不通过,说明双方发送出的数据和对方收到的数据不一致
            System.out.println("input sign: " + inputSign + ", calculated sign: " + sign);
            return null;
        }
        
        // 解密请求方在发送请求时,加密data字段所用的对称加密密钥
        String key = receivedMap.get("key");
        String salt = receivedMap.get("salt");
        key = decryptRSA(selfPrivateKey, key);
        salt = decryptRSA(selfPrivateKey, salt);
        
        // 解密data数据
        String data = decryptAES(key, salt, receivedMap.get("data"));
        System.out.println("接收到的data内容:" + data);
        return data;
    }
    
     /**
      *  Description: 加密数据组织示例
      *  @author  wh.huang DateTime 2018年11月15日 下午5:20:11
      *  @param externalPublicKey
      *  @param selfPrivateKey
      *  @return 加密后的待发送数据
      *  @throws NoSuchAlgorithmException
      *  @throws InvalidKeySpecException
      *  @throws InvalidKeyException
      *  @throws NoSuchPaddingException
      *  @throws UnsupportedEncodingException
      *  @throws BadPaddingException
      *  @throws IllegalBlockSizeException
      *  @throws InvalidAlgorithmParameterException
      */
    public static String encryptSendData(PublicKey externalPublicKey, PrivateKey selfPrivateKey,JSONObject sendData) throws NoSuchAlgorithmException, InvalidKeySpecException,
            InvalidKeyException, NoSuchPaddingException, UnsupportedEncodingException, BadPaddingException,
            IllegalBlockSizeException, InvalidAlgorithmParameterException {
        
        // 随机生成对称加密的密钥和IV (IV就是加盐的概念,加密的偏移量)
        String aesKeyWithBase64 = genRandomAesSecretKey();
        String aesIVWithBase64 = genRandomIV();
        
        // 用接收方提供的公钥加密key和salt,接收方会用对应的私钥解密
        String key = encryptRSA(externalPublicKey, aesKeyWithBase64);
        String salt = encryptRSA(externalPublicKey, aesIVWithBase64);
        
        // 组织业务数据信息,并用上面生成的对称加密的密钥和IV进行加密
        System.out.println("发送的data内容:" + sendData.toJSONString());
        String cipherData = encryptAES(aesKeyWithBase64, aesIVWithBase64, sendData.toJSONString());
        
        // 组织请求的key、value对
        Map<String, String> requestMap = new TreeMap<String, String>();
        requestMap.put("key", key);
        requestMap.put("salt", salt);
        requestMap.put("data", cipherData);
        requestMap.put("source", "由接收方提供"); // 添加来源标识

        // 计算sign,并用请求方的私钥加签,接收方会用请求方发放的公钥验签
        String sign = sha256(requestMap);
        requestMap.put("sign", encryptRSA(selfPrivateKey, sign));
        
        // TODO: 以form urlencoded方式调用,参数为上面组织出来的requestMap
        
        // 注意:请务必以form urlencoded方式,否则base64转码后的个别字符可能会被转成空格,对方接收后将无法正常处理
        JSONObject json = new JSONObject();
        json.putAll(requestMap);
        return json.toString();
    }
    
     /**
      *  Description: 获取随机的对称加密的密钥
      *  @author  wh.huang  DateTime 2018年11月15日 下午5:25:53
      *  @return  对称秘钥字符
      *  @throws NoSuchAlgorithmException
      *  @throws UnsupportedEncodingException
      *  @throws IllegalBlockSizeException
      *  @throws BadPaddingException
      *  @throws InvalidKeyException
      *  @throws NoSuchPaddingException
     */
    private static String genRandomAesSecretKey() throws NoSuchAlgorithmException, UnsupportedEncodingException,
            IllegalBlockSizeException, BadPaddingException, InvalidKeyException, NoSuchPaddingException {        
        KeyGenerator keyGen = KeyGenerator.getInstance("AES");
        keyGen.init(128);
        SecretKey secretKey = keyGen.generateKey();
        String keyWithBase64 = Base64.encodeBase64(secretKey.getEncoded()).toString();
        
        return keyWithBase64;
        
    }
    
    private static String genRandomIV() {
        SecureRandom r = new SecureRandom();
        byte[] iv = new byte[16];
        r.nextBytes(iv);
        String ivParam = Base64.encodeBase64(iv)+"";
        return ivParam;
    }
    
    /**
     * 对称加密数据
     * 
     * @param keyWithBase64
     * @param aesIVWithBase64
     * @param plainText
     * @return
     * @throws NoSuchAlgorithmException
     * @throws NoSuchPaddingException
     * @throws InvalidKeyException
     * @throws IllegalBlockSizeException
     * @throws BadPaddingException
     * @throws UnsupportedEncodingException
     * @throws InvalidAlgorithmParameterException 
     */
    private static String encryptAES(String keyWithBase64, String ivWithBase64, String plainText)
            throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, IllegalBlockSizeException,
            BadPaddingException, UnsupportedEncodingException, InvalidAlgorithmParameterException {
    	byte[] keyWithBase64Arry = keyWithBase64.getBytes();
    	byte[] ivWithBase64Arry = ivWithBase64.getBytes();
        SecretKeySpec key = new SecretKeySpec(Base64.decodeBase64(keyWithBase64Arry), "AES");
        IvParameterSpec iv = new IvParameterSpec(Base64.decodeBase64(ivWithBase64Arry));
        
        Cipher cipher = Cipher.getInstance(AES_ALGORITHM);
        cipher.init(Cipher.ENCRYPT_MODE, key, iv);
       
        return Base64.encodeBase64(cipher.doFinal(plainText.getBytes(UTF_8))).toString();
    }
    
    /**
     * 对称解密数据
     * 
     * @param keyWithBase64
     * @param cipherText
     * @return
     * @throws NoSuchAlgorithmException
     * @throws NoSuchPaddingException
     * @throws InvalidKeyException
     * @throws IllegalBlockSizeException
     * @throws BadPaddingException
     * @throws UnsupportedEncodingException
     * @throws InvalidAlgorithmParameterException 
     */
    private static String decryptAES(String keyWithBase64, String ivWithBase64, String cipherText)
            throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, IllegalBlockSizeException,
            BadPaddingException, UnsupportedEncodingException, InvalidAlgorithmParameterException {
    	byte[] keyWithBase64Arry = keyWithBase64.getBytes();
    	byte[] ivWithBase64Arry = ivWithBase64.getBytes();
    	byte[] cipherTextArry = cipherText.getBytes();
    	SecretKeySpec key = new SecretKeySpec(Base64.decodeBase64(keyWithBase64Arry), "AES");
        IvParameterSpec iv = new IvParameterSpec(Base64.decodeBase64(ivWithBase64Arry));
        
        Cipher cipher = Cipher.getInstance(AES_ALGORITHM);
        cipher.init(Cipher.DECRYPT_MODE, key, iv);
        return new String(cipher.doFinal(Base64.decodeBase64(cipherTextArry)), UTF_8);
    }
    
    /**
     * 非对称加密,根据公钥和原始内容产生加密内容
     * 
     * @param key
     * @param content
     * @return
     * @throws NoSuchPaddingException
     * @throws NoSuchAlgorithmException
     * @throws InvalidKeyException
     * @throws UnsupportedEncodingException
     * @throws BadPaddingException
     * @throws IllegalBlockSizeException
     * @throws InvalidAlgorithmParameterException
     */
    private static String encryptRSA(Key key, String plainText)
            throws NoSuchPaddingException, NoSuchAlgorithmException, InvalidKeyException, UnsupportedEncodingException,
            BadPaddingException, IllegalBlockSizeException, InvalidAlgorithmParameterException {
        Cipher cipher = Cipher.getInstance(RSA_ALGORITHM);
        cipher.init(Cipher.ENCRYPT_MODE, key);
        return Base64.encodeBase64(cipher.doFinal(plainText.getBytes(UTF_8))).toString();
    }
    
    /**
     * 根据私钥和加密内容产生原始内容
     * @param key
     * @param content
     * @return
     * @throws NoSuchPaddingException
     * @throws NoSuchAlgorithmException
     * @throws InvalidKeyException
     * @throws DecoderException
     * @throws BadPaddingException
     * @throws IllegalBlockSizeException
     * @throws UnsupportedEncodingException
     * @throws InvalidAlgorithmParameterException
     */
    private static String decryptRSA(Key key, String content) throws NoSuchPaddingException, NoSuchAlgorithmException, InvalidKeyException, DecoderException, BadPaddingException, IllegalBlockSizeException, UnsupportedEncodingException, InvalidAlgorithmParameterException {
        Cipher cipher = Cipher.getInstance(RSA_ALGORITHM);
        cipher.init(Cipher.DECRYPT_MODE, key);
        byte[] contentArry = content.getBytes();
        return new String(cipher.doFinal(Base64.decodeBase64(contentArry)), UTF_8);
    }
    
    /**
     * 计算sha256值
     * 
     * @param paramMap
     * @return 签名后的所有数据,原始数据+签名
     */
    private static String sha256(Map<String, String> paramMap) {
        Map<String, String> params = new TreeMap<String, String>(paramMap);
        
        StringBuilder concatStr = new StringBuilder();
        for (Entry<String, String> entry : params.entrySet()) {
            if ("sign".equals(entry.getKey())) {
                continue;
            }
            concatStr.append(entry.getKey() + "=" + entry.getValue() + "&");
        }
        
        return DigestUtils.md5Hex(concatStr.toString());
    }
    
    /**
     * 创建RSA的公钥和私钥示例 将生成的公钥和私钥用Base64编码后打印出来
     * @throws NoSuchAlgorithmException
     */
    public static void createKeyPairs() throws NoSuchAlgorithmException {
        KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance("RSA");
        keyPairGenerator.initialize(2048);
        KeyPair keyPair = keyPairGenerator.generateKeyPair();
        RSAPublicKey publicKey = (RSAPublicKey) keyPair.getPublic();
        RSAPrivateKey privateKey = (RSAPrivateKey) keyPair.getPrivate();
        System.out.println("公钥"+Base64.encodeBase64(publicKey.getEncoded()));
        System.out.println("私钥"+Base64.encodeBase64(privateKey.getEncoded()));
    }
    
    /**
     *  Description:默认的RSA解密方法 一般用来解密 参数 小数据
     *  @author  wh.huang  DateTime 2018年12月14日 下午3:43:11
     *  @param privateKeyStr
     *  @param data
     *  @return
     *  @throws NoSuchAlgorithmException
     *  @throws InvalidKeySpecException
     *  @throws NoSuchPaddingException
     *  @throws InvalidKeyException
     *  @throws IllegalBlockSizeException
     *  @throws BadPaddingException
    */
   public static String decryptRSADefault(String privateKeyStr,String data) throws NoSuchAlgorithmException, InvalidKeySpecException, NoSuchPaddingException, InvalidKeyException, IllegalBlockSizeException, BadPaddingException, UnsupportedEncodingException {
     KeyFactory keyFactory = KeyFactory.getInstance(RSA_ALGORITHM_NOPADDING);
     byte[] privateKeyArray = privateKeyStr.getBytes();
     byte[] dataArray = data.getBytes();
     PKCS8EncodedKeySpec pkcs8EncodedKeySpec = new PKCS8EncodedKeySpec(Base64.decodeBase64(privateKeyArray));
     PrivateKey privateKey = keyFactory.generatePrivate(pkcs8EncodedKeySpec);
     
     Cipher cipher = Cipher.getInstance(RSA_ALGORITHM_NOPADDING);
     cipher.init(Cipher.DECRYPT_MODE, privateKey);
     return new String(cipher.doFinal(Base64.decodeBase64(dataArray)), UTF_8);
   }
   
}

2.2 调用工具类 解密参数

// 初始化私钥 保存成常量或数据库纪录
final String PRIVATE_KEY_STR = "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" ;
	
nbxh = CsoftSecurityUtil.decryptRSADefault(PRIVATE_KEY_STR,nbxh);

注意本文秘钥被我篡改,请自行在工具类中获取。

 

 

 

 

 

 

 

 

 

 

 

 

 

 

评论 9
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值