JS实现国密算法SM2加密,后端Java解密

项目涉及保密传输,要求使用国密算法,一般遇到类似问题首先想到的就是使用非对称加密,后端生成密钥对,将公钥交给前端,前端用公钥加密数据,后端用私钥对数据解密。项目的复杂度在于国密的非对称加密算法SM2的Java及JS实现。

Java版比较好办,较新版本的bouncycastle就支持了SM2/SM3/SM4,麻烦在于JS版,找了很多都有问题,直到遇到了这个项目:https://github.com/Saberization/SM2,感谢作者。分别整理下前端后端的实现过程:

 

后端首先引入bouncycastle,Maven配置如下:

 

<dependency>
  <groupId>org.bouncycastle</groupId>
  <artifactId>bcprov-jdk15on</artifactId>
  <version>1.65</version>
</dependency>

 

后端Java代码如下:

//生成密钥对
X9ECParameters sm2ECParameters = GMNamedCurves.getByName("sm2p256v1");
ECDomainParameters domainParameters = new ECDomainParameters(sm2ECParameters.getCurve(), sm2ECParameters.getG(), sm2ECParameters.getN());
ECKeyPairGenerator keyPairGenerator = new ECKeyPairGenerator();
keyPairGenerator.init(new ECKeyGenerationParameters(domainParameters, SecureRandom.getInstance("SHA1PRNG")));
AsymmetricCipherKeyPair asymmetricCipherKeyPair = keyPairGenerator.generateKeyPair();

//私钥,16进制格式,自己保存,格式如a2081b5b81fbea0b6b973a3ab6dbbbc65b1164488bf22d8ae2ff0b8260f64853
BigInteger privatekey = ((ECPrivateKeyParameters) asymmetricCipherKeyPair.getPrivate()).getD();
String privateKeyHex = privatekey.toString(16);

//公钥,16进制格式,发给前端,格式如04813d4d97ad31bd9d18d785f337f683233099d5abed09cb397152d50ac28cc0ba43711960e811d90453db5f5a9518d660858a8d0c57e359a8bf83427760ebcbba
ECPoint ecPoint = ((ECPublicKeyParameters) asymmetricCipherKeyPair.getPublic()).getQ();
String publicKeyHex = Hex.toHexString(ecPoint.getEncoded(false));

 

前端Javascript示例代码,写了个页面:

<!DOCTYPE html>
<html>
<head>
  <meta charset="utf-8">
  <title>SM2-TEST</title>
  <script src="crypto-js.js"></script>
  <script src="sm2.js"></script>
  <script>
  function encrypt() {
    //公钥,16进制格式,由后端生成
    var pubkeyHex = "04813d4d97ad31bd9d18d785f337f683233099d5abed09cb397152d50ac28cc0ba43711960e811d90453db5f5a9518d660858a8d0c57e359a8bf83427760ebcbba";
    var encryptData = sm2Encrypt("SM2 Encryption Test", pubkeyHex, 0);
    console.log(encryptData);
  }
  </script>
</head>
<body onload="encrypt()">
</body>
</html>

 

执行会生成密文,每次生成都会不同,比如我的环境某次生成如下:

 

04be17bf6fe47da1f34a01ad0ff67901241b72d103e998f2f7cc78a004703bdfb8d2c6e3939f4f708f3a57d872d58ec5c41bbe5976666bcb01acea43f5a1c68a62cc117c24821d17c3023035641894d7c978a5521f8dc6798515550c73071f9703602e0ee490157729b648c1cc3eb929c1a0501e12a216d42461117402

 

后端尝试解密:

//JS加密产生的密文
String cipherData = "04be17bf6fe47da1f34a01ad0ff67901241b72d103e998f2f7cc78a004703bdfb8d2c6e3939f4f708f3a57d872d58ec5c41bbe5976666bcb01acea43f5a1c68a62cc117c24821d17c3023035641894d7c978a5521f8dc6798515550c73071f9703602e0ee490157729b648c1cc3eb929c1a0501e12a216d42461117402";
byte[] cipherDataByte = Hex.decode(cipherData);

//刚才的私钥Hex,先还原私钥
String privateKey = "a2081b5b81fbea0b6b973a3ab6dbbbc65b1164488bf22d8ae2ff0b8260f64853";
BigInteger privateKeyD = new BigInteger(privateKey, 16);
ECPrivateKeyParameters privateKeyParameters = new ECPrivateKeyParameters(privateKeyD, domainParameters);

//用私钥解密
SM2Engine sm2Engine = new SM2Engine();
sm2Engine.init(false, privateKeyParameters);

//processBlock得到Base64格式,记得解码
byte[] arrayOfBytes = Base64.getDecoder().decode(sm2Engine.processBlock(cipherDataByte, 0, cipherDataByte.length));

//得到明文:SM2 Encryption Test
String data = new String(arrayOfBytes);
  • 3
    点赞
  • 14
    收藏
    觉得还不错? 一键收藏
  • 6
    评论
下面是一个简单的前端使用 sm2 加密后端使用 java 解密的示例代码: 前端代码: ```javascript import { sm2 } from "sm-crypto"; // 待加密的数据 const data = "Hello, World!"; // 公钥 const publicKey = "04a0b5376a5deca1c8dbf9c3d9f7f82d7d3a96fc79a2f54b6a4e55d90d5e9a7d2ee1d1c1b9ea37a7c3ddafef5e6d67f3dcd91f4e6c8aa1a5c5d7d4e38bda9c02e"; // 将公钥转换为 sm2 公钥对象 const publicKeyObj = sm2.SM2KeyPair(publicKey, "", { curve: "sm2p256v1", publicKeyType: "uncompressed", }); // 使用 sm2 加密数据,并将加密结果进行 base64 编码 const encryptedData = sm2.doEncrypt(data, publicKeyObj).toString("base64"); // 将加密结果发送给后端 ``` 后端代码: ```java import org.bouncycastle.crypto.params.ECPublicKeyParameters; import org.bouncycastle.crypto.params.ParametersWithRandom; import org.bouncycastle.crypto.util.PublicKeyFactory; import org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey; import org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPublicKey; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.jce.spec.ECParameterSpec; import org.bouncycastle.util.encoders.Base64; import org.bouncycastle.crypto.digests.SM3Digest; import org.bouncycastle.crypto.engines.SM2Engine; import org.bouncycastle.crypto.params.ParametersWithID; import org.bouncycastle.crypto.params.SM2KeyExchangePrivateParameters; import org.bouncycastle.crypto.params.SM2KeyExchangePublicParameters; import org.bouncycastle.crypto.params.SM2PrivateKeyParameters; import org.bouncycastle.crypto.params.SM2PublicKeyParameters; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.SecureRandom; import java.security.Security; public class SM2Demo { public static void main(String[] args) throws Exception { Security.addProvider(new BouncyCastleProvider()); // 私钥,从配置文件或数据库中读取 String privateKeyStr = "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"; // 将私钥转换为 sm2 私钥对象 byte[] privateKeyBytes = Hex.decode(privateKeyStr); SM2PrivateKeyParameters privateKey = new SM2PrivateKeyParameters(privateKeyBytes, SM2Util.DOMAIN_PARAMS); // 加密后的数据,从前端接收 String encryptedDataStr = "QXZlbnQgUGF5bG9hZA=="; byte[] encryptedData = Base64.decode(encryptedDataStr); // 使用 sm2 解密数据 SM2Engine engine = new SM2Engine(); engine.init(false, new ParametersWithID(null, null)); engine.processCiphertext(encryptedData, 0, encryptedData.length); byte[] decryptedData = engine.doFinal(); // 输出解密结果 System.out.println(new String(decryptedData)); } } ``` 需要注意的是,在上面的示例代码中,我们使用了 BouncyCastle 提供的 sm2 实现。如果你使用的是其它实现,则代码可能会有所不同。
评论 6
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值