RSA加密-防止自增id被遍历

非对称加密

非对称加密需要两个密钥:公钥 (publickey) 和私钥 (privatekey)。公钥和私钥是一对,如果用公钥对数据加密,那么只能用对应的私钥解密。如果用私钥对数据加密,只能用对应的公钥进行解密。因为加密和解密用的是不同的密钥,所以称为非对称加密。

优点:

安全

缺点:

加密和解密花费时间长、速度慢,只适合对少量数据进行加密

RSA 算法

RSA算法是一种典型的非对称加密的算法

具体信息安利一篇博客
https://blog.csdn.net/u014294681/article/details/86705999
demo
import javax.crypto.Cipher;
import java.security.*;
import java.security.interfaces.RSAPrivateKey;
import java.security.interfaces.RSAPublicKey;
import java.security.spec.PKCS8EncodedKeySpec;
import java.security.spec.X509EncodedKeySpec;
import java.util.HashMap;
import java.util.Map;

import static com.ijpay.jdpay.util.RsaUtil.decryptBASE64;
import static com.ijpay.jdpay.util.RsaUtil.encryptBASE64;

/**
 * @Date 2021/12/21 10:02
 */
public class RSASecurityUtils {

    public static final String KEY_ALGORITHM = "RSA";

    public static final String SIGNATURE_ALGORITHM = "MD5withRSA";



    private static final String PUBLIC_KEY = "RSAPublicKey";

    private static final String PRIVATE_KEY = "RSAPrivateKey";

    /**
     * 用私钥对信息生成数字签名
     *
     * @param data
     *            加密数据
     * @param privateKey
     *            私钥
     *
     * @return
     * @throws Exception
     */public static String sign(byte[] data, String privateKey) throws Exception {

        // 解密由base64编码的私钥
        byte[] keyBytes = decryptBASE64(privateKey);
        // 构造PKCS8EncodedKeySpec对象
        PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);
        // KEY_ALGORITHM 指定的加密算法
        KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
        // 取私钥匙对象
        PrivateKey priKey = keyFactory.generatePrivate(pkcs8KeySpec);
        // 用私钥对信息生成数字签名
        Signature signature = Signature.getInstance(SIGNATURE_ALGORITHM);
        signature.initSign(priKey);
        signature.update(data);
        return encryptBASE64(signature.sign());
    }



    /**
     * 校验数字签名
     *
     * @param data
     *            加密数据
     * @param publicKey
     *
     * @param sign
     *            数字签名
     *
     * @return 校验成功返回true 失败返回false
     * @throws Exception
     *
     */
    public static boolean verify(byte[] data, String publicKey, String sign) throws Exception {
        // 解密由base64编码的公钥
        byte[] keyBytes = decryptBASE64(publicKey);
        // 构造X509EncodedKeySpec对象
        X509EncodedKeySpec keySpec = new X509EncodedKeySpec(keyBytes);
        // KEY_ALGORITHM 指定的加密算法
        KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
        // 取公钥匙对象
        PublicKey pubKey = keyFactory.generatePublic(keySpec);
        Signature signature = Signature.getInstance(SIGNATURE_ALGORITHM);
        signature.initVerify(pubKey);
        signature.update(data);
        // 验证签名是否正常
        return signature.verify(decryptBASE64(sign));
    }



    /**
     * 解密<br>
     * 用私钥解密
     *
     * @param data
     * @param key
     * @return
     * @throws Exception
     */
    public static byte[] decryptByPrivateKey(byte[] data, String key) throws Exception {
        // 对密钥解密
        byte[] keyBytes = decryptBASE64(key);
        // 取得私钥
        PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);
        KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
        Key privateKey = keyFactory.generatePrivate(pkcs8KeySpec);
        // 对数据解密
        Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
        cipher.init(Cipher.DECRYPT_MODE, privateKey);
        return cipher.doFinal(data);

    }



    /**
     * 解密<br>
     * 用私钥解密
     *
     * @param data
     * @param key
     * @return
     * @throws Exception
     */
    public static byte[] decryptByPublicKey(byte[] data, String key) throws Exception {
        // 对密钥解密
        byte[] keyBytes = decryptBASE64(key);
        // 取得公钥
        X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(keyBytes);
        KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
        Key publicKey = keyFactory.generatePublic(x509KeySpec);
        // 对数据解密
        Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
        cipher.init(Cipher.DECRYPT_MODE, publicKey);
        return cipher.doFinal(data);
    }

    /**
     * 加密<br>
     * 用公钥加密
     *
     * @param data
     * @param key
     * @return
     * @throws Exception
     */
    public static byte[] encryptByPublicKey(byte[] data, String key) throws Exception {
        // 对公钥解密
        byte[] keyBytes = decryptBASE64(key);
        // 取得公钥
        X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(keyBytes);
        KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
        Key publicKey = keyFactory.generatePublic(x509KeySpec);
        // 对数据加密
        Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
        cipher.init(Cipher.ENCRYPT_MODE, publicKey);
        return cipher.doFinal(data);
    }



    /**
     * 加密<br>
     * 用私钥加密
     *
     * @param data
     * @param key
     * @return
     * @throws Exception
     */
    public static byte[] encryptByPrivateKey(byte[] data, String key) throws Exception {
        // 对密钥解密
        byte[] keyBytes = decryptBASE64(key);
        // 取得私钥
        PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);
        KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
        Key privateKey = keyFactory.generatePrivate(pkcs8KeySpec);
        // 对数据加密
        Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
        cipher.init(Cipher.ENCRYPT_MODE, privateKey);
        return cipher.doFinal(data);
    }

    /**
     * 取得私钥
     *
     * @param keyMap
     * @return
     * @throws Exception
     */
    public static String getPrivateKey(Map<String, Object> keyMap) throws Exception {
        Key key = (Key) keyMap.get(PRIVATE_KEY);
        return encryptBASE64(key.getEncoded());
    }

    /*
     * 取得公钥
     *
     * @param keyMap
     * @return
     * @throws Exception
     */
    public static String getPublicKey(Map<String, Object> keyMap) throws Exception {
        Key key = (Key) keyMap.get(PUBLIC_KEY);
        return encryptBASE64(key.getEncoded());

    }



    /**

     * 初始化密钥

     *

     * @return

     * @throws Exception

     */

    public static Map<String, Object> initKey() throws Exception {

        KeyPairGenerator keyPairGen = KeyPairGenerator
                .getInstance(KEY_ALGORITHM);
        keyPairGen.initialize(1024);
        KeyPair keyPair = keyPairGen.generateKeyPair();
        // 公钥
        RSAPublicKey publicKey = (RSAPublicKey) keyPair.getPublic();
        // 私钥
        RSAPrivateKey privateKey = (RSAPrivateKey) keyPair.getPrivate();
        Map<String, Object> keyMap = new HashMap<String, Object>(2);
        keyMap.put(PUBLIC_KEY, publicKey);
        keyMap.put(PRIVATE_KEY, privateKey);
        return keyMap;
    }
}

可以通过initKey 方法生成公钥私钥

@Getter
@Setter
@AllArgsConstructor
public class RSATestResponseId {

   @JsonSerialize(using = RSAIdJsonSerializer.class)
   private String id;
}

RSAIdJsonSerializer 是我们自定义的序列化后操作。

加密demo
public class RSAIdJsonSerializer extends JsonSerializer<String>{

  private String PublicKey = "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC8+IWR+oDKnHTiblS9RPoNRy5fENdBRAolQkx5sd00Bx3Oj8b/7napSN410mmM9yib6aFqEM8F34B06F7WkhIXQ4liL7eFD7lc8zSk3f9HoVb2K4OjC+j/cHr6YhvZ24l6xS+Dz54d5EuH8X1/zNPmTEexNJbRFjuX8EAyj0Rj2QIDAQAB";

  @SneakyThrows
  @Override
  public void serialize(String s, JsonGenerator jsonGenerator, SerializerProvider serializerProvider) throws IOException {
      byte[] encodedData = RSASecurityUtils.encryptByPublicKey(s.getBytes(), PublicKey);
      jsonGenerator.writeNumber(new String(encodedData));
  }
}
入口

此时,返回值的自增id就可以被加密,防止被遍历。
demo:

    @PostMapping("/list")
    public List<RSATestResponseId> testListBack(){
        final List<RSATestResponseId> rSATestResponseIds = new ArrayList<>();
        final RSATestResponseId rsaTestResponseId1 = new RSATestResponseId("1");
        rSATestResponseIds.add(rsaTestResponseId1);
        return rSATestResponseIds;
    }

postman请求的结果为:

在这里插入图片描述
可以看到,一个简单的id就被加密完成了,可以有效防止外部遍历

解密demo
@Getter
@Setter
public class RSATestRequestId {
    @JsonDeserialize(using = RSAIdJsonDeserializer.class)
    private String id;
}

public class RSAIdJsonDeserializer extends JsonDeserializer<String> {

    private String privateKey = "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";

    @SneakyThrows
    @Override
    public String deserialize(JsonParser p, DeserializationContext ctxt) throws IOException, JsonProcessingException {
        byte[]  encodedData = p.getValueAsString().getBytes();

        byte[] decodedData = RSASecurityUtils.decryptByPrivateKey(encodedData,
                privateKey);
        //解密
        return new String(decodedData);
    }
}

虽然可以避免自增id被遍历,但是完全没用必要使用这边介绍的方法。这边只是介绍一种可能性。此处公钥私钥都在后端没有暴露,甚至于直接用对称加密就行。

  • 2
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值