RSA使用前台公钥加密后台私钥解密实例

第一步:(百度搜索RSA获得公钥与私钥)--->拿到公钥就OK了--先备着等下要用到

第二步:工具类(这个写好的直接导入)---》里面有一个main方法可以先测试一下

/**
 * RSA 工具类。提供加密,解密,生成密钥对等方法。
 * <p>
 * 需要到http://www.bouncycastle.org下载bcprov-jdk14-123.jar。
 */

public class RSAUtil {
    private static String RSAKeyStore = "E:/RSAKey.txt";
    /**
     * * 生成密钥对 *
     *
     * @return KeyPair *
     * @throws Exception
     */

    public static KeyPair generateKeyPair() throws Exception {

        try {

            KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance("RSA",
                    new org.bouncycastle.jce.provider.BouncyCastleProvider());
            final int KEY_SIZE = 1024;// 没什么好说的了,这个值关系到块加密的大小,可以更改,但是不要太大,否则效率会低
            keyPairGen.initialize(KEY_SIZE, new SecureRandom());
            KeyPair keyPair = keyPairGen.generateKeyPair();
            System.out.println(keyPair.getPrivate());
            System.out.println(keyPair.getPublic());
            saveKeyPair(keyPair);
            return keyPair;
        } catch (Exception e) {
            throw new Exception(e.getMessage());
        }
    }

    public static KeyPair getKeyPair() throws Exception {
        FileInputStream fis = new FileInputStream(RSAKeyStore);
        ObjectInputStream oos = new ObjectInputStream(fis);
        KeyPair kp = (KeyPair) oos.readObject();
        oos.close();
        fis.close();
        return kp;
    }

    public static void saveKeyPair(KeyPair kp) throws Exception {
        FileOutputStream fos = new FileOutputStream(RSAKeyStore);
        ObjectOutputStream oos = new ObjectOutputStream(fos);
        // 生成密钥
        oos.writeObject(kp);
        oos.close();
        fos.close();
    }

    /**
     * * 生成公钥 *
     *
     * @param modulus        *
     * @param publicExponent *
     * @return RSAPublicKey *
     * @throws Exception
     */

    public static RSAPublicKey generateRSAPublicKey(byte[] modulus,
                                                    byte[] publicExponent) throws Exception {
        KeyFactory keyFac = null;
        try {
            keyFac = KeyFactory.getInstance("RSA",
                    new org.bouncycastle.jce.provider.BouncyCastleProvider());
        } catch (NoSuchAlgorithmException ex) {
            throw new Exception(ex.getMessage());
        }

        RSAPublicKeySpec pubKeySpec = new RSAPublicKeySpec(new BigInteger(
                modulus), new BigInteger(publicExponent));
        try {
            return (RSAPublicKey) keyFac.generatePublic(pubKeySpec);
        } catch (InvalidKeySpecException ex) {
            throw new Exception(ex.getMessage());
        }
    }

    /**
     * * 生成私钥 *
     *
     * @param modulus         *
     * @param privateExponent *
     * @return RSAPrivateKey *
     * @throws Exception
     */

    public static RSAPrivateKey generateRSAPrivateKey(byte[] modulus,
                                                      byte[] privateExponent) throws Exception {
        KeyFactory keyFac = null;
        try {
            keyFac = KeyFactory.getInstance("RSA",
                    new org.bouncycastle.jce.provider.BouncyCastleProvider());
        } catch (NoSuchAlgorithmException ex) {
            throw new Exception(ex.getMessage());
        }
        RSAPrivateKeySpec priKeySpec = new RSAPrivateKeySpec(new BigInteger(
                modulus), new BigInteger(privateExponent));
        try {
            return (RSAPrivateKey) keyFac.generatePrivate(priKeySpec);
        } catch (InvalidKeySpecException ex) {
            throw new Exception(ex.getMessage());
        }
    }
    /**
     * * 加密 *
     *
     * @param pk  data 加密的密钥 *
     * @param data 待加密的明文数据 *
     * @return 加密后的数据 *
     * @throws Exception
     */

    public static byte[] encrypt(PublicKey pk, byte[] data) throws Exception {

        try {
            Cipher cipher = Cipher.getInstance("RSA",
                    new org.bouncycastle.jce.provider.BouncyCastleProvider());
            cipher.init(Cipher.ENCRYPT_MODE, pk);
            int blockSize = cipher.getBlockSize();// 获得加密块大小,如:加密前数据为128个byte,而key_size=1024
            // 加密块大小为127
            // byte,加密后为128个byte;因此共有2个加密块,第一个127
            // byte第二个为1个byte
            int outputSize = cipher.getOutputSize(data.length);// 获得加密块加密后块大小
            int leavedSize = data.length % blockSize;
            int blocksSize = leavedSize != 0 ? data.length / blockSize + 1
                    : data.length / blockSize;
            byte[] raw = new byte[outputSize * blocksSize];
            int i = 0;
            while (data.length - i * blockSize > 0) {
                if (data.length - i * blockSize > blockSize)
                    cipher.doFinal(data, i * blockSize, blockSize, raw, i
                            * outputSize);
                else
                    cipher.doFinal(data, i * blockSize, data.length - i
                            * blockSize, raw, i * outputSize);
                // 这里面doUpdate方法不可用,查看源代码后发现每次doUpdate后并没有什么实际动作除了把byte[]放到
                // ByteArrayOutputStream中,而最后doFinal的时候才将所有的byte[]进行加密,可是到了此时加密块大小很可能已经超出了
                // OutputSize所以只好用dofinal方法。
                i++;
            }
            return raw;
        } catch (Exception e) {
            throw new Exception(e.getMessage());
        }
    }
    /**
     * * 解密 *
     *
     * @param pk 解密的密钥 *
     * @param raw 已经加密的数据 *
     * @return 解密后的明文 *
     * @throws Exception
     */
    public static byte[] decrypt(PrivateKey pk, byte[] raw) throws Exception {
        try {
            Cipher cipher = Cipher.getInstance("RSA",
                    new org.bouncycastle.jce.provider.BouncyCastleProvider());
            cipher.init(cipher.DECRYPT_MODE, pk);
            int blockSize = cipher.getBlockSize();
            ByteArrayOutputStream bout = new ByteArrayOutputStream(64);
            int j = 0;
            while (raw.length - j * blockSize > 0) {
                bout.write(cipher.doFinal(raw, j * blockSize, blockSize));
                j++;
            }
        /**
 * RSA 工具类。提供加密,解密,生成密钥对等方法。
 * <p>
 * 需要到http://www.bouncycastle.org下载bcprov-jdk14-123.jar。
 */

public class RSAUtil {
    private static String RSAKeyStore = "E:/RSAKey.txt";
    /**
     * * 生成密钥对 *
     *
     * @return KeyPair *
     * @throws Exception
     */

    public static KeyPair generateKeyPair() throws Exception {

        try {

            KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance("RSA",
                    new org.bouncycastle.jce.provider.BouncyCastleProvider());
            final int KEY_SIZE = 1024;// 没什么好说的了,这个值关系到块加密的大小,可以更改,但是不要太大,否则效率会低
            keyPairGen.initialize(KEY_SIZE, new SecureRandom());
            KeyPair keyPair = keyPairGen.generateKeyPair();
            System.out.println(keyPair.getPrivate());
            System.out.println(keyPair.getPublic());
            saveKeyPair(keyPair);
            return keyPair;
        } catch (Exception e) {
            throw new Exception(e.getMessage());
        }
    }

    public static KeyPair getKeyPair() throws Exception {
        FileInputStream fis = new FileInputStream(RSAKeyStore);
        ObjectInputStream oos = new ObjectInputStream(fis);
        KeyPair kp = (KeyPair) oos.readObject();
        oos.close();
        fis.close();
        return kp;
    }

    public static void saveKeyPair(KeyPair kp) throws Exception {
        FileOutputStream fos = new FileOutputStream(RSAKeyStore);
        ObjectOutputStream oos = new ObjectOutputStream(fos);
        // 生成密钥
        oos.writeObject(kp);
        oos.close();
        fos.close();
    }

    /**
     * * 生成公钥 *
     *
     * @param modulus        *
     * @param publicExponent *
     * @return RSAPublicKey *
     * @throws Exception
     */

    public static RSAPublicKey generateRSAPublicKey(byte[] modulus,
                                                    byte[] publicExponent) throws Exception {
        KeyFactory keyFac = null;
        try {
            keyFac = KeyFactory.getInstance("RSA",
                    new org.bouncycastle.jce.provider.BouncyCastleProvider());
        } catch (NoSuchAlgorithmException ex) {
            throw new Exception(ex.getMessage());
        }

        RSAPublicKeySpec pubKeySpec = new RSAPublicKeySpec(new BigInteger(
                modulus), new BigInteger(publicExponent));
        try {
            return (RSAPublicKey) keyFac.generatePublic(pubKeySpec);
        } catch (InvalidKeySpecException ex) {
            throw new Exception(ex.getMessage());
        }
    }

    /**
     * * 生成私钥 *
     *
     * @param modulus         *
     * @param privateExponent *
     * @return RSAPrivateKey *
     * @throws Exception
     */

    public static RSAPrivateKey generateRSAPrivateKey(byte[] modulus,
                                                      byte[] privateExponent) throws Exception {
        KeyFactory keyFac = null;
        try {
            keyFac = KeyFactory.getInstance("RSA",
                    new org.bouncycastle.jce.provider.BouncyCastleProvider());
        } catch (NoSuchAlgorithmException ex) {
            throw new Exception(ex.getMessage());
        }
        RSAPrivateKeySpec priKeySpec = new RSAPrivateKeySpec(new BigInteger(
                modulus), new BigInteger(privateExponent));
        try {
            return (RSAPrivateKey) keyFac.generatePrivate(priKeySpec);
        } catch (InvalidKeySpecException ex) {
            throw new Exception(ex.getMessage());
        }
    }
    /**
     * * 加密 *
     *
     * @param pk  data 加密的密钥 *
     * @param data 待加密的明文数据 *
     * @return 加密后的数据 *
     * @throws Exception
     */

    public static byte[] encrypt(PublicKey pk, byte[] data) throws Exception {

        try {
            Cipher cipher = Cipher.getInstance("RSA",
                    new org.bouncycastle.jce.provider.BouncyCastleProvider());
            cipher.init(Cipher.ENCRYPT_MODE, pk);
            int blockSize = cipher.getBlockSize();// 获得加密块大小,如:加密前数据为128个byte,而key_size=1024
            // 加密块大小为127
            // byte,加密后为128个byte;因此共有2个加密块,第一个127
            // byte第二个为1个byte
            int outputSize = cipher.getOutputSize(data.length);// 获得加密块加密后块大小
            int leavedSize = data.length % blockSize;
            int blocksSize = leavedSize != 0 ? data.length / blockSize + 1
                    : data.length / blockSize;
            byte[] raw = new byte[outputSize * blocksSize];
            int i = 0;
            while (data.length - i * blockSize > 0) {
                if (data.length - i * blockSize > blockSize)
                    cipher.doFinal(data, i * blockSize, blockSize, raw, i
                            * outputSize);
                else
                    cipher.doFinal(data, i * blockSize, data.length - i
                            * blockSize, raw, i * outputSize);
                // 这里面doUpdate方法不可用,查看源代码后发现每次doUpdate后并没有什么实际动作除了把byte[]放到
                // ByteArrayOutputStream中,而最后doFinal的时候才将所有的byte[]进行加密,可是到了此时加密块大小很可能已经超出了
                // OutputSize所以只好用dofinal方法。
                i++;
            }
            return raw;
        } catch (Exception e) {
            throw new Exception(e.getMessage());
        }
    }
    /**
     * * 解密 *
     *
     * @param pk 解密的密钥 *
     * @param raw 已经加密的数据 *
     * @return 解密后的明文 *
     * @throws Exception
     */
    public static byte[] decrypt(PrivateKey pk, byte[] raw) throws Exception {
        try {
            Cipher cipher = Cipher.getInstance("RSA",
                    new org.bouncycastle.jce.provider.BouncyCastleProvider());
            cipher.init(cipher.DECRYPT_MODE, pk);
            int blockSize = cipher.getBlockSize();
            ByteArrayOutputStream bout = new ByteArrayOutputStream(64);
            int j = 0;
            while (raw.length - j * blockSize > 0) {
                bout.write(cipher.doFinal(raw, j * blockSize, blockSize));
                j++;
            }
            return bout.toByteArray();
        } catch (Exception e) {
            throw new Exception(e.getMessage());
        }
    }
    /**
     * * *
     *
     * @param args *
     * @throws Exception
     */

    public static void main(String[] args) throws Exception {
        RSAPublicKey rsap = (RSAPublicKey) RSAUtil.generateKeyPair().getPublic();
        System.out.println("公钥"+rsap);
        String test = "hello world";
        byte[] en_test = encrypt(getKeyPair().getPublic(), test.getBytes());
        byte[] de_test = decrypt(getKeyPair().getPrivate(), en_test);
        System.out.println(new String(de_test));

    }

}
    return bout.toByteArray();
        } catch (Exception e) {
            throw new Exception(e.getMessage());
        }
    }
    /**
     * * *
     *
     * @param args *
     * @throws Exception
     */

    public static void main(String[] args) throws Exception {
        RSAPublicKey rsap = (RSAPublicKey) RSAUtil.generateKeyPair().getPublic();
        System.out.println("公钥"+rsap);
        String test = "hello world";
        byte[] en_test = encrypt(getKeyPair().getPublic(), test.getBytes());
        byte[] de_test = decrypt(getKeyPair().getPrivate(), en_test);
        System.out.println(new String(de_test));

    }

}

第三步:(前台页面如下)

需要导三个外部js插件如图

<%@ taglib prefix="form" uri="http://www.springframework.org/tags/form" %>
<%@ page language="java" pageEncoding="UTF-8" contentType="text/html; charset=UTF-8"%>
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html:html lang="true">
  <head>
    <title>登陆</title>
    <script type="text/javascript" src="js/RSA_Stripped.js"></script>
    <script type="text/javascript" src="js/BigInt.js"></script>
    <script type="text/javascript" src="js/Barrett.js"></script>
    <script type="text/javascript" src="js/jquery-1.8.3.js"></script>
    <script type="text/javascript">
      /*注意:这个函数和RSA无关是我自己其它的功能这是加了一个验证码功能可以无视只关注RSA就行了*/
      function SendData() {
          $.post(
              "${pageContext.request.contextPath}/AjaxRequestLogin.action",//url地址
           //   {name:"张三",password:"258000"},//参数
              function(result){//回调函数
                  $("#Show").html(result.success);//将回调信息数据写入
              },
              "json"
          )
      }
        function rsalogin(){
            //获得密码框里面的值
            var thisPwd = document.getElementById("password").value;
           var CodeValue= $("#CodeValue").val();
            //使用公钥替换掉原来的密码
            bodyRSA();
            //调用插件进行加密 得到的数据
            var result = encryptedString(key, encodeURIComponent(thisPwd));
            //alert(encodeURIComponent(thisPwd)+"\r\n"+result);
            loginForm.action="Res.action?result="+result+"&CodeValue="+CodeValue;
            loginForm.submit();
        }
        var key ;
        function bodyRSA(){
            setMaxDigits(130);
            key = new RSAKeyPair("10001","","8ade6fa5cb8c453e6239671657226cd0c74b319f1c904b5e1215533d8aa7ada1ffc4246eb2fbaf9b27a08953b596c77c9e3ca6f761855babc80e13e3f1ae4e5439746511afedcfcfb5bcb22f37fea8278c7ad1dd9ee84cfe3f4cb6e34a46b5ce74f7ddf41a601f0ddad0a7e154c96d0e7a6c48a33df8745d081e93143b2da57f");
        }
    </script>
  </head>
  <body>
  <form method="post" name="loginForm" target=_blank>
    <table border="0">
      <%--发送验证码--%>
      <tr>
          <input type="button" value="发送验证码" onclick="SendData()"><font id="Show" style="color: red"></font>
      </tr>
      <tr>
        <td>
          uname:
        </td>
        <td>
          <input type='text' name="uname" id=uname style='width:400px'/>
        </td>
      </tr>
      <tr>
        <td>
          Password:
        </td>
        <td>
          <input type='text' name="password" id=password style='width:400px'/>
        </td>
      </tr>
        <tr>
        <td>
          验证码:
        </td>
        <td>
          <input type="text" placeholder="请输入手机接收的验证码进行登陆" id="CodeValue" name="Code" style="width: 400px" >
        </td>
      </tr>
      <tr>
        <td colspan="2" align="center">
          <input type="button" value="SUBMIT" onclick="rsalogin();" />
        </td>
      </tr>
    </table>
  </form>
  </body>
</html:html>

第四步:后台代码展示

   //登陆
    @RequestMapping("/Res")
    public  String LoginVerify(String result, Integer CodeValue, HttpServletRequest request) throws Exception {
        StringBuffer code = (StringBuffer) request.getSession().getAttribute("code");
        String s1 = code.toString();
        int i = Integer.parseInt(s1);
        String pwd;
        if (CodeValue==i){
            //将密码---》后端查询 此处不列举
            System.out.println("最先提交上来的密文为"+result);
            byte[] en_result = new BigInteger(result, 16).toByteArray();
            byte[] de_result = RSAUtil.decrypt(RSAUtil.getKeyPair().getPrivate(),en_result);
            String s = new String(de_result);
            System.out.println("还原密文"+s);
            //新键StringBuffer缓冲区
            StringBuffer sb = new StringBuffer();
            //在新建的字符串后  追加密文
            sb.append(s);
            pwd=sb.reverse().toString();
            System.out.println("=======================");
            pwd= URLDecoder.decode(pwd,"UTF-8");
            //将密码存储在request域中
            request.setAttribute("pwd",pwd);
            return  "/Success.jsp";
        }else {
            return "/Message.jsp";
        }
    }

第五步:前台页面显示直接从request域中取值就OK了

。。。。 

 

 

 

 

  • 0
    点赞
  • 3
    收藏
    觉得还不错? 一键收藏
  • 2
    评论
评论 2
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值