RSA加解密,.net公钥/私钥兼容java

背景介绍

之前老程序使用.net进行数据的RSA加解密,现在用JAVA重写,但是.net的公钥和私钥是xml格式,跟java的不一样,需要手动转换一下。目前网上的大部分都是java转.net。我这里来个.net转java。

一、.net公钥转java

1、公钥格式

PFJTQUtleVZhbHVlPjxNb2R1bHVzPi9lRk42TUFyVXE4QWhvYmpsamRjTWhjeEhTWjRnMXFZK3Fmeldud0o2aVhwTWZBVzNmaEJXK2krblRXTnZwckcvelZ5OFpQT2VTOStHWmlYQlVJODNpczBVZzB3eVJKT2E0TWU2d3hmR1pJWTE1WFpGUFdjcEtSaVZqeWxaZGJ0ZmNTY3ZQUnFCMTE5N2kvZkVwNjVrY1Fjc1AzT3U5b3B4ZHJmeEJOMEgwRT08L01vZHVsdXM+PEV4cG9uZW50PkFRQUI8L0V4cG9uZW50PjwvUlNBS2V5VmFsdWU+

2、Base64解码

可以看到是base64编码过的,解码后看看,是一段xml

<RSAKeyValue>
    <Modulus>/eFN6MArUq8AhobjljdcMhcxHSZ4g1qY+qfzWnwJ6iXpMfAW3fhBW+i+nTWNvprG/zVy8ZPOeS9+GZiXBUI83is0Ug0wyRJOa4Me6wxfGZIY15XZFPWcpKRiVjylZdbtfcScvPRqB1197i/fEp65kcQcsP3Ou9opxdrfxBN0H0E=</Modulus>
    <Exponent>AQAB</Exponent>
</RSAKeyValue>

3、转换

思路:

  1. 解码base64 公钥
  2. 读取xml节点中的ModulusExponent
  3. ModulusExponent进行base64解码
  4. 创建公钥需要的BigInterg格式的参数
  5. 生成公钥

这段代码中使用了 hutoolspring的工具包来解析json和xml,各位可以自行替换。

private  PublicKey getPublicKey(String xmlPublicKey) throws NoSuchAlgorithmException, InvalidKeySpecException {
        byte[] bytes = Base64.getDecoder().decode(xmlPublicKey);
        JSONObject jsonObject = XML.toJSONObject(new String(bytes, StandardCharsets.UTF_8));
        String Modulus = jsonObject.getJSONObject("RSAKeyValue").getStr("Modulus");
        String Exponent = jsonObject.getJSONObject("RSAKeyValue").getStr("Exponent");
        byte[] modulus = Base64Utils.decode(Modulus.getBytes());
        byte[] exponent = Base64Utils.decode(Exponent.getBytes());
        BigInteger b1 = new BigInteger(1, modulus);
        BigInteger b2 = new BigInteger(1, exponent);
        KeyFactory keyFactory = KeyFactory.getInstance("RSA");
        RSAPublicKeySpec keySpec = new RSAPublicKeySpec(b1, b2);
        return keyFactory.generatePublic(keySpec);
    }

二、.net私钥转java

1、私钥格式

PFJTQUtleVZhbHVlPjxNb2R1bHVzPi9lRk42TUFyVXE4QWhvYmpsamRjTWhjeEhTWjRnMXFZK3Fmeldud0o2aVhwTWZBVzNmaEJXK2krblRXTnZwckcvelZ5OFpQT2VTOStHWmlYQlVJODNpczBVZzB3eVJKT2E0TWU2d3hmR1pJWTE1WFpGUFdjcEtSaVZqeWxaZGJ0ZmNTY3ZQUnFCMTE5N2kvZkVwNjVrY1Fjc1AzT3U5b3B4ZHJmeEJOMEgwRT08L01vZHVsdXM+PEV4cG9uZW50PkFRQUI8L0V4cG9uZW50PjxQPi93YTQyRnEyWGpkMUE5K1paR1dHR29zclB5YmpPZk8rZkZ4UkxlcFl0cW1TLytEVnpHRGhMaG9lMG1hNnpFQ3FCaFQ0aUgyUHRRWmhiZWtCQlU2T2dRPT08L1A+PFE+L3RsMlFvNWd2ck1JcWhVYkV4QitNRFlFTmgxdzNrUWQzK0M1bmZTWjA4TDBqV3N5Z2N3SjdSU0hPY2ZFclM0bEF5UkwzR0RtbVNrK3hYNVdWRUt3d1E9PTwvUT48RFA+N0lqZWp3VHIyczBUQWltMGl2TERCQUdLZGdOcWc0aTRaMzMwYVdMUEwzUnVmRmViMVBrU1FnRkdEeDNyS2FEY1VkSEhoa2ozTGc2aDlTQkVxeGhtZ1E9PTwvRFA+PERRPnNUQ0ZWdFVqVXJPcjdJVnNJNTh0L1ZzeEptYmwyTVBIZWFjSHAxa3ZzdG96cWpmRUVCYkxOL2t6NCtxUFJsRjFEbkFvQm51aEdSQmlRbklLbDk4ZWdRPT08L0RRPjxJbnZlcnNlUT5TYWZ4eC9GTUVrQzZZTmg0SlNwaUpoSlhiQjB6ajhQSnRSTmNxWWIyNVNLcE1aZW5FSmcxSmNDK0xZbWlLQUFVTFFwK0xROURVcUhBenJMSGlPS3g4Zz09PC9JbnZlcnNlUT48RD42LytaUmFnRlhhb1NDZnV2NmI1eWRKbThiUVdLOTBlcmR5M1NlS1ZmTGdxcHVHTWZUcDFzWER5Qm5HL2c0SExPVXdSallnOXMycGY4VjF6UjNmQ1IxSFpLaE9YRkliY2plajB5TFdURk9xT0Q1MlRLQW5LTE1lWm16TGI3c3NoR0JScXNhaEV5TTJlc2ZUbTM5VUN3TzA0eEJJMHlwT09XMTVQU3pQY0s0QUU9PC9EPjwvUlNBS2V5VmFsdWU+

2、Base64解码

可以看到是base64编码过的,解码后看看,是一段xml。参数比较多

<RSAKeyValue>
    <Modulus>/eFN6MArUq8AhobjljdcMhcxHSZ4g1qY+qfzWnwJ6iXpMfAW3fhBW+i+nTWNvprG/zVy8ZPOeS9+GZiXBUI83is0Ug0wyRJOa4Me6wxfGZIY15XZFPWcpKRiVjylZdbtfcScvPRqB1197i/fEp65kcQcsP3Ou9opxdrfxBN0H0E=</Modulus>
    <Exponent>AQAB</Exponent>
    <P>/wa42Fq2Xjd1A9+ZZGWGGosrPybjOfO+fFxRLepYtqmS/+DVzGDhLhoe0ma6zECqBhT4iH2PtQZhbekBBU6OgQ==</P>
    <Q>/tl2Qo5gvrMIqhUbExB+MDYENh1w3kQd3+C5nfSZ08L0jWsygcwJ7RSHOcfErS4lAyRL3GDmmSk+xX5WVEKwwQ==</Q>
    <DP>7IjejwTr2s0TAim0ivLDBAGKdgNqg4i4Z330aWLPL3RufFeb1PkSQgFGDx3rKaDcUdHHhkj3Lg6h9SBEqxhmgQ==</DP>
    <DQ>sTCFVtUjUrOr7IVsI58t/VsxJmbl2MPHeacHp1kvstozqjfEEBbLN/kz4+qPRlF1DnAoBnuhGRBiQnIKl98egQ==</DQ>
    <InverseQ>Safxx/FMEkC6YNh4JSpiJhJXbB0zj8PJtRNcqYb25SKpMZenEJg1JcC+LYmiKAAULQp+LQ9DUqHAzrLHiOKx8g==</InverseQ>
    <D>6/+ZRagFXaoSCfuv6b5ydJm8bQWK90erdy3SeKVfLgqpuGMfTp1sXDyBnG/g4HLOUwRjYg9s2pf8V1zR3fCR1HZKhOXFIbcjej0yLWTFOqOD52TKAnKLMeZmzLb7sshGBRqsahEyM2esfTm39UCwO04xBI0ypOOW15PSzPcK4AE=</D>
</RSAKeyValue>

3、转换

大体思路同上,看代码就行了。还是用到了 hutoolspring的工具包来解析json和xml,各位可以自行替换。

private PrivateKey getPrivateKey(String xmlPrivateKey) throws Exception {
        byte[] bytes = Base64.getDecoder().decode(xmlPrivateKey);
        JSONObject jsonObject = XML.toJSONObject(new String(bytes, StandardCharsets.UTF_8));
        JSONObject rsaKeyValue = jsonObject.getJSONObject("RSAKeyValue");
        BigInteger modulus = new BigInteger(1, Base64Utils.decode(rsaKeyValue.getStr("Modulus").getBytes()));
        BigInteger exponent = new BigInteger(1, Base64Utils.decode(rsaKeyValue.getStr("Exponent").getBytes()));
        BigInteger d = new BigInteger(1, Base64Utils.decode(rsaKeyValue.getStr("D").getBytes()));
        BigInteger p = new BigInteger(1, Base64Utils.decode(rsaKeyValue.getStr("P").getBytes()));
        BigInteger q = new BigInteger(1, Base64Utils.decode(rsaKeyValue.getStr("Q").getBytes()));
        BigInteger dp = new BigInteger(1, Base64Utils.decode(rsaKeyValue.getStr("DP").getBytes()));
        BigInteger dq = new BigInteger(1, Base64Utils.decode(rsaKeyValue.getStr("DQ").getBytes()));
        BigInteger inverseQ = new BigInteger(1, Base64Utils.decode(rsaKeyValue.getStr("InverseQ").getBytes()));
        RSAPrivateCrtKeySpec privateKeySpec = new RSAPrivateCrtKeySpec(modulus, exponent, d, p, q, dp, dq, inverseQ);
        KeyFactory keyFactory = KeyFactory.getInstance("RSA");
        PrivateKey privateKey = keyFactory.generatePrivate(privateKeySpec);
        Cipher cipher = Cipher.getInstance("RSA");
        cipher.init(Cipher.DECRYPT_MODE, privateKey);
        return privateKey;
    }
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
RSA是一种非对称加密算法,其公钥私钥是成对生成的。以下是RSA生成公钥私钥以及加解密的步骤: 1. 生成RSA公钥私钥: 首先需要随机生成两个大素数p和q,计算n = p * q,再选取一个整数e(一般为65537),计算d = e^-1 mod ((p-1) * (q-1))。 生成的公钥为(n, e),私钥为(n, d)。 2. RSA加密: 假设要将明文M加密为密文C,使用公钥(n, e)进行加密,计算C = M^e mod n。 3. RSA解密: 使用私钥(n, d)进行解密,计算M = C^d mod n。 以下是一个简单的RSA加解密的C语言实现示例: ```c #include <stdio.h> #include <stdlib.h> #include <string.h> #include <openssl/bio.h> #include <openssl/rsa.h> #include <openssl/pem.h> int main() { // 生成RSA公钥私钥 RSA *rsa = RSA_generate_key(2048, 65537, NULL, NULL); if (rsa == NULL) { printf("Failed to generate RSA key pair.\n"); return -1; } // 获取公钥私钥 BIO *pubBio = BIO_new(BIO_s_mem()); BIO *priBio = BIO_new(BIO_s_mem()); PEM_write_bio_RSAPublicKey(pubBio, rsa); PEM_write_bio_RSAPrivateKey(priBio, rsa, NULL, NULL, 0, NULL, NULL); // 获取公钥私钥字符串 char pubKey[1024] = {0}; char priKey[4096] = {0}; BIO_read(pubBio, pubKey, sizeof(pubKey)); BIO_read(priBio, priKey, sizeof(priKey)); // 输出公钥私钥 printf("Public Key:\n%s\n", pubKey); printf("Private Key:\n%s\n", priKey); // 加密明文 char *plaintext = "Hello World!"; int plaintextLen = strlen(plaintext) + 1; char ciphertext[4096] = {0}; int ciphertextLen = RSA_public_encrypt(plaintextLen, (unsigned char *)plaintext, (unsigned char *)ciphertext, rsa, RSA_PKCS1_PADDING); if (ciphertextLen == -1) { printf("Failed to encrypt plaintext.\n"); return -1; } // 输出密文 printf("Ciphertext:\n"); for (int i = 0; i < ciphertextLen; i++) { printf("%02x", ciphertext[i]); } printf("\n"); // 解密密文 char decrypted[4096] = {0}; int decryptedLen = RSA_private_decrypt(ciphertextLen, (unsigned char *)ciphertext, (unsigned char *)decrypted, rsa, RSA_PKCS1_PADDING); if (decryptedLen == -1) { printf("Failed to decrypt ciphertext.\n"); return -1; } // 输出解密后的明文 printf("Decrypted plaintext: %s\n", decrypted); // 释放资源 RSA_free(rsa); BIO_free_all(pubBio); BIO_free_all(priBio); return 0; } ```
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值