时间:2021-04-30 08:41:17
web前端,用户注册与登录,不能直接以明文形式提交用户密码,容易被截获,这时就引入RSA。
前端加密
需引入4个JS扩展文件,jsbn.js、prng4.js、rng.js和rsa.js。
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
<
html
><
head
>
<
title
>RSA Login Test</
title
>
<
meta
charset
=
"utf-8"
>
<
script
type
=
"text/javascript"
src
=
"./js/jsbn.js"
></
script
>
<
script
type
=
"text/javascript"
src
=
"./js/prng4.js"
></
script
>
<
script
type
=
"text/javascript"
src
=
"./js/rng.js"
></
script
>
<
script
type
=
"text/javascript"
src
=
"./js/rsa.js"
></
script
>
<
script
src
=
"//cdn.bootcss.com/jquery/3.0.0/jquery.min.js"
></
script
>
<
script
type
=
"text/javascript"
>
function cmdEncrypt() { var passwd = $('#passwd').val(); var rsa = new RSAKey();
//openssl生成的modulus,十六进制数据 var modulus = "DB1EA572B55F5D9C8ADF092F5DCC3559CFEA8CE8BB54E3A71DA9B1AFBD7D17CF80ADB224FE4EA5379BC782F41C137748D8F1B5A36AD62A127EF5E87EFB25C209A66BCEE9925CE09631BF2271E81123E93438646625080FF04F4F2CF532B077E3E390486DF40E7586F0AE522C873F33170222F46BDB6084F55DE6B7031E55DBE7";
//openssl生成秘钥时的e的值(0x10001)
var exponent = "10001";
rsa.setPublic(modulus, exponent);
var res = rsa.encrypt(passwd);
$('#passwd').val(res);
} </
script
></
head
><
body
><
form
action
=
"./login.php"
method
=
"post"
>
<
label
for
=
"username"
>用户名:</
label
><
input
type
=
"text"
name
=
"username"
id
=
"username"
>
<
label
for
=
"passwd"
>密 码:</
label
><
input
type
=
"password"
name
=
"password"
id
=
"passwd"
>
<
input
type
=
"submit"
value
=
"登录"
onclick
=
"cmdEncrypt();"
></
form
></
body
></
html
>
前端代码十分简单,只有短短的几行,下面分别解释具体的含义:
1.new一个RSAKey对象,
2.定义modulus(模数),我们可以根据私钥计算出该值(十六进制),具体指令: rsa -in rsa_private_key.pem -noout -modulus
3.定义exponent,此值在openssl生成秘钥时,输出,一般情况下e的取值是一个定值10001(十六进制)
4.设置公钥
5.加密数据
至此,我们就完成了前端的公钥加密。
后端解密
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
//私钥$private_key = "-----BEGIN RSA PRIVATE KEY-----
MIICXAIBAAKBgQDICrXl+ELhqFE0xCGA3/xdN1VxwUc5kxAKb5f3F28HY40zdXbn
uwpdQNKnHwTNvHZupBRHlYpqX+1Plti81sRadtYKNwVoLRlwwP3mzIyRRvO0hf3c
...
...
AoGAdu2/NQkDIkvCc7+DN65yyCyklOvW34jqSXoM++8nqFnsUcKtPZn60HRAiPEt
Fu/L7X2JPQHP9+wuF1pUYvjAZQb5E9n8G12nxduBS5Ux085INOWP69pXnsljhyip
cv4EjHjDN6ClhT6ATuamw0sNlta9n4cGPQJASBltXItUbhV5U5hTNIQ5thWZRZoy
ylDFPO7ZI89ON+A7yG4ceByI/ft9Z6ySH7cvK1RG6WqFuYn4A3Wj0lDlZQJBAIjr
Pq0TRbLl25ToXTAIkI9jREDUuGa/mC1gu+ALbDHc+HTzAxpVY0rLJ2Hgf9l6Nf1D
sW4ReWqSsFBNkCRKc+0CQClxcPv2wwSGMFhLTqpKeySPIeVy4NrTHv8zEYvm7MuU
Gvlsj6sqvcuUQbVHoLRpqQiDi8TPaEMHzS9fhDjVUUc=
-----END RSA PRIVATE KEY-----";$hex_encrypt_data = trim($_POST['password']); //十六进制数据$encrypt_data = pack("H*", $hex_encrypt_data); //对十六进制数据进行转换openssl_private_decrypt($encrypt_data, $decrypt_data, $private_key); //解密数据echo '解密后的数据:' . $decrypt_data;
openssl操作截图:
需要注意的是: 前端加密的时候如果是中文,则解密后是乱码。
openssl工具和完整demo,详见:https://github.com/cqingt/RSA_JS_PHP