前后端非对称加密,解决http明文传输

后台加密解密的工具类

package com.sdyy.cas.utils;

import org.apache.commons.codec.binary.Base64;

import javax.crypto.Cipher;
import java.math.BigInteger;
import java.security.*;
import java.security.interfaces.RSAPrivateKey;
import java.security.interfaces.RSAPublicKey;
import java.security.spec.RSAPrivateKeySpec;
import java.security.spec.RSAPublicKeySpec;
import java.util.HashMap;

/**
 * @author p7
 * @ClassName: RSAUtils
 * @Description: 公钥、密钥生成和校验
 * @date 2018年2月2日 下午3:57:14
 **/
public class RSAUtils {
	private static final KeyPair KEY_PAIR = initKey();

	/**
	 * 生成公钥和私钥
	 *
	 * @throws NoSuchAlgorithmException
	 */
	public static HashMap<String, Object> getKeys() throws NoSuchAlgorithmException {
		HashMap<String, Object> map = new HashMap<String, Object>();
		KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance("RSA",
				new org.bouncycastle.jce.provider.BouncyCastleProvider());
		keyPairGen.initialize(1024);
		KeyPair keyPair = keyPairGen.generateKeyPair();
		RSAPublicKey publicKey = (RSAPublicKey) keyPair.getPublic();
		RSAPrivateKey privateKey = (RSAPrivateKey) keyPair.getPrivate();
		map.put("public", publicKey);
		map.put("private", privateKey);
		return map;
	}

	/**
	 * 使用模和指数生成RSA公钥
	 *
	 * @param modulus  模
	 * @param exponent 指数
	 * @return
	 */
	public static RSAPublicKey getPublicKey(String modulus, String exponent) {
		try {
			BigInteger b1 = new BigInteger(modulus);
			BigInteger b2 = new BigInteger(exponent);
			KeyFactory keyFactory = KeyFactory.getInstance("RSA",
					new org.bouncycastle.jce.provider.BouncyCastleProvider());
			RSAPublicKeySpec keySpec = new RSAPublicKeySpec(b1, b2);
			return (RSAPublicKey) keyFactory.generatePublic(keySpec);
		} catch (Exception e) {
			e.printStackTrace();
			return null;
		}
	}

	/**
	 * 使用模和指数生成RSA私钥
	 * <p>
	 * /None/NoPadding
	 *
	 * @param modulus  模
	 * @param exponent 指数
	 * @return
	 */
	public static RSAPrivateKey getPrivateKey(String modulus, String exponent) {
		try {
			BigInteger b1 = new BigInteger(modulus);
			BigInteger b2 = new BigInteger(exponent);
			KeyFactory keyFactory = KeyFactory.getInstance("RSA",
					new org.bouncycastle.jce.provider.BouncyCastleProvider());
			RSAPrivateKeySpec keySpec = new RSAPrivateKeySpec(b1, b2);
			return (RSAPrivateKey) keyFactory.generatePrivate(keySpec);
		} catch (Exception e) {
			e.printStackTrace();
			return null;
		}
	}

	/**
	 * 公钥加密
	 *
	 * @param data
	 * @param publicKey
	 * @return
	 * @throws Exception
	 */
	public static String encryptByPublicKey(String data, RSAPublicKey publicKey) throws Exception {
		Cipher cipher = Cipher.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider());
		cipher.init(Cipher.ENCRYPT_MODE, publicKey);
		// 模长
		int keyLen = publicKey.getModulus().bitLength() / 8;
		// 加密数据长度 <= 模长-11
		String[] datas = splitString(data, keyLen - 11);
		String mi = "";
		// 如果明文长度大于模长-11则要分组加密
		for (String s : datas) {
			mi += bcd2Str(cipher.doFinal(s.getBytes()));
		}
		return mi;
	}

	/**
	 * 私钥解密
	 *
	 * @param data
	 * @param privateKey
	 * @return
	 * @throws Exception
	 */
	public static String decryptByPrivateKey(String data, RSAPrivateKey privateKey) throws Exception {
		Cipher cipher = Cipher.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider());
		cipher.init(Cipher.DECRYPT_MODE, privateKey);
		// 模长
		int keyLen = privateKey.getModulus().bitLength() / 8;
		byte[] bytes = data.getBytes();
		byte[] bcd = asciiToBCD(bytes, bytes.length);
		// System.err.println(bcd.length);
		// 如果密文长度大于模长则要分组解密
		String ming = "";
		byte[][] arrays = splitArray(bcd, keyLen);
		for (byte[] arr : arrays) {
			ming += new String(cipher.doFinal(arr));
		}
		return ming;
	}

	/**
	 * ASCII码转BCD码
	 */
	public static byte[] asciiToBCD(byte[] ascii, int ascLen) {
		byte[] bcd = new byte[ascLen / 2];
		int j = 0;
		for (int i = 0; i < (ascLen + 1) / 2; i++) {
			bcd[i] = ascToBcd(ascii[j++]);
			bcd[i] = (byte) (((j >= ascLen) ? 0x00 : ascToBcd(ascii[j++])) + (bcd[i] << 4));
		}
		return bcd;
	}

	public static byte ascToBcd(byte asc) {
		byte bcd;

		if ((asc >= '0') && (asc <= '9')){
			bcd = (byte) (asc - '0');

		}
		else if ((asc >= 'A') && (asc <= 'F')){
			bcd = (byte) (asc - 'A' + 10);

		}
		else if ((asc >= 'a') && (asc <= 'f')){
			bcd = (byte) (asc - 'a' + 10);

		}
		else{
			bcd = (byte) (asc - 48);

		}
		return bcd;
	}

	/**
	 * BCD转字符串
	 */
	public static String bcd2Str(byte[] bytes) {
		char[] temp = new char[bytes.length * 2];
		char val;

		for (int i = 0; i < bytes.length; i++) {
			val = (char) (((bytes[i] & 0xf0) >> 4) & 0x0f);
			temp[i * 2] = (char) (val > 9 ? val + 'A' - 10 : val + '0');

			val = (char) (bytes[i] & 0x0f);
			temp[i * 2 + 1] = (char) (val > 9 ? val + 'A' - 10 : val + '0');
		}
		return new String(temp);
	}

	/**
	 * 拆分字符串
	 */
	public static String[] splitString(String string, int len) {
		int x = string.length() / len;
		int y = string.length() % len;
		int z = 0;
		if (y != 0) {
			z = 1;
		}
		String[] strings = new String[x + z];
		String str = "";
		for (int i = 0; i < x + z; i++) {
			if (i == x + z - 1 && y != 0) {
				str = string.substring(i * len, i * len + y);
			} else {
				str = string.substring(i * len, i * len + len);
			}
			strings[i] = str;
		}
		return strings;
	}

	/**
	 * 拆分数组
	 */
	public static byte[][] splitArray(byte[] data, int len) {
		int x = data.length / len;
		int y = data.length % len;
		int z = 0;
		if (y != 0) {
			z = 1;
		}
		byte[][] arrays = new byte[x + z][];
		byte[] arr;
		for (int i = 0; i < x + z; i++) {
			arr = new byte[len];
			if (i == x + z - 1 && y != 0) {
				System.arraycopy(data, i * len, arr, 0, y);
			} else {
				System.arraycopy(data, i * len, arr, 0, len);
			}
			arrays[i] = arr;
		}
		return arrays;
	}

	private static KeyPair initKey() {
		try {
			Security.addProvider(new org.bouncycastle.jce.provider.BouncyCastleProvider());
			SecureRandom random = new SecureRandom();
			KeyPairGenerator generator = KeyPairGenerator.getInstance("RSA", "BC");
			generator.initialize(1024, random);
			return generator.generateKeyPair();
		} catch (Exception e) {
			throw new RuntimeException(e);
		}
	}


	/**
	 * 生成public key
	 *
	 * @return
	 */
	public static String generateBase64PublicKey() {
		RSAPublicKey key = (RSAPublicKey) KEY_PAIR.getPublic();
		RSAPrivateKey pkey = (RSAPrivateKey) KEY_PAIR.getPrivate();
		String pk = new String(Base64.encodeBase64(key.getEncoded()));
		return pk;
	}

	/**
	 * 解密
	 *
	 * @param string
	 * @return
	 */
	public static String decryptBase64(String string) {
		return new String(decrypt(Base64.decodeBase64(string)));
	}

	private static byte[] decrypt(byte[] string) {
		try {
			Security.addProvider(new org.bouncycastle.jce.provider.BouncyCastleProvider());
			Cipher cipher = Cipher.getInstance("RSA/None/PKCS1Padding", "BC");
			RSAPrivateKey pbk = (RSAPrivateKey) KEY_PAIR.getPrivate();
			cipher.init(Cipher.DECRYPT_MODE, pbk);
			byte[] plainText = cipher.doFinal(string);
			return plainText;
		} catch (Exception e) {
			throw new RuntimeException(e);
		}
	}

	//public static void main(String[] args) {
	//	String pass="fCWvjJJrp+s96Fs9J78Q+jPySVIA404khgEHdwsC2w4vRNccQeV7hTnh44NjXaj/lLY16lN6r7H86jYebtZLttKPm/MXuB1L6MuTmm/YMEm7jt+n4jupNntEYE/xM3NfFUnSfZU1ZKdGCIN4ZA1mx/sRHgXjoRp9QcocH/ebfco=";
	//
	//	String password = "";
	//	try {
	//		password = decryptBase64(pass);
	//	} catch (Exception e) {
	//		e.printStackTrace();
	//	}
	//	System.out.println(password);
	//}


	 public static void main(String[] args) throws Exception {
	 	// 生成public key
	 	System.out.println(generateBase64PublicKey());
		 System.out.println();

		 //System.out.println(decryptBase64("wAfY9JkoKay9SxcPIs1FcG+t6sR+wYwAs/mh9DpfcBraxzqoZdb9LyaAigzFQ0EKck9OyHL0dhv+Uxuw5hHw6CPT0B2Z0i1gwrjDUNaL1gWvqt1pDJVGrIYPLJSjs9xktFhY1jbxQgXGjyCt06Rwid5sJknw90AUO0CyQulfipg="));


		 HashMap<String, Object> map = getKeys();
		 // 生成公钥和私钥
		 RSAPublicKey publicKey = (RSAPublicKey) map.get("public");
		 System.out.println(publicKey);
		 RSAPrivateKey privateKey = (RSAPrivateKey) map.get("private");

		 // 模
		 String modulus = publicKey.getModulus().toString();
		 System.out.println("pubkey modulus=" + modulus);
		 // 公钥指数
		 String public_exponent = publicKey.getPublicExponent().toString();
		 System.out.println("pubkey exponent=" + public_exponent);
		 // 私钥指数
		 String private_exponent = privateKey.getPrivateExponent().toString();
		 System.out.println("private exponent=" + private_exponent);
		 // 明文
		 String ming = "yangzhen";
		 // 使用模和指数生成公钥和私钥
		 RSAPublicKey pubKey = RSAUtils.getPublicKey(modulus, public_exponent);
		 RSAPrivateKey priKey = RSAUtils.getPrivateKey(modulus, private_exponent);
		 // 加密后的密文
		 String mi = RSAUtils.encryptByPublicKey(ming, pubKey);
		 System.err.println("mi=" + mi);
		 // 解密后的明文
		 String ming2 = RSAUtils.decryptByPrivateKey(mi, priKey);
		 System.err.println("ming2=" + ming2);
	 }
}

前端加密 jsencrypt.js

	var encrypt = new JSEncrypt();
    encrypt.setPublicKey(rPK);
    var ec = encrypt.encrypt(password);
  • 1
    点赞
  • 6
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值