AES_GCM_256加密

final class AesGcmUtils {
    private static final String ALG_AES = "AES";
    private static final String ALGORITHM = "AES/GCM/PKCS5Padding";
    private static final int TAG_LENGTH_BIT = 120;//must be one of {128, 120, 112, 104, 96}

    /**
     * Get encrypted object
     * @param key It must be 32-bit
     * @param iv It must be 16-bit
     * @return
     */
    private static Cipher getCipher(@NonNull byte[] key, @NonNull byte[] iv) {
        SecretKeySpec keySpec = new SecretKeySpec(key, ALG_AES);
        Cipher cipher = null;
        try {
            cipher = Cipher.getInstance(ALGORITHM);
            GCMParameterSpec params = new GCMParameterSpec(TAG_LENGTH_BIT, iv);
            cipher.init(Cipher.DECRYPT_MODE, keySpec, params);
        } catch (NoSuchAlgorithmException e) {
            e.printStackTrace();
        } catch (NoSuchPaddingException e) {
            e.printStackTrace();
        } catch (InvalidAlgorithmParameterException e) {
            e.printStackTrace();
        } catch (InvalidKeyException e) {
            e.printStackTrace();
        }

        return cipher;
    }

    public static byte[] encrypt(@NonNull byte[] content, @NonNull byte[] key, @NonNull byte[] iv) throws Exception {
        Cipher cipher = getCipher(key,iv);
        if(cipher == null){
            throw new NullPointerException("Failed to get encryption method");
        }
        return cipher.doFinal(content);
    }

    public static byte[] decrypt(@NonNull byte[] content, @NonNull byte[] key, @NonNull byte[] iv) throws Exception {
        SecretKeySpec keySpec = new SecretKeySpec(key, ALG_AES);
        Cipher cipher = Cipher.getInstance(ALGORITHM);
        GCMParameterSpec params = new GCMParameterSpec(TAG_LENGTH_BIT, iv);
        cipher.init(Cipher.DECRYPT_MODE, keySpec, params);
        return cipher.doFinal(content);
    }

    public static byte[] buildIv(String ivString) {
        byte[] derivative = ivString.getBytes();
        byte[] iv = new byte[16];
        System.arraycopy(derivative, 0, iv, 0, iv.length);
        return iv;
    }

测试用例代码:

@RunWith(RobolectricTestRunner.class)
public class AesGcmUtilsTest {
    static String KEY = "NxQHusZRgJ4kEsGIv2tRDxs";
    static String IV = "123456781122321321321321313231213";
    static String CONTENT = "Test aes_gcm encrypt data!";
    static Base64.Decoder decoder = Base64.getDecoder();
    static Base64.Encoder encoder = Base64.getEncoder();

    @Test
    public void encode() {
        try {
            assertThat(encoder.encodeToString(AesGcmUtils.encrypt(CONTENT.getBytes(),
                    encoder.encode(KEY.getBytes())
                    , AesGcmUtils.buildIv(IV))))
                    .isEqualTo("JjbKFck2UqZw3dQ0O3wSPsYyiLRWRlKgxyzH22B+ig4253d/rWsKHjA=");
        } catch (Exception e) {
            e.printStackTrace();
        }
    }

    @Test
    public void decode() {
        try {
            assertThat(new String(
                    AesGcmUtils.decrypt(decoder.decode("JjbKFck2UqZw3dQ0O3wSPsYyiLRWRlKgxyzH22B+ig4253d/rWsKHjA="),
                            encoder.encode(KEY.getBytes())
                    , AesGcmUtils.buildIv(IV))))
                    .isEqualTo(CONTENT);
        } catch (Exception e) {
            e.printStackTrace();
        }
    }
}
AES_GCM是一种结合了AES对称加密算法和GCM消息认证码的加密算法。在AES_GCM中,GCM指的是Galois/Counter Mode,其中的G代表GMAC,C代表CTR。AES_GCM算法可以同时提供对消息的加密和完整性校验,并且还可以提供附加消息的完整性校验。在实际应用中,有些信息可能不需要保密,但接收者需要确认其真实性,这些信息可以作为附加消息加入到MAC值的计算中。AES_GCM的实现过程中,使用对称密钥对输入进行AES运算,并生成密文、初始向量IV和MAC值。密文接收者可以使用相同的密钥和IV来解密密文,并验证MAC值以确保消息的完整性和真实性。因此,AES_GCM是一种同时提供加密和完整性校验的高级加密标准。 #### 引用[.reference_title] - *1* *2* [AES-GCM加密算法的简单介绍](https://blog.csdn.net/qq_39500214/article/details/108888998)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v91^koosearch_v1,239^v3^insert_chatgpt"}} ] [.reference_item] - *3* [什么是 AES-GCM加密算法](https://blog.csdn.net/T0mato_/article/details/53160772)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v91^koosearch_v1,239^v3^insert_chatgpt"}} ] [.reference_item] [ .reference_list ]
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值