aes c android ios,AES加密在iOS和Android中产生不同的结果

尝试使用AES128算法加密样本数据,在

Android和iOS中使用CBC和PKCS7填充,但结果不同:(

Android代码:

private static final byte[] KEY = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F, 0x10};

int srcBuffSiz = 1024;

byte[] srcBuff = new byte[srcBuffSiz];

Arrays.fill(srcBuff, (byte)0x01);

SecretKeySpec skeySpec = new SecretKeySpec(KEY, "AES");

Cipher ecipher = Cipher.getInstance("AES/CBC/PKCS7Padding");

ecipher.init(Cipher.ENCRYPT_MODE, skeySpec);

byte[] dstBuff = ecipher.doFinal(srcBuff);

int bytesEncrypted = dstBuff.length;

iOS代码:

// Source buffer

size_t srcBuffSiz = 1024;

unsigned char* srcBuff = new unsigned char[srcBuffSiz];

memset(srcBuff, 0x01, srcBuffSiz);

// Destination buffer

size_t dstBuffSiz = srcBuffSiz + 128;

unsigned char* dstBuff = new unsigned char[dstBuffSiz];

memset(dstBuff, 0x00, dstBuffSiz);

unsigned char keyPtr[kCCKeySizeAES128] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F, 0x10};

size_t bytesEncrypted = 0;

CCCryptorStatus cryptStatus = CCCrypt(kCCEncrypt, kCCAlgorithmAES128, kCCOptionPKCS7Padding,

keyPtr, kCCKeySizeAES128,

NULL /* initialization vector (optional) */,

srcBuff, srcBuffSiz, /* input */

dstBuff, dstBuffSiz, /* output */

&bytesEncrypted);

因此,在这两种情况下,我都试图使用预定义的样本密钥加密样本1024字节缓冲区(通常填充0x01值).

iOS中第一个和最后6个字节的加密缓冲区:

ED CC 64 27 A8 99 ... 0C 44 9F EC 34 FC

Android中第一个和最后一个6字节的加密缓冲区:

AE 65 A9 F7 7F 0E ... 1F BD AE 8B 85 ED

任何的想法?

如果我将Cipher.getInstance(“AES / CBC / PKCS7Padding”)替换为Cipher.getInstance(“AES”),那么加密缓冲区的前几个字节将是相同的,但是从第17个字节开始……

iOS版:

ED CC 64 27 A8 99 DA 83 D5 4A B0 03 0F E7 DD A7 35 F2 50 5C 49 47 CC 3B 2F AB D1 61 05

安卓:

ED CC 64 27 A8 99 DA 83 D5 4A B0 03 0F E7 DD A7 ED CC 64 27 A8 99 DA 83 D5 4A B0 03 0F

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
iOS使用AES加密可以使用CommonCrypto库提供的API实现。具体步骤如下: 1. 引入头文件: ```objective-c #import <CommonCrypto/CommonCryptor.h> ``` 2. 定义加密/解密方法: ```objective-c // 加密方法 + (NSString *)encrypt:(NSString *)content key:(NSString *)key iv:(NSString *)iv { char keyPtr[kCCKeySizeAES256 + 1]; memset(keyPtr, 0, sizeof(keyPtr)); [key getCString:keyPtr maxLength:sizeof(keyPtr) encoding:NSUTF8StringEncoding]; char ivPtr[kCCBlockSizeAES128 + 1]; memset(ivPtr, 0, sizeof(ivPtr)); [iv getCString:ivPtr maxLength:sizeof(ivPtr) encoding:NSUTF8StringEncoding]; NSData *data = [content dataUsingEncoding:NSUTF8StringEncoding]; NSUInteger dataLength = [data length]; int bufferSize = dataLength + kCCBlockSizeAES128; void *buffer = malloc(bufferSize); size_t numBytesEncrypted = 0; CCCryptorStatus status = CCCrypt(kCCEncrypt, kCCAlgorithmAES128, kCCOptionPKCS7Padding | kCCOptionECBMode, keyPtr, kCCBlockSizeAES128, ivPtr, [data bytes], dataLength, buffer, bufferSize, &numBytesEncrypted); if (status == kCCSuccess) { NSData *resultData = [NSData dataWithBytesNoCopy:buffer length:numBytesEncrypted]; return [resultData base64EncodedStringWithOptions:NSDataBase64EncodingEndLineWithLineFeed]; } free(buffer); return nil; } // 解密方法 + (NSString *)decrypt:(NSString *)content key:(NSString *)key iv:(NSString *)iv { char keyPtr[kCCKeySizeAES256 + 1]; memset(keyPtr, 0, sizeof(keyPtr)); [key getCString:keyPtr maxLength:sizeof(keyPtr) encoding:NSUTF8StringEncoding]; char ivPtr[kCCBlockSizeAES128 + 1]; memset(ivPtr, 0, sizeof(ivPtr)); [iv getCString:ivPtr maxLength:sizeof(ivPtr) encoding:NSUTF8StringEncoding]; NSData *data = [[NSData alloc] initWithBase64EncodedString:content options:NSDataBase64DecodingIgnoreUnknownCharacters]; NSUInteger dataLength = [data length]; int bufferSize = dataLength + kCCBlockSizeAES128; void *buffer = malloc(bufferSize); size_t numBytesDecrypted = 0; CCCryptorStatus status = CCCrypt(kCCDecrypt, kCCAlgorithmAES128, kCCOptionPKCS7Padding | kCCOptionECBMode, keyPtr, kCCBlockSizeAES128, ivPtr, [data bytes], dataLength, buffer, bufferSize, &numBytesDecrypted); if (status == kCCSuccess) { NSData *resultData = [NSData dataWithBytesNoCopy:buffer length:numBytesDecrypted]; return [[NSString alloc] initWithData:resultData encoding:NSUTF8StringEncoding]; } free(buffer); return nil; } ``` 3. 调用加密/解密方法: ```objective-c NSString *key = @"1234567890123456"; NSString *iv = @"1234567890123456"; NSString *content = @"hello, world"; NSString *encryptedContent = [self encrypt:content key:key iv:iv]; NSLog(@"加密后:%@", encryptedContent); NSString *decryptedContent = [self decrypt:encryptedContent key:key iv:iv]; NSLog(@"解密后:%@", decryptedContent); ``` 需要注意的是,在ECB模式下,iv的值不会被使用,但是仍然需要传入一个长度为16的字符串。另外,加密后的结果需要使用base64编码才能转换为字符串,解密前需要先对密文进行base64解码。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值