数字签名:带有密钥(公钥,私钥)的消息摘要算法。
验证数据的完整性,认证数据的来源,抗否性
OSI参考模型
私钥签名,公钥验证
签名算法:RSA,DSA,ECDSA
算法1 :RSA
MD,SHA两类
————————————————————————————————————
密钥长度均是 512~65536(64的整数倍)
————————————————————————————————————
实现方:JDK 默认长度:1024
MD2withRSA
MD5withRSA
SHA1withRSA
————————————————————————————————————
实现方:BC 默认长度:2048
SHA224withRSA
SHA256withRSA
SHA384withRSA
SHA512withRSA
RIPEMD128withRSA
RIPEMD160withRSA
————————————————————————————————————
1 package RSA; 2 3 import com.sun.org.apache.xerces.internal.impl.dv.util.HexBin; 4 5 import java.security.*; 6 import java.security.interfaces.RSAPrivateKey; 7 import java.security.interfaces.RSAPublicKey; 8 import java.security.spec.PKCS8EncodedKeySpec; 9 import java.security.spec.X509EncodedKeySpec; 10 11 public class Rsa { 12 public static String src = "hello human"; 13 public static void main(String[] args) { 14 jdkRSA(); 15 } 16 public static void jdkRSA(){ 17 try{ 18 // 密钥初始化 19 KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance("RSA"); 20 keyPairGenerator.initialize(512); 21 KeyPair keyPair = keyPairGenerator.generateKeyPair(); 22 RSAPublicKey rsaPublicKey = (RSAPublicKey)keyPair.getPublic() ; 23 RSAPrivateKey rsaPrivateKey = (RSAPrivateKey)keyPair.getPrivate() ; 24 // 签名 25 PKCS8EncodedKeySpec pkcs8EncodedKeySpec = new PKCS8EncodedKeySpec(rsaPrivateKey.getEncoded()); 26 KeyFactory keyFactory = KeyFactory.getInstance("RSA"); 27 PrivateKey privateKey = keyFactory.generatePrivate(pkcs8EncodedKeySpec); 28 Signature signature = Signature.getInstance("MD5withRSA"); 29 signature.initSign(privateKey); 30 signature.update(src.getBytes()); 31 byte []arr = signature.sign(); 32 System.out.println("jdk rsa sign:"+ HexBin.encode(arr)); 33 // 验证签名 34 X509EncodedKeySpec x509EncodedKeySpec = new X509EncodedKeySpec(rsaPublicKey.getEncoded()) ; 35 keyFactory = KeyFactory.getInstance("RSA"); 36 PublicKey publicKey = keyFactory.generatePublic(x509EncodedKeySpec); 37 signature = Signature.getInstance("MD5withRSA"); 38 signature.initVerify(publicKey); 39 signature.update(src.getBytes()); 40 boolean bool = signature.verify(arr); 41 System.out.println("jdk rsa verify:"+bool); 42 }catch (Exception e){ 43 44 } 45 } 46 }
执行过程:
构建密钥对:
发送方 :1.构建密钥对
2.公布密钥
发送数据 :
发送方 :1.使用私钥对数据签名
2.发送签名,数据
接收放 :3.使用公钥,签名验证数据