java dsa加密实例_Java加密算法 DSA

package com.stone.security;

import java.security.Key;

import java.security.KeyFactory;

import java.security.KeyPair;

import java.security.KeyPairGenerator;

import java.security.PrivateKey;

import java.security.PublicKey;

import java.security.SecureRandom;

import java.security.Signature;

import java.security.spec.PKCS8EncodedKeySpec;

import java.security.spec.X509EncodedKeySpec;

import java.util.HashMap;

import java.util.Map;

import sun.misc.BASE64Decoder;

import sun.misc.BASE64Encoder;

/**

* DSA-Digital Signature Algorithm 是Schnorr和ElGamal签名算法的变种,被美国NIST作为DSS(DigitalSignature Standard)。

* 简单的说,这是一种更高级的验证方式,用作数字签名。不单单只有公钥、私钥,还有数字签名。私钥加密生成数字签名,公钥验证数据及签名。

* 如果数据和签名不匹配则认为验证失败!即 传输中的数据 可以不再加密,接收方获得数据后,拿到公钥与签名 验证数据是否有效

*

* @author stone

* @date 2014-03-11 09:50:51

*/

public class DSA {

//不仅可以使用DSA算法,同样也可以使用RSA算法做数字签名

/*public static final String KEY_ALGORITHM = "RSA";

public static final String SIGNATURE_ALGORITHM = "MD5withRSA";*/

public static final String KEY_ALGORITHM = "DSA";

public static final String SIGNATURE_ALGORITHM = "DSA";

public static final String DEFAULT_SEED = "$%^*%^()(HJG8awfjas7"; //默认种子

public static final String PUBLIC_KEY = "DSAPublicKey";

public static final String PRIVATE_KEY = "DSAPrivateKey";

public static void main(String[] args) throws Exception {

String str = "!@#$!#^$#&ZXVDF呆军工路爱着你*()_+";

byte[] data = str.getBytes();

Map keyMap = initKey();// 构建密钥

PublicKey publicKey = (PublicKey) keyMap.get(PUBLIC_KEY);

PrivateKey privateKey = (PrivateKey) keyMap.get(PRIVATE_KEY);

System.out.println("私钥format:" + privateKey.getFormat());

System.out.println("公钥format:" + publicKey.getFormat());

// 产生签名

String sign = sign(data, getPrivateKey(keyMap));

// 验证签名

boolean verify1 = verify("aaa".getBytes(), getPublicKey(keyMap), sign);

System.err.println("经验证 数据和签名匹配:" + verify1);

boolean verify = verify(data, getPublicKey(keyMap), sign);

System.err.println("经验证 数据和签名匹配:" + verify);

}

/**

* 生成密钥

*

* @param seed 种子

* @return 密钥对象

* @throws Exception

*/

public static Map initKey(String seed) throws Exception {

System.out.println("生成密钥");

KeyPairGenerator keygen = KeyPairGenerator.getInstance(KEY_ALGORITHM);

SecureRandom secureRandom = new SecureRandom();

secureRandom.setSeed(seed.getBytes());

//Modulus size must range from 512 to 1024 and be a multiple of 64

keygen.initialize(640, secureRandom);

KeyPair keys = keygen.genKeyPair();

PrivateKey privateKey = keys.getPrivate();

PublicKey publicKey = keys.getPublic();

Map map = new HashMap(2);

map.put(PUBLIC_KEY, publicKey);

map.put(PRIVATE_KEY, privateKey);

return map;

}

/**

* 生成默认密钥

*

* @return 密钥对象

* @throws Exception

*/

public static Map initKey() throws Exception {

return initKey(DEFAULT_SEED);

}

/**

* 取得私钥

*

* @param keyMap

* @return

* @throws Exception

*/

public static String getPrivateKey(Map keyMap) throws Exception {

Key key = (Key) keyMap.get(PRIVATE_KEY);

return encryptBASE64(key.getEncoded()); //base64加密私钥

}

/**

* 取得公钥

*

* @param keyMap

* @return

* @throws Exception

*/

public static String getPublicKey(Map keyMap) throws Exception {

Key key = (Key) keyMap.get(PUBLIC_KEY);

return encryptBASE64(key.getEncoded()); //base64加密公钥

}

/**

* 用私钥对信息进行数字签名

* @param data加密数据

* @param privateKey 私钥-base64加密的

* @return

* @throws Exception

*/

public static String sign(byte[] data, String privateKey) throws Exception {

System.out.println("用私钥对信息进行数字签名");

byte[] keyBytes = decryptBASE64(privateKey);

PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(keyBytes);

KeyFactory factory = KeyFactory.getInstance(KEY_ALGORITHM);

PrivateKey priKey = factory.generatePrivate(keySpec);//生成 私钥

//用私钥对信息进行数字签名

Signature signature = Signature.getInstance(SIGNATURE_ALGORITHM);

signature.initSign(priKey);

signature.update(data);

return encryptBASE64(signature.sign());

}

/**

* BASE64Encoder 加密

* @param data 要加密的数据

* @return 加密后的字符串

*/

private static String encryptBASE64(byte[] data) {

BASE64Encoder encoder = new BASE64Encoder();

String encode = encoder.encode(data);

return encode;

}

/**

* BASE64Decoder 解密

* @param data 要解密的字符串

* @return 解密后的byte[]

* @throws Exception

*/

private static byte[] decryptBASE64(String data) throws Exception {

BASE64Decoder decoder = new BASE64Decoder();

byte[] buffer = decoder.decodeBuffer(data);

return buffer;

}

/**

* 校验数字签名

* @param data 加密数据

* @param publicKey

* @param sign 数字签名

* @return

* @throws Exception

*/

public static boolean verify(byte[] data, String publicKey, String sign) throws Exception {

byte[] keyBytes = decryptBASE64(publicKey);

X509EncodedKeySpec keySpec = new X509EncodedKeySpec(keyBytes);

KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);

PublicKey pubKey = keyFactory.generatePublic(keySpec);

Signature signature = Signature.getInstance(SIGNATURE_ALGORITHM);

signature.initVerify(pubKey);

signature.update(data);

return signature.verify(decryptBASE64(sign)); //验证签名

}

}

参考地址:http://63938525.iteye.com/blog/1051565

http://www.iteye.com/topic/1122076

  • 0
    点赞
  • 2
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
非对称加密算法是一种常用的加密方式,它采用了一对密钥,即公钥和私钥。公钥是公开的,可以任意分发,而私钥则只能由密钥的所有者持有,用于解密加密数据。常见的非对称加密算法包括RSA、DSA、ECC等。 下面是一个使用RSA算法实现非对称加密Java示例代码: ```java import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.PrivateKey; import java.security.PublicKey; import java.security.Signature; import javax.crypto.Cipher; public class RSAEncryptionExample { public static void main(String[] args) throws Exception { String input = "Hello World!"; KeyPair keyPair = generateRSAKeyPair(); PrivateKey privateKey = keyPair.getPrivate(); PublicKey publicKey = keyPair.getPublic(); byte[] encryptedData = rsaEncrypt(input.getBytes(), publicKey); byte[] decryptedData = rsaDecrypt(encryptedData, privateKey); System.out.println("Original data: " + input); System.out.println("Encrypted data: " + new String(encryptedData)); System.out.println("Decrypted data: " + new String(decryptedData)); } public static KeyPair generateRSAKeyPair() throws Exception { KeyPairGenerator generator = KeyPairGenerator.getInstance("RSA"); generator.initialize(2048); // key size KeyPair keyPair = generator.generateKeyPair(); return keyPair; } public static byte[] rsaEncrypt(byte[] data, PublicKey publicKey) throws Exception { Cipher cipher = Cipher.getInstance("RSA"); cipher.init(Cipher.ENCRYPT_MODE, publicKey); byte[] encryptedData = cipher.doFinal(data); return encryptedData; } public static byte[] rsaDecrypt(byte[] data, PrivateKey privateKey) throws Exception { Cipher cipher = Cipher.getInstance("RSA"); cipher.init(Cipher.DECRYPT_MODE, privateKey); byte[] decryptedData = cipher.doFinal(data); return decryptedData; } } ``` 这个示例代码中,我们首先生成了一个RSA密钥对,包括公钥和私钥。然后使用公钥对原始数据进行加密,得到加密后的数据。接着使用私钥对加密后的数据进行解密,得到原始数据。 需要注意的是,RSA算法使用的密钥长度越长,安全性就越高,但加解密的速度也越慢。在实际应用中,需要根据实际需求和环境选择合适的密钥长度。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值