JAVA中RSA签名算法实现

import java.security.InvalidKeyException;
import java.security.Key;
import java.security.KeyFactory;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.NoSuchAlgorithmException;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.Signature;
import java.security.SignatureException;
import java.security.interfaces.RSAPrivateKey;
import java.security.interfaces.RSAPublicKey;
import java.security.spec.InvalidKeySpecException;
import java.security.spec.PKCS8EncodedKeySpec;
import java.security.spec.X509EncodedKeySpec;
import java.util.HashMap;
import java.util.Map;
import javax.crypto.BadPaddingException;
import javax.crypto.Cipher;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.NoSuchPaddingException;
import org.apache.commons.codec.DecoderException;
import org.apache.commons.codec.binary.Hex;

/**
 * Created by Lb on 2017/9/10.
 */
public class RSACoder {

  //非对称加密算法
  public static final String KEY_ALGORITHM = "RSA";
  //数字签名 签名/验证算法
  public static final String SIGNATURE_ALGORITHM = "SHA1withRSA";
  //公钥
  private static final String PUBLIC_KEY = "RSAPublicKey";
  //私钥
  private static final String PRIVATE_KEY = "RSAPrivateKey";
  //RSA密钥长度默认1024位,密钥长度必须是64的倍数,范围在512-65536位之间
  private static final int KEY_SIZE = 512;

  /**
   * 私钥解密
   */
  public static byte[] decryptByPrivateKey(byte[] data, byte[] key)
      throws NoSuchAlgorithmException, InvalidKeySpecException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException {
    //取得私钥
    PKCS8EncodedKeySpec pkcs8EncodedKeySpec = new PKCS8EncodedKeySpec(key);
    KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
    //生成私钥
    PrivateKey privateKey = keyFactory.generatePrivate(pkcs8EncodedKeySpec);
    //对数据解密
    Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
    cipher.init(Cipher.DECRYPT_MODE, privateKey);
    return cipher.doFinal(data);
  }

  /**
   * 公钥解密
   */
  public static byte[] decryptByPublicKey(byte[] data, byte[] key)
      throws NoSuchAlgorithmException, InvalidKeySpecException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException {
    //取得公钥
    X509EncodedKeySpec x509EncodedKeySpec = new X509EncodedKeySpec(key);
    KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
    //生成公钥
    PublicKey publicKey = keyFactory.generatePublic(x509EncodedKeySpec);
    //对数据解密
    Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
    cipher.init(Cipher.DECRYPT_MODE, publicKey);
    return cipher.doFinal(data);
  }

  /**
   * 公钥加密
   */
  public static byte[] encryptByPublicKey(byte[] data, byte[] key)
      throws NoSuchAlgorithmException, InvalidKeySpecException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException {
    //取得公钥
    X509EncodedKeySpec x509EncodedKeySpec = new X509EncodedKeySpec(key);
    KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
    //生成公钥
    PublicKey publicKey = keyFactory.generatePublic(x509EncodedKeySpec);
    //对数据加密
    Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
    cipher.init(Cipher.ENCRYPT_MODE, publicKey);
    return cipher.doFinal(data);
  }


  /**
   * 私钥加密
   */
  public static byte[] encryptByPrivateKey(byte[] data, byte[] key)
      throws NoSuchAlgorithmException, InvalidKeySpecException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException {
    //取得私钥
    PKCS8EncodedKeySpec pkcs8EncodedKeySpec = new PKCS8EncodedKeySpec(key);
    KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
    //生成私钥
    PrivateKey privateKey = keyFactory.generatePrivate(pkcs8EncodedKeySpec);
    //对数据加密
    Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
    cipher.init(Cipher.ENCRYPT_MODE, privateKey);
    return cipher.doFinal(data);
  }

  /**
   * 取得私钥
   */
  public static byte[] getPrivateKey(Map<String, Object> keyMap)
      throws NoSuchAlgorithmException, InvalidKeySpecException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException {
    Key key = (Key) keyMap.get(PRIVATE_KEY);
    return key.getEncoded();
  }

  /**
   * 取得公钥
   */
  public static byte[] getPublicKey(Map<String, Object> keyMap)
      throws NoSuchAlgorithmException, InvalidKeySpecException, NoSuchPaddingException, InvalidKeyException, BadPaddingException, IllegalBlockSizeException {
    Key key = (Key) keyMap.get(PUBLIC_KEY);
    return key.getEncoded();
  }

  /**
   * 初始化密钥
   */
  public static Map<String, Object> initKey() throws NoSuchAlgorithmException {
    //实例化密钥生成器
    KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance(KEY_ALGORITHM);
    //初始化密钥对生成器
    keyPairGenerator.initialize(KEY_SIZE);
    //生成密钥对
    KeyPair keyPair = keyPairGenerator.generateKeyPair();
    //公钥
    RSAPublicKey publicKey = (RSAPublicKey) keyPair.getPublic();
    //私钥
    RSAPrivateKey privateKey = (RSAPrivateKey) keyPair.getPrivate();
    //封装密钥
    Map<String, Object> keyMap = new HashMap<>();
    keyMap.put(PUBLIC_KEY, publicKey);
    keyMap.put(PRIVATE_KEY, privateKey);
    return keyMap;
  }

  /**
   * 签名
   *
   * @param data 待签名数据
   * @param privateKey 私钥
   * @return 数字签名
   */
  public static byte[] sign(byte[] data, byte[] privateKey)
      throws NoSuchAlgorithmException, InvalidKeySpecException, InvalidKeyException, SignatureException {
    //转换私钥材料
    PKCS8EncodedKeySpec pkcs8EncodedKeySpec = new PKCS8EncodedKeySpec(privateKey);
    //实例化密钥工厂
    KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
    //取私钥对象
    PrivateKey priKey = keyFactory.generatePrivate(pkcs8EncodedKeySpec);
    //实例化Signature
    Signature signature = Signature.getInstance(SIGNATURE_ALGORITHM);
    //初始化Signature
    signature.initSign(priKey);
    //更新
    signature.update(data);
    //签名
    return signature.sign();
  }

  /**
   * 公钥校验
   *
   * @param data 待校验数据
   * @param publicKey 公钥
   * @param sign 数字签名
   * @return 校验成功返回true 失败返回false
   */
  public static boolean verify(byte[] data, byte[] publicKey, byte[] sign)
      throws NoSuchAlgorithmException, InvalidKeySpecException, InvalidKeyException, SignatureException {
    //转换公钥材料
    X509EncodedKeySpec keySpec = new X509EncodedKeySpec(publicKey);
    //实例化密钥工厂
    KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
    //生成公钥
    PublicKey pubKey = keyFactory.generatePublic(keySpec);
    //实例化Signature
    Signature signature = Signature.getInstance(SIGNATURE_ALGORITHM);
    //初始化Signature
    signature.initVerify(pubKey);
    //更新
    signature.update(data);
    //验证
    return signature.verify(sign);
  }

  /**
   * 私钥签名
   *
   * @param data 待签名数据
   * @param privateKey 私钥
   * @return 十六进行签名字符串
   */
  public static String sign(byte[] data, String privateKey)
      throws DecoderException, InvalidKeySpecException, NoSuchAlgorithmException, InvalidKeyException, SignatureException {
    byte[] sign = sign(data, getKey(privateKey));
    return Hex.encodeHexString(sign);
  }


  /**
   * 公钥校验
   *
   * @param data 待校验数据
   * @param publicKey 公钥
   * @param sign 签名
   * @return 成功返回true,失败返回false
   */
  public static boolean verify(byte[] data, String publicKey, String sign)
      throws DecoderException, InvalidKeySpecException, NoSuchAlgorithmException, InvalidKeyException, SignatureException {
    return verify(data, getKey(publicKey), Hex.decodeHex(sign.toCharArray()));
  }


  /**
   * 私钥加密
   */
  public static byte[] encryptByPrivateKey(byte[] data, String key)
      throws DecoderException, NoSuchPaddingException, NoSuchAlgorithmException, IllegalBlockSizeException, BadPaddingException, InvalidKeyException, InvalidKeySpecException {
    return encryptByPrivateKey(data, getKey(key));
  }

  /**
   * 公钥加密
   */
  public static byte[] encryptByPublicKey(byte[] data, String key)
      throws DecoderException, NoSuchPaddingException, NoSuchAlgorithmException, IllegalBlockSizeException, BadPaddingException, InvalidKeyException, InvalidKeySpecException {
    return encryptByPublicKey(data, getKey(key));
  }

  /**
   * 私钥解密
   */
  public static byte[] decryptByPrivateKey(byte[] data, String key)
      throws DecoderException, NoSuchPaddingException, NoSuchAlgorithmException, IllegalBlockSizeException, BadPaddingException, InvalidKeyException, InvalidKeySpecException {
    return decryptByPrivateKey(data, getKey(key));
  }

  /**
   * 公钥解密
   */
  public static byte[] decryptByPublicKey(byte[] data, String key)
      throws DecoderException, NoSuchPaddingException, NoSuchAlgorithmException, IllegalBlockSizeException, BadPaddingException, InvalidKeyException, InvalidKeySpecException {
    return decryptByPublicKey(data, getKey(key));
  }

  /**
   * 初始化密钥
   *
   * @return 十六进制编码密钥
   */
  public static String getPrivateKeyString(Map<String, Object> keyMap)
      throws NoSuchPaddingException, NoSuchAlgorithmException, IllegalBlockSizeException, BadPaddingException, InvalidKeyException, InvalidKeySpecException {
//    return Base64.encodeBase64String(getPrivateKey(keyMap));
    return Hex.encodeHexString(getPrivateKey(keyMap));
  }

  /**
   * 初始化密钥
   *
   * @return 十六进制编码密钥
   */
  public static String getPublicKeyString(Map<String, Object> keyMap)
      throws NoSuchPaddingException, NoSuchAlgorithmException, IllegalBlockSizeException, BadPaddingException, InvalidKeyException, InvalidKeySpecException {
//    return Base64.encodeBase64String(getPublicKey(keyMap));
    return Hex.encodeHexString(getPublicKey(keyMap));
  }

  /**
   * 获取密钥
   *
   * @param key 密钥
   * @return 密钥
   */
  public static byte[] getKey(String key) throws DecoderException {
    return Hex.decodeHex(key.toCharArray());
//    return Base64.decodeBase64(key);
  }


  public static void main(String[] args)
      throws NoSuchAlgorithmException, IllegalBlockSizeException, InvalidKeyException, BadPaddingException, InvalidKeySpecException, NoSuchPaddingException, DecoderException, SignatureException {
    Map<String, Object> keyMap = RSACoder.initKey();
    //获取并打印公钥
    String publicKey = RSACoder.getPublicKeyString(keyMap);

    System.out.println("publicKey=" + publicKey);
    //获取并打印私钥
    String privateKey = RSACoder.getPrivateKeyString(keyMap);
    System.out.println("privateKey=" + privateKey);

    String inputStr = "测试加密18803696960http://www.baidu.com///xxxx";
    byte[] data = inputStr.getBytes();
    System.out.println("原文:" + inputStr);
    byte[] encodeData = RSACoder.encryptByPublicKey(data, publicKey);
    System.out.println("加密后:" + Hex.encodeHexString(encodeData));
    byte[] decodeData = RSACoder.decryptByPrivateKey(encodeData, privateKey);
    System.out.println("解密后:" + new String(decodeData));
    //私钥签名  公钥校验
    String sign = RSACoder.sign(data, privateKey);
    System.out.println("校验=" + RSACoder.verify(data, publicKey, sign));
  }
}

转载于:https://my.oschina.net/kkrgwbj/blog/1533673

  • 0
    点赞
  • 5
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值