OpenPGP加密解密文件

OpenPGP 号称是世界上使用最广泛的邮件加密标准. OpenPGP is the most widely used email encryption standard in the world. ( http://www.openpgp.org/ )
这篇例子介绍如何使用这个标准进行文件的加密解密 (https://www.bouncycastle.org/latest_releases.html, 需要下载: bcprov-jdk15on-151.jar, bcpg-jdk15on-151.jar).

主要是使用bouncycastle提供的OpenPGP的库来完成这个功能,参照了其提供的示例程序,进行了部分改动 ( Bouncy Castle 是一种用于 Java 平台的开放源码的轻量级密码术包。它支持大量的密码术算法,并提供 JCE 1.2.1 的实现。因为 Bouncy Castle 被设计成轻量级的,所以从 J2SE 1.4 到 J2ME(包括 MIDP)平台,它都可以运行。它是在 MIDP 上运行的唯一完整的密码术包。)

  1. 添加循环遍历来查找第一个可用的message
  2. 需要注意的是在main函数中的,如果不添加这一句的话 Security.addProvider(new BouncyCastleProvider()); 程序运行中会报错:No such Provider "BC"
  3. 错误Exception in thread "main" java.security.InvalidKeyException: Illegal key size or default parameters , 这是因为java缺省的库支持的key长度比较短,需要到oracle的网站上去下载一个支持更长key的库覆盖原有的库文件
    <JAVA_HOME>/lib/securty/ 目录下的两个jar文件
    local_policy.jar and US_export_policy.jar
    搜索这个文件: Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files
    下载页面(以JDK6为例):http://www.oracle.com/technetwork/java/javase/downloads/jce-6-download-429243.html

package com.test.test;

import java.io.BufferedInputStream;
import java.io.BufferedOutputStream;
import java.io.File;
import java.io.FileInputStream;
import java.io.FileOutputStream;
import java.io.IOException;
import java.io.InputStream;
import java.io.OutputStream;
import java.security.NoSuchProviderException;
import java.security.SecureRandom;
import java.security.Security;
import java.util.Iterator;

import org.bouncycastle.bcpg.ArmoredOutputStream;
import org.bouncycastle.bcpg.CompressionAlgorithmTags;
import org.bouncycastle.jce.provider.BouncyCastleProvider;
import org.bouncycastle.openpgp.PGPCompressedData;
import org.bouncycastle.openpgp.PGPEncryptedData;
import org.bouncycastle.openpgp.PGPEncryptedDataGenerator;
import org.bouncycastle.openpgp.PGPEncryptedDataList;
import org.bouncycastle.openpgp.PGPException;
import org.bouncycastle.openpgp.PGPLiteralData;
import org.bouncycastle.openpgp.PGPOnePassSignatureList;
import org.bouncycastle.openpgp.PGPPrivateKey;
import org.bouncycastle.openpgp.PGPPublicKey;
import org.bouncycastle.openpgp.PGPPublicKeyEncryptedData;
import org.bouncycastle.openpgp.PGPSecretKeyRingCollection;
import org.bouncycastle.openpgp.PGPSignatureList;
import org.bouncycastle.openpgp.PGPUtil;
import org.bouncycastle.openpgp.jcajce.JcaPGPObjectFactory;
import org.bouncycastle.openpgp.operator.jcajce.JcaKeyFingerprintCalculator;
import org.bouncycastle.openpgp.operator.jcajce.JcePGPDataEncryptorBuilder;
import org.bouncycastle.openpgp.operator.jcajce.JcePublicKeyDataDecryptorFactoryBuilder;
import org.bouncycastle.openpgp.operator.jcajce.JcePublicKeyKeyEncryptionMethodGenerator;
import org.bouncycastle.util.io.Streams;

/**

  • A simple utility class that encrypts/decrypts public key based
  • encryption files.
  • <p>
  • To encrypt a file: KeyBasedFileProcessor -e [-a|-ai] fileName publicKeyFile.<br>
  • If -a is specified the output file will be "ascii-armored".
  • If -i is specified the output file will be have integrity checking added.
  • <p>
  • To decrypt: KeyBasedFileProcessor -d fileName secretKeyFile passPhrase.
  • <p>
  • Note 1: this example will silently overwrite files, nor does it pay any attention to
  • the specification of "_CONSOLE" in the filename. It also expects that a single pass phrase
  • will have been used.
  • <p>
  • Note 2: if an empty file name has been specified in the literal data object contained in the
  • encrypted packet a file with the name filename.out will be generated in the current working directory.
    */
    public class KeyBasedFileProcessor
    {
    private static void decryptFile(
    String inputFileName,
    String keyFileName,
    char[] passwd,
    String defaultFileName)
    throws IOException, NoSuchProviderException
    {
    InputStream in = new BufferedInputStream(new FileInputStream(inputFileName));
    InputStream keyIn = new BufferedInputStream(new FileInputStream(keyFileName));
    decryptFile(in, keyIn, passwd, defaultFileName);
    keyIn.close();
    in.close();
    }

    /**

    • decrypt the passed in message stream
      */
      private static void decryptFile(
      InputStream in,
      InputStream keyIn,
      char[] passwd,
      String defaultFileName)
      throws IOException, NoSuchProviderException
      {
      in = PGPUtil.getDecoderStream(in);

      try
      {
      JcaPGPObjectFactory pgpF = new JcaPGPObjectFactory(in);
      PGPEncryptedDataList enc;

      Object                  o = pgpF.nextObject();
      //
      // the first object might be a PGP marker packet.
      //
      if (o instanceof PGPEncryptedDataList)
      {
          enc = (PGPEncryptedDataList)o;
      }
      else
      {
          enc = (PGPEncryptedDataList)pgpF.nextObject();
      }
      
      //
      // find the secret key
      //
      Iterator                    it = enc.getEncryptedDataObjects();
      PGPPrivateKey               sKey = null;
      PGPPublicKeyEncryptedData   pbe = null;
      PGPSecretKeyRingCollection  pgpSec = new PGPSecretKeyRingCollection(
          PGPUtil.getDecoderStream(keyIn), new JcaKeyFingerprintCalculator());
      
      while (sKey == null && it.hasNext())
      {
          pbe = (PGPPublicKeyEncryptedData)it.next();
      
          sKey = PGPExampleUtil.findSecretKey(pgpSec, pbe.getKeyID(), passwd);
      }
      
      if (sKey == null)
      {
          throw new IllegalArgumentException("secret key for message not found.");
      }
      
      InputStream         clear = pbe.getDataStream(new JcePublicKeyDataDecryptorFactoryBuilder().setProvider("BC").build(sKey));
      
      JcaPGPObjectFactory    plainFact = new JcaPGPObjectFactory(clear);
      
      Object              message = plainFact.nextObject();
      
      while ( true ) {
          if (message instanceof PGPCompressedData)
          {
              PGPCompressedData   cData = (PGPCompressedData)message;
              JcaPGPObjectFactory    pgpFact = new JcaPGPObjectFactory(cData.getDataStream());
      
              message = pgpFact.nextObject();
          }
      
          if (message instanceof PGPLiteralData)
          {
              PGPLiteralData ld = (PGPLiteralData)message;
      
              String outFileName = ld.getFileName();
              if (outFileName.length() == 0)
              {
                  outFileName = defaultFileName;
              }
      
              InputStream unc = ld.getInputStream();
              OutputStream fOut = new BufferedOutputStream(new FileOutputStream(outFileName));
      
              Streams.pipeAll(unc, fOut);
      
              fOut.close();
              break;
          }
          else if (message instanceof PGPOnePassSignatureList)
          {
              System.out.println("encrypted message contains a signed message - not literal data.");
          }
          else if (message instanceof PGPSignatureList)
          {
              System.out.println("encrypted message contains a signed message - not literal data.");
          }
          else
          {
              throw new PGPException("message is not a simple encrypted file - type unknown.");
          }
          message = plainFact.nextObject();
      }
      
      if (pbe.isIntegrityProtected())
      {
          if (!pbe.verify())
          {
              System.err.println("message failed integrity check");
          }
          else
          {
              System.err.println("message integrity check passed");
          }
      }
      else
      {
          System.err.println("no message integrity check");
      }

      }
      catch (PGPException e)
      {
      System.err.println(e);
      if (e.getUnderlyingException() != null)
      {
      e.getUnderlyingException().printStackTrace();
      }
      }
      }

    private static void encryptFile(
    String outputFileName,
    String inputFileName,
    String encKeyFileName,
    boolean armor,
    boolean withIntegrityCheck)
    throws IOException, NoSuchProviderException, PGPException
    {
    OutputStream out = new BufferedOutputStream(new FileOutputStream(outputFileName));
    PGPPublicKey encKey = PGPExampleUtil.readPublicKey(encKeyFileName);
    encryptFile(out, inputFileName, encKey, armor, withIntegrityCheck);
    out.close();
    }

    private static void encryptFile(
    OutputStream out,
    String fileName,
    PGPPublicKey encKey,
    boolean armor,
    boolean withIntegrityCheck)
    throws IOException, NoSuchProviderException
    {
    if (armor)
    {
    out = new ArmoredOutputStream(out);
    }

    try
    {
        byte[] bytes = PGPExampleUtil.compressFile(fileName, CompressionAlgorithmTags.ZIP);
    
        PGPEncryptedDataGenerator encGen = new PGPEncryptedDataGenerator(
            new JcePGPDataEncryptorBuilder(PGPEncryptedData.CAST5).setWithIntegrityPacket(withIntegrityCheck).setSecureRandom(new SecureRandom()).setProvider("BC"));
    
        encGen.addMethod(new JcePublicKeyKeyEncryptionMethodGenerator(encKey).setProvider("BC"));
    
        OutputStream cOut = encGen.open(out, bytes.length);
    
        cOut.write(bytes);
        cOut.close();
    
        if (armor)
        {
            out.close();
        }
    }
    catch (PGPException e)
    {
        System.err.println(e);
        if (e.getUnderlyingException() != null)
        {
            e.getUnderlyingException().printStackTrace();
        }
    }

    }

    public static void main(
    String[] args)
    throws Exception
    {
    Security.addProvider(new BouncyCastleProvider());

    if (args.length == 0)
    {
        System.err.println("usage: KeyBasedFileProcessor -e|-d [-a|ai] file [secretKeyFile passPhrase|pubKeyFile]");
        return;
    }
    
    if (args[0].equals("-e"))
    {
        if (args[1].equals("-a") || args[1].equals("-ai") || args[1].equals("-ia"))
        {
            encryptFile(args[2] + ".asc", args[2], args[3], true, (args[1].indexOf('i') > 0));
        }
        else if (args[1].equals("-i"))
        {
            encryptFile(args[2] + ".bpg", args[2], args[3], false, true);
        }
        else
        {
            encryptFile(args[1] + ".bpg", args[1], args[2], false, false);
        }
    }
    else if (args[0].equals("-d"))
    {
        decryptFile(args[1], args[2], args[3].toCharArray(), new File(args[1]).getName() + ".out");
    }
    else
    {
        System.err.println("usage: KeyBasedFileProcessor -d|-e [-a|ai] file [secretKeyFile passPhrase|pubKeyFile]");
    }

    }
    }

转载于:https://blog.51cto.com/13850667/2163416

  • 0
    点赞
  • 4
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值