java 客户端和服务端加密,RSA 加密解密,客户端JS加密,服务端JAVA解密

JS加密依赖:jsencrypt.js

Github地址:https://github.com/travist/jsencrypt

可客户端尽量依赖JAVA自带的Jar,只是Base64加密的时候额外依赖了apache的工具类commons-net-3.3.jar

服务端工RSA工具类

package com.wzh.config.utils;

import org.apache.commons.net.util.Base64;

import org.apache.log4j.Logger;

import javax.crypto.Cipher;

import java.io.ByteArrayOutputStream;

import java.security.*;

import java.security.interfaces.RSAPrivateKey;

import java.security.interfaces.RSAPublicKey;

import java.security.spec.PKCS8EncodedKeySpec;

import java.security.spec.X509EncodedKeySpec;

import java.util.HashMap;

import java.util.Map;

/**

*

*

* @author wzh

* @version 2018-12-16 18:20

* @see [相关类/方法] (可选)

**/

public class RsaUtils

{

private static Logger log = Logger.getLogger(RsaUtils.class);

/**

* 块加密大小

*/

private static final int CACHE_SIZE = 1024;

/**

* 加密算法RSA

*/

public static final String KEY_ALGORITHM = "RSA";

/**

* 签名算法

*/

public static final String SIGNATURE_ALGORITHM = "MD5withRSA";

/**

* 获取公钥的key

*/

private static final String PUBLIC_KEY = "RsaPublicKey";

/**

* 获取私钥的key

*/

private static final String PRIVATE_KEY = "RsaPrivateKey";

/**

* RSA最大加密明文大小

*/

private static final int MAX_ENCRYPT_BLOCK = 117;

/**

* RSA最大解密密文大小

*/

private static final int MAX_DECRYPT_BLOCK = 128;

/**

* Base64字符串解码为二进制数据

* @param base64

* @return 二进制数据

* @throws Exception

*/

public static byte[] decodeBase64(String base64)

throws Exception

{

return Base64.decodeBase64(base64.getBytes());

}

/**

* 二进制数据编码为Base64字符串

* @param bytes

* @return Base64字符串

* @throws Exception

*/

public static String encodeBase64(byte[] bytes)

throws Exception

{

return new String(Base64.encodeBase64(bytes));

}

/**

* 生成秘钥对

* @return 返回公钥和私钥的Map集合

* @throws Exception

*/

public static Map initKeyPair()

throws Exception

{

KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance(KEY_ALGORITHM);

keyPairGen.initialize(CACHE_SIZE);

KeyPair keyPair = keyPairGen.generateKeyPair();

RSAPublicKey publicKey = (RSAPublicKey)keyPair.getPublic();

RSAPrivateKey privateKey = (RSAPrivateKey)keyPair.getPrivate();

Map keyMap = new HashMap(2);

// 公钥

keyMap.put(PUBLIC_KEY, publicKey);

// 私钥

keyMap.put(PRIVATE_KEY, privateKey);

return keyMap;

}

/**

* 获取私钥

* @param keyMap 秘钥对Map

* @return 私钥字符串

* @throws Exception

*/

public static String getPrivateKey(Map keyMap) throws Exception {

Key key = (Key) keyMap.get(PRIVATE_KEY);

return encodeBase64(key.getEncoded());

}

/**

* 获取公钥字符串

* @param keyMap 秘钥对Map

* @return 公钥字符串

* @throws Exception

*/

public static String getPublicKey(Map keyMap) throws Exception {

Key key = (Key) keyMap.get(PUBLIC_KEY);

return encodeBase64(key.getEncoded());

}

/**

* 使用私钥生成数字签名

* @param data 使用私钥加密的数据

* @param privateKey 是哟啊字符串

* @return 数字签名

* @throws Exception

*/

public static String sign(byte[] data, String privateKey) throws Exception {

// 获取byte数组

byte[] keyBytes = decodeBase64(privateKey);

// 构造PKCS8EncodedKeySpec对象

PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);

// 指定的加密算法

KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);

// 取私钥匙对象

PrivateKey privateK = keyFactory.generatePrivate(pkcs8KeySpec);

// 用私钥对信息生成数字签名

Signature signature = Signature.getInstance(SIGNATURE_ALGORITHM);

signature.initSign(privateK);

signature.update(data);

return encodeBase64(signature.sign());

}

/**

* 校验数字签名

* @param data 私钥加密的数据

* @param publicKey 公钥字符串

* @param sign 私钥生成的签名

* @return 校验成功返回true 失败返回false

* @throws Exception

*/

public static boolean verify(byte[] data, String publicKey, String sign) throws Exception {

// 获取byte数组

byte[] keyBytes = decodeBase64(publicKey);

X509EncodedKeySpec keySpec = new X509EncodedKeySpec(keyBytes);

// 构造X509EncodedKeySpec对象

KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);

// 指定的加密算法

Signature signature = Signature.getInstance(SIGNATURE_ALGORITHM);

// 取公钥匙对象

PublicKey publicK = keyFactory.generatePublic(keySpec);

signature.initVerify(publicK);

signature.update(data);

// 验证签名是否正常

return signature.verify(decodeBase64(sign));

}

/**

* 私钥加密

* @param data 需要加密的数据

* @param privateKey 私钥

* @return 加密后的数据

* @throws Exception

*/

public static byte[] encryptByPrivateKey(byte[] data, String privateKey) throws Exception {

byte[] keyBytes = decodeBase64(privateKey);

PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);

KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);

Key privateK = keyFactory.generatePrivate(pkcs8KeySpec);

Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());

cipher.init(Cipher.ENCRYPT_MODE, privateK);

int inputLen = data.length;

ByteArrayOutputStream out = new ByteArrayOutputStream();

int offSet = 0;

byte[] cache;

int i = 0;

// 对数据分段加密

while (inputLen - offSet > 0) {

if (inputLen - offSet > MAX_ENCRYPT_BLOCK) {

cache = cipher.doFinal(data, offSet, MAX_ENCRYPT_BLOCK);

} else {

cache = cipher.doFinal(data, offSet, inputLen - offSet);

}

out.write(cache, 0, cache.length);

i++;

offSet = i * MAX_ENCRYPT_BLOCK;

}

byte[] encryptedData = out.toByteArray();

out.close();

return encryptedData;

}

/**

* 公钥加密

* @param data 需要加密的数据

* @param publicKey 公钥字符串

* @return 加密后的数据

* @throws Exception

*/

public static byte[] encryptByPublicKey(byte[] data, String publicKey) throws Exception {

byte[] keyBytes = decodeBase64(publicKey);

X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(keyBytes);

KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);

Key publicK = keyFactory.generatePublic(x509KeySpec);

// 对数据加密

Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());

cipher.init(Cipher.ENCRYPT_MODE, publicK);

int inputLen = data.length;

ByteArrayOutputStream out = new ByteArrayOutputStream();

int offSet = 0;

byte[] cache;

int i = 0;

// 对数据分段加密

while (inputLen - offSet > 0) {

if (inputLen - offSet > MAX_ENCRYPT_BLOCK) {

cache = cipher.doFinal(data, offSet, MAX_ENCRYPT_BLOCK);

} else {

cache = cipher.doFinal(data, offSet, inputLen - offSet);

}

out.write(cache, 0, cache.length);

i++;

offSet = i * MAX_ENCRYPT_BLOCK;

}

byte[] encryptedData = out.toByteArray();

out.close();

return encryptedData;

}

/**

* 私钥解密

* @param encryptedData 公钥加密的数据

* @param privateKey 私钥字符串

* @return 私钥解密的数据

* @throws Exception

*/

public static byte[] decryptByPrivateKey(byte[] encryptedData, String privateKey) throws Exception {

byte[] keyBytes = decodeBase64(privateKey);

PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);

KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);

Key privateK = keyFactory.generatePrivate(pkcs8KeySpec);

Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());

cipher.init(Cipher.DECRYPT_MODE, privateK);

int inputLen = encryptedData.length;

ByteArrayOutputStream out = new ByteArrayOutputStream();

int offSet = 0;

byte[] cache;

int i = 0;

// 对数据分段解密

while (inputLen - offSet > 0) {

if (inputLen - offSet > MAX_DECRYPT_BLOCK) {

cache = cipher.doFinal(encryptedData, offSet, MAX_DECRYPT_BLOCK);

} else {

cache = cipher.doFinal(encryptedData, offSet, inputLen - offSet);

}

out.write(cache, 0, cache.length);

i++;

offSet = i * MAX_DECRYPT_BLOCK;

}

byte[] decryptedData = out.toByteArray();

out.close();

return decryptedData;

}

/**

* 公钥解密

* @param encryptedData 私钥加密的数据

* @param publicKey 公钥字符串

* @return 公钥解密的数据

* @throws Exception

*/

public static byte[] decryptByPublicKey(byte[] encryptedData, String publicKey) throws Exception {

byte[] keyBytes = decodeBase64(publicKey);

X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(keyBytes);

KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);

Key publicK = keyFactory.generatePublic(x509KeySpec);

Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());

cipher.init(Cipher.DECRYPT_MODE, publicK);

int inputLen = encryptedData.length;

ByteArrayOutputStream out = new ByteArrayOutputStream();

int offSet = 0;

byte[] cache;

int i = 0;

// 对数据分段解密

while (inputLen - offSet > 0) {

if (inputLen - offSet > MAX_DECRYPT_BLOCK) {

cache = cipher.doFinal(encryptedData, offSet, MAX_DECRYPT_BLOCK);

} else {

cache = cipher.doFinal(encryptedData, offSet, inputLen - offSet);

}

out.write(cache, 0, cache.length);

i++;

offSet = i * MAX_DECRYPT_BLOCK;

}

byte[] decryptedData = out.toByteArray();

out.close();

return decryptedData;

}

/**

* 公钥加密方法

* @param data 需加密的字符串

* @param PUBLICKEY 公钥字符串

* @return 加密后的字符串

*/

public static String encryptedDataByPublic(String data, String PUBLICKEY) {

try {

data = encodeBase64(encryptByPublicKey(data.getBytes(), PUBLICKEY));

} catch (Exception e) {

e.printStackTrace();

log.error(e.getMessage(),e);

}

return data;

}

/**

* 私钥解密方法

* @param data 公钥加密的字符串

* @param PRIVATEKEY 私钥字符串

* @return 私钥解密的字符串

*/

public static String decryptDataByPrivate(String data, String PRIVATEKEY) {

String temp = "";

try {

byte[] rs = decodeBase64(data);

//以utf-8的方式生成字符串

temp = new String(decryptByPrivateKey(rs, PRIVATEKEY),"UTF-8");

} catch (Exception e) {

e.printStackTrace();

}

return temp;

}

public static void main(String[] args) {

try {

Map keyMap = RsaUtils.initKeyPair();

String publicKey = RsaUtils.getPublicKey(keyMap);

String privateKey = RsaUtils.getPrivateKey(keyMap);

System.out.println("公钥:" + publicKey);

System.out.println("私钥:" + privateKey);

String source = "我是需要私钥加密的字符串!";

System.out.println("签名验证逻辑,私钥加密--公钥解密,需要加密的字符串:" + source);

byte[] data = source.getBytes();

byte[] encodedData = RsaUtils.encryptByPrivateKey(data, privateKey);

System.out.println("私钥加密后:" + new String(encodedData));

String sign = RsaUtils.sign(encodedData, privateKey);

System.out.println("签名:" + sign);

boolean status = RsaUtils.verify(encodedData, publicKey, sign);

System.out.println("验证结果:" + status);

byte[] decodedData = RsaUtils.decryptByPublicKey(encodedData, publicKey);

String target = new String(decodedData);

System.out.println("公钥解密私钥加密的数据:" + target);

System.out.println("---------公钥加密----私钥解密----------");

// 这里尽量长一点,复制了一段歌词

String msg = "月溅星河,长路漫漫,风烟残尽,独影阑珊;谁叫我身手不凡,谁让我爱恨两难,到后来," +

"肝肠寸断。幻世当空,恩怨休怀,舍悟离迷,六尘不改;且怒且悲且狂哉,是人是鬼是妖怪,不过是," +

"心有魔债。叫一声佛祖,回头无岸,跪一人为师,生死无关;善恶浮世真假界,尘缘散聚不分明,难断!" +

"我要这铁棒有何用,我有这变化又如何;还是不安,还是氐惆,金箍当头,欲说还休。我要这铁棒醉舞魔," +

"我有这变化乱迷浊;踏碎灵霄,放肆桀骜,世恶道险,终究难逃。";

String ecodeMsg = RsaUtils.encryptedDataByPublic(msg,publicKey);

System.out.println("加密后的歌词:" + ecodeMsg);

String decodeMsg = RsaUtils.decryptDataByPrivate(ecodeMsg,privateKey);

System.out.println("解密后的歌词:" + decodeMsg);

} catch (Exception e) {

e.printStackTrace();

}

}

}

首先测试一下工具类,main函数跑一下,成功验证签名,加密,解密

621d8f7e2b44

image.png

客户端JS代码,需要JSEncrypt库,前文有给出github地址,这里对这个库做一个简单的扩展,因为RSA长文本超过秘钥长度要报错,所以需要扩展修改下

/**

* ---------------------------

* 此JS需加载JSEncrypt库的后面,加密解密调用着两个方法

* ---------------------------

*/

/**

* 长文本加密

* @param {string} string 待加密长文本

* @returns {string} 加密后的base64编码

* */

JSEncrypt.prototype.encryptLong = function (string) {

var k = this.getKey();

try {

var ct = "";

//RSA每次加密117bytes,需要辅助方法判断字符串截取位置

//1.获取字符串截取点

var bytes = new Array();

bytes.push(0);

var byteNo = 0;

var len, c;

len = string.length;

var temp = 0;

for (var i = 0; i < len; i++) {

c = string.charCodeAt(i);

if (c >= 0x010000 && c <= 0x10FFFF) { //特殊字符,如Ř,Ţ

byteNo += 4;

} else if (c >= 0x000800 && c <= 0x00FFFF) { //中文以及标点符号

byteNo += 3;

} else if (c >= 0x000080 && c <= 0x0007FF) { //特殊字符,如È,Ò

byteNo += 2;

} else { // 英文以及标点符号

byteNo += 1;

}

if ((byteNo % 117) >= 114 || (byteNo % 117) == 0) {

if (byteNo - temp >= 114) {

bytes.push(i);

temp = byteNo;

}

}

}

//2.截取字符串并分段加密

if (bytes.length > 1) {

for (var i = 0; i < bytes.length - 1; i++) {

var str;

if (i == 0) {

str = string.substring(0, bytes[i + 1] + 1);

} else {

str = string.substring(bytes[i] + 1, bytes[i + 1] + 1);

}

var t1 = k.encrypt(str);

ct += t1;

}

;

if (bytes[bytes.length - 1] != string.length - 1) {

var lastStr = string.substring(bytes[bytes.length - 1] + 1);

ct += k.encrypt(lastStr);

}

return hex2b64(ct);

}

var t = k.encrypt(string);

var y = hex2b64(t);

return y;

} catch (ex) {

console.log(ex);

return false;

}

};

/**

* 长文本解密

* @param {string} string 加密后的base64编码

* @returns {string} 解密后的原文

* */

JSEncrypt.prototype.decryptLong = function (string) {

var k = this.getKey();

var maxLength = 128;

try {

var string = b64tohex(string);

var ct = "";

if (string.length > maxLength * 2) {

var lt = string.match(/.{1,256}/g); //128位解密。取256位

lt.forEach(function (entry) {

var t1 = k.decrypt(entry);

ct += t1;

});

return ct;

}

var y = k.decrypt(string);

return y;

} catch (ex) {

return false;

}

};

function hex2b64(h) {

var b64map="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";

var b64padchar="=";

var i;

var c;

var ret = "";

for(i = 0; i+3 <= h.length; i+=3) {

c = parseInt(h.substring(i,i+3),16);

ret += b64map.charAt(c >> 6) + b64map.charAt(c & 63);

}

if(i+1 == h.length) {

c = parseInt(h.substring(i,i+1),16);

ret += b64map.charAt(c << 2);

}

else if(i+2 == h.length) {

c = parseInt(h.substring(i,i+2),16);

ret += b64map.charAt(c >> 2) + b64map.charAt((c & 3) << 4);

}

while((ret.length & 3) > 0) ret += b64padchar;

return ret;

}

一个简单的测试页面,就不做前后台衔接了,只是在前提用后台生成的公钥进行加密,然后后台main方法解密一下。

MyHtml.html

$(function() {

$('#submit').click(function() {

var data = $('#msg').val();

// 公钥

var publickey = $('#publickey').val();

// 使用jsencrypt库加密前端参数

var jsencrypt = new JSEncrypt();

jsencrypt.setPublicKey(publickey);

// 这里调用长文本的加密方法

var ecodeMsg = jsencrypt.encryptLong(data);

$('#ecodeMsg').val(ecodeMsg);

});

});

需要加密的内容:

公钥:

密文:

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值