JAVA的rsa默认实现_JDK自带方法实现RSA非对称加密

48304ba5e6f9fe08f3fa1abda7d326ab.png

1 package jdbc.pro.lin;

2

3 import java.security.InvalidKeyException;

4 import java.security.Key;

5 import java.security.KeyFactory;

6 import java.security.KeyPair;

7 import java.security.KeyPairGenerator;

8 import java.security.NoSuchAlgorithmException;

9 import java.security.PrivateKey;

10 import java.security.PublicKey;

11 import java.security.interfaces.RSAPrivateKey;

12 import java.security.interfaces.RSAPublicKey;

13 import java.security.spec.InvalidKeySpecException;

14 import java.security.spec.PKCS8EncodedKeySpec;

15 import java.security.spec.X509EncodedKeySpec;

16 import java.util.HashMap;

17 import java.util.Map;

18

19 import javax.crypto.BadPaddingException;

20 import javax.crypto.Cipher;

21 import javax.crypto.IllegalBlockSizeException;

22 import javax.crypto.NoSuchPaddingException;

23

24 import org.apache.commons.codec.binary.Base64;

25

26 public class MyRSA {

27 public static final String KEY_ALGORITHM = "RSA";

28 /** 貌似默认是RSA/NONE/PKCS1Padding,未验证 */

29 public static final String CIPHER_ALGORITHM = "RSA/ECB/PKCS1Padding";

30 public static final String PUBLIC_KEY = "publicKey";

31 public static final String PRIVATE_KEY = "privateKey";

32

33 /** RSA密钥长度必须是64的倍数,在512~65536之间。默认是1024 */

34 public static final int KEY_SIZE = 2048;

35

36 public static final String PLAIN_TEXT = "MANUTD is the greatest club in the world";

37

38 public static void main(String[] args) {

39 Map keyMap = generateKeyBytes();

40

41 // 加密

42 PublicKey publicKey = restorePublicKey(keyMap.get(PUBLIC_KEY));

43

44 byte[] encodedText = RSAEncode(publicKey, PLAIN_TEXT.getBytes());

45 System.out.println("RSA encoded: " + Base64.encodeBase64String(encodedText));

46

47 // 解密

48 PrivateKey privateKey = restorePrivateKey(keyMap.get(PRIVATE_KEY));

49 System.out.println("RSA decoded: "

50 + RSADecode(privateKey, encodedText));

51 }

52

53 /**

54 * 生成密钥对。注意这里是生成密钥对KeyPair,再由密钥对获取公私钥

55 *

56 * @return

57 */

58 public static Map generateKeyBytes() {

59

60 try {

61 KeyPairGenerator keyPairGenerator = KeyPairGenerator

62 .getInstance(KEY_ALGORITHM);

63 keyPairGenerator.initialize(KEY_SIZE);

64 KeyPair keyPair = keyPairGenerator.generateKeyPair();

65 RSAPublicKey publicKey = (RSAPublicKey) keyPair.getPublic();

66 RSAPrivateKey privateKey = (RSAPrivateKey) keyPair.getPrivate();

67

68 Map keyMap = new HashMap();

69 keyMap.put(PUBLIC_KEY, publicKey.getEncoded());

70 keyMap.put(PRIVATE_KEY, privateKey.getEncoded());

71 return keyMap;

72 } catch (NoSuchAlgorithmException e) {

73 // TODO Auto-generated catch block

74 e.printStackTrace();

75 }

76 return null;

77 }

78

79 /**

80 * 还原公钥,X509EncodedKeySpec 用于构建公钥的规范

81 *

82 * @param keyBytes

83 * @return

84 */

85 public static PublicKey restorePublicKey(byte[] keyBytes) {

86 X509EncodedKeySpec x509EncodedKeySpec = new X509EncodedKeySpec(keyBytes);

87

88 try {

89 KeyFactory factory = KeyFactory.getInstance(KEY_ALGORITHM);

90 PublicKey publicKey = factory.generatePublic(x509EncodedKeySpec);

91 return publicKey;

92 } catch (NoSuchAlgorithmException | InvalidKeySpecException e) {

93 // TODO Auto-generated catch block

94 e.printStackTrace();

95 }

96 return null;

97 }

98

99 /**

100 * 还原私钥,PKCS8EncodedKeySpec 用于构建私钥的规范

101 *

102 * @param keyBytes

103 * @return

104 */

105 public static PrivateKey restorePrivateKey(byte[] keyBytes) {

106 PKCS8EncodedKeySpec pkcs8EncodedKeySpec = new PKCS8EncodedKeySpec(

107 keyBytes);

108 try {

109 KeyFactory factory = KeyFactory.getInstance(KEY_ALGORITHM);

110 PrivateKey privateKey = factory

111 .generatePrivate(pkcs8EncodedKeySpec);

112 return privateKey;

113 } catch (NoSuchAlgorithmException | InvalidKeySpecException e) {

114 // TODO Auto-generated catch block

115 e.printStackTrace();

116 }

117 return null;

118 }

119

120 /**

121 * 加密,三步走。

122 *

123 * @param key

124 * @param plainText

125 * @return

126 */

127 public static byte[] RSAEncode(PublicKey key, byte[] plainText) {

128

129 try {

130 Cipher cipher = Cipher.getInstance(CIPHER_ALGORITHM);

131 cipher.init(Cipher.ENCRYPT_MODE, key);

132 return cipher.doFinal(plainText);

133 } catch (NoSuchAlgorithmException | NoSuchPaddingException

134 | InvalidKeyException | IllegalBlockSizeException

135 | BadPaddingException e) {

136 // TODO Auto-generated catch block

137 e.printStackTrace();

138 }

139 return null;

140

141 }

142

143 /**

144 * 解密,三步走。

145 *

146 * @param key

147 * @param encodedText

148 * @return

149 */

150 public static String RSADecode(PrivateKey key, byte[] encodedText) {

151

152 try {

153 Cipher cipher = Cipher.getInstance(CIPHER_ALGORITHM);

154 cipher.init(Cipher.DECRYPT_MODE, key);

155 return new String(cipher.doFinal(encodedText));

156 } catch (NoSuchAlgorithmException | NoSuchPaddingException

157 | InvalidKeyException | IllegalBlockSizeException

158 | BadPaddingException e) {

159 // TODO Auto-generated catch block

160 e.printStackTrace();

161 }

162 return null;

163

164 }

165 }

48304ba5e6f9fe08f3fa1abda7d326ab.png

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
RSA前端JS加密,后端JAVA解密实现RSA非对称加密方式实现。后台生成rsa密钥对,然后在页面设置rsa公钥,提交时用公钥加密密码,生成的密文传到后台,后台再用私钥解密,获取密码明文。 这样客户端只需要知道rsa加密方式和公钥,前台不知道私钥是无法解密的,此解决方案还是相对比较安全的。 需要到http://www.bouncycastle.org/latest_releases.html下载bcpkix-jdk15on-151.jar文件。 缺陷:由于进行的都是大数计算,使得RSA最快的情况也比DES慢上100倍,无论 是软件还是硬件实现。所以一般来说只用于少量数据 加密。 下面我们就来一个实际的例子: 1、前端加密需要引入Barrett.js、BigInt.js和RSA.js。 <script src="/rsa/RSA.js" type="text/javascript"></script> <script src="/rsa/BigInt.js" type="text/javascript"></script> <script src="/rsa/Barrett.js" type="text/javascript"></script> 复制代码 2、前端加密代码: encryptedString : (function(paramStr, rsaKey){ setMaxDigits(130); //第一个参数为加密指数、第二个参数为解密参数、第三个参数为加密系数 //加密指数就是RSA公有KEY对象对象中toString()返回的字符串(encryptionExponent)数字部分默认就是10001. //加密系数就是RSA公有KEY对象对象中toString()返回的字符串modulus部分 key = new RSAKeyPair("10001", "", rsaKey); //返回加密后的字符串 return encryptedString(key, encodeURIComponent(paramStr)); }) 复制代码其中的加密系数可以自定义,这里为:8246a46f44fc4d961e139fd70f4787d272d374532f4d2d9b7cbaad6a15a8c1301319aa6b3f30413b859351c71938aec516fa7147b69168b195e81df46b6bed7950cf3a1c719d42175f73d7c97a85d7d20a9e83688b92f05b3059bb2ff75cd7190a042cd2db97ebc2ab4da366f2a7085556ed613b5a39c9fdd2bb2595d1dc23b5 3、后台RSA加密解密方法如下: import java.io.ByteArrayOutputStream; import java.io.FileInputStream; import java.io.FileOutputStream; import java.io.ObjectInputStream; import java.io.ObjectOutputStream; import java.math.BigInteger; import java.security.KeyFactory; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.PrivateKey; import java.security.PublicKey; import java.security.SecureRandom; import java.security.interfaces.RSAPrivateKey; import java.security.interfaces.RSAPublicKey; import java.security.spec.InvalidKeySpecException; import java.security.spec.RSAPrivateKeySpec; import java.security.spec.RSAPublicKeySpec; import javax.crypto.Cipher; import org.apache.commons.lang.StringUtils; import com.jd.uwp.common.Constants; /** * RSA 工具类。提供加密,解密,生成密钥对等方法。 * 需要bcprov-jdk16-140.jar包。 * */ public class RSAUtil { private static String RSAKeyStore = "RSAKey.txt"; //测试方法 public static void main(String[] args){ //先生成密钥文件 String basePath = "D:\\RSA\\"; RSAUtil.generateKeyPair(basePath); //得到公用KEY对象,如果不保存到可以从生成密钥方法得到. KeyPair kp = RSAUtil.getKeyPair(basePath); //对字符串加密 String pass = "123456"; byte[] enpass = RSAUtil.encrypt(pk.getPublicKey(), pass.getByte()) String enpassStr = new String(enpass); System.out.println("加密:" + enpassStr); //对字符串解密--注意JAVA中解密要用byte[]这种方法 byte[] depass = RSAUtil.decrypt(pk.getPrivateKey(), enpass); String depassStr = new String(depass); System.out.println("解密:" + depassStr); //对字符串解密--主要针对JS传过来的加密字符串解密,其内部也要调用上面的方法. String decryptStr(String paramStr, String basePath) //注意JS中用到的encryptionExponent和modulus通过pk.getPublicKey().toString()字符串中得到. } /** * * 生成密钥对 * @return KeyPair * @throws EncryptException */ public static KeyPair generateKeyPair(String basePath) throws Exception { try { KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider()); //大小 final int KEY_SIZE = 1024; keyPairGen.initialize(KEY_SIZE, new SecureRandom()); KeyPair keyPair = keyPairGen.generateKeyPair(); saveKeyPair(keyPair, basePath); return keyPair; } catch (Exception e) { throw new Exception(e.getMessage()); } } /** * 获取密钥对 * @return * @throws Exception */ public static KeyPair getKeyPair(String basePath) throws Exception { FileInputStream fis = new FileInputStream(StringUtils.isNotBlank(basePath) ? (basePath + RSAKeyStore) : RSAKeyStore); ObjectInputStream oos = new ObjectInputStream(fis); KeyPair kp = (KeyPair) oos.readObject(); oos.close(); fis.close(); return kp; } /** * 保存密钥 * @param kp * @throws Exception */ public static void saveKeyPair(KeyPair kp, String basePath) throws Exception { FileOutputStream fos = new FileOutputStream(StringUtils.isNotBlank(basePath) ? (basePath + RSAKeyStore) : RSAKeyStore); ObjectOutputStream oos = new ObjectOutputStream(fos); // 生成密钥 oos.writeObject(kp); oos.close(); fos.close(); } /** * * 生成公钥 * @param modulus * @param publicExponent * @return RSAPublicKey * @throws Exception */ public static RSAPublicKey generateRSAPublicKey(byte[] modulus, byte[] publicExponent) throws Exception { KeyFactory keyFac = null; try { keyFac = KeyFactory.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider()); } catch (NoSuchAlgorithmException ex) { throw new Exception(ex.getMessage()); } RSAPublicKeySpec pubKeySpec = new RSAPublicKeySpec(new BigInteger( modulus), new BigInteger(publicExponent)); try { return (RSAPublicKey) keyFac.generatePublic(pubKeySpec); } catch (InvalidKeySpecException ex) { throw new Exception(ex.getMessage()); } } /** * * 生成私钥 * @param modulus * @param privateExponent * @return RSAPrivateKey * @throws Exception */ public static RSAPrivateKey generateRSAPrivateKey(byte[] modulus, byte[] privateExponent) throws Exception { KeyFactory keyFac = null; try { keyFac = KeyFactory.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider()); } catch (NoSuchAlgorithmException ex) { throw new Exception(ex.getMessage()); } RSAPrivateKeySpec priKeySpec = new RSAPrivateKeySpec(new BigInteger( modulus), new BigInteger(privateExponent)); try { return (RSAPrivateKey) keyFac.generatePrivate(priKeySpec); } catch (InvalidKeySpecException ex) { throw new Exception(ex.getMessage()); } } /** * * 加密 * @param key 加密的密钥 * @param data 待加密的明文数据 * @return 加密后的数据 * @throws Exception */ public static byte[] encrypt(PublicKey pk, byte[] data) throws Exception { try { Cipher cipher = Cipher.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider()); cipher.init(Cipher.ENCRYPT_MODE, pk); // 获得加密块大小,如:加密前数据为128个byte,而key_size=1024 int blockSize = cipher.getBlockSize(); // 加密块大小为127byte,加密后为128个byte; //因此共有2个加密块,第一个127byte第二个为1个byte int outputSize = cipher.getOutputSize(data.length);// 获得加密块加密后块大小 int leavedSize = data.length % blockSize; int blocksSize = leavedSize != 0 ? data.length / blockSize + 1 : data.length / blockSize; byte[] raw = new byte[outputSize * blocksSize]; int i = 0; while (data.length - i * blockSize > 0) { if (data.length - i * blockSize > blockSize) { cipher.doFinal(data, i * blockSize, blockSize, raw, i * outputSize); } else { cipher.doFinal(data, i * blockSize, data.length - i * blockSize, raw, i * outputSize); } i++; } return raw; } catch (Exception e) { throw new Exception(e.getMessage()); } } /** * * 解密 * @param key 解密的密钥 * @param raw 已经加密的数据 * @return 解密后的明文 * @throws Exception */ @SuppressWarnings("static-access") public static byte[] decrypt(PrivateKey pk, byte[] raw) throws Exception { try { Cipher cipher = Cipher.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider()); cipher.init(cipher.DECRYPT_MODE, pk); int blockSize = cipher.getBlockSize(); ByteArrayOutputStream bout = new ByteArrayOutputStream(64); int j = 0; while (raw.length - j * blockSize > 0) { bout.write(cipher.doFinal(raw, j * blockSize, blockSize)); j++; } return bout.toByteArray(); } catch (Exception e) { throw new Exception(e.getMessage()); } } /** * 解密方法 * paramStr ->密文 * basePath ->RSAKey.txt所在的文件夹路径 **/ public static String decryptStr(String paramStr, String basePath) throws Exception{ byte[] en_result = new BigInteger(paramStr, 16).toByteArray(); byte[] de_result = decrypt(getKeyPair(basePath).getPrivate(), en_result); StringBuffer sb = new StringBuffer(); sb.append(new String(de_result)); //返回解密的字符串 return sb.reverse().toString(); } } 4、前端提交到后端解密调用: //前端 表单提交 $.ajax({ url : contextPath + "test.action", //加密传输,第二个参数应该是从ACTION传过来才对. data : {pwd:encryptedString ($("#pwd").val(), "adasdasdasdasdadsasdasdasdasd")}, type : "post", datatype : "json", success : function(retData){ } }); //后端解密代码 RSAUtil.decryptStr(paramMap.getString("pwd"), request.getSession().getServletContext().getRealPath("/"));

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值