java js rsa加密解密_用javascript与java进行RSA加密与解密

这几天一直做安全登录,网上查了好多资料,不尽如意。

具体实现思路如下:

1。服务端生成公钥与私钥,保存。

2。客户端在请求到登录页面后,随机生成一字符串。

3。后此随机字符串作为密钥加密密码,再用从服务端获取到的公钥加密生成的随机字符串。

4。将此两段密文传入服务端,服务端用私钥解出随机字符串,再用此私钥解出加密的密文。

这其中有一个关键是解决服务端的公钥,传入客户端,客户端用此公钥加密字符串后,后又能在服务端用私钥解出。

此文即为实现此步而作。

加密算法为RSA:

1。服务端的RSA  java实现。

Java代码 6788554fe9bcd82795ef9839d3f317b0.gif c491770d13cdcbfc9be5bb9b128dd65d.png

1d4715fb3e5b109ea94009c98d36f8e8.gif

/**

*

*/

packagecom.sunsoft.struts.util;

importjava.io.ByteArrayOutputStream;

importjava.io.FileInputStream;

importjava.io.FileOutputStream;

importjava.io.ObjectInputStream;

importjava.io.ObjectOutputStream;

importjava.math.BigInteger;

importjava.security.KeyFactory;

importjava.security.KeyPair;

importjava.security.KeyPairGenerator;

importjava.security.NoSuchAlgorithmException;

importjava.security.PrivateKey;

importjava.security.PublicKey;

importjava.security.SecureRandom;

importjava.security.interfaces.RSAPrivateKey;

importjava.security.interfaces.RSAPublicKey;

importjava.security.spec.InvalidKeySpecException;

importjava.security.spec.RSAPrivateKeySpec;

importjava.security.spec.RSAPublicKeySpec;

importjavax.crypto.Cipher;

/**

* RSA 工具类。提供加密,解密,生成密钥对等方法。

* 需要到http://www.bouncycastle.org下载bcprov-jdk14-123.jar。

*

*/

publicclassRSAUtil {

/**

* * 生成密钥对 *

*

* @return KeyPair *

* @throws EncryptException

*/

publicstaticKeyPair generateKeyPair()throwsException {

try{

KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance("RSA",

neworg.bouncycastle.jce.provider.BouncyCastleProvider());

finalintKEY_SIZE =1024;// 没什么好说的了,这个值关系到块加密的大小,可以更改,但是不要太大,否则效率会低

keyPairGen.initialize(KEY_SIZE,newSecureRandom());

KeyPair keyPair = keyPairGen.generateKeyPair();

saveKeyPair(keyPair);

returnkeyPair;

}catch(Exception e) {

thrownewException(e.getMessage());

}

}

publicstaticKeyPair getKeyPair()throwsException{

FileInputStream fis =newFileInputStream("C:/RSAKey.txt");

ObjectInputStream oos =newObjectInputStream(fis);

KeyPair kp= (KeyPair) oos.readObject();

oos.close();

fis.close();

returnkp;

}

publicstaticvoidsaveKeyPair(KeyPair kp)throwsException{

FileOutputStream fos =newFileOutputStream("C:/RSAKey.txt");

ObjectOutputStream oos =newObjectOutputStream(fos);

//生成密钥

oos.writeObject(kp);

oos.close();

fos.close();

}

/**

* * 生成公钥 *

*

* @param modulus *

* @param publicExponent *

* @return RSAPublicKey *

* @throws Exception

*/

publicstaticRSAPublicKey generateRSAPublicKey(byte[] modulus,

byte[] publicExponent)throwsException {

KeyFactory keyFac =null;

try{

keyFac = KeyFactory.getInstance("RSA",

neworg.bouncycastle.jce.provider.BouncyCastleProvider());

}catch(NoSuchAlgorithmException ex) {

thrownewException(ex.getMessage());

}

RSAPublicKeySpec pubKeySpec =newRSAPublicKeySpec(newBigInteger(

modulus),newBigInteger(publicExponent));

try{

return(RSAPublicKey) keyFac.generatePublic(pubKeySpec);

}catch(InvalidKeySpecException ex) {

thrownewException(ex.getMessage());

}

}

/**

* * 生成私钥 *

*

* @param modulus *

* @param privateExponent *

* @return RSAPrivateKey *

* @throws Exception

*/

publicstaticRSAPrivateKey generateRSAPrivateKey(byte[] modulus,

byte[] privateExponent)throwsException {

KeyFactory keyFac =null;

try{

keyFac = KeyFactory.getInstance("RSA",

neworg.bouncycastle.jce.provider.BouncyCastleProvider());

}catch(NoSuchAlgorithmException ex) {

thrownewException(ex.getMessage());

}

RSAPrivateKeySpec priKeySpec =newRSAPrivateKeySpec(newBigInteger(

modulus),newBigInteger(privateExponent));

try{

return(RSAPrivateKey) keyFac.generatePrivate(priKeySpec);

}catch(InvalidKeySpecException ex) {

thrownewException(ex.getMessage());

}

}

/**

* * 加密 *

*

* @param key

*            加密的密钥 *

* @param data

*            待加密的明文数据 *

* @return 加密后的数据 *

* @throws Exception

*/

publicstaticbyte[] encrypt(PublicKey pk,byte[] data)throwsException {

try{

Cipher cipher = Cipher.getInstance("RSA",

neworg.bouncycastle.jce.provider.BouncyCastleProvider());

cipher.init(Cipher.ENCRYPT_MODE, pk);

intblockSize = cipher.getBlockSize();// 获得加密块大小,如:加密前数据为128个byte,而key_size=1024

// 加密块大小为127

// byte,加密后为128个byte;因此共有2个加密块,第一个127

// byte第二个为1个byte

intoutputSize = cipher.getOutputSize(data.length);// 获得加密块加密后块大小

intleavedSize = data.length % blockSize;

intblocksSize = leavedSize !=0? data.length / blockSize +1

: data.length / blockSize;

byte[] raw =newbyte[outputSize * blocksSize];

inti =0;

while(data.length - i * blockSize >0) {

if(data.length - i * blockSize > blockSize)

cipher.doFinal(data, i * blockSize, blockSize, raw, i

* outputSize);

else

cipher.doFinal(data, i * blockSize, data.length - i

* blockSize, raw, i * outputSize);

// 这里面doUpdate方法不可用,查看源代码后发现每次doUpdate后并没有什么实际动作除了把byte[]放到

// ByteArrayOutputStream中,而最后doFinal的时候才将所有的byte[]进行加密,可是到了此时加密块大小很可能已经超出了

// OutputSize所以只好用dofinal方法。

i++;

}

returnraw;

}catch(Exception e) {

thrownewException(e.getMessage());

}

}

/**

* * 解密 *

*

* @param key

*            解密的密钥 *

* @param raw

*            已经加密的数据 *

* @return 解密后的明文 *

* @throws Exception

*/

publicstaticbyte[] decrypt(PrivateKey pk,byte[] raw)throwsException {

try{

Cipher cipher = Cipher.getInstance("RSA",

neworg.bouncycastle.jce.provider.BouncyCastleProvider());

cipher.init(cipher.DECRYPT_MODE, pk);

intblockSize = cipher.getBlockSize();

ByteArrayOutputStream bout =newByteArrayOutputStream(64);

intj =0;

while(raw.length - j * blockSize >0) {

bout.write(cipher.doFinal(raw, j * blockSize, blockSize));

j++;

}

returnbout.toByteArray();

}catch(Exception e) {

thrownewException(e.getMessage());

}

}

/**

* * *

*

* @param args *

* @throws Exception

*/

publicstaticvoidmain(String[] args)throwsException {

RSAPublicKey rsap = (RSAPublicKey) RSAUtil.generateKeyPair().getPublic();

String test ="hello world";

byte[] en_test = encrypt(getKeyPair().getPublic(),test.getBytes());

byte[] de_test = decrypt(getKeyPair().getPrivate(),en_test);

System.out.println(newString(de_test));

}

}

/**

*

*/

package com.sunsoft.struts.util;

import java.io.ByteArrayOutputStream;

import java.io.FileInputStream;

import java.io.FileOutputStream;

import java.io.ObjectInputStream;

import java.io.ObjectOutputStream;

import java.math.BigInteger;

import java.security.KeyFactory;

import java.security.KeyPair;

import java.security.KeyPairGenerator;

import java.security.NoSuchAlgorithmException;

import java.security.PrivateKey;

import java.security.PublicKey;

import java.security.SecureRandom;

import java.security.interfaces.RSAPrivateKey;

import java.security.interfaces.RSAPublicKey;

import java.security.spec.InvalidKeySpecException;

import java.security.spec.RSAPrivateKeySpec;

import java.security.spec.RSAPublicKeySpec;

import javax.crypto.Cipher;

/**

* RSA 工具类。提供加密,解密,生成密钥对等方法。

* 需要到http://www.bouncycastle.org下载bcprov-jdk14-123.jar。

*

*/

public class RSAUtil {

/**

* * 生成密钥对 *

*

* @return KeyPair *

* @throws EncryptException

*/

public static KeyPair generateKeyPair() throws Exception {

try {

KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance("RSA",

new org.bouncycastle.jce.provider.BouncyCastleProvider());

final int KEY_SIZE = 1024;// 没什么好说的了,这个值关系到块加密的大小,可以更改,但是不要太大,否则效率会低

keyPairGen.initialize(KEY_SIZE, new SecureRandom());

KeyPair keyPair = keyPairGen.generateKeyPair();

saveKeyPair(keyPair);

return keyPair;

} catch (Exception e) {

throw new Exception(e.getMessage());

}

}

public static KeyPair getKeyPair()throws Exception{

FileInputStream fis = new FileInputStream("C:/RSAKey.txt");

ObjectInputStream oos = new ObjectInputStream(fis);

KeyPair kp= (KeyPair) oos.readObject();

oos.close();

fis.close();

return kp;

}

public static void saveKeyPair(KeyPair kp)throws Exception{

FileOutputStream fos = new FileOutputStream("C:/RSAKey.txt");

ObjectOutputStream oos = new ObjectOutputStream(fos);

//生成密钥

oos.writeObject(kp);

oos.close();

fos.close();

}

/**

* * 生成公钥 *

*

* @param modulus *

* @param publicExponent *

* @return RSAPublicKey *

* @throws Exception

*/

public static RSAPublicKey generateRSAPublicKey(byte[] modulus,

byte[] publicExponent) throws Exception {

KeyFactory keyFac = null;

try {

keyFac = KeyFactory.getInstance("RSA",

new org.bouncycastle.jce.provider.BouncyCastleProvider());

} catch (NoSuchAlgorithmException ex) {

throw new Exception(ex.getMessage());

}

RSAPublicKeySpec pubKeySpec = new RSAPublicKeySpec(new BigInteger(

modulus), new BigInteger(publicExponent));

try {

return (RSAPublicKey) keyFac.generatePublic(pubKeySpec);

} catch (InvalidKeySpecException ex) {

throw new Exception(ex.getMessage());

}

}

/**

* * 生成私钥 *

*

* @param modulus *

* @param privateExponent *

* @return RSAPrivateKey *

* @throws Exception

*/

public static RSAPrivateKey generateRSAPrivateKey(byte[] modulus,

byte[] privateExponent) throws Exception {

KeyFactory keyFac = null;

try {

keyFac = KeyFactory.getInstance("RSA",

new org.bouncycastle.jce.provider.BouncyCastleProvider());

} catch (NoSuchAlgorithmException ex) {

throw new Exception(ex.getMessage());

}

RSAPrivateKeySpec priKeySpec = new RSAPrivateKeySpec(new BigInteger(

modulus), new BigInteger(privateExponent));

try {

return (RSAPrivateKey) keyFac.generatePrivate(priKeySpec);

} catch (InvalidKeySpecException ex) {

throw new Exception(ex.getMessage());

}

}

/**

* * 加密 *

*

* @param key

* 加密的密钥 *

* @param data

* 待加密的明文数据 *

* @return 加密后的数据 *

* @throws Exception

*/

public static byte[] encrypt(PublicKey pk, byte[] data) throws Exception {

try {

Cipher cipher = Cipher.getInstance("RSA",

new org.bouncycastle.jce.provider.BouncyCastleProvider());

cipher.init(Cipher.ENCRYPT_MODE, pk);

int blockSize = cipher.getBlockSize();// 获得加密块大小,如:加密前数据为128个byte,而key_size=1024

// 加密块大小为127

// byte,加密后为128个byte;因此共有2个加密块,第一个127

// byte第二个为1个byte

int outputSize = cipher.getOutputSize(data.length);// 获得加密块加密后块大小

int leavedSize = data.length % blockSize;

int blocksSize = leavedSize != 0 ? data.length / blockSize + 1

: data.length / blockSize;

byte[] raw = new byte[outputSize * blocksSize];

int i = 0;

while (data.length - i * blockSize > 0) {

if (data.length - i * blockSize > blockSize)

cipher.doFinal(data, i * blockSize, blockSize, raw, i

* outputSize);

else

cipher.doFinal(data, i * blockSize, data.length - i

* blockSize, raw, i * outputSize);

// 这里面doUpdate方法不可用,查看源代码后发现每次doUpdate后并没有什么实际动作除了把byte[]放到

// ByteArrayOutputStream中,而最后doFinal的时候才将所有的byte[]进行加密,可是到了此时加密块大小很可能已经超出了

// OutputSize所以只好用dofinal方法。

i++;

}

return raw;

} catch (Exception e) {

throw new Exception(e.getMessage());

}

}

/**

* * 解密 *

*

* @param key

* 解密的密钥 *

* @param raw

* 已经加密的数据 *

* @return 解密后的明文 *

* @throws Exception

*/

public static byte[] decrypt(PrivateKey pk, byte[] raw) throws Exception {

try {

Cipher cipher = Cipher.getInstance("RSA",

new org.bouncycastle.jce.provider.BouncyCastleProvider());

cipher.init(cipher.DECRYPT_MODE, pk);

int blockSize = cipher.getBlockSize();

ByteArrayOutputStream bout = new ByteArrayOutputStream(64);

int j = 0;

while (raw.length - j * blockSize > 0) {

bout.write(cipher.doFinal(raw, j * blockSize, blockSize));

j++;

}

return bout.toByteArray();

} catch (Exception e) {

throw new Exception(e.getMessage());

}

}

/**

* * *

*

* @param args *

* @throws Exception

*/

public static void main(String[] args) throws Exception {

RSAPublicKey rsap = (RSAPublicKey) RSAUtil.generateKeyPair().getPublic();

String test = "hello world";

byte[] en_test = encrypt(getKeyPair().getPublic(),test.getBytes());

byte[] de_test = decrypt(getKeyPair().getPrivate(),en_test);

System.out.println(new String(de_test));

}

}

2.测试页面:

IndexAction.java

Java代码 6788554fe9bcd82795ef9839d3f317b0.gif c491770d13cdcbfc9be5bb9b128dd65d.png

1d4715fb3e5b109ea94009c98d36f8e8.gif

/*

* Generated by MyEclipse Struts

* Template path: templates/java/JavaClass.vtl

*/

packagecom.sunsoft.struts.action;

importjava.security.interfaces.RSAPrivateKey;

importjava.security.interfaces.RSAPublicKey;

importjavax.servlet.http.HttpServletRequest;

importjavax.servlet.http.HttpServletResponse;

importorg.apache.struts.action.Action;

importorg.apache.struts.action.ActionForm;

importorg.apache.struts.action.ActionForward;

importorg.apache.struts.action.ActionMapping;

importcom.sunsoft.struts.util.RSAUtil;

/**

* MyEclipse Struts

* Creation date: 06-28-2008

*

* XDoclet definition:

* @struts.action validate="true"

*/

publicclassIndexActionextendsAction {

/*

* Generated Methods

*/

/**

* Method execute

* @param mapping

* @param form

* @param request

* @param response

* @return ActionForward

*/

publicActionForward execute(ActionMapping mapping, ActionForm form,

HttpServletRequest request, HttpServletResponse response)throwsException {

RSAPublicKey rsap = (RSAPublicKey) RSAUtil.getKeyPair().getPublic();

String module = rsap.getModulus().toString(16);

String empoent = rsap.getPublicExponent().toString(16);

System.out.println("module");

System.out.println(module);

System.out.println("empoent");

System.out.println(empoent);

request.setAttribute("m", module);

request.setAttribute("e", empoent);

returnmapping.findForward("login");

}

}

/*

* Generated by MyEclipse Struts

* Template path: templates/java/JavaClass.vtl

*/

package com.sunsoft.struts.action;

import java.security.interfaces.RSAPrivateKey;

import java.security.interfaces.RSAPublicKey;

import javax.servlet.http.HttpServletRequest;

import javax.servlet.http.HttpServletResponse;

import org.apache.struts.action.Action;

import org.apache.struts.action.ActionForm;

import org.apache.struts.action.ActionForward;

import org.apache.struts.action.ActionMapping;

import com.sunsoft.struts.util.RSAUtil;

/**

* MyEclipse Struts

* Creation date: 06-28-2008

*

* XDoclet definition:

* @struts.action validate="true"

*/

public class IndexAction extends Action {

/*

* Generated Methods

*/

/**

* Method execute

* @param mapping

* @param form

* @param request

* @param response

* @return ActionForward

*/

public ActionForward execute(ActionMapping mapping, ActionForm form,

HttpServletRequest request, HttpServletResponse response)throws Exception {

RSAPublicKey rsap = (RSAPublicKey) RSAUtil.getKeyPair().getPublic();

String module = rsap.getModulus().toString(16);

String empoent = rsap.getPublicExponent().toString(16);

System.out.println("module");

System.out.println(module);

System.out.println("empoent");

System.out.println(empoent);

request.setAttribute("m", module);

request.setAttribute("e", empoent);

return mapping.findForward("login");

}

}

通过此action进入登录页面,并传入公钥的 Modulus 与PublicExponent的hex编码形式。

3。登录页面 login.jsp

Html代码 6788554fe9bcd82795ef9839d3f317b0.gif c491770d13cdcbfc9be5bb9b128dd65d.png

1d4715fb3e5b109ea94009c98d36f8e8.gif

HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

login

function rsalogin()

{

bodyRSA();

varresult=encryptedString(key, document.getElementById("pwd").value);

//alert(result);

loginForm.action="login.do?result="+result;

loginForm.submit();

}

var key ;

function bodyRSA()

{

setMaxDigits(130);

key=newRSAKeyPair("10001","","8c1cd09a04ed01aafe70dc84c5f32ae23a16fe8fc8898aba6797c5a9c708720de4f08dbf086af429fc51c0636208f56de20a8ab5686affd9bdfb643ae1e90d5617155c4867eef06b0884ba8ecd187907c7069ae3eed4f0155eeca6573411864035ae803ad8fd91a0cc479f27e41b19c13465ab30f3cfbfd14de56f49cbd09481");

}

Login:Password:login

function rsalogin()

{

bodyRSA();

var result = encryptedString(key, document.getElementById("pwd").value);

//alert(result);

loginForm.action="login.do?result="+result;

loginForm.submit();

}

var key ;

function bodyRSA()

{

setMaxDigits(130);

key = new RSAKeyPair("10001","","8c1cd09a04ed01aafe70dc84c5f32ae23a16fe8fc8898aba6797c5a9c708720de4f08dbf086af429fc51c0636208f56de20a8ab5686affd9bdfb643ae1e90d5617155c4867eef06b0884ba8ecd187907c7069ae3eed4f0155eeca6573411864035ae803ad8fd91a0cc479f27e41b19c13465ab30f3cfbfd14de56f49cbd09481");

}

Login:
Password:

3.点击登录后,调用LoginAction.java

Java代码 6788554fe9bcd82795ef9839d3f317b0.gif c491770d13cdcbfc9be5bb9b128dd65d.png

1d4715fb3e5b109ea94009c98d36f8e8.gif

/*

* Generated by MyEclipse Struts

* Template path: templates/java/JavaClass.vtl

*/

packagecom.sunsoft.struts.action;

importjava.math.BigInteger;

importjavax.servlet.http.HttpServletRequest;

importjavax.servlet.http.HttpServletResponse;

importorg.apache.struts.action.Action;

importorg.apache.struts.action.ActionForm;

importorg.apache.struts.action.ActionForward;

importorg.apache.struts.action.ActionMapping;

importcom.sunsoft.struts.util.RSAUtil;

/**

* MyEclipse Struts

* Creation date: 06-28-2008

*

* XDoclet definition:

* @struts.action path="/login" name="loginForm" input="/login.jsp" scope="request" validate="true"

* @struts.action-forward name="error" path="/error.jsp"

* @struts.action-forward name="success" path="/success.jsp"

*/

publicclassLoginActionextendsAction {

/*

* Generated Methods

*/

/**

* Method execute

* @param mapping

* @param form

* @param request

* @param response

* @return ActionForward

*/

publicActionForward execute(ActionMapping mapping, ActionForm form,

HttpServletRequest request, HttpServletResponse response)throwsException{

//LoginForm loginForm = (LoginForm) form;

String result = request.getParameter("result");

System.out.println("原文加密后为:");

System.out.println(result);

byte[] en_result =newBigInteger(result,16).toByteArray();

System.out.println("转成byte[]"+newString(en_result));

byte[] de_result = RSAUtil.decrypt(RSAUtil.getKeyPair().getPrivate(),en_result);

System.out.println("还原密文:");

System.out.println(newString(de_result));

StringBuffer sb =newStringBuffer();

sb.append(newString(de_result));

System.out.println(sb.reverse().toString());

returnmapping.findForward("success");

}

}

/*

* Generated by MyEclipse Struts

* Template path: templates/java/JavaClass.vtl

*/

package com.sunsoft.struts.action;

import java.math.BigInteger;

import javax.servlet.http.HttpServletRequest;

import javax.servlet.http.HttpServletResponse;

import org.apache.struts.action.Action;

import org.apache.struts.action.ActionForm;

import org.apache.struts.action.ActionForward;

import org.apache.struts.action.ActionMapping;

import com.sunsoft.struts.util.RSAUtil;

/**

* MyEclipse Struts

* Creation date: 06-28-2008

*

* XDoclet definition:

* @struts.action path="/login" name="loginForm" input="/login.jsp" scope="request" validate="true"

* @struts.action-forward name="error" path="/error.jsp"

* @struts.action-forward name="success" path="/success.jsp"

*/

public class LoginAction extends Action {

/*

* Generated Methods

*/

/**

* Method execute

* @param mapping

* @param form

* @param request

* @param response

* @return ActionForward

*/

public ActionForward execute(ActionMapping mapping, ActionForm form,

HttpServletRequest request, HttpServletResponse response) throws Exception{

//LoginForm loginForm = (LoginForm) form;

String result = request.getParameter("result");

System.out.println("原文加密后为:");

System.out.println(result);

byte[] en_result = new BigInteger(result, 16).toByteArray();

System.out.println("转成byte[]"+new String(en_result));

byte[] de_result = RSAUtil.decrypt(RSAUtil.getKeyPair().getPrivate(),en_result);

System.out.println("还原密文:");

System.out.println(new String(de_result));

StringBuffer sb = new StringBuffer();

sb.append(new String(de_result));

System.out.println(sb.reverse().toString());

return mapping.findForward("success");

}

}

因为发现解出的明文是倒序的,后面就用StringBuffer的reverse()来转换了一下。

4。login.jsp所调用的js

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值