SM4国密加解密

需求:使用国密SM4进行前端加密,后台解密
java解密代码

<dependency>
    <groupId>cn.hutool</groupId>
    <artifactId>hutool-all</artifactId>
    <version>5.6.6</version>
</dependency>

import cn.hutool.crypto.Mode;
import cn.hutool.crypto.Padding;
import cn.hutool.crypto.symmetric.SM4;
import cn.hutool.crypto.symmetric.SymmetricCrypto;
  
    String decryptStr(String str) {
        if (StringTool.empty(str)) {
            return "密码为空";
        }
        //国密SM4解密
        String pwd = str.trim();
        SymmetricCrypto sm4 = new SM4(Mode.CBC, Padding.PKCS5Padding, "HTHTqQq314159@26".getBytes(), "HTHTqQq314159@26".getBytes());
        byte[] cipherHex = Base64.decode(pwd);
        pwd = sm4.decryptStr(cipherHex);
        return pwd;
    }

js加密代码

 //sm4加密  "gm-crypt": "^0.0.2",安装依赖npm install gm-crypt 

    encryption (passWord) {
      const SM4 = require('gm-crypt').sm4;
      let sm4Config = {
        //配置sm4参数
        key: 'HTHTqQq314159@26', //这里这个key值是跟后端要的
        mode: 'cbc', // 加密的方式有两种,ecb和cbc两种,也是看后端如何定义的,不过要是cbc的话下面还要加一个iv的参数,ecb不用
        iv: 'HTHTqQq314159@26',
        cipherType: 'base64',
      };
      let sm4 = new SM4(sm4Config);
      let Pwd = sm4.encrypt(passWord);
      return Pwd;
    },
  • 0
    点赞
  • 3
    收藏
    觉得还不错? 一键收藏
  • 1
    评论
javasm2国密加解密工具类可以用于对数据进行国密SM2算法的加解密、签名和验签操作。以下是一个简单的示例代码: ```java import org.bouncycastle.crypto.AsymmetricCipherKeyPair; import org.bouncycastle.crypto.CipherParameters; import org.bouncycastle.crypto.digests.SM3Digest; import org.bouncycastle.crypto.engines.SM2Engine; import org.bouncycastle.crypto.generators.AsymmetricKeyPairGenerator; import org.bouncycastle.crypto.generators.ECKeyPairGenerator; import org.bouncycastle.crypto.params.*; import org.bouncycastle.crypto.signers.SM2Signer; import org.bouncycastle.crypto.util.PrivateKeyFactory; import org.bouncycastle.crypto.util.PublicKeyFactory; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.util.encoders.Hex; import java.security.Security; public class SM2Util { static { Security.addProvider(new BouncyCastleProvider()); } public static AsymmetricCipherKeyPair generateKeyPair() { ECKeyPairGenerator gen = new ECKeyPairGenerator(); gen.init(new ECKeyGenerationParameters( SM2UtilParams.sm2ECParams, SM2UtilParams.random)); return gen.generateKeyPair(); } public static String encrypt(byte[] data, ECPublicKeyParameters publicKey) throws Exception { SM2Engine engine = new SM2Engine(); CipherParameters param = new ParametersWithRandom(publicKey, SM2UtilParams.random); engine.init(true, param); byte[] enc = engine.processBlock(data, 0, data.length); return Hex.toHexString(enc); } public static byte[] decrypt(String data, ECPrivateKeyParameters privateKey) throws Exception { SM2Engine engine = new SM2Engine(); CipherParameters param = new ParametersWithRandom(privateKey, SM2UtilParams.random); engine.init(false, param); byte[] dec = Hex.decode(data); return engine.processBlock(dec, 0, dec.length); } public static String sign(byte[] data, ECPrivateKeyParameters privateKey) throws Exception { SM2Signer signer = new SM2Signer(); signer.init(true, new ParametersWithRandom(privateKey, SM2UtilParams.random)); signer.update(data, 0, data.length); byte[] sig = signer.generateSignature(); return Hex.toHexString(sig); } public static boolean verify(byte[] data, String sign, ECPublicKeyParameters publicKey) throws Exception { SM2Signer signer = new SM2Signer(); signer.init(false, publicKey); signer.update(data, 0, data.length); byte[] sig = Hex.decode(sign); return signer.verifySignature(sig); } public static void main(String[] args) throws Exception { AsymmetricCipherKeyPair keyPair = SM2Util.generateKeyPair(); ECPublicKeyParameters publicKey = (ECPublicKeyParameters) keyPair.getPublic(); ECPrivateKeyParameters privateKey = (ECPrivateKeyParameters) keyPair.getPrivate(); String message = "hello world"; byte[] data = message.getBytes(); String encData = SM2Util.encrypt(data, publicKey); System.out.println("encData: " + encData); byte[] decData = SM2Util.decrypt(encData, privateKey); System.out.println("decData: " + new String(decData)); String sign = SM2Util.sign(data, privateKey); System.out.println("sign: " + sign); boolean verifyResult = SM2Util.verify(data, sign, publicKey); System.out.println("verifyResult: " + verifyResult); } } ``` 注意:该示例代码仅供参考,具体实现应根据具体需求进行修改和完善。同时,使用国密算法需要遵守相关法律法规。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值