RSA非对称加密

import java.io.ByteArrayOutputStream;
import java.io.File;
import java.io.FileInputStream;
import java.io.FileOutputStream;
import java.io.ObjectInputStream;
import java.io.ObjectOutputStream;
import java.math.BigInteger;
import java.security.KeyFactory;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.NoSuchAlgorithmException;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.SecureRandom;
import java.security.interfaces.RSAPrivateKey;
import java.security.interfaces.RSAPublicKey;
import java.security.spec.InvalidKeySpecException;
import java.security.spec.RSAPrivateKeySpec;
import java.security.spec.RSAPublicKeySpec;  

  
public class RSAEncrypt {
    	private static Logger logger = Logger.getLogger(RSAEncrypt.class);
    	private static String filePash = System.getProperty("java.io.tmpdir");
    	private static String filePashs = filePash.substring(0, filePash.lastIndexOf(File.separator));
    	private static String filePashss = filePashs.substring(0, filePashs.lastIndexOf(File.separator));
    	private static String tempPath = filePashss + File.separator + "ZEEI";
    	private static String tempPathFile = filePashss + File.separator + "ZEEI" + File.separator + "RSAKey.txt";
    	// 第一次进入判断秘钥文件存不存在,不存在就创建文件,并生成
    	static {
    		File file = new File(tempPath);
    		// 如果文件夹不存在则创建
    		if (!file.exists() && !file.isDirectory()) {
    			file.mkdir();
    			File fileDate = new File(tempPathFile);
    			try {
    				fileDate.createNewFile();
    				generateKeyPair();
    			} catch (Exception e) {
    				logger.error(String.format("RSAEncrypt.static:%s", e));
    			}
    		} else {
    			File fileDate = new File(tempPathFile);
    			if (!fileDate.exists()) {
    				try {
    					fileDate.createNewFile();
    					generateKeyPair();
    				} catch (Exception e) {
    					logger.error(String.format("RSAEncrypt.static 2:%s", e));
    				}
    			}
    		}
    	}
    
	private RSAEncrypt() {

	}
/**
 * * 生成密钥对 *
 *
 * @return KeyPair *
 * @throws EncryptException
 */
public static KeyPair generateKeyPair() {
	KeyPair keyPair = null;
	try {
		KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance("RSA",
				new org.bouncycastle.jce.provider.BouncyCastleProvider());
		final int KEY_SIZE = 1024;// 没什么好说的了,这个值关系到块加密的大小,可以更改,但是不要太大,否则效率会低
		keyPairGen.initialize(KEY_SIZE, new SecureRandom());
		keyPair = keyPairGen.generateKeyPair();
		saveKeyPair(keyPair);
		return keyPair;
	} catch (Exception e) {
		logger.error(String.format("RSAEncrypt.generateKeyPair:%s", e));
	}

	return keyPair;
}

/**
 * 获取密钥对
 *
 * @return
 * @throws Exception
 */
public static KeyPair getKeyPair() {
	KeyPair kp = null;
	try {
		FileInputStream fis = new FileInputStream(tempPathFile);
		ObjectInputStream oos = new ObjectInputStream(fis);
		kp = (KeyPair) oos.readObject();
		oos.close();
		fis.close();

		return kp;
	} catch (Exception e) {
		logger.error(String.format("RSAEncrypt.getKeyPair:%s", e));
	}

	return kp;
}

/**
 * 保存密钥
 *
 * @param kp
 * @throws Exception
 */
public static void saveKeyPair(KeyPair kp) {
	try {
		FileOutputStream fos = new FileOutputStream(tempPathFile);
		ObjectOutputStream oos = new ObjectOutputStream(fos);
		// 生成密钥
		oos.writeObject(kp);
		oos.close();
		fos.close();

	} catch (Exception e) {
		logger.error(String.format("RSAEncrypt.saveKeyPair:%s", e));
	}

}

/**
 * * 生成公钥 *
 *
 * @param modulus
 *            *
 * @param publicExponent
 *            *
 * @return RSAPublicKey *
 * @throws Exception
 */
public static RSAPublicKey generateRSAPublicKey(byte[] modulus, byte[] publicExponent) {
	RSAPublicKey key = null;
	try {
		KeyFactory keyFac = KeyFactory.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider());

		RSAPublicKeySpec pubKeySpec = new RSAPublicKeySpec(new BigInteger(modulus), new BigInteger(publicExponent));
		return (RSAPublicKey) keyFac.generatePublic(pubKeySpec);
	} catch (Exception e) {
		logger.error(String.format("RSAEncrypt.saveKeyPair:%s", e));
	}
	
	return key;
}

/**
 * * 生成私钥 *
 *
 * @param modulus
 *            *
 * @param privateExponent
 *            *
 * @return RSAPrivateKey *
 * @throws Exception
 */
public static RSAPrivateKey generateRSAPrivateKey(byte[] modulus, byte[] privateExponent) throws Exception {
	KeyFactory keyFac = null;
	try {
		keyFac = KeyFactory.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider());
	} catch (NoSuchAlgorithmException ex) {
		throw new Exception(ex.getMessage());
	}

	RSAPrivateKeySpec priKeySpec = new RSAPrivateKeySpec(new BigInteger(modulus), new BigInteger(privateExponent));
	try {
		return (RSAPrivateKey) keyFac.generatePrivate(priKeySpec);
	} catch (InvalidKeySpecException ex) {
		throw new Exception(ex.getMessage());
	}
}

/**
 * * 加密 *
 *
 * @param key
 *            加密的密钥 *
 * @param data
 *            待加密的明文数据 *
 * @return 加密后的数据 *
 * @throws Exception
 */
public static byte[] encrypt(PublicKey pk, byte[] data) {
	try {
		Cipher cipher = Cipher.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider());
		cipher.init(Cipher.ENCRYPT_MODE, pk);
		int blockSize = cipher.getBlockSize();// 获得加密块大小,如:加密前数据为128个byte,而key_size=1024
		// 加密块大小为127
		// byte,加密后为128个byte;因此共有2个加密块,第一个127
		// byte第二个为1个byte
		// 获得加密块加密后块大小
		int outputSize = cipher.getOutputSize(data.length);
		int leavedSize = data.length % blockSize;
		int blocksSize = leavedSize != 0 ? data.length / blockSize + 1 : data.length / blockSize;
		byte[] raw = new byte[outputSize * blocksSize];
		int i = 0;
		while (data.length - i * blockSize > 0) {
			if (data.length - i * blockSize > blockSize) {
				cipher.doFinal(data, i * blockSize, blockSize, raw, i * outputSize);
			} else {
				cipher.doFinal(data, i * blockSize, data.length - i * blockSize, raw, i * outputSize);
			}
			// 这里面doUpdate方法不可用,查看源代码后发现每次doUpdate后并没有什么实际动作除了把byte[]放到
			// ByteArrayOutputStream中,而最后doFinal的时候才将所有的byte[]进行加密,可是到了此时加密块大小很可能已经超出了
			// OutputSize所以只好用dofinal方法。
			i++;
		}
		
		return raw;
	} catch (Exception e) {
		logger.error(String.format("RSAEncrypt.encrypt:%s", e));
	}

	return null;
}

/**
 * * 解密 *
 *
 * @param key
 *            解密的密钥 *
 * @param raw
 *            已经加密的数据 *
 * @return 解密后的明文 *
 * @throws Exception
 */
public static byte[] decrypt(PrivateKey pk, byte[] raw) {
	ByteArrayOutputStream bout = new ByteArrayOutputStream(64);
	try {
		Cipher cipher = Cipher.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider());
		cipher.init(Cipher.DECRYPT_MODE, pk);
		int blockSize = cipher.getBlockSize();
		int j = 0;

		while (raw.length - j * blockSize > 0) {
			bout.write(cipher.doFinal(raw, j * blockSize, blockSize));
			j++;
		}
	} catch (Exception e) {
		logger.error(String.format("RSAEncrypt.decrypt:%s", e));
	}

	return bout.toByteArray();
}

/**
 * 解密方法 paramStr ->密文 basePath ->RSAKey.txt所在的文件夹路径
 **/
public static String decryptStr(String paramStr) {
	try{
		KeyPair keyPair = getKeyPair();
		if (keyPair != null){
			byte[] enResult = HexUtil.hexStringToBytes(paramStr);
			byte[] deResult = decrypt(keyPair.getPrivate(), enResult);
			StringBuffer sb = new StringBuffer();
			sb.append(new String(deResult));
			
			// 返回解密的字符串
			return sb.reverse().toString();
		}
		
		return StringUtil.empty();
	}catch(Exception e){
		logger.error(String.format("RSAEncrypt.decryptStr:%s", e));
	}
	
	return StringUtil.empty();
}

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值