python实现RsaWithSHA256签名以及国密Sm3WithSm2签名

相关依赖:

  1. gmssl==3.2.2
  2. pycryptodome == 3.9.7

相关实现

import abc
import base64

from Crypto.Hash import SHA256
from Crypto.PublicKey import RSA
from Crypto.Signature import PKCS1_v1_5
from gmssl import sm2


class BaseSignatureUtil(metaclass=abc.ABCMeta):

    @abc.abstractmethod
    def signature(self, *args, **kwargs): pass

    @abc.abstractmethod
    def verify_signature(self, *args, **kwargs): pass


class RsaWithSha256Util(BaseSignatureUtil):

    @staticmethod
    def signature(sign_data: str, private_key: str) -> str:
        rsa_key = RSA.importKey(private_key)
        signer = PKCS1_v1_5.new(rsa_key)
        _rand_hash = SHA256.new()
        _rand_hash.update(sign_data.encode('utf-8'))
        signature = signer.sign(_rand_hash)
        return base64.b64encode(signature).decode('utf-8')

    @staticmethod
    def verify_signature(verify_data: str, signature: str, public_key: str):
        rsa_key = RSA.importKey(public_key)
        signer = PKCS1_v1_5.new(rsa_key)
        _rand_hash = SHA256.new()
        _rand_hash.update(verify_data.encode('utf-8'))
        return signer.verify(_rand_hash, base64.b64decode(signature))


class Sm3WithSm2Util(BaseSignatureUtil):
    """
    Sm3WithSm2签名及验签实现
    """

    @staticmethod
    def signature(sign_data: str, private_key: str, public_key: str):
        """
        此处签名需要公钥
        :param sign_data:
        :param private_key: 私钥
        :param public_key: 公钥
        :return:
        """
        crypt = sm2.CryptSM2(private_key=private_key, public_key=public_key, mode=1, asn1=True)
        sign_str = crypt.sign_with_sm3(bytes(sign_data, encoding="utf8"))
        b64 = base64.b64encode(bytes.fromhex(sign_str)).decode()
        return b64

    @staticmethod
    def verify_signature(verify_data: str, signature: str, public_key: str):
        """

        :param public_key:
        :param verify_data:
        :param signature:
        :return:
        """
        crypt = sm2.CryptSM2(private_key="", public_key=public_key, mode=1, asn1=True)
        return crypt.verify_with_sm3(base64.b64decode(signature).hex(), bytes(verify_data, encoding="utf8"))

使用

if __name__ == '__main__':
    rsa_pri_key = """-----BEGIN PRIVATE KEY-----
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQCR2eBgYkRLPZgs
OFf2/81o5i69/S2rjGic/YW7Clm1mokiYZ1YLDEHH2c7tdvXJrmfLavc4ngruX4y
Uddn9A2+Ts+B5YbsbRrzOJ9ok6CA0MaVpAYejmaT/bq3e2jBY2rwI7NBzfx7c1H/
gRNY2kMTGK6l2aI4fg8jxCLt+5jOU9UbvEmwd4VNBcqfUpb9VTukdCfXt9p3jtLB
ej2bc2CQwReuv8FldhuGzDgHLvRRplXeGQ1i2OwvCguJiZH8mCq4/18336Mf0Xoc
bG7BmQYATPf+0OOkb1fJ9vDTtgLDB0T1BxiajoUNP5F4RLWer0eIDnF6iO46zwjC
czasKs3XAgMBAAECggEAEDog7ChSt9pRAW59XvZD6M1fWvT9rU3wX7MXO2Gh7IIW
itQ4eNRl2giE6FBJ9syQr2SZ7/fkbdzz7O5NHHw7QTasgKPEWK6k5nWgyrZOD7bq
uUBoC+NFB2cd7IcW9xk0DyaxrXsZAbUpZNd8CxExkEDZQYuOsGFaFt0eE8M/04i2
L9QPB3WQ3lN+sK8q9AfTBK3yv8MkGI8+00Ihp9TLZ1XqhtvlJSxKs6vLFAcH8rzP
ZKsSnqM7KGVlv5azkIeFeNLWHIzjepjA3V4ncnbu4nOBiuNGlcNh9++ELmHF+fNk
EmGO4u+GTgfuaECFtjdeq+DUH8JJ0dPXOEMhGX8p2QKBgQC5yxa3CodwW832dQ+u
pQaN3J7pZfgUrHK1idGSyGxuehEU+wyjSSwOC1eUGaP4dmj6azmvz5Ng4xPa7Ew3
TemNz7HGVnx8L+YMYa+cJHEfaWEvByin5nnPgy79Fy6aO49uK1egFGFNSPV7i4Sd
nnGt/8ye+g65uS2MwSxAN3V/WQKBgQDI9u8G0xFNI3tg7glFTr9yy/WihCZ495BZ
Bq7MAQWsaNUOR0Rh6/+gDDG2j0m3Yjnk9JFXpuctZGnVyWi1fBGjjW25e8NiyBjz
BJbpPNrkxJWpdeG51gKaOUgz2YfnooHKrt/3Cn1LO6KrNBPZMw7++NpWWh+aRE6A
cVWFOUbArwKBgHYLQdBkQS8zNQYc1CzrLuHdRZ4XKmrAMlWDTgNLkhETP10sMJhi
OjpmHGu9ar/HQ+WvUMSSRxoszIWw0q/ksbpnNpVEh+1DZY+CVVgIk1MY2iVOEBe1
SLl+qNEm9HYL15JwuUi9CiFXdJjdSRH4BFRADRsI12hK7lTauynF0sJpAoGBAIt/
fWRLVxMoshgSo7TMePCCy7tH6DzH/BcQIH3Tp9CJ5HrI1Zrzarn6PPfwdscpE+7u
JYWmgYpszVptOJXhzYyuO6ApXPNQ2qC2atr0Ny3dl9XN0iZhe+T6Jjh3o3MSxu2e
fjDJwzdZ6gzVVYHLg3lR3J1cadt31tYp1adonshZAoGAWTgi+QE1ts0HwztCw2CV
3AeKB6wZNfFNYEE4bwZhwWUQMOEjnlwh9IHwjMh5POyFD5BR/YAgihW3/u052/9O
1w7I18QvqjwSyPRVMXhItT51P5QNsugRRcsCNTHvWdozjgKuIP5pLTK+nwE7PPl3
UUNybmttjqJCyfndIOUOVlQ=
-----END PRIVATE KEY-----"""
    rsa_pub_key = """-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAkdngYGJESz2YLDhX9v/N
aOYuvf0tq4xonP2FuwpZtZqJImGdWCwxBx9nO7Xb1ya5ny2r3OJ4K7l+MlHXZ/QN
vk7PgeWG7G0a8zifaJOggNDGlaQGHo5mk/26t3towWNq8COzQc38e3NR/4ETWNpD
ExiupdmiOH4PI8Qi7fuYzlPVG7xJsHeFTQXKn1KW/VU7pHQn17fad47SwXo9m3Ng
kMEXrr/BZXYbhsw4By70UaZV3hkNYtjsLwoLiYmR/JgquP9fN9+jH9F6HGxuwZkG
AEz3/tDjpG9Xyfbw07YCwwdE9QcYmo6FDT+ReES1nq9HiA5xeojuOs8IwnM2rCrN
1wIDAQAB
-----END PUBLIC KEY-----"""
    sm_pri_key = 'c124889fb35a23cd3092a62f92ad9f3aafd07876c5bb08bf147ac27b43e15ec7'
    sm_pub_key = '04aaf5c364472a7b26ab254a834f5b8104ef06387ea7cc9104dd183c6ace0a647a70f19e704721919bcf955a1be8c69c9a9ead286a7d1fdfe067145244c377e1ce'
    data = "test"
    print("=========== Sm3WithSm2 ===========")
    sm_sign = Sm3WithSm2Util.signature(data, sm_pri_key, sm_pub_key)
    print("Sm3WithSm2 计算后签名:", sm_sign)
    print("Sm3WithSm2 验签结果:", Sm3WithSm2Util.verify_signature(data, sm_sign, sm_pub_key))
    print("=========== RsaWithSha256 ===========")
    rsa_sign = RsaWithSha256Util.signature(data, rsa_pri_key)
    print("RsaWithSha256 计算后签名:", rsa_sign)
    print("RsaWithSha256 验签结果:", RsaWithSha256Util.verify_signature(data, rsa_sign, rsa_pub_key))


"""
=========== Sm3WithSm2 ===========
Sm3WithSm2 计算后签名: MEUCIHLCP/7f3aAdsxZHH206h65KyTJhm4ceVT1BdTjMEBZwAiEAkzRuMeD1rLQVeC0Tm7MTw/5ssEP9VWxo2dxex3WWjkQ=
Sm3WithSm2 验签结果: True
=========== RsaWithSha256 ===========
RsaWithSha256 计算后签名: FBVEU8nyALWLDKdiJFefcugGrwCcalGoOEDegbZ3N5blLHk5joIUcWHR4giFAYXm3l5wgenRNbToxItBblmGnMVkTSr6um1chGTejKtOu1KZ2koQt4hH5W8+Clc8gniuYfsLZl9W+7idl9oqczXg9vdfUqBOw/Iv1A0uEhpUdGyirf3yc2UduxKouQGGNZbVMTpOjrE4YTXs+Tbz9OIJjv19zQYcVfi1aXX4wiFJbpv/vnUGp7Bvo2FUkvLicf2r1qiPlh0ltX/EfIZmWoNvO6iD/GaQfaA9Z/7VnBhyQxhEeVMi/2KZqoVDDIOM7dIWjmCf1TGy+MDYUxzX+cGRCg==
RsaWithSha256 验签结果: True
"""
  • 0
    点赞
  • 10
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
实现SM2数字签名,加密和解密需要使用SM2算法库,可以使用Python的第三方库pycryptodome或gmssl。以下是使用pycryptodome实现SM2数字签名,加密和解密的示例代码: 1. SM2数字签名 ```python from Crypto.PublicKey import ECC from Crypto.Signature import DSS from Crypto.Hash import SHA256 from Crypto.Cipher import AES from Crypto.Util.Padding import pad, unpad from binascii import b2a_hex, a2b_hex # 生成SM2密钥对 private_key = ECC.generate(curve='sm2') public_key = private_key.public_key() # 待签名数据 data = b'hello, world' # 计算消息摘要 digest = SHA256.new(data) # 对消息摘要进行数字签名 signer = DSS.new(private_key, 'fips-186-3') signature = signer.sign(digest) # 验证数字签名 verifier = DSS.new(public_key, 'fips-186-3') try: verifier.verify(digest, signature) print("Signature is valid.") except ValueError: print("Signature is invalid.") ``` 2. SM2加密和解密 ```python from Crypto.Cipher import SM2Cipher from Crypto.PublicKey import ECC from Crypto.Util.Padding import pad, unpad from binascii import b2a_hex, a2b_hex # 生成SM2密钥对 private_key = ECC.generate(curve='sm2') public_key = private_key.public_key() # 加密数据 plaintext = b'hello, world' cipher = SM2Cipher.new(public_key) ciphertext = cipher.encrypt(plaintext) # 解密数据 cipher = SM2Cipher.new(private_key) decrypttext = cipher.decrypt(ciphertext) print("Plaintext:", plaintext) print("Ciphertext:", b2a_hex(ciphertext)) print("Decrypttext:", decrypttext) ``` 注意,以上代码只是示例,实际使用时需要注意安全性和数据格式转换等问题。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值