Java与.NET RSA加密解密(签名,验签)实例代码

 原文地址: http://www.jackyinfo.com/post/2011/05/11/98436.aspx

经过一段时间的研究,发现Java和.NET各自有各自的一套签名算法,数据一致,密钥一致,其实现的结果完全不同,经过不断研究,终于在朋友帮助下,实现了.NET与Java之间签名、验签、加密、解密均一致。废话不说,需要的朋友自己看以下代码,通过调用public方法即可实现,无需修改本实例代码。

—————————————————————我是分割线———————————————————————

 

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.IO;
using System.Security.Cryptography;
  
namespace Alipay.Class
{
     public sealed class RSAFromPkcs8
     {
         /// <summary>
         /// 签名
         /// </summary>
         /// <param name="content">需要签名的内容</param>
         /// <param name="privateKey">私钥</param>
         /// <returns></returns>
         public static string sign( string content, string privateKey)
         {
  
  
             byte [] Data = Encoding.UTF8.GetBytes(content);
             RSACryptoServiceProvider rsa = DecodePemPrivateKey(privateKey);
             SHA1 sh = new SHA1CryptoServiceProvider();
  
  
             byte [] signData = rsa.SignData(Data, sh);
             return Convert.ToBase64String(signData);
  
  
         }
         /// <summary>
         /// 验证签名
         /// </summary>
         /// <param name="content">需要验证的内容</param>
         /// <param name="signedString">签名结果</param>
         /// <param name="publicKey">公钥</param>
         /// <returns></returns>
         public static bool verify( string content, string signedString, string publicKey)
         {
             bool result = false ;
  
             byte [] Data = Encoding.UTF8.GetBytes(content);
             byte [] data = Convert.FromBase64String(signedString);
             RSAParameters paraPub = ConvertFromPublicKey(publicKey);
             RSACryptoServiceProvider rsaPub = new RSACryptoServiceProvider();
             rsaPub.ImportParameters(paraPub);
  
             SHA1 sh = new SHA1CryptoServiceProvider();
             result = rsaPub.VerifyData(Data, sh, data);
             return result;
         }
  
         public static string decrypt( byte [] data, string privateKey)
         {
             string result = "" ;
             RSACryptoServiceProvider rsa = DecodePemPrivateKey(privateKey);
             SHA1 sh = new SHA1CryptoServiceProvider();
             byte [] source = rsa.Decrypt(data, false );
             Encoding utf8 = Encoding.UTF8;
  
  
             char [] asciiChars = new char [utf8.GetCharCount(source, 0, source.Length)];
             utf8.GetChars(source, 0, source.Length, asciiChars, 0);
             result = new string (asciiChars);
  
             //result = ASCIIEncoding.ASCII.GetString(source);
             return result;
         }
  
         public static string decryptData( string resData, string privateKey)
         {
  
             byte [] DataToDecrypt = Convert.FromBase64String(resData);
  
             string result = "" ;
  
  
             for ( int j = 0; j < DataToDecrypt.Length / 128; j++)
             {
                 byte [] buf = new byte [128];
                 for ( int i = 0; i < 128; i++)
                 {
  
                     buf[i] = DataToDecrypt[i + 128 * j];
                 }
                 result += decrypt(buf, privateKey);
             }
             return result;
         }
         /// <summary>
         /// 解析java生成的pem文件私钥
         /// </summary>
         /// <param name="pemstr"></param>
         /// <returns></returns>
         private static RSACryptoServiceProvider DecodePemPrivateKey(String pemstr)
         {
             byte [] pkcs8privatekey;
             pkcs8privatekey = Convert.FromBase64String(pemstr);
             if (pkcs8privatekey != null )
             {
  
                 RSACryptoServiceProvider rsa = DecodePrivateKeyInfo(pkcs8privatekey);
                 return rsa;
             }
             else
                 return null ;
         }
  
         private static RSACryptoServiceProvider DecodePrivateKeyInfo( byte [] pkcs8)
         {
  
             byte [] SeqOID = { 0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01, 0x05, 0x00 };
             byte [] seq = new byte [15];
  
             MemoryStream mem = new MemoryStream(pkcs8);
             int lenstream = ( int )mem.Length;
             BinaryReader binr = new BinaryReader(mem);    //wrap Memory Stream with BinaryReader for easy reading
             byte bt = 0;
             ushort twobytes = 0;
  
             try
             {
  
                 twobytes = binr.ReadUInt16();
                 if (twobytes == 0x8130) //data read as little endian order (actual data order for Sequence is 30 81)
                     binr.ReadByte();    //advance 1 byte
                 else if (twobytes == 0x8230)
                     binr.ReadInt16();   //advance 2 bytes
                 else
                     return null ;
  
  
                 bt = binr.ReadByte();
                 if (bt != 0x02)
                     return null ;
  
                 twobytes = binr.ReadUInt16();
  
                 if (twobytes != 0x0001)
                     return null ;
  
                 seq = binr.ReadBytes(15);       //read the Sequence OID
                 if (!CompareBytearrays(seq, SeqOID))    //make sure Sequence for OID is correct
                     return null ;
  
                 bt = binr.ReadByte();
                 if (bt != 0x04) //expect an Octet string 
                     return null ;
  
                 bt = binr.ReadByte();       //read next byte, or next 2 bytes is  0x81 or 0x82; otherwise bt is the byte count
                 if (bt == 0x81)
                     binr.ReadByte();
                 else
                     if (bt == 0x82)
                         binr.ReadUInt16();
                 //------ at this stage, the remaining sequence should be the RSA private key
  
                 byte [] rsaprivkey = binr.ReadBytes(( int )(lenstream - mem.Position));
                 RSACryptoServiceProvider rsacsp = DecodeRSAPrivateKey(rsaprivkey);
                 return rsacsp;
             }
  
             catch (Exception)
             {
                 return null ;
             }
  
             finally { binr.Close(); }
  
         }
  
  
         private static bool CompareBytearrays( byte [] a, byte [] b)
         {
             if (a.Length != b.Length)
                 return false ;
             int i = 0;
             foreach ( byte c in a)
             {
                 if (c != b[i])
                     return false ;
                 i++;
             }
             return true ;
         }
  
         private static RSACryptoServiceProvider DecodeRSAPrivateKey( byte [] privkey)
         {
             byte [] MODULUS, E, D, P, Q, DP, DQ, IQ;
  
             // ---------  Set up stream to decode the asn.1 encoded RSA private key  ------
             MemoryStream mem = new MemoryStream(privkey);
             BinaryReader binr = new BinaryReader(mem);    //wrap Memory Stream with BinaryReader for easy reading
             byte bt = 0;
             ushort twobytes = 0;
             int elems = 0;
             try
             {
                 twobytes = binr.ReadUInt16();
                 if (twobytes == 0x8130) //data read as little endian order (actual data order for Sequence is 30 81)
                     binr.ReadByte();    //advance 1 byte
                 else if (twobytes == 0x8230)
                     binr.ReadInt16();   //advance 2 bytes
                 else
                     return null ;
  
                 twobytes = binr.ReadUInt16();
                 if (twobytes != 0x0102) //version number
                     return null ;
                 bt = binr.ReadByte();
                 if (bt != 0x00)
                     return null ;
  
  
                 //------  all private key components are Integer sequences ----
                 elems = GetIntegerSize(binr);
                 MODULUS = binr.ReadBytes(elems);
  
                 elems = GetIntegerSize(binr);
                 E = binr.ReadBytes(elems);
  
                 elems = GetIntegerSize(binr);
                 D = binr.ReadBytes(elems);
  
                 elems = GetIntegerSize(binr);
                 P = binr.ReadBytes(elems);
  
                 elems = GetIntegerSize(binr);
                 Q = binr.ReadBytes(elems);
  
                 elems = GetIntegerSize(binr);
                 DP = binr.ReadBytes(elems);
  
                 elems = GetIntegerSize(binr);
                 DQ = binr.ReadBytes(elems);
  
                 elems = GetIntegerSize(binr);
                 IQ = binr.ReadBytes(elems);
  
                 // ------- create RSACryptoServiceProvider instance and initialize with public key -----
                 RSACryptoServiceProvider RSA = new RSACryptoServiceProvider();
                 RSAParameters RSAparams = new RSAParameters();
                 RSAparams.Modulus = MODULUS;
                 RSAparams.Exponent = E;
                 RSAparams.D = D;
                 RSAparams.P = P;
                 RSAparams.Q = Q;
                 RSAparams.DP = DP;
                 RSAparams.DQ = DQ;
                 RSAparams.InverseQ = IQ;
                 RSA.ImportParameters(RSAparams);
                 return RSA;
             }
             catch (Exception)
             {
                 return null ;
             }
             finally { binr.Close(); }
         }
  
         private static int GetIntegerSize(BinaryReader binr)
         {
             byte bt = 0;
             byte lowbyte = 0x00;
             byte highbyte = 0x00;
             int count = 0;
             bt = binr.ReadByte();
             if (bt != 0x02)     //expect integer
                 return 0;
             bt = binr.ReadByte();
  
             if (bt == 0x81)
                 count = binr.ReadByte();    // data size in next byte
             else
                 if (bt == 0x82)
                 {
                     highbyte = binr.ReadByte(); // data size in next 2 bytes
                     lowbyte = binr.ReadByte();
                     byte [] modint = { lowbyte, highbyte, 0x00, 0x00 };
                     count = BitConverter.ToInt32(modint, 0);
                 }
                 else
                 {
                     count = bt;     // we already have the data size
                 }
  
  
  
             while (binr.ReadByte() == 0x00)
             {   //remove high order zeros in data
                 count -= 1;
             }
             binr.BaseStream.Seek(-1, SeekOrigin.Current);       //last ReadByte wasn't a removed zero, so back up a byte
             return count;
         }
  
         #region 解析.net 生成的Pem
         private static RSAParameters ConvertFromPublicKey( string pemFileConent)
         {
  
             byte [] keyData = Convert.FromBase64String(pemFileConent);
             if (keyData.Length < 162)
             {
                 throw new ArgumentException( "pem file content is incorrect." );
             }
             byte [] pemModulus = new byte [128];
             byte [] pemPublicExponent = new byte [3];
             Array.Copy(keyData, 29, pemModulus, 0, 128);
             Array.Copy(keyData, 159, pemPublicExponent, 0, 3);
             RSAParameters para = new RSAParameters();
             para.Modulus = pemModulus;
             para.Exponent = pemPublicExponent;
             return para;
         }
  
         private static RSAParameters ConvertFromPrivateKey( string pemFileConent)
         {
             byte [] keyData = Convert.FromBase64String(pemFileConent);
             if (keyData.Length < 609)
             {
                 throw new ArgumentException( "pem file content is incorrect." );
             }
  
             int index = 11;
             byte [] pemModulus = new byte [128];
             Array.Copy(keyData, index, pemModulus, 0, 128);
  
             index += 128;
             index += 2; //141
             byte [] pemPublicExponent = new byte [3];
             Array.Copy(keyData, index, pemPublicExponent, 0, 3);
  
             index += 3;
             index += 4; //148
             byte [] pemPrivateExponent = new byte [128];
             Array.Copy(keyData, index, pemPrivateExponent, 0, 128);
  
             index += 128;
             index += (( int )keyData[index + 1] == 64 ? 2 : 3); //279
             byte [] pemPrime1 = new byte [64];
             Array.Copy(keyData, index, pemPrime1, 0, 64);
  
             index += 64;
             index += (( int )keyData[index + 1] == 64 ? 2 : 3); //346
             byte [] pemPrime2 = new byte [64];
             Array.Copy(keyData, index, pemPrime2, 0, 64);
  
             index += 64;
             index += (( int )keyData[index + 1] == 64 ? 2 : 3); //412/413
             byte [] pemExponent1 = new byte [64];
             Array.Copy(keyData, index, pemExponent1, 0, 64);
  
             index += 64;
             index += (( int )keyData[index + 1] == 64 ? 2 : 3); //479/480
             byte [] pemExponent2 = new byte [64];
             Array.Copy(keyData, index, pemExponent2, 0, 64);
  
             index += 64;
             index += (( int )keyData[index + 1] == 64 ? 2 : 3); //545/546
             byte [] pemCoefficient = new byte [64];
             Array.Copy(keyData, index, pemCoefficient, 0, 64);
  
             RSAParameters para = new RSAParameters();
             para.Modulus = pemModulus;
             para.Exponent = pemPublicExponent;
             para.D = pemPrivateExponent;
             para.P = pemPrime1;
             para.Q = pemPrime2;
             para.DP = pemExponent1;
             para.DQ = pemExponent2;
             para.InverseQ = pemCoefficient;
             return para;
         }
         #endregion
  
     }
}

 

 

说明:

public static string sign(string content, string privateKey) 此方法用于签名,第一个参数是需要签名的数据,第二个参数是匹配的私钥

public static bool verify(string content, string signedString, string publicKey) 此方法用于验签,第一次参数是需要签名的数据,第二个是需要匹配的签名,第三个是匹配的公钥

public static string decryptData(string resData, string privateKey) 此方法用于解密操作,第一个参数是需要解密的数据,第二个参数是匹配的私钥

 

—————————————————————我是分割线———————————————————————

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 1
    评论
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值