Java - SHA1WithRSA PKCS8 签名

文章目录


前言

算法:SHA1WithRSA
密钥格式:PKCS8

代码

import java.nio.charset.StandardCharsets;
import java.security.KeyFactory;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.NoSuchAlgorithmException;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.Signature;
import java.security.spec.PKCS8EncodedKeySpec;
import java.security.spec.X509EncodedKeySpec;
import java.util.Base64;

/**
 * RSA 工具类
 *
 * @author xianzhan
 */
public class RSAUtils {

    /**
     * 返回内容签名
     *
     * @param content    待签名的内容
     * @param privateKey Base64 编码的私钥
     * @return 签名
     */
    public static String sign(String content, String privateKey) {
        try {
            PKCS8EncodedKeySpec pkcs8 = new PKCS8EncodedKeySpec(Base64.getDecoder()
                    .decode(privateKey.getBytes(StandardCharsets.UTF_8)));
            KeyFactory kf = KeyFactory.getInstance("RSA");
            PrivateKey pk = kf.generatePrivate(pkcs8);

            Signature sha1WithRSA = Signature.getInstance("SHA1WithRSA");
            sha1WithRSA.initSign(pk);
            sha1WithRSA.update(content.getBytes(StandardCharsets.UTF_8));

            return Base64.getEncoder().encodeToString(sha1WithRSA.sign());
        } catch (Exception e) {
            e.printStackTrace();
        }
        return null;
    }

    /**
     * 验证内容签名是否正确
     *
     * @param content   内容
     * @param sign      签名
     * @param publicKey 公钥
     * @return 该内容是否为对应私钥签名
     */
    public static boolean verify(String content, String sign, String publicKey) {
        try {
            X509EncodedKeySpec x509 = new X509EncodedKeySpec(Base64.getDecoder()
                    .decode(publicKey.getBytes(StandardCharsets.UTF_8)));
            KeyFactory kf = KeyFactory.getInstance("RSA");
            PublicKey pk = kf.generatePublic(x509);

            Signature sha1WithRSA = Signature.getInstance("SHA1WithRSA");
            sha1WithRSA.initVerify(pk);
            sha1WithRSA.update(content.getBytes(StandardCharsets.UTF_8));

            return sha1WithRSA.verify(Base64.getDecoder().decode(sign.getBytes(StandardCharsets.UTF_8)));
        } catch (Exception e) {
            e.printStackTrace();
        }
        return false;
    }

    /**
     * 生成公钥喝私钥
     *
     * @return 0.公钥 和 1.私钥
     */
    public static String[] genKey() {
        try {
            KeyPairGenerator gen = KeyPairGenerator.getInstance("RSA");
            KeyPair keyPair = gen.generateKeyPair();
            PublicKey publicKey = keyPair.getPublic();
            PrivateKey privateKey = keyPair.getPrivate();

            Base64.Encoder encoder = Base64.getEncoder();
            return new String[]{
                    encoder.encodeToString(publicKey.getEncoded()),
                    encoder.encodeToString(privateKey.getEncoded())
            };
        } catch (NoSuchAlgorithmException e) {
            e.printStackTrace();
        }
        return new String[2];
    }

    public static void main(String... args) {
        String content = "hello world";

        String[] keys = genKey();
        String publicKey = keys[0];
        String privateKey = keys[1];
        System.out.println("publicKey: " + publicKey);
        System.out.println();
        System.out.println("privateKey: " + privateKey);
        System.out.println();

        String sign = sign(content, privateKey);
        System.out.println("sign: " + sign);
        System.out.println();

        boolean verify = verify(content, sign, publicKey);
        System.out.println("verify: " + verify);
    }
}

main 方法执行结果

publicKey: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArf4j1lheE+wXcVcqeufYYVwDyfGAesiaE4GAlG8ms+Xi32bJ3b3H/LwWvw9GmiOpl3By2Xz8KRMICpqp0KbXFaNohIqMy00Vj1O6wZUSaGVTL439lZ2CmaQXnlQoDTcJiKV349T4HuRUqUMxX6UAIeBdsGi7YRmC+RGqHXYMeUY1dTrc6CZMzEv+5eMAHeeBMQwqBBA0PQoFiruQDJT9M4sUfm0vi6HJDMFU7ls45EfCajmVDrS/Ga3lyONkP7b84DxCPQj5eZFowx8OEiS1NI1bYDAo+uMMgdX/8gsvVJ7qyHSUBO/LBU1rPRU/iUymnX6Sto/r7fRDJczDLfbWQwIDAQAB

privateKey: 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

sign: RnGp3x8JbHp0Ni7hPWFzr52/o36VKCP/YMzOTeCaqUifSAcy0yn+biBTdUgw7MnPwObs3AxWIMfnQZjP3I1Zhvd8yQy+OI+Jhm3F8JBx+kqQ/K19X5C4gTQUsRvLZXUvw8XwAQRuSXO9xc5a8TmI/eomDRLsWlCDO03Pkzp2R3Ncdswop+IfWzC5u8wnTPRsfnLh2hZromK9zu3ShFf6p91rtOSr5iaX7DzGT8a0rNt5vyW/tIMzDRKYPvOPcxzJbrXHIPz2u3Av53smWwS/g8bae4IRBkA7ncE9/2HDf0INwy05rG7yI4ueHgNHmDdKZ+eX1AtHxeBUm0303ZtZag==

verify: true

作用

主要用于企业间的数据传输通信,防止数据被篡改。

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值