使用Openssl产生1016bit RSA CRT密钥并读取数据的方法

1016bit RSA是比较特别的密钥长度,因为它的字节长度为127,是奇数,目前网上很多工具都没有支持这个长度。所以这次使用Openssl产生一下,并记录学习。

前提,电脑中已经安装了openssl环境,然后打开终端或者命令行,输入命令。

openssl genpkey -algorithm RSA -out private_key.pem -pkeyopt rsa_keygen_bits:1016 -pkeyopt rsa_keygen_pubexp:65537

在这里插入图片描述
输出文件结果
在这里插入图片描述
再输入命令,生成公钥

openssl rsa -in private_key.pem -outform PEM -pubout -out public_key.pem -RSAPublicKey_out -text

在这里插入图片描述
在这里插入图片描述
再将CRT私钥显示到界面上

openssl rsa -in private_key.pem -text
PS C:\Users\tians\Desktop\223> openssl rsa -in private_key.pem -text
Private-Key: (1016 bit, 2 primes)
modulus:
    00:a9:f4:6b:c8:be:ab:18:99:2c:e8:24:03:bd:bf:
    ec:42:a1:8d:b8:b7:c1:52:fe:04:30:04:df:c7:e5:
    c1:d9:c9:54:f4:5a:c1:8a:75:df:6e:28:d0:02:a3:
    2d:b5:98:83:ae:b8:5e:41:cd:0b:96:50:34:dd:22:
    f6:1a:6b:7a:39:af:48:95:d9:53:7f:98:2a:47:a2:
    38:05:b2:e1:a0:1a:fd:c2:f2:f6:b3:f4:4f:9d:46:
    89:fa:ce:07:b5:78:5e:82:2e:e7:35:ff:86:41:3a:
    d8:0c:8e:62:a3:dc:97:bb:ba:c0:d5:a2:66:82:74:
    34:ff:7f:54:d7:5c:0c:e9
publicExponent: 65537 (0x10001)
privateExponent:
    00:90:48:0d:3c:e6:09:70:9f:91:4d:1e:4e:02:c7:
    ad:36:3f:da:85:c7:92:1a:f7:c4:ec:53:26:fb:98:
    25:02:d3:f6:08:60:07:d0:99:12:ee:7d:3d:62:0f:
    cf:dd:4b:b5:f7:1d:53:ff:be:a8:28:9a:bc:d6:43:
    38:f4:e2:eb:51:60:11:62:a0:38:f4:bb:06:be:dd:
    29:28:a0:92:fb:c3:c3:35:d6:d8:7e:3c:47:8d:08:
    ae:f8:ed:7f:84:11:51:8f:65:15:2d:d2:68:55:59:
    1e:67:3d:37:6c:be:13:aa:4b:be:1b:bc:66:01:f7:
    32:88:e0:2b:25:45:52:91
prime1:
    0d:f1:24:7b:33:03:ff:dd:5b:1e:3e:e2:ed:f6:18:
    a0:1a:0f:f4:f2:71:e7:10:82:1c:50:c5:de:6d:40:
    68:c3:00:7d:c2:77:c9:98:24:be:3f:98:53:ce:f9:
    ff:0b:84:5e:4c:b7:9f:e0:71:d6:23:90:d0:00:c9:
    ff:32:ff:f5
prime2:
    0c:30:ae:60:b8:27:f8:43:a7:27:7e:23:a2:83:33:
    c6:71:6f:2f:42:2c:2a:7f:b2:e7:07:50:b1:dc:86:
    f7:86:b5:28:3b:70:3e:2f:a6:58:f8:4b:ca:03:6a:
    b6:ed:f5:df:b1:ae:87:e6:c9:0e:5f:13:e9:b0:a6:
    61:80:44:a5
exponent1:
    00:ab:1c:fa:a3:19:7f:fc:d6:cf:7e:68:56:cc:43:
    a5:f9:59:e6:7e:71:23:88:d1:14:16:73:46:14:aa:
    cf:da:f9:7d:0e:03:bc:30:85:22:71:de:15:b6:88:
    99:c7:ad:92:ef:ce:a5:e5:96:cf:93:68:ef:ef:f9:
    bf:38:6c:b9
exponent2:
    0a:5c:08:a5:5b:7b:64:49:a2:31:36:ca:73:de:8a:
    4e:97:b2:04:78:78:ee:39:0d:c1:b6:7e:c6:58:82:
    3e:b3:35:1b:16:c0:41:a8:de:f6:77:34:79:5e:43:
    ff:67:e4:ef:10:a2:21:0e:69:49:14:55:e8:e0:5d:
    d5:38:5b:9d
coefficient:
    08:a8:6b:21:14:8d:4f:80:11:0a:74:62:65:38:8a:
    a7:5d:d4:d4:8a:35:f6:3e:a9:65:4b:0f:a2:6f:d4:
    1d:03:bb:aa:f6:e9:dc:83:c7:7b:02:8f:43:62:3d:
    dd:ba:2b:42:18:61:1d:93:f1:b1:69:16:30:0b:c1:
    de:49:84:dc
writing RSA key
-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----

完成

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值