国产探花免费观看_亚洲丰满少妇自慰呻吟_97日韩有码在线_资源在线日韩欧美_一区二区精品毛片,辰东完美世界有声小说,欢乐颂第一季,yy玄幻小说排行榜完本

首頁 > 學院 > 開發設計 > 正文

java與IOS之間的RSA加解密

2019-11-14 19:48:01
字體:
來源:轉載
供稿:網友

    很簡單的一個需求,ipad端給密碼RSA加密,傳到java后臺,解密。RSA加密算法是基于一個密鑰對的,分為公鑰和私鑰,一般情況公鑰加密,私鑰解密,但也可私鑰加密,公鑰解密。還可以驗簽,就是先用私鑰對數據進行加密,然后對加密后的數據進行簽名,得到一個簽名值。然后再用公鑰先驗簽,證明是對應私鑰加密過的數據才解密。主要是為了防止來源不確定的數據。     根據上面的介紹,大家也都知道,RSA算法的關鍵就是密鑰對,我和IOS的同事各自找了RSA的算法實現代碼,都能正常根據密鑰對加解密。問題是我們各自使用對方的密鑰對就不能加解密成功。IOS同事也是一個新手。連RSA算法是個什么概念都沒搞清楚,我也懂點IOS。所以就陪著他一起看代碼,找資料??吹降资裁丛蛞鸬拿荑€對不能共用。后來找到下面這篇文章: Java中使用OpenSSL生成的RSA公私鑰進行數據加解密
原來在用mac 系統中自帶的openssl生成的密鑰對文件是X509編碼格式的。而我們JAVA所需的私鑰文件是PKCS#8編碼格式的。。所以要將在mac 系統中生成的私鑰文件轉下碼就行了。轉碼方式參考上面鏈接。附下java代碼:

Java代碼 復制代碼 收藏代碼
  1. import java.io.BufferedReader;  
  2. import java.io.IOException;  
  3. import java.io.InputStream;  
  4. import java.io.InputStreamReader;  
  5. import java.security.InvalidKeyException;  
  6. import java.security.KeyFactory;  
  7. import java.security.KeyPair;  
  8. import java.security.KeyPairGenerator;  
  9. import java.security.NoSuchAlgorithmException;  
  10. import java.security.SecureRandom;  
  11. import java.security.interfaces.RSAPRivateKey;  
  12. import java.security.interfaces.RSAPublicKey;  
  13. import java.security.spec.InvalidKeySpecException;  
  14. import java.security.spec.PKCS8EncodedKeySpec;  
  15. import java.security.spec.X509EncodedKeySpec;  
  16.   
  17. import javax.crypto.BadPaddingException;  
  18. import javax.crypto.Cipher;  
  19. import javax.crypto.IllegalBlockSizeException;  
  20. import javax.crypto.NoSuchPaddingException;  
  21.   
  22. import sun.misc.BASE64Decoder;  
  23. import sun.misc.BASE64Encoder;  
  24.   
  25. public class RSAEncrypt {  
  26.     private static final String DEFAULT_PUBLIC_KEY=     
  27.         "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQChDzcjw/rWgFwnxunbKp7/4e8w" + "/r" +    
  28.         "/UmXx2jk6qEEn69t6N2R1i/LmcyDT1xr/T2AHGOiXNQ5V8W4iCaaeNawi7aJaRht" + "/r" +    
  29.         "Vx1uOH/2U378fscEESEG8XDqll0GCfB1/TjKI2aitVSzXOtRs8kYgGU78f7VmDNg" + "/r" +    
  30.         "XIlk3gdhnzh+uoEQywIDAQAB" + "/r";    
  31.         
  32.     private static final String DEFAULT_PRIVATE_KEY=    
  33.         "MIICdQIBADANBgkqhkiG9w0BAQEFAASCAl8wggJbAgEAAoGBAKEPNyPD+taAXCfG" + "/r" +    
  34.         "6dsqnv/h7zD9SZfHaOTqoQSfr23o3ZHWL8uZzINPXGv9PYAcY6Jc1DlXxbiIJpp4" + "/r" +    
  35.         "1rCLtolpGG1XHW44f/ZTfvx+xwQRIQbxcOqWXQYJ8HX9OMojZqK1VLNc61GzyRiA" + "/r" +    
  36.         "ZTvx/tWYM2BciWTeB2GfOH66gRDLAgMBAAECgYBp4qTvoJKynuT3SbDJY/XwaEtm" + "/r" +    
  37.         "u768SF9P0GlXrtwYuDWjAVue0VhBI9WxMWZTaVafkcP8hxX4QZqPh84td0zjcq3j" + "/r" +    
  38.         "DLOegAFJkIorGzq5FyK7ydBoU1TLjFV459c8dTZMTu+LgsOTD11/V/Jr4NJxIudo" + "/r" +    
  39.         "MBQ3c4cHmOoYv4uzkQJBANR+7Fc3e6oZgqTOesqPSPqljbsdF9E4x4eDFuOecCkJ" + "/r" +    
  40.         "DvVLOOoAzvtHfAiUp+H3fk4hXRpALiNBEHiIdhIuX2UCQQDCCHiPHFd4gC58yyCM" + "/r" +    
  41.         "6Leqkmoa+6YpfRb3oxykLBXcWx7DtbX+ayKy5OQmnkEG+MW8XB8wAdiUl0/tb6cQ" + "/r" +    
  42.         "FaRvAkBhvP94Hk0DMDinFVHlWYJ3xy4pongSA8vCyMj+aSGtvjzjFnZXK4gIjBjA" + "/r" +    
  43.         "2Z9ekDfIOBBawqp2DLdGuX2VXz8BAkByMuIh+KBSv76cnEDwLhfLQJlKgEnvqTvX" + "/r" +    
  44.         "TB0TUw8avlaBAXW34/5sI+NUB1hmbgyTK/T/IFcEPXpBWLGO+e3pAkAGWLpnH0Zh" + "/r" +    
  45.         "Fae7oAqkMAd3xCNY6ec180tAe57hZ6kS+SYLKwb4gGzYaCxc22vMtYksXHtUeamo" + "/r" +    
  46.         "1NMLzI2ZfUoX" + "/r";    
  47.     
  48.     /**  
  49.      * 私鑰  
  50.      */    
  51.     private RSAPrivateKey privateKey;    
  52.     
  53.     /**  
  54.      * 公鑰  
  55.      */    
  56.     private RSAPublicKey publicKey;    
  57.         
  58.     /**  
  59.      * 字節數據轉字符串專用集合  
  60.      */    
  61.     private static final char[] HEX_CHAR= {'0', '1', '2', '3', '4', '5', '6', '7', '8', '9', 'a', 'b', 'c', 'd', 'e', 'f'};    
  62.         
  63.     
  64.     /**  
  65.      * 獲取私鑰  
  66.      * @return 當前的私鑰對象  
  67.      */    
  68.     public RSAPrivateKey getPrivateKey() {    
  69.         return privateKey;    
  70.     }    
  71.     
  72.     /**  
  73.      * 獲取公鑰  
  74.      * @return 當前的公鑰對象  
  75.      */    
  76.     public RSAPublicKey getPublicKey() {    
  77.         return publicKey;    
  78.     }    
  79.     
  80.     /**  
  81.      * 隨機生成密鑰對  
  82.      */    
  83.     public void genKeyPair(){    
  84.         KeyPairGenerator keyPairGen= null;    
  85.         try {    
  86.             keyPairGen= KeyPairGenerator.getInstance("RSA");    
  87.         } catch (NoSuchAlgorithmException e) {    
  88.             e.printStackTrace();    
  89.         }    
  90.         keyPairGen.initialize(1024, new SecureRandom());    
  91.         KeyPair keyPair= keyPairGen.generateKeyPair();    
  92.         this.privateKey= (RSAPrivateKey) keyPair.getPrivate();    
  93.         this.publicKey= (RSAPublicKey) keyPair.getPublic();    
  94.     }    
  95.     
  96.     /**  
  97.      * 從文件中輸入流中加載公鑰  
  98.      * @param in 公鑰輸入流  
  99.      * @throws Exception 加載公鑰時產生的異常  
  100.      */    
  101.     public void loadPublicKey(InputStream in) throws Exception{    
  102.         try {    
  103.             BufferedReader br= new BufferedReader(new InputStreamReader(in));    
  104.             String readLine= null;    
  105.             StringBuilder sb= new StringBuilder();    
  106.             while((readLine= br.readLine())!=null){    
  107.                 if(readLine.charAt(0)=='-'){    
  108.                     continue;    
  109.                 }else{    
  110.                     sb.append(readLine);    
  111.                     sb.append('/r');    
  112.                 }    
  113.             }    
  114.             loadPublicKey(sb.toString());    
  115.         } catch (IOException e) {    
  116.             throw new Exception("公鑰數據流讀取錯誤");    
  117.         } catch (NullPointerException e) {    
  118.             throw new Exception("公鑰輸入流為空");    
  119.         }    
  120.     }    
  121.     
  122.     
  123.     /**  
  124.      * 從字符串中加載公鑰  
  125.      * @param publicKeyStr 公鑰數據字符串  
  126.      * @throws Exception 加載公鑰時產生的異常  
  127.      */    
  128.     public void loadPublicKey(String publicKeyStr) throws Exception{    
  129.         try {    
  130.             BASE64Decoder base64Decoder= new BASE64Decoder();    
  131.             byte[] buffer= base64Decoder.decodeBuffer(publicKeyStr);  
  132.             KeyFactory keyFactory= KeyFactory.getInstance("RSA");    
  133.             X509EncodedKeySpec keySpec= new X509EncodedKeySpec(buffer);    
  134.             this.publicKey= (RSAPublicKey) keyFactory.generatePublic(keySpec);    
  135.         } catch (NoSuchAlgorithmException e) {    
  136.             throw new Exception("無此算法");    
  137.         } catch (InvalidKeySpecException e) {    
  138.             throw new Exception("公鑰非法");    
  139.         } catch (IOException e) {    
  140.             throw new Exception("公鑰數據內容讀取錯誤");    
  141.         } catch (NullPointerException e) {    
  142.             throw new Exception("公鑰數據為空");    
  143.         }    
  144.     }    
  145.     
  146.     /**  
  147.      * 從文件中加載私鑰  
  148.      * @param keyFileName 私鑰文件名  
  149.      * @return 是否成功  
  150.      * @throws Exception   
  151.      */    
  152.     public void loadPrivateKey(InputStream in) throws Exception{    
  153.         try {    
  154.             BufferedReader br= new BufferedReader(new InputStreamReader(in));    
  155.             String readLine= null;    
  156.             StringBuilder sb= new StringBuilder();    
  157.             while((readLine= br.readLine())!=null){    
  158.                 if(readLine.charAt(0)=='-'){    
  159.                     continue;    
  160.                 }else{    
  161.                     sb.append(readLine);    
  162.                     sb.append('/r');    
  163.                 }    
  164.             }    
  165.             loadPrivateKey(sb.toString());    
  166.         } catch (IOException e) {    
  167.             throw new Exception("私鑰數據讀取錯誤");    
  168.         } catch (NullPointerException e) {    
  169.             throw new Exception("私鑰輸入流為空");    
  170.         }    
  171.     }    
  172.     
  173.     public void loadPrivateKey(String privateKeyStr) throws Exception{    
  174.         try {    
  175.             BASE64Decoder base64Decoder= new BASE64Decoder();    
  176.             byte[] buffer= base64Decoder.decodeBuffer(privateKeyStr);    
  177.             PKCS8EncodedKeySpec keySpec= new PKCS8EncodedKeySpec(buffer);    
  178.             KeyFactory keyFactory= KeyFactory.getInstance("RSA");    
  179.             this.privateKey= (RSAPrivateKey) keyFactory.generatePrivate(keySpec);    
  180.         } catch (NoSuchAlgorithmException e) {    
  181.             throw new Exception("無此算法");    
  182.         } catch (InvalidKeySpecException e) {    
  183.             e.printStackTrace();  
  184.             throw new Exception("私鑰非法");    
  185.         } catch (IOException e) {    
  186.             throw new Exception("私鑰數據內容讀取錯誤");    
  187.         } catch (NullPointerException e) {    
  188.             throw new Exception("私鑰數據為空");    
  189.         }    
  190.     }    
  191.     
  192.     /**  
  193.      * 加密過程  
  194.      * @param publicKey 公鑰  
  195.      * @param plainTextData 明文數據  
  196.      * @return  
  197.      * @throws Exception 加密過程中的異常信息  
  198.      */    
  199.     public byte[] encrypt(RSAPublicKey publicKey, byte[] plainTextData) throws Exception{    
  200.         if(publicKey== null){    
  201.             throw new Exception("加密公鑰為空, 請設置");    
  202.         }    
  203.         Cipher cipher= null;    
  204.         try {    
  205.             cipher= Cipher.getInstance("RSA");//, new BouncyCastleProvider());    
  206.             cipher.init(Cipher.ENCRYPT_MODE, publicKey);    
  207.             byte[] output= cipher.doFinal(plainTextData);    
  208.             return output;    
  209.         } catch (NoSuchAlgorithmException e) {    
  210.             throw new Exception("無此加密算法");    
  211.         } catch (NoSuchPaddingException e) {    
  212.             e.printStackTrace();    
  213.             return null;    
  214.         }catch (InvalidKeyException e) {    
  215.             throw new Exception("加密公鑰非法,請檢查");    
  216.         } catch (IllegalBlockSizeException e) {    
  217.             throw new Exception("明文長度非法");    
  218.         } catch (BadPaddingException e) {    
  219.             throw new Exception("明文數據已損壞");    
  220.         }    
  221.     }    
  222.     
  223.     /**  
  224.      * 解密過程  
  225.      * @param privateKey 私鑰  
  226.      * @param cipherData 密文數據  
  227.      * @return 明文  
  228.      * @throws Exception 解密過程中的異常信息  
  229.      */    
  230.     public byte[] decrypt(RSAPrivateKey privateKey, byte[] cipherData) throws Exception{    
  231.         if (privateKey== null){    
  232.             throw new Exception("解密私鑰為空, 請設置");    
  233.         }    
  234.         Cipher cipher= null;    
  235.         try {    
  236.             cipher= Cipher.getInstance("RSA");//, new BouncyCastleProvider());    
  237.             cipher.init(Cipher.DECRYPT_MODE, privateKey);    
  238.             byte[] output= cipher.doFinal(cipherData);    
  239.             return output;    
  240.         } catch (NoSuchAlgorithmException e) {    
  241.             throw new Exception("無此解密算法");    
  242.         } catch (NoSuchPaddingException e) {    
  243.             e.printStackTrace();    
  244.             return null;    
  245.         }catch (InvalidKeyException e) {    
  246.             throw new Exception("解密私鑰非法,請檢查");    
  247.         } catch (IllegalBlockSizeException e) {    
  248.             throw new Exception("密文長度非法");    
  249.         } catch (BadPaddingException e) {    
  250.             throw new Exception("密文數據已損壞");    
  251.         }           
  252.     }    
  253.     
  254.         
  255.     /**  
  256.      * 字節數據轉十六進制字符串  
  257.      * @param data 輸入數據  
  258.      * @return 十六進制內容  
  259.      */    
  260.     public static String byteArrayToString(byte[] data){    
  261.         StringBuilder stringBuilder= new StringBuilder();    
  262.         for (int i=0; i<data.length; i++){    
  263.             //取出字節的高四位 作為索引得到相應的十六進制標識符 注意無符號右移    
  264.             stringBuilder.append(HEX_CHAR[(data[i] & 0xf0)>>> 4]);    
  265.             //取出字節的低四位 作為索引得到相應的十六進制標識符    
  266.             stringBuilder.append(HEX_CHAR[(data[i] & 0x0f)]);    
  267.             if (i<data.length-1){    
  268.                 stringBuilder.append(' ');    
  269.             }    
  270.         }    
  271.         return stringBuilder.toString();    
  272.     }    
  273.     
  274.     
  275.     public static void main(String[] args){    
  276.         RSAEncrypt rsaEncrypt= new RSAEncrypt();    
  277.         //rsaEncrypt.genKeyPair();    
  278.          
  279.     
  280.         //加載公鑰    
  281.         try {    
  282.             rsaEncrypt.loadPublicKey(RSAEncrypt.DEFAULT_PUBLIC_KEY);    
  283.             System.out.println("加載公鑰成功");    
  284.         } catch (Exception e) {    
  285.             System.err.println(e.getMessage());    
  286.             System.err.println("加載公鑰失敗");    
  287.         }    
  288.     
  289.         //加載私鑰    
  290.         try {    
  291.             rsaEncrypt.loadPrivateKey(RSAEncrypt.DEFAULT_PRIVATE_KEY);    
  292.             System.out.println("加載私鑰成功");    
  293.         } catch (Exception e) {    
  294.             System.err.println(e.getMessage());    
  295.             System.err.println("加載私鑰失敗");    
  296.         }    
  297.     
  298.         //測試字符串    
  299.         String encryptStr= "abc";    
  300.         System.out.println("私鑰長度:"+rsaEncrypt.getPrivateKey().toString().length());  
  301.         System.out.println("公鑰長度:"+rsaEncrypt.getPublicKey().toString().length());  
  302.         try {    
  303.             //加密    
  304.             byte[] cipher = rsaEncrypt.encrypt(rsaEncrypt.getPublicKey(), encryptStr.getBytes());    
  305.               
  306.              
  307.             //解密    
  308.             byte[] plainText = rsaEncrypt.decrypt(rsaEncrypt.getPrivateKey(), cipher);    
  309.   
  310.               
  311.              
  312.             System.out.println("密文長度:"+ cipher.length);    
  313.             System.out.println(RSAEncrypt.byteArrayToString(cipher));    
  314.             System.out.println("明文長度:"+ plainText.length);    
  315.             System.out.println(RSAEncrypt.byteArrayToString(plainText));    
  316.             System.out.println(new String(plainText));    
  317.         } catch (Exception e) {    
  318.             System.err.println(e.getMessage());    
  319.         }    
  320.     }  
  321. }  
import java.io.BufferedReader;import java.io.IOException;import java.io.InputStream;import java.io.InputStreamReader;import java.security.InvalidKeyException;import java.security.KeyFactory;import java.security.KeyPair;import java.security.KeyPairGenerator;import java.security.NoSuchAlgorithmException;import java.security.SecureRandom;import java.security.interfaces.RSAPrivateKey;import java.security.interfaces.RSAPublicKey;import java.security.spec.InvalidKeySpecException;import java.security.spec.PKCS8EncodedKeySpec;import java.security.spec.X509EncodedKeySpec;import javax.crypto.BadPaddingException;import javax.crypto.Cipher;import javax.crypto.IllegalBlockSizeException;import javax.crypto.NoSuchPaddingException;import sun.misc.BASE64Decoder;import sun.misc.BASE64Encoder;public class RSAEncrypt {	private static final String DEFAULT_PUBLIC_KEY=           "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQChDzcjw/rWgFwnxunbKp7/4e8w" + "/r" +          "/UmXx2jk6qEEn69t6N2R1i/LmcyDT1xr/T2AHGOiXNQ5V8W4iCaaeNawi7aJaRht" + "/r" +          "Vx1uOH/2U378fscEESEG8XDqll0GCfB1/TjKI2aitVSzXOtRs8kYgGU78f7VmDNg" + "/r" +          "XIlk3gdhnzh+uoEQywIDAQAB" + "/r";            private static final String DEFAULT_PRIVATE_KEY=          "MIICdQIBADANBgkqhkiG9w0BAQEFAASCAl8wggJbAgEAAoGBAKEPNyPD+taAXCfG" + "/r" +          "6dsqnv/h7zD9SZfHaOTqoQSfr23o3ZHWL8uZzINPXGv9PYAcY6Jc1DlXxbiIJpp4" + "/r" +          "1rCLtolpGG1XHW44f/ZTfvx+xwQRIQbxcOqWXQYJ8HX9OMojZqK1VLNc61GzyRiA" + "/r" +          "ZTvx/tWYM2BciWTeB2GfOH66gRDLAgMBAAECgYBp4qTvoJKynuT3SbDJY/XwaEtm" + "/r" +          "u768SF9P0GlXrtwYuDWjAVue0VhBI9WxMWZTaVafkcP8hxX4QZqPh84td0zjcq3j" + "/r" +          "DLOegAFJkIorGzq5FyK7ydBoU1TLjFV459c8dTZMTu+LgsOTD11/V/Jr4NJxIudo" + "/r" +          "MBQ3c4cHmOoYv4uzkQJBANR+7Fc3e6oZgqTOesqPSPqljbsdF9E4x4eDFuOecCkJ" + "/r" +          "DvVLOOoAzvtHfAiUp+H3fk4hXRpALiNBEHiIdhIuX2UCQQDCCHiPHFd4gC58yyCM" + "/r" +          "6Leqkmoa+6YpfRb3oxykLBXcWx7DtbX+ayKy5OQmnkEG+MW8XB8wAdiUl0/tb6cQ" + "/r" +          "FaRvAkBhvP94Hk0DMDinFVHlWYJ3xy4pongSA8vCyMj+aSGtvjzjFnZXK4gIjBjA" + "/r" +          "2Z9ekDfIOBBawqp2DLdGuX2VXz8BAkByMuIh+KBSv76cnEDwLhfLQJlKgEnvqTvX" + "/r" +          "TB0TUw8avlaBAXW34/5sI+NUB1hmbgyTK/T/IFcEPXpBWLGO+e3pAkAGWLpnH0Zh" + "/r" +          "Fae7oAqkMAd3xCNY6ec180tAe57hZ6kS+SYLKwb4gGzYaCxc22vMtYksXHtUeamo" + "/r" +          "1NMLzI2ZfUoX" + "/r";        /**      * 私鑰      */      private RSAPrivateKey privateKey;        /**      * 公鑰      */      private RSAPublicKey publicKey;            /**      * 字節數據轉字符串專用集合      */      private static final char[] HEX_CHAR= {'0', '1', '2', '3', '4', '5', '6', '7', '8', '9', 'a', 'b', 'c', 'd', 'e', 'f'};              /**      * 獲取私鑰      * @return 當前的私鑰對象      */      public RSAPrivateKey getPrivateKey() {          return privateKey;      }        /**      * 獲取公鑰      * @return 當前的公鑰對象      */      public RSAPublicKey getPublicKey() {          return publicKey;      }        /**      * 隨機生成密鑰對      */      public void genKeyPair(){          KeyPairGenerator keyPairGen= null;          try {              keyPairGen= KeyPairGenerator.getInstance("RSA");          } catch (NoSuchAlgorithmException e) {              e.printStackTrace();          }          keyPairGen.initialize(1024, new SecureRandom());          KeyPair keyPair= keyPairGen.generateKeyPair();          this.privateKey= (RSAPrivateKey) keyPair.getPrivate();          this.publicKey= (RSAPublicKey) keyPair.getPublic();      }        /**      * 從文件中輸入流中加載公鑰      * @param in 公鑰輸入流      * @throws Exception 加載公鑰時產生的異常      */      public void loadPublicKey(InputStream in) throws Exception{          try {              BufferedReader br= new BufferedReader(new InputStreamReader(in));              String readLine= null;              StringBuilder sb= new StringBuilder();              while((readLine= br.readLine())!=null){                  if(readLine.charAt(0)=='-'){                      continue;                  }else{                      sb.append(readLine);                      sb.append('/r');                  }              }              loadPublicKey(sb.toString());          } catch (IOException e) {              throw new Exception("公鑰數據流讀取錯誤");          } catch (NullPointerException e) {              throw new Exception("公鑰輸入流為空");          }      }          /**      * 從字符串中加載公鑰      * @param publicKeyStr 公鑰數據字符串      * @throws Exception 加載公鑰時產生的異常      */      public void loadPublicKey(String publicKeyStr) throws Exception{          try {              BASE64Decoder base64Decoder= new BASE64Decoder();              byte[] buffer= base64Decoder.decodeBuffer(publicKeyStr);            KeyFactory keyFactory= KeyFactory.getInstance("RSA");              X509EncodedKeySpec keySpec= new X509EncodedKeySpec(buffer);              this.publicKey= (RSAPublicKey) keyFactory.generatePublic(keySpec);          } catch (NoSuchAlgorithmException e) {              throw new Exception("無此算法");          } catch (InvalidKeySpecException e) {              throw new Exception("公鑰非法");          } catch (IOException e) {              throw new Exception("公鑰數據內容讀取錯誤");          } catch (NullPointerException e) {              throw new Exception("公鑰數據為空");          }      }        /**      * 從文件中加載私鑰      * @param keyFileName 私鑰文件名      * @return 是否成功      * @throws Exception       */      public void loadPrivateKey(InputStream in) throws Exception{          try {              BufferedReader br= new BufferedReader(new InputStreamReader(in));              String readLine= null;              StringBuilder sb= new StringBuilder();              while((readLine= br.readLine())!=null){                  if(readLine.charAt(0)=='-'){                      continue;                  }else{                      sb.append(readLine);                      sb.append('/r');                  }              }              loadPrivateKey(sb.toString());          } catch (IOException e) {              throw new Exception("私鑰數據讀取錯誤");          } catch (NullPointerException e) {              throw new Exception("私鑰輸入流為空");          }      }        public void loadPrivateKey(String privateKeyStr) throws Exception{          try {              BASE64Decoder base64Decoder= new BASE64Decoder();              byte[] buffer= base64Decoder.decodeBuffer(privateKeyStr);              PKCS8EncodedKeySpec keySpec= new PKCS8EncodedKeySpec(buffer);              KeyFactory keyFactory= KeyFactory.getInstance("RSA");              this.privateKey= (RSAPrivateKey) keyFactory.generatePrivate(keySpec);          } catch (NoSuchAlgorithmException e) {              throw new Exception("無此算法");          } catch (InvalidKeySpecException e) {          	e.printStackTrace();            throw new Exception("私鑰非法");          } catch (IOException e) {              throw new Exception("私鑰數據內容讀取錯誤");          } catch (NullPointerException e) {              throw new Exception("私鑰數據為空");          }      }        /**      * 加密過程      * @param publicKey 公鑰      * @param plainTextData 明文數據      * @return      * @throws Exception 加密過程中的異常信息      */      public byte[] encrypt(RSAPublicKey publicKey, byte[] plainTextData) throws Exception{          if(publicKey== null){              throw new Exception("加密公鑰為空, 請設置");          }          Cipher cipher= null;          try {              cipher= Cipher.getInstance("RSA");//, new BouncyCastleProvider());              cipher.init(Cipher.ENCRYPT_MODE, publicKey);              byte[] output= cipher.doFinal(plainTextData);              return output;          } catch (NoSuchAlgorithmException e) {              throw new Exception("無此加密算法");          } catch (NoSuchPaddingException e) {              e.printStackTrace();              return null;          }catch (InvalidKeyException e) {              throw new Exception("加密公鑰非法,請檢查");          } catch (IllegalBlockSizeException e) {              throw new Exception("明文長度非法");          } catch (BadPaddingException e) {              throw new Exception("明文數據已損壞");          }      }        /**      * 解密過程      * @param privateKey 私鑰      * @param cipherData 密文數據      * @return 明文      * @throws Exception 解密過程中的異常信息      */      public byte[] decrypt(RSAPrivateKey privateKey, byte[] cipherData) throws Exception{          if (privateKey== null){              throw new Exception("解密私鑰為空, 請設置");          }          Cipher cipher= null;          try {              cipher= Cipher.getInstance("RSA");//, new BouncyCastleProvider());              cipher.init(Cipher.DECRYPT_MODE, privateKey);              byte[] output= cipher.doFinal(cipherData);              return output;          } catch (NoSuchAlgorithmException e) {              throw new Exception("無此解密算法");          } catch (NoSuchPaddingException e) {              e.printStackTrace();              return null;          }catch (InvalidKeyException e) {              throw new Exception("解密私鑰非法,請檢查");          } catch (IllegalBlockSizeException e) {              throw new Exception("密文長度非法");          } catch (BadPaddingException e) {              throw new Exception("密文數據已損壞");          }             }              /**      * 字節數據轉十六進制字符串      * @param data 輸入數據      * @return 十六進制內容      */      public static String byteArrayToString(byte[] data){          StringBuilder stringBuilder= new StringBuilder();          for (int i=0; i<data.length; i++){              //取出字節的高四位 作為索引得到相應的十六進制標識符 注意無符號右移              stringBuilder.append(HEX_CHAR[(data[i] & 0xf0)>>> 4]);              //取出字節的低四位 作為索引得到相應的十六進制標識符              stringBuilder.append(HEX_CHAR[(data[i] & 0x0f)]);              if (i<data.length-1){                  stringBuilder.append(' ');              }          }          return stringBuilder.toString();      }          public static void main(String[] args){          RSAEncrypt rsaEncrypt= new RSAEncrypt();          //rsaEncrypt.genKeyPair();                   //加載公鑰          try {              rsaEncrypt.loadPublicKey(RSAEncrypt.DEFAULT_PUBLIC_KEY);              System.out.println("加載公鑰成功");          } catch (Exception e) {              System.err.println(e.getMessage());              System.err.println("加載公鑰失敗");          }            //加載私鑰          try {              rsaEncrypt.loadPrivateKey(RSAEncrypt.DEFAULT_PRIVATE_KEY);              System.out.println("加載私鑰成功");          } catch (Exception e) {              System.err.println(e.getMessage());              System.err.println("加載私鑰失敗");          }            //測試字符串          String encryptStr= "abc";          System.out.println("私鑰長度:"+rsaEncrypt.getPrivateKey().toString().length());        System.out.println("公鑰長度:"+rsaEncrypt.getPublicKey().toString().length());        try {              //加密              byte[] cipher = rsaEncrypt.encrypt(rsaEncrypt.getPublicKey(), encryptStr.getBytes());                                     //解密              byte[] plainText = rsaEncrypt.decrypt(rsaEncrypt.getPrivateKey(), cipher);                                     System.out.println("密文長度:"+ cipher.length);              System.out.println(RSAEncrypt.byteArrayToString(cipher));              System.out.println("明文長度:"+ plainText.length);              System.out.println(RSAEncrypt.byteArrayToString(plainText));              System.out.println(new String(plainText));          } catch (Exception e) {              System.err.println(e.getMessage());          }      }}

提供兩種方式加載密鑰對,可通過字符串或者文件流,文件是指生成的.pem文件才可以哦。 另外附一份IOS中加密方法,不過這里要求的文件是der。 http://blog.yorkgu.me/2011/10/27/rsa-in-ios-using-publick-key-generated-by-openssl/ IOS中加密后返回的NSdata對象,可以對NSdata對象進行base64編碼轉換成字符串,然后java用BASE64Decoder解碼之后,就轉換成了byte[],可直接用上面方法解密。。。


發表評論 共有條評論
用戶名: 密碼:
驗證碼: 匿名發表
主站蜘蛛池模板: 武川县| 宾阳县| 昭通市| 凌海市| 宾川县| 萝北县| 天长市| 思茅市| 江阴市| 芒康县| 句容市| 尖扎县| 梅河口市| 尖扎县| 江永县| 娄底市| 仁布县| 双柏县| 石城县| 五峰| 龙川县| 贡嘎县| 栾川县| 当雄县| 开原市| 温宿县| 温泉县| 阿勒泰市| 莱阳市| 西盟| 肇州县| 天全县| 思南县| 马山县| 西吉县| 甘泉县| 逊克县| 本溪| 丹阳市| 嫩江县| 疏附县|