加密方法有对称加密和非对称加密两种。
对称加密是key+明文==加密后的数据
然后服务端得到加密后的数据和key解密得到明文。
这里key是一致的。
非对称加密是key是不一致的。安全,但效率低。
这里需要base64工具类,因为生成的乱码会在传输的过程中出问题。比如说我在这加密了一套算法,服务端那边拿到解密却不是这一套算法,这不是乱套了么,,所以最好规定一套公共的,加密解密都用这种算法才不会出问题。
package com.coder520.mamabike.security; import java.io.ByteArrayOutputStream; import java.io.IOException; import java.io.OutputStream; public class Base64Util { private static final char[] legalChars = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/" .toCharArray(); public static String encode(byte[] data) { byte start = 0; int len = data.length; StringBuffer buf = new StringBuffer(data.length * 3 / 2); int end = len - 3; int i = start; int n = 0; int d; while (i <= end) { d = (data[i] & 255) << 16 | (data[i + 1] & 255) << 8 | data[i + 2] & 255; buf.append(legalChars[d >> 18 & 63]); buf.append(legalChars[d >> 12 & 63]); buf.append(legalChars[d >> 6 & 63]); buf.append(legalChars[d & 63]); i += 3; if (n++ >= 14) { n = 0; buf.append(" "); } } if (i == start + len - 2) { d = (data[i] & 255) << 16 | (data[i + 1] & 255) << 8; buf.append(legalChars[d >> 18 & 63]); buf.append(legalChars[d >> 12 & 63]); buf.append(legalChars[d >> 6 & 63]); buf.append("="); } else if (i == start + len - 1) { d = (data[i] & 255) << 16; buf.append(legalChars[d >> 18 & 63]); buf.append(legalChars[d >> 12 & 63]); buf.append("=="); } return buf.toString(); } private static int decode(char c) { if (c >= 65 && c <= 90) { return c - 65; } else if (c >= 97 && c <= 122) { return c - 97 + 26; } else if (c >= 48 && c <= 57) { return c - 48 + 26 + 26; } else { switch (c) { case '+': return 62; case '/': return 63; case '=': return 0; default: throw new RuntimeException("unexpected code: " + c); } } } public static byte[] decode(String s) { ByteArrayOutputStream bos = new ByteArrayOutputStream(); try { decode(s, bos); } catch (IOException var5) { throw new RuntimeException(); } byte[] decodedBytes = bos.toByteArray(); try { bos.close(); bos = null; } catch (IOException var4) { System.err.println("Error while decoding BASE64: " + var4.toString()); } return decodedBytes; } private static void decode(String s, OutputStream os) throws IOException { int i = 0; int len = s.length(); while (true) { while (i < len && s.charAt(i) <= 32) { ++i; } if (i == len) { break; } int tri = (decode(s.charAt(i)) << 18) + (decode(s.charAt(i + 1)) << 12) + (decode(s.charAt(i + 2)) << 6) + decode(s.charAt(i + 3)); os.write(tri >> 16 & 255); if (s.charAt(i + 2) == 61) { break; } os.write(tri >> 8 & 255); if (s.charAt(i + 3) == 61) { break; } os.write(tri & 255); i += 4; } } }
package com.coder520.mamabike.security; import org.springframework.stereotype.Component; import javax.crypto.*; import javax.crypto.spec.IvParameterSpec; import javax.crypto.spec.SecretKeySpec; import java.io.UnsupportedEncodingException; import java.security.InvalidKeyException; import java.security.NoSuchAlgorithmException; import java.security.SecureRandom; /** * Created by JackWangon[www.coder520.com] 2017/7/31. */ public class AESUtil { public static final String KEY_ALGORITHM = "AES"; public static final String KEY_ALGORITHM_MODE = "AES/CBC/PKCS5Padding"; /** * AES对称加密 * @param data * @param key key需要16位 * @return */ public static String encrypt(String data , String key) { try { SecretKeySpec spec = new SecretKeySpec(key.getBytes("UTF-8"),KEY_ALGORITHM); Cipher cipher = Cipher.getInstance(KEY_ALGORITHM_MODE); cipher.init(Cipher.ENCRYPT_MODE , spec,new IvParameterSpec(new byte[cipher.getBlockSize()])); byte[] bs = cipher.doFinal(data.getBytes("UTF-8")); return Base64Util.encode(bs); } catch (Exception e) { e.printStackTrace(); } return null; } /** * AES对称解密 key需要16位 * @param data * @param key * @return */ public static String decrypt(String data, String key) { try { SecretKeySpec spec = new SecretKeySpec(key.getBytes("UTF-8"), KEY_ALGORITHM); Cipher cipher = Cipher.getInstance(KEY_ALGORITHM_MODE); cipher.init(Cipher.DECRYPT_MODE , spec , new IvParameterSpec(new byte[cipher.getBlockSize()])); byte[] originBytes = Base64Util.decode(data); byte[] result = cipher.doFinal(originBytes); return new String(result,"UTF-8"); } catch (Exception e) { e.printStackTrace(); } return null; } public static void main(String[] args) throws Exception { String s="123456789qazwsx"; String encrypt = AESUtil.encrypt(s, "123456789qazwsxc"); System.out.println(encrypt); String decrypt = AESUtil.decrypt(encrypt, "123456789qazwsxc"); System.out.println(decrypt); /*String okey = "123456789abcdefg"; //移动端随机key AES加密数据 String enr= encrypt("{'mobile':'18980840843','code':'8060','platform':'android','channelId':12454348}",okey); System.out.println(enr); //移动端RSA加密AES的key 和加密的数据一起传到服务器 byte[] keyrsa = RSAUtil.encryptByPublicKey(okey.getBytes("UTF-8"),"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCuVRY8B3+Af5euC9WbgNkJKAiBzqOvrYi9mSST78jd4clpn7vkYHDfHzJiqFz9wjNRLzg9MUREF53bw9yhSljZ7F8JPMryfe8RR2Ed6CJq5nCy/2hvTTw4L6ypDemwe9f9yjIg52oPRPwU8lm8Uj3wKhjedDmZrkO1TAmt3sbQtwIDAQAB"); System.out.println(Base64Util.encode(keyrsa)); String base = Base64Util.encode(keyrsa);*/ // //服务端RSA解密AES的key // byte[] keybyte= RSAUtil.decryptByPrivateKey(Base64Util.decode(base)); // String keyR=new String(keybyte,"UTF-8"); // System.out.println(keyR); } }
1。首先通过javax的包,不用引入其他包,里面的类得到公钥和私钥。
public static void main(String[] args) throws Exception { KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance(KEY_ALGORITHM); keyPairGen.initialize(1024); KeyPair keyPair = keyPairGen.generateKeyPair(); PrivateKey privateKey = keyPair.getPrivate(); PublicKey publicKey = keyPair.getPublic(); System.out.println(Base64Util.encode(privateKey.getEncoded())); //私钥 System.out.println(Base64Util.encode(publicKey.getEncoded())); //公钥 }
2。然后通过公钥加密返回一个byte[]数组。 注意:这里第一个参数传的数组需要加密的key.getBytes(“UTF-8”)得到,第二个参数就是字符串的公钥
/** * * @param data * @param key * @return 公钥加密 * @throws Exception */ public static byte[] encryptByPublicKey(byte[] data, String key) throws Exception { byte[] keyBytes = Base64Util.decode(key); X509EncodedKeySpec pkcs8KeySpec = new X509EncodedKeySpec(keyBytes); KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM); Key publicKey = keyFactory.generatePublic(pkcs8KeySpec); // Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm()); Cipher cipher = Cipher.getInstance("RSA/ECB/PKCS1Padding"); cipher.init(Cipher.ENCRYPT_MODE, publicKey); return cipher.doFinal(data); }
3。然后通过返回加密返回的byte[]数组和私钥解密,返回的还是byte[]数组,new String(bytes1,”UTF-8”)这种解密就可以得到字符串key。
/** * 私钥解密 * * @param data * @return * @throws Exception */ public static byte[] decryptByPrivateKey(byte[] data) throws Exception { convert(); //先读取私钥 byte[] keyBytes = Base64Util.decode(PRIVATE_KEY); PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes); KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM); Key privateKey = keyFactory.generatePrivate(pkcs8KeySpec); Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm()); cipher.init(Cipher.DECRYPT_MODE, privateKey); return cipher.doFinal(data); }
main函数测试
public static void main(String[] args) throws Exception { String data="孙悟空来了----"; String key="MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCoxN+GpRBuQT1+J72rVtyX GADOn1peU7kaLQ+CLxisx3+n9sdUWnF85Av6miE829NQ4G6R1J7wt2JnuMir 89/BHBie4L19H8qMnVpyWEVBtGWiy8A/Zw9IdL21v1+e1v1NEUIVvws/nyrf +shjI/jIVajz6h1Ql/z/aDpl1KMYLwIDAQAB"; //公钥加密 byte[] bytes = encryptByPublicKey(data.getBytes("UTF-8"), key); //私钥解密 byte[] bytes1 = decryptByPrivateKey(bytes); System.out.println(new String(bytes1,"UTF-8")); }
第一:采用对称方法拿到加密过后的数据。但是key在http协议中传输不安全,然后采用非对称加密的方法来加密key。把加密后的数据和加密后的key传到服务端。注意:加密后的key使用RSAUtil.encryptByPublicKey()方法返回的是数组,需要传字符串,所以需要用Base64Util.encode(bytes)来得到字符串。。。不然乱码!!!!!!!!!!!
第二:服务端拿到加密后的key之后,将key解密出来。然后再根据key和加密的数据来解密加密过的数据。
String okey="123456789abcdefg"; String enr= encrypt("{'mobile':'15515664xxx','code':'8888','platform':'android'}",okey); System.out.println(enr);//加密后的数据 byte[] bytes = RSAUtil.encryptByPublicKey(okey.getBytes("UTF-8"), "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCoxN+GpRBuQT1+J72rVtyX GADOn1peU7kaLQ+CLxisx3+n9sdUWnF85Av6miE829NQ4G6R1J7wt2JnuMir 89/BHBie4L19H8qMnVpyWEVBtGWiy8A/Zw9IdL21v1+e1v1NEUIVvws/nyrf +shjI/jIVajz6h1Ql/z/aDpl1KMYLwIDAQAB"); System.out.println(Base64Util.encode(bytes));//公钥加密的key
这个就是客户端传送的加密后的数据,和公钥加密的key。
服务器端先解密key,然后再解密加密的数据。
//RSA解密AES的key byte[] aesKey = RSAUtil.decryptByPrivateKey(Base64Util.decode(key)); //AES的key解密AES加密数据 decryptData = AESUtil.decrypt(data, new String(aesKey, "UTF-8"));
首先我需要传送一个加密的数据和一个公钥加密的key。但是公钥加密的key返回的是数组,所以我需要用Base64来转成字符串。
然后后台接收到字符串后,又用Base64转换成数组然后解密key。得到的还是数组。这时候就不用Bash64了
得到key之后,再解密数据