RSA加密解密
RSAUtil.java
package com.soc.cloud.util; import com.soc.cloud.exception.CommonError; import com.soc.cloud.param.BaseErrResult; import com.soc.cloud.util.redis.RedisParam; import org.springframework.data.redis.core.RedisTemplate; import java.io.ByteArrayOutputStream; import java.math.BigInteger; import java.security.KeyFactory; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.PrivateKey; import java.security.PublicKey; import java.security.SecureRandom; import java.security.interfaces.RSAPrivateKey; import java.security.interfaces.RSAPublicKey; import java.security.spec.InvalidKeySpecException; import java.security.spec.RSAPrivateKeySpec; import java.security.spec.RSAPublicKeySpec; import javax.crypto.Cipher; /** * https://blog.csdn.net/sunansheng/article/details/48155823 * RSA 工具类。提供加密,解密,生成密钥对等方法。 * 需要到http://www.bouncycastle.org下载bcprov-jdk14-123.jar。 * */ public class RSAUtil { private static final KeyPair keyPair = generateKeyPair(); /** * 生成密钥对 * @return * @throws Exception */ public static KeyPair generateKeyPair() { try { KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider()); final int KEY_SIZE = 1024;// 没什么好说的了,这个值关系到块加密的大小,可以更改,但是不要太大,否则效率会低 keyPairGen.initialize(KEY_SIZE, new SecureRandom()); KeyPair keyPair = keyPairGen.generateKeyPair(); return keyPair; } catch (Exception e) { throw new RuntimeException(e); } } /** * 生成公钥 * @param modulus * @param publicExponent * @return * @throws Exception */ public static RSAPublicKey generateRSAPublicKey(byte[] modulus, byte[] publicExponent) throws Exception { KeyFactory keyFac = null; try { keyFac = KeyFactory.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider()); } catch (NoSuchAlgorithmException ex) { throw new Exception(ex.getMessage()); } RSAPublicKeySpec pubKeySpec = new RSAPublicKeySpec(new BigInteger( modulus), new BigInteger(publicExponent)); try { return (RSAPublicKey) keyFac.generatePublic(pubKeySpec); } catch (InvalidKeySpecException ex) { throw new Exception(ex.getMessage()); } } /** * 生成私钥 * @param modulus * @param privateExponent * @return * @throws Exception */ public static RSAPrivateKey generateRSAPrivateKey(byte[] modulus, byte[] privateExponent) throws Exception { KeyFactory keyFac = null; try { keyFac = KeyFactory.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider()); } catch (NoSuchAlgorithmException ex) { throw new Exception(ex.getMessage()); } RSAPrivateKeySpec priKeySpec = new RSAPrivateKeySpec(new BigInteger( modulus), new BigInteger(privateExponent)); try { return (RSAPrivateKey) keyFac.generatePrivate(priKeySpec); } catch (InvalidKeySpecException ex) { throw new Exception(ex.getMessage()); } } /** * * 加密 * * * @param pk * 加密的密钥 * * @param data * 待加密的明文数据 * * @return 加密后的数据 * * @throws Exception */ public static byte[] encrypt(PublicKey pk, byte[] data) throws Exception { try { Cipher cipher = Cipher.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider()); cipher.init(Cipher.ENCRYPT_MODE, pk); int blockSize = cipher.getBlockSize();// 获得加密块大小,如:加密前数据为128个byte,而key_size=1024 // 加密块大小为127 // byte,加密后为128个byte;因此共有2个加密块,第一个127 // byte第二个为1个byte int outputSize = cipher.getOutputSize(data.length);// 获得加密块加密后块大小 int leavedSize = data.length % blockSize; int blocksSize = leavedSize != 0 ? data.length / blockSize + 1 : data.length / blockSize; byte[] raw = new byte[outputSize * blocksSize]; int i = 0; while (data.length - i * blockSize > 0) { if (data.length - i * blockSize > blockSize) cipher.doFinal(data, i * blockSize, blockSize, raw, i * outputSize); else cipher.doFinal(data, i * blockSize, data.length - i * blockSize, raw, i * outputSize); // 这里面doUpdate方法不可用,查看源代码后发现每次doUpdate后并没有什么实际动作除了把byte[]放到 // ByteArrayOutputStream中,而最后doFinal的时候才将所有的byte[]进行加密,可是到了此时加密块大小很可能已经超出了 // OutputSize所以只好用dofinal方法。 i++; } return raw; } catch (Exception e) { throw new Exception(e.getMessage()); } } /** * * 解密 * * * @param pk * 解密的密钥 * * @param raw * 已经加密的数据 * * @return 解密后的明文 * * @throws Exception */ public static byte[] decrypt(PrivateKey pk, byte[] raw) throws Exception { try { Cipher cipher = Cipher.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider()); cipher.init(cipher.DECRYPT_MODE, pk); int blockSize = cipher.getBlockSize(); ByteArrayOutputStream bout = new ByteArrayOutputStream(64); int j = 0; while (raw.length - j * blockSize > 0) { bout.write(cipher.doFinal(raw, j * blockSize, blockSize)); j++; } return bout.toByteArray(); } catch (Exception e) { throw new Exception(e.getMessage()); } } /** * RSA 公用加密,用秘钥解密,然后base64加密返回 * @param password * @param keyPair * @return * @throws Exception */ public static String passwordEncrypt(String password, KeyPair keyPair ) throws Exception { return passwordEncrypt(true,password,keyPair); } /** * RSA 公用加密,用秘钥解密,然后base64加密返回 * @return */ public static String passwordEncrypt(boolean passwordVerify,String password, KeyPair keyPair ) throws Exception { // byte[] en_result = new BigInteger(password, 16).toByteArray(); byte[] en_result = hexStringToBytes(password ) ; byte[] de_result = RSAUtil.decrypt(keyPair.getPrivate(),en_result); StringBuffer sb = new StringBuffer(); sb.append(new String(de_result)); String rsaPsaaword = sb.reverse().toString(); // if (passwordVerify){ // boolean psaawordBl = StringUtil.validateKey(rsaPsaaword); // if (psaawordBl){ // CommonError.CommonErr(new BaseErrResult("11001", "键盘上连续排序的密码,连续不得超过3位")); // } // } String psaaword = EncryptUtils.encodeMD5String( EncryptUtils.encodeBase64String(rsaPsaaword)); return psaaword; } /** * RSA 公用加密,用秘钥解密, 返回真实密码 * @return */ public static String originalPasswordEncrypt(String password, KeyPair keyPair ) throws Exception { byte[] en_result = hexStringToBytes(password ) ; byte[] de_result = RSAUtil.decrypt(keyPair.getPrivate(),en_result); StringBuffer sb = new StringBuffer(); sb.append(new String(de_result)); String rsaPsaaword = sb.reverse().toString(); return rsaPsaaword; } /** * 16进制 To byte[] * @param hexString * @return byte[] */ public static byte[] hexStringToBytes(String hexString) { if (hexString == null || hexString.equals("")) { return null; } hexString = hexString.toUpperCase(); int length = hexString.length() / 2; char[] hexChars = hexString.toCharArray(); byte[] d = new byte[length]; for (int i = 0; i < length; i++) { int pos = i * 2; d[i] = (byte) (charToByte(hexChars[pos]) << 4 | charToByte(hexChars[pos + 1])); } return d; } /** * Convert char to byte * @param c char * @return byte */ private static byte charToByte(char c) { return (byte) "0123456789ABCDEF".indexOf(c); } }
获取RSA公钥,将 秘钥对 存redis里
@Autowired RedisTemplateredisRsa; public static final String RSA_KEY_PAIR= "RSA_KEY_PAIR_";//每次RSA加密对应的秘钥 /** * */ @RequestMapping(value = "/getRsaPublicKey", method = { RequestMethod.GET }) @ResponseBody @SystemControllerLog(description = "获取RSA公钥", moduleName = "获取RSA公钥") public BaseResult getRsaPublicKey() throws Exception { KeyPair keyPair = RSAUtil.generateKeyPair();-- 获取秘钥对 redisRsa.opsForValue().set(RedisParam.RSA_KEY_PAIR, keyPair); Mapmap = new HashMap (2); RSAPublicKey rsap = (RSAPublicKey) keyPair.getPublic(); map.put("modulus", rsap.getModulus().toString(16)); map.put("e", rsap.getPublicExponent().toString(16)); return new BaseResult("0", "成功", map); }
公钥加密
@Autowired RedisTemplateredisRsa; @Override public User login(String loginId, String password) throws Exception { User user = userMapper.getUserByLoginId(loginId); KeyPair keyPair = (KeyPair) redisRsa.opsForValue().get(RedisParam.RSA_KEY_PAIR); -- redis里获取秘钥对 //rsa加密登陆密码 做对比 String nUserPassWord = RSAUtil.passwordEncrypt(false,password,keyPair); if(user==null||!user.getUserPassword().equals(nUserPassWord)){ // 登陆失败 CommonError.CommonErr(AdminResultParam.USER_PASSUSER_ERR.getErrResult()); } return user; }
解密同理