RSA加密解密坑

1、用NODE RSA JS 加密解密正常,用JAVA RSAUtils工具類加密解密正常。但是用node加密玩的java解密不了。原因:node默認的是

DEFAULT_ENCRYPTION_SCHEME = 'pkcs1_oaep'

     而java中默認的是pkcs1。

     另:NODE-RSA中其它的默認值:

      

 var SUPPORTED_HASH_ALGORITHMS = {
        node10: ['md4', 'md5', 'ripemd160', 'sha', 'sha1', 'sha224', 'sha256', 'sha384', 'sha512'],
        node: ['md4', 'md5', 'ripemd160', 'sha', 'sha1', 'sha224', 'sha256', 'sha384', 'sha512'],
        iojs: ['md4', 'md5', 'ripemd160', 'sha', 'sha1', 'sha224', 'sha256', 'sha384', 'sha512'],
        browser: ['md5', 'ripemd160', 'sha1', 'sha256', 'sha512']
    };

    var DEFAULT_ENCRYPTION_SCHEME = 'pkcs1_oaep';
    var DEFAULT_SIGNING_SCHEME = 'pkcs1';

    var DEFAULT_EXPORT_FORMAT = 'private';
    var EXPORT_FORMAT_ALIASES = {
        'private': 'pkcs1-private-pem',
        'private-der': 'pkcs1-private-der',
        'public': 'pkcs8-public-pem',
        'public-der': 'pkcs8-public-der',
    };



2、java 中用的方法類RSAUtils中用的是從網上找來的類,裏面密鑰都是通過pkcs8加密的,所以要讓node的代碼和java的代碼一致。

Node:

var NodeRSA = require('node-rsa');

var key=new NodeRSA({b: 1024});
key.setOptions({encryptionScheme: 'pkcs1'})

var publicDer = key.exportKey('public-der');
var privateDer = key.exportKey('pkcs8-private-der');

var publicKeyStr=publicDer.toString('base64')
var privateKeyStr=privateDer.toString('base64')

console.log(publicKeyStr)
console.log(privateKeyStr)

var str="馬志宇|marsyoung|0907__"
// var y=key.encrypt(str,'base64')
// console.log(y)

var key2 = new NodeRSA();
key2.setOptions({encryptionScheme: 'pkcs1'})
key2.importKey("-----BEGIN PRIVATE KEY-----\n"+privateKeyStr+"-----END PRIVATE KEY-----","pkcs8-private")
var x=key2.encrypt(str, 'base64');
console.log(x)
console.log(key2.decrypt(x,'utf8'))

Java:(有點坑的類,網上還有更加新的)

package mobi.mixiong.util;

import org.apache.commons.codec.binary.Base64;

import javax.crypto.Cipher;
import java.io.ByteArrayOutputStream;
import java.security.Key;
import java.security.KeyFactory;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.Signature;
import java.security.interfaces.RSAPrivateKey;
import java.security.interfaces.RSAPublicKey;
import java.security.spec.PKCS8EncodedKeySpec;
import java.security.spec.X509EncodedKeySpec;
import java.util.HashMap;
import java.util.Map;


public class RSAUtils {

    /** *//**
     * 加密算法RSA
     */
    public static final String KEY_ALGORITHM = "RSA";
    
    /** *//**
     * 簽名算法
     */
    public static final String SIGNATURE_ALGORITHM = "MD5withRSA";

    /** *//**
     * 獲取公鑰的key
     */
    private static final String PUBLIC_KEY = "RSAPublicKey";
    
    /** *//**
     * 獲取私鑰的key
     */
    private static final String PRIVATE_KEY = "RSAPrivateKey";
    
    /** *//**
     * RSA最大加密明文大小
     */
    private static final int MAX_ENCRYPT_BLOCK = 117;
    
    /** *//**
     * RSA最大解密密文大小
     */
    private static final int MAX_DECRYPT_BLOCK = 128;

    public static Map<String, Object> genKeyPair() throws Exception {
        KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance(KEY_ALGORITHM);
        keyPairGen.initialize(1024);
        KeyPair keyPair = keyPairGen.generateKeyPair();
        RSAPublicKey publicKey = (RSAPublicKey) keyPair.getPublic();
        RSAPrivateKey privateKey = (RSAPrivateKey) keyPair.getPrivate();
        Map<String, Object> keyMap = new HashMap<String, Object>(2);
        keyMap.put(PUBLIC_KEY, publicKey);
        keyMap.put(PRIVATE_KEY, privateKey);
        return keyMap;
    }

    public static String sign(byte[] data, String privateKey) throws Exception {
        byte[] keyBytes =Base64.decodeBase64(privateKey);
        PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);
        KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
        PrivateKey privateK = keyFactory.generatePrivate(pkcs8KeySpec);
        Signature signature = Signature.getInstance(SIGNATURE_ALGORITHM);
        signature.initSign(privateK);
        signature.update(data);
        return Base64.encodeBase64String(signature.sign());
    }

    public static boolean verify(byte[] data, String publicKey, String sign)
            throws Exception {
        byte[] keyBytes = Base64.decodeBase64(publicKey);
        X509EncodedKeySpec keySpec = new X509EncodedKeySpec(keyBytes);
        KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
        PublicKey publicK = keyFactory.generatePublic(keySpec);
        Signature signature = Signature.getInstance(SIGNATURE_ALGORITHM);
        signature.initVerify(publicK);
        signature.update(data);
        return signature.verify(Base64.decodeBase64(sign));
    }

    public static byte[] decryptByPrivateKey(byte[] encryptedData, String privateKey)
            throws Exception {
        byte[] keyBytes = Base64.decodeBase64(privateKey);
        PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);
        KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
        Key privateK = keyFactory.generatePrivate(pkcs8KeySpec);
        Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
        cipher.init(Cipher.DECRYPT_MODE, privateK);
        int inputLen = encryptedData.length;
        byte[] result = new byte[(encryptedData.length/128 + 1 )*117];
        int offSet = 0;
        byte[] cache;
        int i = 0;
        int len=0;
        // 對數據分段解密
        while (inputLen - offSet > 0) {
            if (inputLen - offSet > MAX_DECRYPT_BLOCK) {
                cache = cipher.doFinal(encryptedData, offSet, MAX_DECRYPT_BLOCK);
            } else {
                cache = cipher.doFinal(encryptedData, offSet, inputLen - offSet);
            }
            i++;
            offSet = i * MAX_DECRYPT_BLOCK;
            for(byte b:cache){
            	result[len++]=b;
            }
        }
        return result;
    }

    public static byte[] decryptByPublicKey(byte[] encryptedData, String publicKey)
            throws Exception {
        byte[] keyBytes = Base64.decodeBase64(publicKey);
        X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(keyBytes);
        KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
        Key publicK = keyFactory.generatePublic(x509KeySpec);
        Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
        cipher.init(Cipher.DECRYPT_MODE, publicK);
        int inputLen = encryptedData.length;
        ByteArrayOutputStream out = new ByteArrayOutputStream();
        int offSet = 0;
        byte[] cache;
        int i = 0;
        // 對數據分段解密
        while (inputLen - offSet > 0) {
            if (inputLen - offSet > MAX_DECRYPT_BLOCK) {
                cache = cipher.doFinal(encryptedData, offSet, MAX_DECRYPT_BLOCK);
            } else {
                cache = cipher.doFinal(encryptedData, offSet, inputLen - offSet);
            }
            out.write(cache, 0, cache.length);
            i++;
            offSet = i * MAX_DECRYPT_BLOCK;
        }
        byte[] decryptedData = out.toByteArray();
        out.close();
        return decryptedData;
    }

    public static byte[] encryptByPublicKey(byte[] data, String publicKey)
            throws Exception {
        byte[] keyBytes = Base64.decodeBase64(publicKey);
        X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(keyBytes);
        KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
        Key publicK = keyFactory.generatePublic(x509KeySpec);
        // 對數據加密
        Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
        cipher.init(Cipher.ENCRYPT_MODE, publicK);
        int inputLen = data.length;
        ByteArrayOutputStream out = new ByteArrayOutputStream();
        int offSet = 0;
        byte[] cache;
        int i = 0;
        // 對數據分段加密
        while (inputLen - offSet > 0) {
            if (inputLen - offSet > MAX_ENCRYPT_BLOCK) {
                cache = cipher.doFinal(data, offSet, MAX_ENCRYPT_BLOCK);
            } else {
                cache = cipher.doFinal(data, offSet, inputLen - offSet);
            }
            out.write(cache, 0, cache.length);
            i++;
            offSet = i * MAX_ENCRYPT_BLOCK;
        }
        byte[] encryptedData = out.toByteArray();
        out.close();
        return encryptedData;
    }

    public static byte[] encryptByPrivateKey(byte[] data, String privateKey)
            throws Exception {
        byte[] keyBytes = Base64.decodeBase64(privateKey);
        PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);
        KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
        Key privateK = keyFactory.generatePrivate(pkcs8KeySpec);
        Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
        cipher.init(Cipher.ENCRYPT_MODE, privateK);
        int inputLen = data.length;
        ByteArrayOutputStream out = new ByteArrayOutputStream();
        int offSet = 0;
        byte[] cache;
        int i = 0;
        // 對數據分段加密
        while (inputLen - offSet > 0) {
            if (inputLen - offSet > MAX_ENCRYPT_BLOCK) {
                cache = cipher.doFinal(data, offSet, MAX_ENCRYPT_BLOCK);
            } else {
                cache = cipher.doFinal(data, offSet, inputLen - offSet);
            }
            out.write(cache, 0, cache.length);
            i++;
            offSet = i * MAX_ENCRYPT_BLOCK;
        }
        byte[] encryptedData = out.toByteArray();
        out.close();
        return encryptedData;
    }

    public static String getPrivateKey(Map<String, Object> keyMap)
            throws Exception {
        Key key = (Key) keyMap.get(PRIVATE_KEY);
        return Base64.encodeBase64String(key.getEncoded());
    }

    public static String getPublicKey(Map<String, Object> keyMap)
            throws Exception {
        Key key = (Key) keyMap.get(PUBLIC_KEY);
        return Base64.encodeBase64String(key.getEncoded());
    }
    
    public static void main(String[] args) {
		try {
//            Map<String,Object> keyPair=genKeyPair();
//            System.out.println(getPrivateKey(keyPair));
//            System.out.println(getPublicKey(keyPair));

			String pwd="馬志宇|marsyoung|0907__";
			//encode
			byte[] b=encryptByPublicKey(pwd.getBytes("UTF-8"), "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCvYA5q75yqwIv+I8MiI6Aeq2iGxtv0zzUu4bmHW5LxswqZA1c3DjBy/rreirm1J7Y4qXo83yuG3f5VfvDH/0/lGf/YPb7pCKhBUIyamfEXEliN01bH4pq8JMsy28M8/cuE3LMw6Scfijejuplvg6Dy6Z+JY/k0ENXXItdrvBOvtQIDAQAB");
			String pwd_encoded=Base64.encodeBase64String(b);
			//decode
			System.out.println(pwd_encoded);
            String pwd_decoded=new String(decryptByPrivateKey(Base64.decodeBase64(pwd_encoded), "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"));
			System.out.println(pwd_decoded.trim());

        } catch (Exception e) {
			e.printStackTrace();
		}
		
	}

}




3、Android這邊加密過的數據,服務器端死活解密不了,原來android系統的RSA實現是"RSA/None/NoPadding",而標準JDK實現是"RSA/None/PKCS1Padding" ,這造成了在android機上加密後無法在服務器上解密的原因,所以在實現的時候這個一定要注意。



發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章