RSA加解密,根据N.D.E生成公私钥

package com.demo.test;
import lombok.extern.slf4j.Slf4j;
import org.apache.commons.codec.binary.Base64;
import java.io.BufferedReader;
import java.io.IOException;
import java.io.InputStream;
import java.io.InputStreamReader;
import java.math.BigInteger;
import java.security.*;
import java.security.interfaces.RSAPrivateKey;
import java.security.interfaces.RSAPublicKey;
import java.security.spec.*;
import javax.crypto.BadPaddingException;
import javax.crypto.Cipher;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.NoSuchPaddingException;

@Slf4j
public class RSAUtils {
    private static String RSA = "RSA";
    /**
     * 随机生成RSA密钥对(默认密钥长度为1024)
     * @return
     */
    public static KeyPair generateRSAKeyPair() {
        return generateRSAKeyPair(1024);
    }
    /**
     * 随机生成RSA密钥对
     * @param keyLength 密钥长度,范围:512~2048
一般1024 * @return */ public static KeyPair generateRSAKeyPair(int keyLength) { try { KeyPairGenerator kpg = KeyPairGenerator.getInstance(RSA); kpg.initialize(keyLength); return kpg.genKeyPair(); } catch (NoSuchAlgorithmException e) { e.printStackTrace(); return null; } } /** * 用公钥加密
* 每次加密的字节数,不能超过密钥的长度值减去11 * @param data 需加密数据的byte数据 * @param publicKey 公钥 * @return 加密后的byte型数据 */ public static byte[] encryptData(byte[] data, PublicKey publicKey) { try { Cipher cipher = Cipher.getInstance(RSA); // 编码前设定编码方式及密钥 cipher.init(Cipher.ENCRYPT_MODE, publicKey); // 传入编码数据并返回编码结果 return cipher.doFinal(data); } catch (Exception e) { e.printStackTrace(); return null; } } /** * 用私钥解密 * @param encryptedData 经过encryptedData()加密返回的byte数据 * @param privateKey 私钥 * @return */ public static byte[] decryptData(byte[] encryptedData, PrivateKey privateKey) { try { Cipher cipher = Cipher.getInstance(RSA); cipher.init(Cipher.DECRYPT_MODE, privateKey); return cipher.doFinal(encryptedData); } catch (Exception e) { return null; } } /** * 通过公钥byte[](publicKey.getEncoded())将公钥还原,适用于RSA算法 * @param keyBytes * @return * @throws NoSuchAlgorithmException */ public static PublicKey getPublicKey(byte[] keyBytes) throws NoSuchAlgorithmException, InvalidKeySpecException { X509EncodedKeySpec keySpec = new X509EncodedKeySpec(keyBytes); KeyFactory keyFactory = KeyFactory.getInstance(RSA); PublicKey publicKey = keyFactory.generatePublic(keySpec); return publicKey; } /** * 通过私钥byte[](publicKey.getEncoded())将私钥还原,适用于RSA算法 * @param keyBytes * @return * @throws NoSuchAlgorithmException * @throws InvalidKeySpecException */ public static PrivateKey getPrivateKey(byte[] keyBytes) throws NoSuchAlgorithmException, InvalidKeySpecException { PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(keyBytes); KeyFactory keyFactory = KeyFactory.getInstance(RSA); PrivateKey privateKey = keyFactory.generatePrivate(keySpec); return privateKey; } /** * 使用N、e值还原公钥 * @param modulus N * @param publicExponent e * @return * @throws NoSuchAlgorithmException * @throws InvalidKeySpecException */ public static PublicKey getPublicKey(String modulus, String publicExponent) throws NoSuchAlgorithmException, InvalidKeySpecException { BigInteger bigIntModulus = new BigInteger(modulus,16); BigInteger bigIntPrivateExponent = new BigInteger(publicExponent,16); RSAPublicKeySpec keySpec = new RSAPublicKeySpec(bigIntModulus, bigIntPrivateExponent); KeyFactory keyFactory = KeyFactory.getInstance(RSA); PublicKey publicKey = keyFactory.generatePublic(keySpec); return publicKey; } /** * 使用N、d值还原私钥 * @param modulus N * @param privateExponent d * @return * @throws NoSuchAlgorithmException * @throws InvalidKeySpecException */ public static PrivateKey getPrivateKey(String modulus, String privateExponent) throws NoSuchAlgorithmException, InvalidKeySpecException { BigInteger bigIntModulus = new BigInteger(modulus,16); BigInteger bigIntPrivateExponent = new BigInteger(privateExponent,16); RSAPrivateKeySpec keySpec = new RSAPrivateKeySpec(bigIntModulus, bigIntPrivateExponent); KeyFactory keyFactory = KeyFactory.getInstance(RSA); PrivateKey privateKey = keyFactory.generatePrivate(keySpec); return privateKey; } /** * 从字符串中加载公钥 * @param publicKeyStr 公钥数据字符串 * @throws Exception 加载公钥时产生的异常 */ public static RSAPublicKey loadPublicKey(String publicKeyStr) throws Exception { try { byte[] buffer = new Base64().decode(publicKeyStr); KeyFactory keyFactory = KeyFactory.getInstance(RSA); X509EncodedKeySpec keySpec = new X509EncodedKeySpec(buffer); return (RSAPublicKey) keyFactory.generatePublic(keySpec); } catch (NoSuchAlgorithmException e) { throw new Exception("无此算法"); } catch (InvalidKeySpecException e) { throw new Exception("公钥非法"); } catch (NullPointerException e) { throw new Exception("公钥数据为空"); } } /** * 从字符串中加载私钥
* 加载时使用的是PKCS8EncodedKeySpec(PKCS#8编码的Key指令)。 * @param privateKeyStr * @return * @throws Exception */ public static RSAPrivateKey loadPrivateKey(String privateKeyStr) throws Exception { try { byte[] buffer = new Base64().decode(privateKeyStr); PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(buffer); KeyFactory keyFactory = KeyFactory.getInstance(RSA); return (RSAPrivateKey) keyFactory.generatePrivate(keySpec); } catch (NoSuchAlgorithmException e) { throw new Exception("无此算法"); } catch (InvalidKeySpecException e) { throw new Exception("私钥非法"); } catch (NullPointerException e) { throw new Exception("私钥数据为空"); } } /** * 从文件中输入流中加载公钥 * @param in 公钥输入流 * @throws Exception 加载公钥时产生的异常 */ public static PublicKey loadPublicKey(InputStream in) throws Exception { try { return loadPublicKey(readKey(in)); } catch (IOException e) { throw new Exception("公钥数据流读取错误"); } catch (NullPointerException e) { throw new Exception("公钥输入流为空"); } } /** * 从文件中加载私钥 * @param in 证书文件流 * @return rsa私钥证书 * @throws Exception */ public static RSAPrivateKey loadPrivateKey(InputStream in) throws Exception { try { return loadPrivateKey(readKey(in)); } catch (IOException e) { throw new Exception("私钥数据读取错误"); } catch (NullPointerException e) { throw new Exception("私钥输入流为空"); } } /** * 读取密钥信息 * @param in * @return * @throws IOException */ private static String readKey(InputStream in) throws IOException { BufferedReader br = new BufferedReader(new InputStreamReader(in)); String readLine = null; StringBuilder sb = new StringBuilder(); while ((readLine = br.readLine()) != null) { if (readLine.charAt(0) == '-') { continue; } else { sb.append(readLine); sb.append('\r'); } } return sb.toString(); } /** * 用私钥进行数字签名 *签名 SHA1WithRSA * @param data 加密数据 * @param key 私钥 * @return 数字签名 * @throws NoSuchAlgorithmException * @throws InvalidKeySpecException * @throws InvalidKeyException * @throws SignatureException * @throws Exception */ public static String sign(byte[] data, byte[] key) throws NoSuchAlgorithmException, InvalidKeySpecException, InvalidKeyException, SignatureException { // 构造PKCS8EncodedKeySpec对象 PKCS8EncodedKeySpec pkcs8EncodedKeySpec = new PKCS8EncodedKeySpec(key); // 指定加密算法 KeyFactory keyFactory = KeyFactory.getInstance(RSA); // 取私钥匙对象 PrivateKey privKey = keyFactory.generatePrivate(pkcs8EncodedKeySpec); // RSA数字签名 Signature signature = Signature.getInstance("SHA1WithRSA"); // 初始化私钥 signature.initSign(privKey); signature.update(data); // 获取数字签名 String s = Base64.encodeBase64String(signature.sign()); log.info(" 签名值:{}", s); return s; } /** * 校验数字签名 * 验签SHA1WithRSA * @param data 加密数据 * @param publicKey 公钥 * @param sign 数字签名 * @return * @throws NoSuchAlgorithmException * @throws InvalidKeySpecException * @throws InvalidKeyException * @throws SignatureException */ public static boolean verify(byte[] data, byte[] publicKey, String sign) throws NoSuchAlgorithmException, InvalidKeySpecException, InvalidKeyException, SignatureException { // 构造X509EncodedKeySpec对象 X509EncodedKeySpec x509EncodedKeySpec = new X509EncodedKeySpec( publicKey); // 指定加密算法 KeyFactory keyFactory = KeyFactory.getInstance(RSA); // 取公钥匙对象 PublicKey publicKey2 = keyFactory.generatePublic(x509EncodedKeySpec); Signature signature = Signature.getInstance("SHA1WithRSA"); signature.initVerify(publicKey2); signature.update(data); // 验证签名是否正常 return signature.verify(Base64.decodeBase64(sign)); } /** * 用私钥进行数字签名 *签名 SHA256WithRSA * @param data 加密数据 * @param key 私钥 * @return 数字签名 * @throws NoSuchAlgorithmException * @throws InvalidKeySpecException * @throws InvalidKeyException * @throws SignatureException * @throws Exception */ public static String sign256(byte[] data, byte[] key) throws NoSuchAlgorithmException, InvalidKeySpecException, InvalidKeyException, SignatureException { // 构造PKCS8EncodedKeySpec对象 PKCS8EncodedKeySpec pkcs8EncodedKeySpec = new PKCS8EncodedKeySpec(key); // 指定加密算法 KeyFactory keyFactory = KeyFactory.getInstance(RSA); // 取私钥匙对象 PrivateKey privKey = keyFactory.generatePrivate(pkcs8EncodedKeySpec); // RSA数字签名 Signature signature = Signature.getInstance("SHA256withRSA"); // 初始化私钥 signature.initSign(privKey); signature.update(data); // 获取数字签名 String s = Base64.encodeBase64String(signature.sign()); log.info(" 签名值:{}", s); return s; } /** * 校验数字签名 * 验签SHA256WithRSA * @param data 加密数据 * @param publicKey 公钥 * @param sign 数字签名 * @return * @throws NoSuchAlgorithmException * @throws InvalidKeySpecException * @throws InvalidKeyException * @throws SignatureException */ public static boolean verify256(byte[] data, byte[] publicKey, String sign) throws NoSuchAlgorithmException, InvalidKeySpecException, InvalidKeyException, SignatureException { // 构造X509EncodedKeySpec对象 X509EncodedKeySpec x509EncodedKeySpec = new X509EncodedKeySpec( publicKey); // 指定加密算法 KeyFactory keyFactory = KeyFactory.getInstance(RSA); // 取公钥匙对象 PublicKey publicKey2 = keyFactory.generatePublic(x509EncodedKeySpec); Signature signature = Signature.getInstance("SHA256WithRSA"); signature.initVerify(publicKey2); signature.update(data); // 验证签名是否正常 return signature.verify(Base64.decodeBase64(sign)); } /** * RSA NoPadding加密 * @param data * @param key */ public static byte[] rsaPrivateKeyDeNoPadding(byte[] data, RSAPrivateKey key) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, IllegalBlockSizeException, BadPaddingException, IOException { Cipher cipher = Cipher.getInstance("RSA/ECB/NOPADDING"); cipher.init(Cipher.ENCRYPT_MODE, key); byte [] b = cipher.doFinal(data); return b; } /** * RSA NoPadding解密 * @param data * @param key */ public static byte[] rsaPrivateKeyDeNoPadding(byte[] data, RSAPublicKey key) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, IllegalBlockSizeException, BadPaddingException, IOException { Cipher cipher = Cipher.getInstance("RSA/ECB/NOPADDING"); cipher.init(Cipher.DECRYPT_MODE, key); byte [] b = cipher.doFinal(data); return b; } /** * RSA NoPadding加密 * @param data * @param publicKey */ private static byte [] encryptRsaNoPadding(byte[] data, PublicKey publicKey) { byte[] enBytes = null; try { Cipher cipher = Cipher.getInstance("RSA/ECB/NoPadding"); cipher.init(Cipher.ENCRYPT_MODE, publicKey); enBytes = cipher.doFinal(data); } catch (IllegalBlockSizeException e) { e.printStackTrace(); } catch (BadPaddingException e) { e.printStackTrace(); }catch (InvalidKeyException e) { e.printStackTrace(); }catch (NoSuchAlgorithmException e) { e.printStackTrace(); } catch (NoSuchPaddingException e) { e.printStackTrace(); } return enBytes; } /** * RSA NoPadding解密 * @param data * @param privateKey * @return */ private static byte [] decryptRsaNoPadding(byte[] data, PrivateKey privateKey){ byte[] enBytes = null; try { Cipher cipher = Cipher.getInstance("RSA/ECB/NoPadding"); cipher.init(Cipher.DECRYPT_MODE, privateKey); enBytes = cipher.doFinal(data); } catch (NoSuchAlgorithmException e) { e.printStackTrace(); } catch (InvalidKeyException e) { e.printStackTrace(); } catch (NoSuchPaddingException e) { e.printStackTrace(); } catch (IllegalBlockSizeException e) { e.printStackTrace(); } catch (BadPaddingException e) { e.printStackTrace(); } return enBytes; } private static final String HEX_CHARS = "0123456789ABCDEF"; /** * 测试根据 公钥模数N ,指数E生成公钥,---私钥模数N ,指数D生成私钥, * @param args */ public static void main(String[] args) { byte[] b = {0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16}; System.out.println("原始值:"+toHexString(b)); KeyPair keyPair = generateRSAKeyPair(); byte[] encryptByte = encryptRsaNoPadding(b, keyPair.getPublic()); System.out.println("加密后值:"+toHexString(encryptByte)); byte[] decryptByte = decryptRsaNoPadding(encryptByte, keyPair.getPrivate()); System.out.println("解密后值:"+toHexString(decryptByte)); /** * N E生成公钥 */ String N="00A5A9C9C011E80E904DA4650A3069B9966D6AD18008D54489010F47C46281F65D583EB74003F5740785395B0C2EEA0262C8A8CE574846B922EEF3C15D43A9F0A1B0D36237B5DAA6C058BD63D3D7865B7A0506667A813FFE90E57715EE946EE669DC3807E4570E9C009F87B491DDBDBCA4627AE4DB8294CD20F5CCF344C3C7ABBD"; String E="00010001"; /** * N D生成私钥 */ String N1="BBBC49996CB668B80A83E6BD5DC98937334315E46AD46C09DAEBDF7E57FFAA30FB9C7D130E87CA06BED60E07648F0109D117A97F0D406DCC5D1F5FE63315151F2A5221B054474E16166F64E76053FF8C5C7A8C950109E3F820ED0505D7A4C7B4F24FD57EC09F8052E35A84255EEEF693A51BDC1819C29ECF2D439AE48CA08657"; String D1="4DC9F5872CAC22950BCA5ECC1D75FA34D4B959F3652EB2BB9CAA3AD79BB7F4B9CA302C053EF2960C187C12A10E9250C05412E5691F41109DEB022A96F498AA3B0A91D686CDE8CD9A3CADF5D3CAAB59BE5BDD05B08FF25A70E900A64515F08FFFAC9900B2DE4F50691E39883A444DAC661DB248865B8E49F37FFFB0FD6C0A003D"; try { RSAPublicKey pub = (RSAPublicKey)RSAUtils.getPublicKey(N,E); //System.out.println("pub----N:"+ toHexString(pub.getModulus().toByteArray())); //System.out.println("pub----E:"+toHexString(pub.getPublicExponent().toByteArray())); RSAPrivateKey pri = (RSAPrivateKey)RSAUtils.getPrivateKey(N1,D1); //System.out.println("pri----N1:"+toHexString(pri.getModulus().toByteArray())); //System.out.println("pri----D1:"+toHexString(pri.getPrivateExponent().toByteArray())); } catch (NoSuchAlgorithmException e) { e.printStackTrace(); } catch (InvalidKeySpecException e) { e.printStackTrace(); } } /** * byte[]转16进制HEXString * @param b * @return */ public static String toHexString(byte[] b) { StringBuilder sb = new StringBuilder(); for (int i = 0; i < b.length; i++) { sb.append(RSAUtils.HEX_CHARS.charAt(b[i] >>> 4 & 0x0F)); sb.append(RSAUtils.HEX_CHARS.charAt(b[i] & 0x0F)); } return sb.toString(); } } /** * 由keystore证书密钥库文件获取私钥 * * @param keyStorePath 密钥库文件路径 * @param keyStorePassword 密钥库文件密码 * @param alias 指定密钥对的别名 * @param aliasPassword 密钥密码 * @return key 私钥,PrivateKey类型 * @throws NoSuchAlgorithmException * @throws KeyStoreException * @throws UnrecoverableKeyException * @throws IOException * @throws CertificateException */ public static PrivateKey getPrivateKey(String keyStorePath, String keyStorePassword, String alias, String aliasPassword) throws UnrecoverableKeyException, KeyStoreException, NoSuchAlgorithmException, CertificateException, IOException { KeyStore ks = getKeyStore(keyStorePath, keyStorePassword); PrivateKey key = null; if (null != ks) { key = (PrivateKey) ks.getKey(alias, aliasPassword.toCharArray()); } return key; } public static KeyStore getKeyStore(String keyStorePath, String keyStorePassword) throws KeyStoreException, NoSuchAlgorithmException, CertificateException { FileInputStream is = null; KeyStore ks = null; try { is = new FileInputStream(keyStorePath); ks = KeyStore.getInstance(KEY_STORE); ks.load(is, keyStorePassword.toCharArray()); } catch (IOException e) { log.info("IO流异常:{}", e); } finally { if (is != null) { try { is.close(); } catch (IOException e) { is = null; log.info("关闭流异常:{}", e); } } } return ks; } public static PrivateKey GetPvkformPfx(String strPfx, String strPassword){ try { KeyStore ks = KeyStore.getInstance("PKCS12"); FileInputStream fis = new FileInputStream(strPfx); char[] nPassword = null; if ((strPassword == null) || strPassword.trim().equals("")){ nPassword = null; } else { nPassword = strPassword.toCharArray(); } ks.load(fis, nPassword); fis.close(); Enumeration enumas = ks.aliases(); String keyAlias = null; if (enumas.hasMoreElements()){ keyAlias = (String)enumas.nextElement(); } /*java.security.cert.Certificate cert = ks.getCertificate(keyAlias); PublicKey pubkey = cert.getPublicKey();*/ PrivateKey prikey = (PrivateKey) ks.getKey(keyAlias, nPassword); return prikey; } catch (Exception e) { e.printStackTrace(); } return null; }

 

你可能感兴趣的:(工具)