package com.client.rsa;
import java.io.ByteArrayOutputStream;
import java.io.IOException;
import java.math.BigInteger;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.NoSuchAlgorithmException;
import java.security.interfaces.RSAPrivateCrtKey;
import java.security.interfaces.RSAPublicKey;
import com.nettyServer.util.BaseString;
import com.nettyServer.util.ByteUtils;
public class RSAUtil {
public String[] initGenKey(int keylen) {
String[] genInfo = new String[5];
try {
KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA");
kpg.initialize(keylen);
KeyPair kp = kpg.generateKeyPair();
RSAPublicKey puk = (RSAPublicKey) kp.getPublic();
RSAPrivateCrtKey prk = (RSAPrivateCrtKey) kp.getPrivate();
BigInteger e = puk.getPublicExponent();
BigInteger n = puk.getModulus();
log("n len(" + n.toByteArray().length + ")");
BigInteger d = prk.getPrivateExponent();
BigInteger p = prk.getPrimeP();
BigInteger q = prk.getPrimeQ();
genInfo[0] = e.toString();
genInfo[1] = n.toString();
genInfo[2] = d.toString();
genInfo[3] = p.toString();
genInfo[4] = q.toString();
String[] des = { "e", "n", "d", "p", "q" };
for (int i = 0; i < genInfo.length; i++) {
log(des[i] + "=" + genInfo[i]);
}
} catch (NoSuchAlgorithmException ex) {
ex.printStackTrace();
}
return genInfo;
}
//encrypt data
public byte[] encrypt(byte[] ptext, String eStr, String nStr) throws IOException {
log("*******************************encrypt start*************************************");
BigInteger e = new BigInteger(eStr);//publickey param d
BigInteger n = new BigInteger(nStr);//publickey param d
int len = (n.toByteArray().length - 1), i = 0;
int inputLen = ptext.length;
BigInteger m = null;
BigInteger c = null;
ByteArrayOutputStream out = new ByteArrayOutputStream();
int offSet = 0;
byte[] cache=null;
while (inputLen - offSet > 0) {
if (inputLen - offSet > len) {
cache = new byte[len];
} else {
cache = new byte[inputLen - offSet];
}
System.arraycopy(ptext, offSet, cache, 0, cache.length);
m = new BigInteger(cache);
c = m.modPow(e, n);
out.write(c.toByteArray());
log("encrypt before:len(" + cache.length + "),data("+i+"):"
+ ByteUtils.bytesToHexString(cache));
log("encrypt after data("+i+"):"
+ ByteUtils.bytesToHexString(c.toByteArray()));
i++;
offSet = i * len;
}
byte[] encryptData=out.toByteArray();
out.close();
log("*******************************encrypt end*************************************");
return encryptData;
}
//decrypt data
public byte[] decrypt(byte[] miwen, String dStr, String nStr) throws IOException {
log("*******************************decrypt start*************************************");
BigInteger d = new BigInteger(dStr);//privatekey param d
BigInteger n = new BigInteger(nStr);//privatekey param n
BigInteger c = null;
BigInteger m = null;
int len = n.toByteArray().length;
int i = 0;
ByteArrayOutputStream out = new ByteArrayOutputStream();
int inputLen = miwen.length;
int offSet = 0;
byte[] cache = null;
while (inputLen - offSet > 0) {
if (inputLen - offSet > len) {
cache = new byte[len];
} else {
cache = new byte[inputLen - offSet];
}
System.arraycopy(miwen, offSet, cache, 0, cache.length);
c = new BigInteger(cache);
m = c.modPow(d, n);
byte[] dData = m.toByteArray();
out.write(dData);
log("decrypt before data("+i+"):"
+ ByteUtils.bytesToHexString(cache));
log("decrypt after:len(" + dData.length + "),data("+i+"):"
+ ByteUtils.bytesToHexString(dData));
i++;
offSet = i * len;
}
byte[] entryDataB=out.toByteArray();
out.close();
log("*******************************decrypt end*************************************");
return entryDataB;
}
private void log(String log){
System.out.println(log);
}
public static void main(String[] args) throws IOException {
RSAUtil rsaUtil = new RSAUtil();
String[] p = rsaUtil.initGenKey(1023);// 1023
//中文需要采用base编码后再加密
String data = "18BB49FBC8AE1A82EECFECF8BB89C9D35FAAB857CC0C3B959DA3C3D513CAB255A0B627FDDE15813629A00FBF464740A32C7907B5B845245D9CDAC3F5F68A666EAFDE3FCE21A8096A61BABB659DDDB899F8CD29B2604199BC1F42993DFAB09ABFBE6BE69B7C299CBA6797EEE21665AF6B67A8061DBE6FA2EB0825C366DD812129";
//String text = Base64.encodeBase64String(data.getBytes("GBK"));
rsaUtil.log("(" + data.length() + ")" + data);
ByteArrayOutputStream out = new ByteArrayOutputStream();
out.write(BaseString.getBytes(data));
byte[] minwen = out.toByteArray();
out.close();
byte[] hex = rsaUtil.encrypt(minwen, p[0], p[1]);
byte[] decodeData = rsaUtil.decrypt(hex, p[2], p[1]);
data = BaseString.byteToString(decodeData);
//data = BaseString.byteToString(Base64.decodeBase64(decodeData));
rsaUtil.log("(" + data.length() + ")" + data);
}
}
output:
n len(128)
e=65537
n=79878443116477431723910720076331964206927196983187460111829662096543709950682705577119366644900259032296548146226108881718640174009506648698055329399979826968504236032315385550029317396676828095359442971095598662249798287465446643154424521383364489258800969007909367639398542203155486245540834166630656463551
d=26360849103913421324209851744982341606534040562619259155876099483101871596401506877366032345024990499267737969491711291237175178654464040130636749687394346556715475310635822940069011833047004651164959543795626563240523875100964945568109834945618143409494207572709757223766144562392543175635168401408831807649
p=12388121363302700405059571893776373129179128456352582548743075852274073073044285422961339481772197365397373993998587373598128718142470712954759279729185579
q=6447986807192665658869257921655147348637730988762875266579286105565709187930397704433502779690215309166895026920782468729159257017248953918267942262113469
(256)18BB49FBC8AE1A82EECFECF8BB89C9D35FAAB857CC0C3B959DA3C3D513CAB255A0B627FDDE15813629A00FBF464740A32C7907B5B845245D9CDAC3F5F68A666EAFDE3FCE21A8096A61BABB659DDDB899F8CD29B2604199BC1F42993DFAB09ABFBE6BE69B7C299CBA6797EEE21665AF6B67A8061DBE6FA2EB0825C366DD812129
*******************************encrypt start*************************************
encrypt before:len(127),data(0):31384242343946424338414531413832454543464543463842423839433944333546414142383537434330433342393539444133433344353133434142323535413042363237464444453135383133363239413030464246343634373430413332433739303742354238343532343544394344414333463546363841363636
encrypt after data(0):0A393732881F8FD5347AC6EA5DD17D862567608038C39FDB57E0E0FCFA6C6BD2795FE9A7B52C9D60B57B70E867C692B907140A784C1C86E61E00E4CCBBC4541A83C97F7478C0F0A662066755A390022EB76ADA8948893564DF56524C58E47ACC672624C0EB9CE6822B703F69D851F9D68C84FB75D0A6636DE14E3A995AB38D3C
encrypt before:len(127),data(1):45414644453346434532314138303936413631424142423635394444444238393946384344323942323630343139394243314634323939334446414230394142464245364245363942374332393943424136373937454545323136363541463642363741383036314442453646413245423038323543333636444438313231
encrypt after data(1):48845A09A4FF5B012BBE42FC83F250B0AEA5D4FE1EA6A59BE813166C561EB1BA4F1744E79F50FC072016FF68384DCA1CA86B90BE50753956B9F1D5B68983F67C63EAF8ECFD62F1A6C3491469F6E6CFD8E895694678B2A24A9098FA120EF826C461B0ABF8B1B0C9E4EFD8E70547553068BA8560B61F7691E435E947E999A4B5C0
encrypt before:len(2),data(2):3239
encrypt after data(2):3D940F0A14DA5A9838AAF70049C978529569667BB5D3191A7075A3DA53205EA2C74E4F3CF21814514A45275246CBB579F9768ED321BFEAA8CCED6C6EA683DD866CB5660B513360799D69C4CF6BEBDCD0A1976510A6C6FF19E6A4915B85A5533FE5644E4CD761B0A37F3D19004685C52C8A931F074DE15D615DA88C3E98D99FD4
*******************************encrypt end*************************************
*******************************decrypt start*************************************
decrypt before data(0):0A393732881F8FD5347AC6EA5DD17D862567608038C39FDB57E0E0FCFA6C6BD2795FE9A7B52C9D60B57B70E867C692B907140A784C1C86E61E00E4CCBBC4541A83C97F7478C0F0A662066755A390022EB76ADA8948893564DF56524C58E47ACC672624C0EB9CE6822B703F69D851F9D68C84FB75D0A6636DE14E3A995AB38D3C
decrypt after:len(127),data(0):31384242343946424338414531413832454543464543463842423839433944333546414142383537434330433342393539444133433344353133434142323535413042363237464444453135383133363239413030464246343634373430413332433739303742354238343532343544394344414333463546363841363636
decrypt before data(1):48845A09A4FF5B012BBE42FC83F250B0AEA5D4FE1EA6A59BE813166C561EB1BA4F1744E79F50FC072016FF68384DCA1CA86B90BE50753956B9F1D5B68983F67C63EAF8ECFD62F1A6C3491469F6E6CFD8E895694678B2A24A9098FA120EF826C461B0ABF8B1B0C9E4EFD8E70547553068BA8560B61F7691E435E947E999A4B5C0
decrypt after:len(127),data(1):45414644453346434532314138303936413631424142423635394444444238393946384344323942323630343139394243314634323939334446414230394142464245364245363942374332393943424136373937454545323136363541463642363741383036314442453646413245423038323543333636444438313231
decrypt before data(2):3D940F0A14DA5A9838AAF70049C978529569667BB5D3191A7075A3DA53205EA2C74E4F3CF21814514A45275246CBB579F9768ED321BFEAA8CCED6C6EA683DD866CB5660B513360799D69C4CF6BEBDCD0A1976510A6C6FF19E6A4915B85A5533FE5644E4CD761B0A37F3D19004685C52C8A931F074DE15D615DA88C3E98D99FD4
decrypt after:len(2),data(2):3239
*******************************decrypt end*************************************
(256)18BB49FBC8AE1A82EECFECF8BB89C9D35FAAB857CC0C3B959DA3C3D513CAB255A0B627FDDE15813629A00FBF464740A32C7907B5B845245D9CDAC3F5F68A666EAFDE3FCE21A8096A61BABB659DDDB899F8CD29B2604199BC1F42993DFAB09ABFBE6BE69B7C299CBA6797EEE21665AF6B67A8061DBE6FA2EB0825C366DD812129
相关推荐
RSA加密演算法是一种非对称加密演算法。在公开密钥加密和电子商业中RSA被广泛使用。 典型的应用 1. 苹果App签名, iOS App 签名的原理; 2. 支付宝签名验证 ; 2. HTTPS 加密连接; 3. 程序直接用RSA+AES加密通信 ...
RSA加密解密C#实现调用实例 public string RSAEncrypt(string xmlPublicKey, string m_strEncryptString) { try { byte[] PlainTextBArray; byte[] CypherTextBArray; string Result; System.Security....
(去掉注释13.6kb)微信小程序RSA加密模块,用法请参考文件里面的注释。 //加载RSA模块 var RSA = require('rsa.js'); var rsa_res = new RSA.RSAKey(); //配置公钥证书 let public_n = ''; let public_e = ''; ...
RSA公钥加密算法是1977年由罗纳德·李维斯特(Ron Rivest)、阿迪·萨莫尔(Adi Shamir)和伦纳德·阿德曼(Leonard Adleman)一起提出的。1987年首次公布,当时他们三人都在麻省理工学院工作。RSA就是他们三人姓氏...
RSA算法基于一个十分简单的数论事实:将两个大素数相乘十分容易,但是想要对其乘积进行因式分解却极其困难,因此可以将乘积公开作为加密密钥。RSA算法是第一个能同时用于加密和数字签名的算法,也易于理解和操作。...
使用RSA非对称加密完成JavaScript前端RSA加密和分段加解密,最近研究了RSA非对称加密,关于什么是RSA,网上各种文章一搜一大把,但是关于如何使用RSA完成前端的组合加密解密,东西就非常少了,并且由于RSA的特性,一...
1、了解和掌握RSA加密算法原理及过程; 2、了解生成大素数的方法; 3、掌握快速指数算法; 4、能够编写代码实现RSA算法。 【实验内容】 1、编写程序构造一RSA密钥; 2、编写程序实现快速指数算法; 3...
* RSA加密解密:私钥解密,公钥加密。 * RSA数字签名-俗称加签验签:私钥加签,公钥验签。 * RSA加密解密:私钥解密,公钥加密。 * RSA数字签名-俗称加签验签:私钥加签,公钥验签。 * RSA加密解密:私钥...
RSA算法演示RSA算法演示RSA算法演示RSA算法演示RSA算法演示RSA算法演示RSA算法演示RSA算法演示RSA算法演示RSA算法演示RSA算法演示
Springboot项目报文加密(采用AES、RSA动态加密策略) Springboot项目报文加密(采用AES、RSA动态加密策略) Springboot项目报文加密(采用AES、RSA动态加密策略) Springboot项目报文加密(采用AES、RSA动态加密...
支付宝签名、验签、RSA、RSA2公钥、私钥一键生成等工具
PKCS #1: RSA Cryptography Specifications Version 2.2 Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1. Requirements Language . . . . . . . . . . . . . . . . . ...
1.该程序是基于OpenSSL的使用纯C语言来实现RSA加解密的,在Linux环境下开发完成,建议在Linux环境下使用(在Windows环境下需要自行修改); 2.该程序具有生成RSA密钥对、RSA公钥加密和RSA私钥解密的功能,支持手动...
用PowerBuilder实现RSA加密算法
由于Java的RSA加解密一般都是用RSA/ECB/PKCS1PADDING,导致Python一般的RSA加密库的加解密结果与Java的不兼容,Python下目前能与之兼容的RSA的库目前发现的只有一个,就是m2crypto。 这个库目前的问题是在windows...
赠送jar包:spring-security-rsa-1.0.10.RELEASE.jar; 赠送原API文档:spring-security-rsa-1.0.10.RELEASE-javadoc.jar; 赠送源代码:spring-security-rsa-1.0.10.RELEASE-sources.jar; 赠送Maven依赖信息文件:...
rsa2048.rar RSA2048的C语言实现代码rsa2048.rar RSA2048的C语言实现代码
1.RSACryption RSA 的密钥产生 2.RSACryption RSA的加密函数 3.RSACryption RSA的解密函数 4.RSACryption 获取Hash描述表 5.RSACryption RSA签名 6.RSACryption RSA签名认证 / <summary> /// RSA加密...
C#RSA加密解密签名和验证签名的小例子,代码都加了注释,可以很容易看懂.如果应用到消息收发,发送方用公钥加密,接收方用私钥解密.如果是应用到软件注册方面,则需要客户端保留公钥,程序开发者保留私钥.使用签名和验证...
MarkDown文档,使用表格形式展示了RSA签名算法和RSA2签名算法的区别,是一篇阐明概念的文档