Java加密算法-加密算法汇总

「爱情、让人受尽委屈。」 2023-10-15 15:12 145阅读 0赞

Java加密算法-加密算法汇总

如基本的单向加密算法:

  • BASE64 严格地说,属于编码格式,而非加密算法
  • MD5(Message Digest algorithm 5,信息摘要算法)
  • SHA(Secure Hash Algorithm,安全散列算法)
  • HMAC(Hash Message Authentication Code,散列消息鉴别码)

    复杂的对称加密(DES、PBE)、非对称加密算法:

  • DES(Data Encryption Standard,数据加密算法)
  • PBE(Password-based encryption,基于密码验证)
  • RSA(算法的名字以发明者的名字命名:Ron Rivest, AdiShamir 和Leonard Adleman)
  • DH(Diffie-Hellman算法,密钥一致协议)
  • DSA(Digital Signature Algorithm,数字签名)
  • ECC(Elliptic Curves Cryptography,椭圆曲线密码编码学)

    本篇内容简要介绍BASE64MD5SHAHMAC几种方法。
    MD5SHAHMAC这三种加密算法,可谓是非可逆加密,就是不可解密的加密方法。我们通常只把他们作为加密的基础。单纯的以上三种的加密并不可靠。

BASE64
按 照RFC2045的定义,Base64被定义为:Base64内容传送编码被设计用来把任意序列的8位字节描述为一种不易被人直接识别的形式。(The Base64 Content-Transfer-Encoding is designed to represent arbitrary sequences of octets in a form that need not be humanly readable.)
常见于邮件、http加密,截取http信息,你就会发现登录操作的用户名、密码字段通过BASE64加密的。

各种Java加密算法

通过java代码实现如下:

  1. /**
  2. * BASE64解密
  3. *
  4. * @param key
  5. * @return
  6. * @throws Exception
  7. */
  8. public static byte[] decryptBASE64(String key) throws Exception {
  9. return (new BASE64Decoder()).decodeBuffer(key);
  10. }
  11. /**
  12. * BASE64加密
  13. *
  14. * @param key
  15. * @return
  16. * @throws Exception
  17. */
  18. public static String encryptBASE64(byte[] key) throws Exception {
  19. return (new BASE64Encoder()).encodeBuffer(key);
  20. }

主要就是BASE64Encoder、BASE64Decoder两个类,我们只需要知道使用对应的方法即可。另,BASE加密后产生的字节位数是8的倍数,如果不够位数以**=**符号填充。

MD5
MD5 – message-digest algorithm 5 (信息-摘要算法)缩写,广泛用于加密和解密技术,常用于文件校验。校验?不管文件多大,经过MD5后都能生成唯一的MD5值。好比现在的ISO校验,都 是MD5校验。怎么用?当然是把ISO经过MD5后产生MD5的值。一般下载linux-ISO的朋友都见过下载链接旁边放着MD5的串。就是用来验证文 件是否一致的。

各种Java加密算法

通过java代码实现如下:

  1. /**
  2. * MD5加密
  3. *
  4. * @param data
  5. * @return
  6. * @throws Exception
  7. */
  8. public static byte[] encryptMD5(byte[] data) throws Exception {
  9. MessageDigest md5 = MessageDigest.getInstance(KEY_MD5);
  10. md5.update(data);
  11. return md5.digest();
  12. }

通常我们不直接使用上述MD5加密。通常将MD5产生的字节数组交给BASE64再加密一把,得到相应的字符串。

SHA
SHA(Secure Hash Algorithm,安全散列算法),数字签名等密码学应用中重要的工具,被广泛地应用于电子商务等信息安全领域。虽然,SHA与MD5通过碰撞法都被破解了, 但是SHA仍然是公认的安全加密算法,较之MD5更为安全。

各种Java加密算法

通过java代码实现如下:

  1. /**
  2. * SHA加密
  3. *
  4. * @param data
  5. * @return
  6. * @throws Exception
  7. */
  8. public static byte[] encryptSHA(byte[] data) throws Exception {
  9. MessageDigest sha = MessageDigest.getInstance(KEY_SHA);
  10. sha.update(data);
  11. return sha.digest();
  12. }
  13. }

HMAC
HMAC(Hash Message Authentication Code,散列消息鉴别码,基于密钥的Hash算法的认证协议。消息鉴别码实现鉴别的原理是,用公开函数和密钥产生一个固定长度的值作为认证标识,用这个 标识鉴别消息的完整性。使用一个密钥生成一个固定大小的小数据块,即MAC,并将其加入到消息中,然后传输。接收方利用与发送方共享的密钥进行鉴别认证 等。

各种Java加密算法

通过java代码实现如下:

  1. /**
  2. * 初始化HMAC密钥
  3. *
  4. * @return
  5. * @throws Exception
  6. */
  7. public static String initMacKey() throws Exception {
  8. KeyGenerator keyGenerator = KeyGenerator.getInstance(KEY_MAC);
  9. SecretKey secretKey = keyGenerator.generateKey();
  10. return encryptBASE64(secretKey.getEncoded());
  11. }
  12. /**
  13. * HMAC加密
  14. *
  15. * @param data
  16. * @param key
  17. * @return
  18. * @throws Exception
  19. */
  20. public static byte[] encryptHMAC(byte[] data, String key) throws Exception {
  21. SecretKey secretKey = new SecretKeySpec(decryptBASE64(key), KEY_MAC);
  22. Mac mac = Mac.getInstance(secretKey.getAlgorithm());
  23. mac.init(secretKey);
  24. return mac.doFinal(data);
  25. }

给出一个完整类,如下:

  1. import java.security.MessageDigest;
  2. import javax.crypto.KeyGenerator;
  3. import javax.crypto.Mac;
  4. import javax.crypto.SecretKey;
  5. import sun.misc.BASE64Decoder;
  6. import sun.misc.BASE64Encoder;
  7. /**
  8. * 基础加密组件
  9. *
  10. * @author 梁栋
  11. * @version 1.0
  12. * @since 1.0
  13. */
  14. public abstract class Coder {
  15. public static final String KEY_SHA = "SHA";
  16. public static final String KEY_MD5 = "MD5";
  17. /**
  18. * MAC算法可选以下多种算法
  19. *
  20. * <pre>
  21. * HmacMD5
  22. * HmacSHA1
  23. * HmacSHA256
  24. * HmacSHA384
  25. * HmacSHA512
  26. * </pre>
  27. */
  28. public static final String KEY_MAC = "HmacMD5";
  29. /**
  30. * BASE64解密
  31. *
  32. * @param key
  33. * @return
  34. * @throws Exception
  35. */
  36. public static byte[] decryptBASE64(String key) throws Exception {
  37. return (new BASE64Decoder()).decodeBuffer(key);
  38. }
  39. /**
  40. * BASE64加密
  41. *
  42. * @param key
  43. * @return
  44. * @throws Exception
  45. */
  46. public static String encryptBASE64(byte[] key) throws Exception {
  47. return (new BASE64Encoder()).encodeBuffer(key);
  48. }
  49. /**
  50. * MD5加密
  51. *
  52. * @param data
  53. * @return
  54. * @throws Exception
  55. */
  56. public static byte[] encryptMD5(byte[] data) throws Exception {
  57. MessageDigest md5 = MessageDigest.getInstance(KEY_MD5);
  58. md5.update(data);
  59. return md5.digest();
  60. }
  61. /**
  62. * SHA加密
  63. *
  64. * @param data
  65. * @return
  66. * @throws Exception
  67. */
  68. public static byte[] encryptSHA(byte[] data) throws Exception {
  69. MessageDigest sha = MessageDigest.getInstance(KEY_SHA);
  70. sha.update(data);
  71. return sha.digest();
  72. }
  73. /**
  74. * 初始化HMAC密钥
  75. *
  76. * @return
  77. * @throws Exception
  78. */
  79. public static String initMacKey() throws Exception {
  80. KeyGenerator keyGenerator = KeyGenerator.getInstance(KEY_MAC);
  81. SecretKey secretKey = keyGenerator.generateKey();
  82. return encryptBASE64(secretKey.getEncoded());
  83. }
  84. /**
  85. * HMAC加密
  86. *
  87. * @param data
  88. * @param key
  89. * @return
  90. * @throws Exception
  91. */
  92. public static byte[] encryptHMAC(byte[] data, String key) throws Exception {
  93. SecretKey secretKey = new SecretKeySpec(decryptBASE64(key), KEY_MAC);
  94. Mac mac = Mac.getInstance(secretKey.getAlgorithm());
  95. mac.init(secretKey);
  96. return mac.doFinal(data);
  97. }
  98. }

再给出一个测试类:

  1. import static org.junit.Assert.*;
  2. import org.junit.Test;
  3. /**
  4. *
  5. * @author 梁栋
  6. * @version 1.0
  7. * @since 1.0
  8. */
  9. public class CoderTest {
  10. @Test
  11. public void test() throws Exception {
  12. String inputStr = "简单加密";
  13. System.err.println("原文:\n" + inputStr);
  14. byte[] inputData = inputStr.getBytes();
  15. String code = Coder.encryptBASE64(inputData);
  16. System.err.println("BASE64加密后:\n" + code);
  17. byte[] output = Coder.decryptBASE64(code);
  18. String outputStr = new String(output);
  19. System.err.println("BASE64解密后:\n" + outputStr);
  20. // 验证BASE64加密解密一致性
  21. assertEquals(inputStr, outputStr);
  22. // 验证MD5对于同一内容加密是否一致
  23. assertArrayEquals(Coder.encryptMD5(inputData), Coder
  24. .encryptMD5(inputData));
  25. // 验证SHA对于同一内容加密是否一致
  26. assertArrayEquals(Coder.encryptSHA(inputData), Coder
  27. .encryptSHA(inputData));
  28. String key = Coder.initMacKey();
  29. System.err.println("Mac密钥:\n" + key);
  30. // 验证HMAC对于同一内容,同一密钥加密是否一致
  31. assertArrayEquals(Coder.encryptHMAC(inputData, key), Coder.encryptHMAC(
  32. inputData, key));
  33. BigInteger md5 = new BigInteger(Coder.encryptMD5(inputData));
  34. System.err.println("MD5:\n" + md5.toString(16));
  35. BigInteger sha = new BigInteger(Coder.encryptSHA(inputData));
  36. System.err.println("SHA:\n" + sha.toString(32));
  37. BigInteger mac = new BigInteger(Coder.encryptHMAC(inputData, inputStr));
  38. System.err.println("HMAC:\n" + mac.toString(16));
  39. }
  40. }

控制台输出:

  1. 原文:
  2. 简单加密
  3. BASE64加密后:
  4. 566A5Y2V5Yqg5a+G
  5. BASE64解密后:
  6. 简单加密
  7. Mac密钥:
  8. uGxdHC+6ylRDaik++leFtGwiMbuYUJ6mqHWyhSgF4trVkVBBSQvY/a22xU8XT1RUemdCWW155Bke
  9. pBIpkd7QHg==
  10. MD5:
  11. -550b4d90349ad4629462113e7934de56
  12. SHA:
  13. 91k9vo7p400cjkgfhjh0ia9qthsjagfn
  14. HMAC:
  15. 2287d192387e95694bdbba2fa941009a

注意
编译时,可能会看到如下提示:

引用

警告:sun.misc.BASE64Decoder 是 Sun 的专用 API,可能会在未来版本中删除

import sun.misc.BASE64Decoder;
^
警告:sun.misc.BASE64Encoder 是 Sun 的专用 API,可能会在未来版本中删除

import sun.misc.BASE64Encoder;
^

BASE64Encoder 和BASE64Decoder是非官方JDK实现类。虽然可以在JDK里能找到并使用,但是在API里查不到。JRE 中 sun 和 com.sun 开头包的类都是未被文档化的,他们属于 java, javax 类库的基础,其中的实现大多数与底层平台有关,一般来说是不推荐使用的。

BASE64的加密解密是双向的,可以求反解。
MD5、SHA以及HMAC是单向加密,任何数据加密后只会产生唯一的一个加密串,通常用来校验数据在传输过程中是否被修改。其中HMAC算法有一个密钥,增强了数据传输过程中的安全性,强化了算法外的不可控因素。
单向加密的用途主要是为了校验数据在传输过程中是否被修改。

接下来我们介绍对称加密算法,最常用的莫过于DES数据加密算法。
DES
DES-Data Encryption Standard,即数据加密算法。是IBM公司于1975年研究成功并公开发表的。DES算法的入口参数有三个:Key、Data、Mode。其中 Key为8个字节共64位,是DES算法的工作密钥;Data也为8个字节64位,是要被加密或被解密的数据;Mode为DES的工作方式,有两种:加密 或解密。
DES算法把64位的明文输入块变为64位的密文输出块,它所使用的密钥也是64位。

通过java代码实现如下:Coder类见

  1. import java.security.Key;
  2. import java.security.SecureRandom;
  3. import javax.crypto.Cipher;
  4. import javax.crypto.KeyGenerator;
  5. import javax.crypto.SecretKey;
  6. import javax.crypto.SecretKeyFactory;
  7. import javax.crypto.spec.DESKeySpec;
  8. /**
  9. * DES安全编码组件
  10. *
  11. * <pre>
  12. * 支持 DES、DESede(TripleDES,就是3DES)、AES、Blowfish、RC2、RC4(ARCFOUR)
  13. * DES key size must be equal to 56
  14. * DESede(TripleDES) key size must be equal to 112 or 168
  15. * AES key size must be equal to 128, 192 or 256,but 192 and 256 bits may not be available
  16. * Blowfish key size must be multiple of 8, and can only range from 32 to 448 (inclusive)
  17. * RC2 key size must be between 40 and 1024 bits
  18. * RC4(ARCFOUR) key size must be between 40 and 1024 bits
  19. * 具体内容 需要关注 JDK Document http://.../docs/technotes/guides/security/SunProviders.html
  20. * </pre>
  21. *
  22. * @author 梁栋
  23. * @version 1.0
  24. * @since 1.0
  25. */
  26. public abstract class DESCoder extends Coder {
  27. /**
  28. * ALGORITHM 算法 <br>
  29. * 可替换为以下任意一种算法,同时key值的size相应改变。
  30. *
  31. * <pre>
  32. * DES key size must be equal to 56
  33. * DESede(TripleDES) key size must be equal to 112 or 168
  34. * AES key size must be equal to 128, 192 or 256,but 192 and 256 bits may not be available
  35. * Blowfish key size must be multiple of 8, and can only range from 32 to 448 (inclusive)
  36. * RC2 key size must be between 40 and 1024 bits
  37. * RC4(ARCFOUR) key size must be between 40 and 1024 bits
  38. * </pre>
  39. *
  40. * 在Key toKey(byte[] key)方法中使用下述代码
  41. * <code>SecretKey secretKey = new SecretKeySpec(key, ALGORITHM);</code> 替换
  42. * <code>
  43. * DESKeySpec dks = new DESKeySpec(key);
  44. * SecretKeyFactory keyFactory = SecretKeyFactory.getInstance(ALGORITHM);
  45. * SecretKey secretKey = keyFactory.generateSecret(dks);
  46. * </code>
  47. */
  48. public static final String ALGORITHM = "DES";
  49. /**
  50. * 转换密钥<br>
  51. *
  52. * @param key
  53. * @return
  54. * @throws Exception
  55. */
  56. private static Key toKey(byte[] key) throws Exception {
  57. DESKeySpec dks = new DESKeySpec(key);
  58. SecretKeyFactory keyFactory = SecretKeyFactory.getInstance(ALGORITHM);
  59. SecretKey secretKey = keyFactory.generateSecret(dks);
  60. // 当使用其他对称加密算法时,如AES、Blowfish等算法时,用下述代码替换上述三行代码
  61. // SecretKey secretKey = new SecretKeySpec(key, ALGORITHM);
  62. return secretKey;
  63. }
  64. /**
  65. * 解密
  66. *
  67. * @param data
  68. * @param key
  69. * @return
  70. * @throws Exception
  71. */
  72. public static byte[] decrypt(byte[] data, String key) throws Exception {
  73. Key k = toKey(decryptBASE64(key));
  74. Cipher cipher = Cipher.getInstance(ALGORITHM);
  75. cipher.init(Cipher.DECRYPT_MODE, k);
  76. return cipher.doFinal(data);
  77. }
  78. /**
  79. * 加密
  80. *
  81. * @param data
  82. * @param key
  83. * @return
  84. * @throws Exception
  85. */
  86. public static byte[] encrypt(byte[] data, String key) throws Exception {
  87. Key k = toKey(decryptBASE64(key));
  88. Cipher cipher = Cipher.getInstance(ALGORITHM);
  89. cipher.init(Cipher.ENCRYPT_MODE, k);
  90. return cipher.doFinal(data);
  91. }
  92. /**
  93. * 生成密钥
  94. *
  95. * @return
  96. * @throws Exception
  97. */
  98. public static String initKey() throws Exception {
  99. return initKey(null);
  100. }
  101. /**
  102. * 生成密钥
  103. *
  104. * @param seed
  105. * @return
  106. * @throws Exception
  107. */
  108. public static String initKey(String seed) throws Exception {
  109. SecureRandom secureRandom = null;
  110. if (seed != null) {
  111. secureRandom = new SecureRandom(decryptBASE64(seed));
  112. } else {
  113. secureRandom = new SecureRandom();
  114. }
  115. KeyGenerator kg = KeyGenerator.getInstance(ALGORITHM);
  116. kg.init(secureRandom);
  117. SecretKey secretKey = kg.generateKey();
  118. return encryptBASE64(secretKey.getEncoded());
  119. }
  120. }

延续上一个类的实现,我们通过MD5以及SHA对字符串加密生成密钥,这是比较常见的密钥生成方式。
再给出一个测试类:

  1. import static org.junit.Assert.*;
  2. import org.junit.Test;
  3. /**
  4. *
  5. * @author 梁栋
  6. * @version 1.0
  7. * @since 1.0
  8. */
  9. public class DESCoderTest {
  10. @Test
  11. public void test() throws Exception {
  12. String inputStr = "DES";
  13. String key = DESCoder.initKey();
  14. System.err.println("原文:\t" + inputStr);
  15. System.err.println("密钥:\t" + key);
  16. byte[] inputData = inputStr.getBytes();
  17. inputData = DESCoder.encrypt(inputData, key);
  18. System.err.println("加密后:\t" + DESCoder.encryptBASE64(inputData));
  19. byte[] outputData = DESCoder.decrypt(inputData, key);
  20. String outputStr = new String(outputData);
  21. System.err.println("解密后:\t" + outputStr);
  22. assertEquals(inputStr, outputStr);
  23. }
  24. }

得到的输出内容如下:

  1. 原文: DES
  2. 密钥: f3wEtRrV6q0=
  3. 加密后: C6qe9oNIzRY=
  4. 解密后: DES

由控制台得到的输出,我们能够比对加密、解密后结果一致。这是一种简单的加密解密方式,只有一个密钥。
其实DES有很多同胞兄弟,如DESede(TripleDES)、AES、Blowfish、RC2、RC4(ARCFOUR)。这里就不过多阐述了,大同小异,只要换掉ALGORITHM换成对应的值,同时做一个代码替换**SecretKey secretKey = new SecretKeySpec(key, ALGORITHM);**就可以了,此外就是密钥长度不同了。

  1. /**
  2. * DES key size must be equal to 56
  3. * DESede(TripleDES) key size must be equal to 112 or 168
  4. * AES key size must be equal to 128, 192 or 256,but 192 and 256 bits may not be available
  5. * Blowfish key size must be multiple of 8, and can only range from 32 to 448 (inclusive)
  6. * RC2 key size must be between 40 and 1024 bits
  7. * RC4(ARCFOUR) key size must be between 40 and 1024 bits
  8. **/

除了DES,我们还知道有DESede(TripleDES,就是3DES)、AES、Blowfish、RC2、RC4(ARCFOUR)等多种对称加密方式,其实现方式大同小异,这里介绍对称加密的另一个算法——PBE
PBE
PBE——Password-based encryption(基于密码加密)。其特点在于口令由用户自己掌管,不借助任何物理媒体;采用随机数(这里我们叫做盐)杂凑多重加密等方法保证数据的安全性。是一种简便的加密方式。
通过java代码实现如下:Coder类见

  1. import java.security.Key;
  2. import java.util.Random;
  3. import javax.crypto.Cipher;
  4. import javax.crypto.SecretKey;
  5. import javax.crypto.SecretKeyFactory;
  6. import javax.crypto.spec.PBEKeySpec;
  7. import javax.crypto.spec.PBEParameterSpec;
  8. /**
  9. * PBE安全编码组件
  10. *
  11. * @author 梁栋
  12. * @version 1.0
  13. * @since 1.0
  14. */
  15. public abstract class PBECoder extends Coder {
  16. /**
  17. * 支持以下任意一种算法
  18. *
  19. * <pre>
  20. * PBEWithMD5AndDES
  21. * PBEWithMD5AndTripleDES
  22. * PBEWithSHA1AndDESede
  23. * PBEWithSHA1AndRC2_40
  24. * </pre>
  25. */
  26. public static final String ALGORITHM = "PBEWITHMD5andDES";
  27. /**
  28. * 盐初始化
  29. *
  30. * @return
  31. * @throws Exception
  32. */
  33. public static byte[] initSalt() throws Exception {
  34. byte[] salt = new byte[8];
  35. Random random = new Random();
  36. random.nextBytes(salt);
  37. return salt;
  38. }
  39. /**
  40. * 转换密钥<br>
  41. *
  42. * @param password
  43. * @return
  44. * @throws Exception
  45. */
  46. private static Key toKey(String password) throws Exception {
  47. PBEKeySpec keySpec = new PBEKeySpec(password.toCharArray());
  48. SecretKeyFactory keyFactory = SecretKeyFactory.getInstance(ALGORITHM);
  49. SecretKey secretKey = keyFactory.generateSecret(keySpec);
  50. return secretKey;
  51. }
  52. /**
  53. * 加密
  54. *
  55. * @param data 数据
  56. * @param password 密码
  57. * @param salt 盐
  58. * @return
  59. * @throws Exception
  60. */
  61. public static byte[] encrypt(byte[] data, String password, byte[] salt)
  62. throws Exception {
  63. Key key = toKey(password);
  64. PBEParameterSpec paramSpec = new PBEParameterSpec(salt, 100);
  65. Cipher cipher = Cipher.getInstance(ALGORITHM);
  66. cipher.init(Cipher.ENCRYPT_MODE, key, paramSpec);
  67. return cipher.doFinal(data);
  68. }
  69. /**
  70. * 解密
  71. *
  72. * @param data 数据
  73. * @param password 密码
  74. * @param salt 盐
  75. * @return
  76. * @throws Exception
  77. */
  78. public static byte[] decrypt(byte[] data, String password, byte[] salt)
  79. throws Exception {
  80. Key key = toKey(password);
  81. PBEParameterSpec paramSpec = new PBEParameterSpec(salt, 100);
  82. Cipher cipher = Cipher.getInstance(ALGORITHM);
  83. cipher.init(Cipher.DECRYPT_MODE, key, paramSpec);
  84. return cipher.doFinal(data);
  85. }
  86. }

再给出一个测试类:

  1. import static org.junit.Assert.*;
  2. import org.junit.Test;
  3. /**
  4. *
  5. * @author 梁栋
  6. * @version 1.0
  7. * @since 1.0
  8. */
  9. public class PBECoderTest {
  10. @Test
  11. public void test() throws Exception {
  12. String inputStr = "abc";
  13. System.err.println("原文: " + inputStr);
  14. byte[] input = inputStr.getBytes();
  15. String pwd = "efg";
  16. System.err.println("密码: " + pwd);
  17. byte[] salt = PBECoder.initSalt();
  18. byte[] data = PBECoder.encrypt(input, pwd, salt);
  19. System.err.println("加密后: " + PBECoder.encryptBASE64(data));
  20. byte[] output = PBECoder.decrypt(data, pwd, salt);
  21. String outputStr = new String(output);
  22. System.err.println("解密后: " + outputStr);
  23. assertEquals(inputStr, outputStr);
  24. }
  25. }

控制台输出:

  1. 原文: abc
  2. 密码: efg
  3. 加密后: iCZ0uRtaAhE=
  4. 解密后: abc

后续我们会介绍非对称加密算法,如RSA、DSA、DH、ECC等。

接下来我们介绍典型的非对称加密算法——RSA

RSA
这种算法1978年就出现了,它是第一个既能用于数据加密也能用于数字签名的算法。它易于理解和操作,也很流行。算法的名字以发明者的名字命名:Ron Rivest, AdiShamir 和Leonard Adleman。
这种加密算法的特点主要是密钥的变化,上文我们看到DES只有一个密钥。相当于只有一把钥匙,如果这把钥匙丢了,数据也就不安全了。RSA同时有两把钥 匙,公钥与私钥。同时支持数字签名。数字签名的意义在于,对传输过来的数据进行校验。确保数据在传输工程中不被修改。

流程分析:

  1. 甲方构建密钥对儿,将公钥公布给乙方,将私钥保留。
  2. 甲方使用私钥加密数据,然后用私钥对加密后的数据签名,发送给乙方签名以及加密后的数据;乙方使用公钥、签名来验证待解密数据是否有效,如果有效使用公钥对数据解密。
  3. 乙方使用公钥加密数据,向甲方发送经过加密后的数据;甲方获得加密数据,通过私钥解密。

按如上步骤给出序列图,如下:

  1. 各种Java加密算法
  2. 各种Java加密算法
  3. 各种Java加密算法

通过java代码实现如下:Coder类见

  1. import java.security.Key;
  2. import java.security.KeyFactory;
  3. import java.security.KeyPair;
  4. import java.security.KeyPairGenerator;
  5. import java.security.PrivateKey;
  6. import java.security.PublicKey;
  7. import java.security.Signature;
  8. import java.security.interfaces.RSAPrivateKey;
  9. import java.security.interfaces.RSAPublicKey;
  10. import java.security.spec.PKCS8EncodedKeySpec;
  11. import java.security.spec.X509EncodedKeySpec;
  12. import java.util.HashMap;
  13. import java.util.Map;
  14. import javax.crypto.Cipher;
  15. /**
  16. * RSA安全编码组件
  17. *
  18. * @author 梁栋
  19. * @version 1.0
  20. * @since 1.0
  21. */
  22. public abstract class RSACoder extends Coder {
  23. public static final String KEY_ALGORITHM = "RSA";
  24. public static final String SIGNATURE_ALGORITHM = "MD5withRSA";
  25. private static final String PUBLIC_KEY = "RSAPublicKey";
  26. private static final String PRIVATE_KEY = "RSAPrivateKey";
  27. /**
  28. * 用私钥对信息生成数字签名
  29. *
  30. * @param data
  31. * 加密数据
  32. * @param privateKey
  33. * 私钥
  34. *
  35. * @return
  36. * @throws Exception
  37. */
  38. public static String sign(byte[] data, String privateKey) throws Exception {
  39. // 解密由base64编码的私钥
  40. byte[] keyBytes = decryptBASE64(privateKey);
  41. // 构造PKCS8EncodedKeySpec对象
  42. PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);
  43. // KEY_ALGORITHM 指定的加密算法
  44. KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
  45. // 取私钥匙对象
  46. PrivateKey priKey = keyFactory.generatePrivate(pkcs8KeySpec);
  47. // 用私钥对信息生成数字签名
  48. Signature signature = Signature.getInstance(SIGNATURE_ALGORITHM);
  49. signature.initSign(priKey);
  50. signature.update(data);
  51. return encryptBASE64(signature.sign());
  52. }
  53. /**
  54. * 校验数字签名
  55. *
  56. * @param data
  57. * 加密数据
  58. * @param publicKey
  59. * 公钥
  60. * @param sign
  61. * 数字签名
  62. *
  63. * @return 校验成功返回true 失败返回false
  64. * @throws Exception
  65. *
  66. */
  67. public static boolean verify(byte[] data, String publicKey, String sign)
  68. throws Exception {
  69. // 解密由base64编码的公钥
  70. byte[] keyBytes = decryptBASE64(publicKey);
  71. // 构造X509EncodedKeySpec对象
  72. X509EncodedKeySpec keySpec = new X509EncodedKeySpec(keyBytes);
  73. // KEY_ALGORITHM 指定的加密算法
  74. KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
  75. // 取公钥匙对象
  76. PublicKey pubKey = keyFactory.generatePublic(keySpec);
  77. Signature signature = Signature.getInstance(SIGNATURE_ALGORITHM);
  78. signature.initVerify(pubKey);
  79. signature.update(data);
  80. // 验证签名是否正常
  81. return signature.verify(decryptBASE64(sign));
  82. }
  83. /**
  84. * 解密<br>
  85. * 用私钥解密
  86. *
  87. * @param data
  88. * @param key
  89. * @return
  90. * @throws Exception
  91. */
  92. public static byte[] decryptByPrivateKey(byte[] data, String key)
  93. throws Exception {
  94. // 对密钥解密
  95. byte[] keyBytes = decryptBASE64(key);
  96. // 取得私钥
  97. PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);
  98. KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
  99. Key privateKey = keyFactory.generatePrivate(pkcs8KeySpec);
  100. // 对数据解密
  101. Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
  102. cipher.init(Cipher.DECRYPT_MODE, privateKey);
  103. return cipher.doFinal(data);
  104. }
  105. /**
  106. * 解密<br>
  107. * 用私钥解密
  108. *
  109. * @param data
  110. * @param key
  111. * @return
  112. * @throws Exception
  113. */
  114. public static byte[] decryptByPublicKey(byte[] data, String key)
  115. throws Exception {
  116. // 对密钥解密
  117. byte[] keyBytes = decryptBASE64(key);
  118. // 取得公钥
  119. X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(keyBytes);
  120. KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
  121. Key publicKey = keyFactory.generatePublic(x509KeySpec);
  122. // 对数据解密
  123. Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
  124. cipher.init(Cipher.DECRYPT_MODE, publicKey);
  125. return cipher.doFinal(data);
  126. }
  127. /**
  128. * 加密<br>
  129. * 用公钥加密
  130. *
  131. * @param data
  132. * @param key
  133. * @return
  134. * @throws Exception
  135. */
  136. public static byte[] encryptByPublicKey(byte[] data, String key)
  137. throws Exception {
  138. // 对公钥解密
  139. byte[] keyBytes = decryptBASE64(key);
  140. // 取得公钥
  141. X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(keyBytes);
  142. KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
  143. Key publicKey = keyFactory.generatePublic(x509KeySpec);
  144. // 对数据加密
  145. Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
  146. cipher.init(Cipher.ENCRYPT_MODE, publicKey);
  147. return cipher.doFinal(data);
  148. }
  149. /**
  150. * 加密<br>
  151. * 用私钥加密
  152. *
  153. * @param data
  154. * @param key
  155. * @return
  156. * @throws Exception
  157. */
  158. public static byte[] encryptByPrivateKey(byte[] data, String key)
  159. throws Exception {
  160. // 对密钥解密
  161. byte[] keyBytes = decryptBASE64(key);
  162. // 取得私钥
  163. PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);
  164. KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM);
  165. Key privateKey = keyFactory.generatePrivate(pkcs8KeySpec);
  166. // 对数据加密
  167. Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());
  168. cipher.init(Cipher.ENCRYPT_MODE, privateKey);
  169. return cipher.doFinal(data);
  170. }
  171. /**
  172. * 取得私钥
  173. *
  174. * @param keyMap
  175. * @return
  176. * @throws Exception
  177. */
  178. public static String getPrivateKey(Map<String, Object> keyMap)
  179. throws Exception {
  180. Key key = (Key) keyMap.get(PRIVATE_KEY);
  181. return encryptBASE64(key.getEncoded());
  182. }
  183. /**
  184. * 取得公钥
  185. *
  186. * @param keyMap
  187. * @return
  188. * @throws Exception
  189. */
  190. public static String getPublicKey(Map<String, Object> keyMap)
  191. throws Exception {
  192. Key key = (Key) keyMap.get(PUBLIC_KEY);
  193. return encryptBASE64(key.getEncoded());
  194. }
  195. /**
  196. * 初始化密钥
  197. *
  198. * @return
  199. * @throws Exception
  200. */
  201. public static Map<String, Object> initKey() throws Exception {
  202. KeyPairGenerator keyPairGen = KeyPairGenerator
  203. .getInstance(KEY_ALGORITHM);
  204. keyPairGen.initialize(1024);
  205. KeyPair keyPair = keyPairGen.generateKeyPair();
  206. // 公钥
  207. RSAPublicKey publicKey = (RSAPublicKey) keyPair.getPublic();
  208. // 私钥
  209. RSAPrivateKey privateKey = (RSAPrivateKey) keyPair.getPrivate();
  210. Map<String, Object> keyMap = new HashMap<String, Object>(2);
  211. keyMap.put(PUBLIC_KEY, publicKey);
  212. keyMap.put(PRIVATE_KEY, privateKey);
  213. return keyMap;
  214. }
  215. }

再给出一个测试类:

  1. import static org.junit.Assert.*;
  2. import org.junit.Before;
  3. import org.junit.Test;
  4. import java.util.Map;
  5. /**
  6. *
  7. * @author 梁栋
  8. * @version 1.0
  9. * @since 1.0
  10. */
  11. public class RSACoderTest {
  12. private String publicKey;
  13. private String privateKey;
  14. @Before
  15. public void setUp() throws Exception {
  16. Map<String, Object> keyMap = RSACoder.initKey();
  17. publicKey = RSACoder.getPublicKey(keyMap);
  18. privateKey = RSACoder.getPrivateKey(keyMap);
  19. System.err.println("公钥: \n\r" + publicKey);
  20. System.err.println("私钥: \n\r" + privateKey);
  21. }
  22. @Test
  23. public void test() throws Exception {
  24. System.err.println("公钥加密——私钥解密");
  25. String inputStr = "abc";
  26. byte[] data = inputStr.getBytes();
  27. byte[] encodedData = RSACoder.encryptByPublicKey(data, publicKey);
  28. byte[] decodedData = RSACoder.decryptByPrivateKey(encodedData,
  29. privateKey);
  30. String outputStr = new String(decodedData);
  31. System.err.println("加密前: " + inputStr + "\n\r" + "解密后: " + outputStr);
  32. assertEquals(inputStr, outputStr);
  33. }
  34. @Test
  35. public void testSign() throws Exception {
  36. System.err.println("私钥加密——公钥解密");
  37. String inputStr = "sign";
  38. byte[] data = inputStr.getBytes();
  39. byte[] encodedData = RSACoder.encryptByPrivateKey(data, privateKey);
  40. byte[] decodedData = RSACoder
  41. .decryptByPublicKey(encodedData, publicKey);
  42. String outputStr = new String(decodedData);
  43. System.err.println("加密前: " + inputStr + "\n\r" + "解密后: " + outputStr);
  44. assertEquals(inputStr, outputStr);
  45. System.err.println("私钥签名——公钥验证签名");
  46. // 产生签名
  47. String sign = RSACoder.sign(encodedData, privateKey);
  48. System.err.println("签名:\r" + sign);
  49. // 验证签名
  50. boolean status = RSACoder.verify(encodedData, publicKey, sign);
  51. System.err.println("状态:\r" + status);
  52. assertTrue(status);
  53. }
  54. }

控制台输出:

  1. 公钥:
  2. MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCYU/+I0+z1aBl5X6DUUOHQ7FZpmBSDbKTtx89J
  3. EcB64jFCkunELT8qiKly7fzEqD03g8ALlu5XvX+bBqHFy7YPJJP0ekE2X3wjUnh2NxlqpH3/B/xm
  4. 1ZdSlCwDIkbijhBVDjA/bu5BObhZqQmDwIxlQInL9oVz+o6FbAZCyHBd7wIDAQAB
  5. 私钥:
  6. MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAJhT/4jT7PVoGXlfoNRQ4dDsVmmY
  7. FINspO3Hz0kRwHriMUKS6cQtPyqIqXLt/MSoPTeDwAuW7le9f5sGocXLtg8kk/R6QTZffCNSeHY3
  8. GWqkff8H/GbVl1KULAMiRuKOEFUOMD9u7kE5uFmpCYPAjGVAicv2hXP6joVsBkLIcF3vAgMBAAEC
  9. gYBvZHWoZHmS2EZQqKqeuGr58eobG9hcZzWQoJ4nq/CarBAjw/VovUHE490uK3S9ht4FW7Yzg3LV
  10. /MB06Huifh6qf/X9NQA7SeZRRC8gnCQk6JuDIEVJOud5jU+9tyumJakDKodQ3Jf2zQtNr+5ZdEPl
  11. uwWgv9c4kmpjhAdyMuQmYQJBANn6pcgvyYaia52dnu+yBUsGkaFfwXkzFSExIbi0MXTkhEb/ER/D
  12. rLytukkUu5S5ecz/KBa8U4xIslZDYQbLz5ECQQCy5dutt7RsxN4+dxCWn0/1FrkWl2G329Ucewm3
  13. QU9CKu4D+7Kqdj+Ha3lXP8F0Etaaapi7+EfkRUpukn2ItZV/AkEAlk+I0iphxT1rCB0Q5CjWDY5S
  14. Df2B5JmdEG5Y2o0nLXwG2w44OLct/k2uD4cEcuITY5Dvi/4BftMCZwm/dnhEgQJACIktJSnJwxLV
  15. o9dchENPtlsCM9C/Sd2EWpqISSUlmfugZbJBwR5pQ5XeMUqKeXZYpP+HEBj1nS+tMH9u2/IGEwJA
  16. fL8mZiZXan/oBKrblAbplNcKWGRVD/3y65042PAEeghahlJMiYquV5DzZajuuT0wbJ5xQuZB01+X
  17. nfpFpBJ2dw==
  18. 公钥加密——私钥解密
  19. 加密前: abc
  20. 解密后: abc
  21. 公钥:
  22. MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDdOj40yEB48XqWxmPILmJAc7UecIN7F32etSHF
  23. 9rwbuEh3+iTPOGSxhoSQpOED0vOb0ZIMkBXZSgsxLaBSin2RZ09YKWRjtpCA0kDkiD11gj4tzTiM
  24. l9qq1kwSK7ZkGAgodEn3yIILVmQDuEImHOXFtulvJ71ka07u3LuwUNdB/wIDAQAB
  25. 私钥:
  26. MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAN06PjTIQHjxepbGY8guYkBztR5w
  27. g3sXfZ61IcX2vBu4SHf6JM84ZLGGhJCk4QPS85vRkgyQFdlKCzEtoFKKfZFnT1gpZGO2kIDSQOSI
  28. PXWCPi3NOIyX2qrWTBIrtmQYCCh0SffIggtWZAO4QiYc5cW26W8nvWRrTu7cu7BQ10H/AgMBAAEC
  29. gYEAz2JWBizjI31bqhP4XiP9PuY5F3vqBW4T+L9cFbQiyumKJc58yzTWUAUGKIIn3enXLG7dNqGr
  30. mbJro4JeFIJ3CiVDpXR9+FluIgI4SXm7ioGKF2NOMA9LR5Fu82W+pLfpTN2y2SaLYWEDZyp53BxY
  31. j9gUxaxi1MQs+C1ZgDF2xmECQQDy70bQntbRfysP+ppCtd56YRnES1Tyekw0wryS2tr+ivQJl7JF
  32. gp5rPAOXpgrq36xHDwUspQ0sJ0vj0O7ywxr1AkEA6SAaLhrJJrYucC0jxwAhUYyaPN+aOsWymaRh
  33. 9jA/Wc0wp29SbGTh5CcMuGpXm1g0M+FKW3dGiHgS3rVUKim4owJAbnxgapUzAgiiHxxMeDaavnHW
  34. 9C2GrtjsO7qtZOTgYI/1uT8itvZW8lJTF+9OW8/qXE76fXl7ai9dFnl5kzMk2QJBALfHz/vCsArt
  35. mkRiwY6zApE4Z6tPl1V33ymSVovvUzHnOdD1SKQdD5t+UV/crb3QVi8ED0t2B0u0ZSPfDT/D7kMC
  36. QDpwdj9k2F5aokLHBHUNJPFDAp7a5QMaT64gv/d48ITJ68Co+v5WzLMpzJBYXK6PAtqIhxbuPEc2
  37. I2k1Afmrwyw=
  38. 私钥加密——公钥解密
  39. 加密前: sign
  40. 解密后: sign
  41. 私钥签名——公钥验证签名
  42. 签名:
  43. ud1RsIwmSC1pN22I4IXteg1VD2FbiehKUfNxgVSHzvQNIK+d20FCkHCqh9djP3h94iWnIUY0ifU+
  44. mbJkhAl/i5krExOE0hknOnPMcEP+lZV1RbJI2zG2YooSp2XDleqrQk5e/QF2Mx0Zxt8Xsg7ucVpn
  45. i3wwbYWs9wSzIf0UjlM=
  46. 状态:
  47. true

简要总结一下,使用公钥加密、私钥解密,完成了乙方到甲方的一次数据传递,通过私钥加密、公钥解密,同时通过私钥签名、公钥验证签名,完成了一次甲方到乙方的数据传递与验证,两次数据传递完成一整套的数据交互!

类似数字签名,数字信封是这样描述的:

数字信封
数字信封用加密技术来保证只有特定的收信人才能阅读信的内容。
流程:
信息发送方采用对称密钥来加密信息,然后再用接收方的公钥来加密此对称密钥(这部分称为数字信封),再将它和信息一起发送给接收方;接收方先用相应的私钥打开数字信封,得到对称密钥,然后使用对称密钥再解开信息。

接下来我们分析DH加密算法,一种适基于密钥一致协议的加密算法。
DH
Diffie- Hellman算法(D-H算法),密钥一致协议。是由公开密钥密码体制的奠基人Diffie和Hellman所提出的一种思想。简单的说就是允许两名用 户在公开媒体上交换信息以生成”一致”的、可以共享的密钥。换句话说,就是由甲方产出一对密钥(公钥、私钥),乙方依照甲方公钥产生乙方密钥对(公钥、私 钥)。以此为基线,作为数据传输保密基础,同时双方使用同一种对称加密算法构建本地密钥(SecretKey)对数据加密。这样,在互通了本地密钥 (SecretKey)算法后,甲乙双方公开自己的公钥,使用对方的公钥和刚才产生的私钥加密数据,同时可以使用对方的公钥和自己的私钥对数据解密。不单 单是甲乙双方两方,可以扩展为多方共享数据通讯,这样就完成了网络交互数据的安全通讯!该算法源于中国的同余定理——中国馀数定理。

流程分析:

1.甲方构建密钥对儿,将公钥公布给乙方,将私钥保留;双方约定数据加密算法;乙方通过甲方公钥构建密钥对儿,将公钥公布给甲方,将私钥保留。
2.甲方使用私钥、乙方公钥、约定数据加密算法构建本地密钥,然后通过本地密钥加密数据,发送给乙方加密后的数据;乙方使用私钥、甲方公钥、约定数据加密算法构建本地密钥,然后通过本地密钥对数据解密。
3.乙方使用私钥、甲方公钥、约定数据加密算法构建本地密钥,然后通过本地密钥加密数据,发送给甲方加密后的数据;甲方使用私钥、乙方公钥、约定数据加密算法构建本地密钥,然后通过本地密钥对数据解密。

各种Java加密算法

  1. 各种Java加密算法
  2. 各种Java加密算法

通过java代码实现如下:Coder类见

  1. import java.security.Key;
  2. import java.security.KeyFactory;
  3. import java.security.KeyPair;
  4. import java.security.KeyPairGenerator;
  5. import java.security.PublicKey;
  6. import java.security.spec.PKCS8EncodedKeySpec;
  7. import java.security.spec.X509EncodedKeySpec;
  8. import java.util.HashMap;
  9. import java.util.Map;
  10. import javax.crypto.Cipher;
  11. import javax.crypto.KeyAgreement;
  12. import javax.crypto.SecretKey;
  13. import javax.crypto.interfaces.DHPrivateKey;
  14. import javax.crypto.interfaces.DHPublicKey;
  15. import javax.crypto.spec.DHParameterSpec;
  16. /**
  17. * DH安全编码组件
  18. *
  19. * @author 梁栋
  20. * @version 1.0
  21. * @since 1.0
  22. */
  23. public abstract class DHCoder extends Coder {
  24. public static final String ALGORITHM = "DH";
  25. /**
  26. * 默认密钥字节数
  27. *
  28. * <pre>
  29. * DH
  30. * Default Keysize 1024
  31. * Keysize must be a multiple of 64, ranging from 512 to 1024 (inclusive).
  32. * </pre>
  33. */
  34. private static final int KEY_SIZE = 1024;
  35. /**
  36. * DH加密下需要一种对称加密算法对数据加密,这里我们使用DES,也可以使用其他对称加密算法。
  37. */
  38. public static final String SECRET_ALGORITHM = "DES";
  39. private static final String PUBLIC_KEY = "DHPublicKey";
  40. private static final String PRIVATE_KEY = "DHPrivateKey";
  41. /**
  42. * 初始化甲方密钥
  43. *
  44. * @return
  45. * @throws Exception
  46. */
  47. public static Map<String, Object> initKey() throws Exception {
  48. KeyPairGenerator keyPairGenerator = KeyPairGenerator
  49. .getInstance(ALGORITHM);
  50. keyPairGenerator.initialize(KEY_SIZE);
  51. KeyPair keyPair = keyPairGenerator.generateKeyPair();
  52. // 甲方公钥
  53. DHPublicKey publicKey = (DHPublicKey) keyPair.getPublic();
  54. // 甲方私钥
  55. DHPrivateKey privateKey = (DHPrivateKey) keyPair.getPrivate();
  56. Map<String, Object> keyMap = new HashMap<String, Object>(2);
  57. keyMap.put(PUBLIC_KEY, publicKey);
  58. keyMap.put(PRIVATE_KEY, privateKey);
  59. return keyMap;
  60. }
  61. /**
  62. * 初始化乙方密钥
  63. *
  64. * @param key
  65. * 甲方公钥
  66. * @return
  67. * @throws Exception
  68. */
  69. public static Map<String, Object> initKey(String key) throws Exception {
  70. // 解析甲方公钥
  71. byte[] keyBytes = decryptBASE64(key);
  72. X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(keyBytes);
  73. KeyFactory keyFactory = KeyFactory.getInstance(ALGORITHM);
  74. PublicKey pubKey = keyFactory.generatePublic(x509KeySpec);
  75. // 由甲方公钥构建乙方密钥
  76. DHParameterSpec dhParamSpec = ((DHPublicKey) pubKey).getParams();
  77. KeyPairGenerator keyPairGenerator = KeyPairGenerator
  78. .getInstance(keyFactory.getAlgorithm());
  79. keyPairGenerator.initialize(dhParamSpec);
  80. KeyPair keyPair = keyPairGenerator.generateKeyPair();
  81. // 乙方公钥
  82. DHPublicKey publicKey = (DHPublicKey) keyPair.getPublic();
  83. // 乙方私钥
  84. DHPrivateKey privateKey = (DHPrivateKey) keyPair.getPrivate();
  85. Map<String, Object> keyMap = new HashMap<String, Object>(2);
  86. keyMap.put(PUBLIC_KEY, publicKey);
  87. keyMap.put(PRIVATE_KEY, privateKey);
  88. return keyMap;
  89. }
  90. /**
  91. * 加密<br>
  92. *
  93. * @param data
  94. * 待加密数据
  95. * @param publicKey
  96. * 甲方公钥
  97. * @param privateKey
  98. * 乙方私钥
  99. * @return
  100. * @throws Exception
  101. */
  102. public static byte[] encrypt(byte[] data, String publicKey,
  103. String privateKey) throws Exception {
  104. // 生成本地密钥
  105. SecretKey secretKey = getSecretKey(publicKey, privateKey);
  106. // 数据加密
  107. Cipher cipher = Cipher.getInstance(secretKey.getAlgorithm());
  108. cipher.init(Cipher.ENCRYPT_MODE, secretKey);
  109. return cipher.doFinal(data);
  110. }
  111. /**
  112. * 解密<br>
  113. *
  114. * @param data
  115. * 待解密数据
  116. * @param publicKey
  117. * 乙方公钥
  118. * @param privateKey
  119. * 乙方私钥
  120. * @return
  121. * @throws Exception
  122. */
  123. public static byte[] decrypt(byte[] data, String publicKey,
  124. String privateKey) throws Exception {
  125. // 生成本地密钥
  126. SecretKey secretKey = getSecretKey(publicKey, privateKey);
  127. // 数据解密
  128. Cipher cipher = Cipher.getInstance(secretKey.getAlgorithm());
  129. cipher.init(Cipher.DECRYPT_MODE, secretKey);
  130. return cipher.doFinal(data);
  131. }
  132. /**
  133. * 构建密钥
  134. *
  135. * @param publicKey
  136. * 公钥
  137. * @param privateKey
  138. * 私钥
  139. * @return
  140. * @throws Exception
  141. */
  142. private static SecretKey getSecretKey(String publicKey, String privateKey)
  143. throws Exception {
  144. // 初始化公钥
  145. byte[] pubKeyBytes = decryptBASE64(publicKey);
  146. KeyFactory keyFactory = KeyFactory.getInstance(ALGORITHM);
  147. X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(pubKeyBytes);
  148. PublicKey pubKey = keyFactory.generatePublic(x509KeySpec);
  149. // 初始化私钥
  150. byte[] priKeyBytes = decryptBASE64(privateKey);
  151. PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(priKeyBytes);
  152. Key priKey = keyFactory.generatePrivate(pkcs8KeySpec);
  153. KeyAgreement keyAgree = KeyAgreement.getInstance(keyFactory
  154. .getAlgorithm());
  155. keyAgree.init(priKey);
  156. keyAgree.doPhase(pubKey, true);
  157. // 生成本地密钥
  158. SecretKey secretKey = keyAgree.generateSecret(SECRET_ALGORITHM);
  159. return secretKey;
  160. }
  161. /**
  162. * 取得私钥
  163. *
  164. * @param keyMap
  165. * @return
  166. * @throws Exception
  167. */
  168. public static String getPrivateKey(Map<String, Object> keyMap)
  169. throws Exception {
  170. Key key = (Key) keyMap.get(PRIVATE_KEY);
  171. return encryptBASE64(key.getEncoded());
  172. }
  173. /**
  174. * 取得公钥
  175. *
  176. * @param keyMap
  177. * @return
  178. * @throws Exception
  179. */
  180. public static String getPublicKey(Map<String, Object> keyMap)
  181. throws Exception {
  182. Key key = (Key) keyMap.get(PUBLIC_KEY);
  183. return encryptBASE64(key.getEncoded());
  184. }
  185. }

再给出一个测试类:

  1. import static org.junit.Assert.*;
  2. import java.util.Map;
  3. import org.junit.Test;
  4. /**
  5. *
  6. * @author 梁栋
  7. * @version 1.0
  8. * @since 1.0
  9. */
  10. public class DHCoderTest {
  11. @Test
  12. public void test() throws Exception {
  13. // 生成甲方密钥对儿
  14. Map<String, Object> aKeyMap = DHCoder.initKey();
  15. String aPublicKey = DHCoder.getPublicKey(aKeyMap);
  16. String aPrivateKey = DHCoder.getPrivateKey(aKeyMap);
  17. System.err.println("甲方公钥:\r" + aPublicKey);
  18. System.err.println("甲方私钥:\r" + aPrivateKey);
  19. // 由甲方公钥产生本地密钥对儿
  20. Map<String, Object> bKeyMap = DHCoder.initKey(aPublicKey);
  21. String bPublicKey = DHCoder.getPublicKey(bKeyMap);
  22. String bPrivateKey = DHCoder.getPrivateKey(bKeyMap);
  23. System.err.println("乙方公钥:\r" + bPublicKey);
  24. System.err.println("乙方私钥:\r" + bPrivateKey);
  25. String aInput = "abc ";
  26. System.err.println("原文: " + aInput);
  27. // 由甲方公钥,乙方私钥构建密文
  28. byte[] aCode = DHCoder.encrypt(aInput.getBytes(), aPublicKey,
  29. bPrivateKey);
  30. // 由乙方公钥,甲方私钥解密
  31. byte[] aDecode = DHCoder.decrypt(aCode, bPublicKey, aPrivateKey);
  32. String aOutput = (new String(aDecode));
  33. System.err.println("解密: " + aOutput);
  34. assertEquals(aInput, aOutput);
  35. System.err.println(" ===============反过来加密解密================== ");
  36. String bInput = "def ";
  37. System.err.println("原文: " + bInput);
  38. // 由乙方公钥,甲方私钥构建密文
  39. byte[] bCode = DHCoder.encrypt(bInput.getBytes(), bPublicKey,
  40. aPrivateKey);
  41. // 由甲方公钥,乙方私钥解密
  42. byte[] bDecode = DHCoder.decrypt(bCode, aPublicKey, bPrivateKey);
  43. String bOutput = (new String(bDecode));
  44. System.err.println("解密: " + bOutput);
  45. assertEquals(bInput, bOutput);
  46. }
  47. }

控制台输出:

  1. 甲方公钥:
  2. MIHfMIGXBgkqhkiG9w0BAwEwgYkCQQD8poLOjhLKuibvzPcRDlJtsHiwXt7LzR60ogjzrhYXrgHz
  3. W5Gkfm32NBPF4S7QiZvNEyrNUNmRUb3EPuc3WS4XAkBnhHGyepz0TukaScUUfbGpqvJE8FpDTWSG
  4. kx0tFCcbnjUDC3H9c9oXkGmzLik1Yw4cIGI1TQ2iCmxBblC+eUykAgIBgANDAAJAdAWBVmIzqcko
  5. Ej6qFjLDL2+Y3FPq1iRbnOyOpDj71yKaK1K+FhTv04B0zy4DKcvAASV7/Gv0W+bgqdmffRkqrQ==
  6. 甲方私钥:
  7. MIHRAgEAMIGXBgkqhkiG9w0BAwEwgYkCQQD8poLOjhLKuibvzPcRDlJtsHiwXt7LzR60ogjzrhYX
  8. rgHzW5Gkfm32NBPF4S7QiZvNEyrNUNmRUb3EPuc3WS4XAkBnhHGyepz0TukaScUUfbGpqvJE8FpD
  9. TWSGkx0tFCcbnjUDC3H9c9oXkGmzLik1Yw4cIGI1TQ2iCmxBblC+eUykAgIBgAQyAjACJRfy1LyR
  10. eHyD+4Hfb+xR0uoIGR1oL9i9Nk6g2AAuaDPgEVWHn+QXID13yL/uDos=
  11. 乙方公钥:
  12. MIHfMIGXBgkqhkiG9w0BAwEwgYkCQQD8poLOjhLKuibvzPcRDlJtsHiwXt7LzR60ogjzrhYXrgHz
  13. W5Gkfm32NBPF4S7QiZvNEyrNUNmRUb3EPuc3WS4XAkBnhHGyepz0TukaScUUfbGpqvJE8FpDTWSG
  14. kx0tFCcbnjUDC3H9c9oXkGmzLik1Yw4cIGI1TQ2iCmxBblC+eUykAgIBgANDAAJAVEYSfBA+I9nr
  15. dWw3OBv475C+eBrWBBYqt0m6/eu4ptuDQHwV4MmUtKAC2wc2nNrdb1wmBhY1X8RnWkJ1XmdDbQ==
  16. 乙方私钥:
  17. MIHSAgEAMIGXBgkqhkiG9w0BAwEwgYkCQQD8poLOjhLKuibvzPcRDlJtsHiwXt7LzR60ogjzrhYX
  18. rgHzW5Gkfm32NBPF4S7QiZvNEyrNUNmRUb3EPuc3WS4XAkBnhHGyepz0TukaScUUfbGpqvJE8FpD
  19. TWSGkx0tFCcbnjUDC3H9c9oXkGmzLik1Yw4cIGI1TQ2iCmxBblC+eUykAgIBgAQzAjEAqaZiCdXp
  20. 2iNpdBlHRaO9ir70wo2n32xNlIzIX19VLSPCDdeUWkgRv4CEj/8k+/yd
  21. 原文: abc
  22. 解密: abc
  23. ===============反过来加密解密==================
  24. 原文: def
  25. 解密: def

如我所言,甲乙双方在获得对方公钥后可以对发送给对方的数据加密,同时也能对接收到的数据解密,达到了数据安全通信的目的!

接下来我们介绍DSA数字签名,非对称加密的另一种实现。
DSA
DSA-Digital Signature Algorithm 是Schnorr和ElGamal签名算法的变种,被美国NIST作为DSS(DigitalSignature Standard)。简单的说,这是一种更高级的验证方式,用作数字签名。不单单只有公钥、私钥,还有数字签名。私钥加密生成数字签名,公钥验证数据及签 名。如果数据和签名不匹配则认为验证失败!数字签名的作用就是校验数据在传输过程中不被修改。数字签名,是单向加密的升级!

  1. 各种Java加密算法
  2. 各种Java加密算法

通过java代码实现如下:Coder类见

  1. import java.security.Key;
  2. import java.security.KeyFactory;
  3. import java.security.KeyPair;
  4. import java.security.KeyPairGenerator;
  5. import java.security.PrivateKey;
  6. import java.security.PublicKey;
  7. import java.security.SecureRandom;
  8. import java.security.Signature;
  9. import java.security.interfaces.DSAPrivateKey;
  10. import java.security.interfaces.DSAPublicKey;
  11. import java.security.spec.PKCS8EncodedKeySpec;
  12. import java.security.spec.X509EncodedKeySpec;
  13. import java.util.HashMap;
  14. import java.util.Map;
  15. /**
  16. * DSA安全编码组件
  17. *
  18. * @author 梁栋
  19. * @version 1.0
  20. * @since 1.0
  21. */
  22. public abstract class DSACoder extends Coder {
  23. public static final String ALGORITHM = "DSA";
  24. /**
  25. * 默认密钥字节数
  26. *
  27. * <pre>
  28. * DSA
  29. * Default Keysize 1024
  30. * Keysize must be a multiple of 64, ranging from 512 to 1024 (inclusive).
  31. * </pre>
  32. */
  33. private static final int KEY_SIZE = 1024;
  34. /**
  35. * 默认种子
  36. */
  37. private static final String DEFAULT_SEED = "0f22507a10bbddd07d8a3082122966e3";
  38. private static final String PUBLIC_KEY = "DSAPublicKey";
  39. private static final String PRIVATE_KEY = "DSAPrivateKey";
  40. /**
  41. * 用私钥对信息生成数字签名
  42. *
  43. * @param data
  44. * 加密数据
  45. * @param privateKey
  46. * 私钥
  47. *
  48. * @return
  49. * @throws Exception
  50. */
  51. public static String sign(byte[] data, String privateKey) throws Exception {
  52. // 解密由base64编码的私钥
  53. byte[] keyBytes = decryptBASE64(privateKey);
  54. // 构造PKCS8EncodedKeySpec对象
  55. PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);
  56. // KEY_ALGORITHM 指定的加密算法
  57. KeyFactory keyFactory = KeyFactory.getInstance(ALGORITHM);
  58. // 取私钥匙对象
  59. PrivateKey priKey = keyFactory.generatePrivate(pkcs8KeySpec);
  60. // 用私钥对信息生成数字签名
  61. Signature signature = Signature.getInstance(keyFactory.getAlgorithm());
  62. signature.initSign(priKey);
  63. signature.update(data);
  64. return encryptBASE64(signature.sign());
  65. }
  66. /**
  67. * 校验数字签名
  68. *
  69. * @param data
  70. * 加密数据
  71. * @param publicKey
  72. * 公钥
  73. * @param sign
  74. * 数字签名
  75. *
  76. * @return 校验成功返回true 失败返回false
  77. * @throws Exception
  78. *
  79. */
  80. public static boolean verify(byte[] data, String publicKey, String sign)
  81. throws Exception {
  82. // 解密由base64编码的公钥
  83. byte[] keyBytes = decryptBASE64(publicKey);
  84. // 构造X509EncodedKeySpec对象
  85. X509EncodedKeySpec keySpec = new X509EncodedKeySpec(keyBytes);
  86. // ALGORITHM 指定的加密算法
  87. KeyFactory keyFactory = KeyFactory.getInstance(ALGORITHM);
  88. // 取公钥匙对象
  89. PublicKey pubKey = keyFactory.generatePublic(keySpec);
  90. Signature signature = Signature.getInstance(keyFactory.getAlgorithm());
  91. signature.initVerify(pubKey);
  92. signature.update(data);
  93. // 验证签名是否正常
  94. return signature.verify(decryptBASE64(sign));
  95. }
  96. /**
  97. * 生成密钥
  98. *
  99. * @param seed
  100. * 种子
  101. * @return 密钥对象
  102. * @throws Exception
  103. */
  104. public static Map<String, Object> initKey(String seed) throws Exception {
  105. KeyPairGenerator keygen = KeyPairGenerator.getInstance(ALGORITHM);
  106. // 初始化随机产生器
  107. SecureRandom secureRandom = new SecureRandom();
  108. secureRandom.setSeed(seed.getBytes());
  109. keygen.initialize(KEY_SIZE, secureRandom);
  110. KeyPair keys = keygen.genKeyPair();
  111. DSAPublicKey publicKey = (DSAPublicKey) keys.getPublic();
  112. DSAPrivateKey privateKey = (DSAPrivateKey) keys.getPrivate();
  113. Map<String, Object> map = new HashMap<String, Object>(2);
  114. map.put(PUBLIC_KEY, publicKey);
  115. map.put(PRIVATE_KEY, privateKey);
  116. return map;
  117. }
  118. /**
  119. * 默认生成密钥
  120. *
  121. * @return 密钥对象
  122. * @throws Exception
  123. */
  124. public static Map<String, Object> initKey() throws Exception {
  125. return initKey(DEFAULT_SEED);
  126. }
  127. /**
  128. * 取得私钥
  129. *
  130. * @param keyMap
  131. * @return
  132. * @throws Exception
  133. */
  134. public static String getPrivateKey(Map<String, Object> keyMap)
  135. throws Exception {
  136. Key key = (Key) keyMap.get(PRIVATE_KEY);
  137. return encryptBASE64(key.getEncoded());
  138. }
  139. /**
  140. * 取得公钥
  141. *
  142. * @param keyMap
  143. * @return
  144. * @throws Exception
  145. */
  146. public static String getPublicKey(Map<String, Object> keyMap)
  147. throws Exception {
  148. Key key = (Key) keyMap.get(PUBLIC_KEY);
  149. return encryptBASE64(key.getEncoded());
  150. }
  151. }

再给出一个测试类:

  1. import static org.junit.Assert.*;
  2. import java.util.Map;
  3. import org.junit.Test;
  4. /**
  5. *
  6. * @author 梁栋
  7. * @version 1.0
  8. * @since 1.0
  9. */
  10. public class DSACoderTest {
  11. @Test
  12. public void test() throws Exception {
  13. String inputStr = "abc";
  14. byte[] data = inputStr.getBytes();
  15. // 构建密钥
  16. Map<String, Object> keyMap = DSACoder.initKey();
  17. // 获得密钥
  18. String publicKey = DSACoder.getPublicKey(keyMap);
  19. String privateKey = DSACoder.getPrivateKey(keyMap);
  20. System.err.println("公钥:\r" + publicKey);
  21. System.err.println("私钥:\r" + privateKey);
  22. // 产生签名
  23. String sign = DSACoder.sign(data, privateKey);
  24. System.err.println("签名:\r" + sign);
  25. // 验证签名
  26. boolean status = DSACoder.verify(data, publicKey, sign);
  27. System.err.println("状态:\r" + status);
  28. assertTrue(status);
  29. }
  30. }

控制台输出:

  1. 公钥:
  2. MIIBtzCCASwGByqGSM44BAEwggEfAoGBAP1/U4EddRIpUt9KnC7s5Of2EbdSPO9EAMMeP4C2USZp
  3. RV1AIlH7WT2NWPq/xfW6MPbLm1Vs14E7gB00b/JmYLdrmVClpJ+f6AR7ECLCT7up1/63xhv4O1fn
  4. xqimFQ8E+4P208UewwI1VBNaFpEy9nXzrith1yrv8iIDGZ3RSAHHAhUAl2BQjxUjC8yykrmCouuE
  5. C/BYHPUCgYEA9+GghdabPd7LvKtcNrhXuXmUr7v6OuqC+VdMCz0HgmdRWVeOutRZT+ZxBxCBgLRJ
  6. FnEj6EwoFhO3zwkyjMim4TwWeotUfI0o4KOuHiuzpnWRbqN/C/ohNWLx+2J6ASQ7zKTxvqhRkImo
  7. g9/hWuWfBpKLZl6Ae1UlZAFMO/7PSSoDgYQAAoGAIu4RUlcQLp49PI0MrbssOY+3uySVnp0TULSv
  8. 5T4VaHoKzsLHgGTrwOvsGA+V3yCNl2WDu3D84bSLF7liTWgOj+SMOEaPk4VyRTlLXZWGPsf1Mfd9
  9. 21XAbMeVyKDSHHVGbMjBScajf3bXooYQMlyoHiOt/WrCo+mv7efstMM0PGo=
  10. 私钥:
  11. MIIBTAIBADCCASwGByqGSM44BAEwggEfAoGBAP1/U4EddRIpUt9KnC7s5Of2EbdSPO9EAMMeP4C2
  12. USZpRV1AIlH7WT2NWPq/xfW6MPbLm1Vs14E7gB00b/JmYLdrmVClpJ+f6AR7ECLCT7up1/63xhv4
  13. O1fnxqimFQ8E+4P208UewwI1VBNaFpEy9nXzrith1yrv8iIDGZ3RSAHHAhUAl2BQjxUjC8yykrmC
  14. ouuEC/BYHPUCgYEA9+GghdabPd7LvKtcNrhXuXmUr7v6OuqC+VdMCz0HgmdRWVeOutRZT+ZxBxCB
  15. gLRJFnEj6EwoFhO3zwkyjMim4TwWeotUfI0o4KOuHiuzpnWRbqN/C/ohNWLx+2J6ASQ7zKTxvqhR
  16. kImog9/hWuWfBpKLZl6Ae1UlZAFMO/7PSSoEFwIVAIegLUtmm2oQKQJTOiLugHTSjl/q
  17. 签名:
  18. MC0CFQCMg0J/uZmF8GuRpr3TNq48w60nDwIUJCyYNah+HtbU6NcQfy8Ac6LeLQs=
  19. 状态:
  20. true

注意状态为true,就验证成功!

ECC
ECC-Elliptic Curves Cryptography,椭圆曲线密码编码学,是目前已知的公钥体制中,对每比特所提供加密强度最高的一种体制。在软件注册保护方面起到很大的作用,一般的序列号通常由该算法产生。
当我开始整理《Java加密技术(二)》的时候,我就已经在开始研究ECC了,但是关于Java实现ECC算法的资料实在是太少了,无论是国内还是国外的 资料,无论是官方还是非官方的解释,最终只有一种答案——ECC算法在jdk1.5后加入支持,目前仅仅只能完成密钥的生成与解析。 如果想要获得ECC算法实现,需要调用硬件完成加密/解密(ECC算法相当耗费资源,如果单纯使用CPU进行加密/解密,效率低下),涉及到Java Card领域,PKCS#11。 其实,PKCS#11配置很简单,但缺乏硬件设备,无法尝试!

尽管如此,我照旧提供相应的Java实现代码,以供大家参考。

通过java代码实现如下:Coder类见

  1. import java.math.BigInteger;
  2. import java.security.Key;
  3. import java.security.KeyFactory;
  4. import java.security.interfaces.ECPrivateKey;
  5. import java.security.interfaces.ECPublicKey;
  6. import java.security.spec.ECFieldF2m;
  7. import java.security.spec.ECParameterSpec;
  8. import java.security.spec.ECPoint;
  9. import java.security.spec.ECPrivateKeySpec;
  10. import java.security.spec.ECPublicKeySpec;
  11. import java.security.spec.EllipticCurve;
  12. import java.security.spec.PKCS8EncodedKeySpec;
  13. import java.security.spec.X509EncodedKeySpec;
  14. import java.util.HashMap;
  15. import java.util.Map;
  16. import javax.crypto.Cipher;
  17. import javax.crypto.NullCipher;
  18. import sun.security.ec.ECKeyFactory;
  19. import sun.security.ec.ECPrivateKeyImpl;
  20. import sun.security.ec.ECPublicKeyImpl;
  21. /**
  22. * ECC安全编码组件
  23. *
  24. * @author 梁栋
  25. * @version 1.0
  26. * @since 1.0
  27. */
  28. public abstract class ECCCoder extends Coder {
  29. public static final String ALGORITHM = "EC";
  30. private static final String PUBLIC_KEY = "ECCPublicKey";
  31. private static final String PRIVATE_KEY = "ECCPrivateKey";
  32. /**
  33. * 解密<br>
  34. * 用私钥解密
  35. *
  36. * @param data
  37. * @param key
  38. * @return
  39. * @throws Exception
  40. */
  41. public static byte[] decrypt(byte[] data, String key) throws Exception {
  42. // 对密钥解密
  43. byte[] keyBytes = decryptBASE64(key);
  44. // 取得私钥
  45. PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes);
  46. KeyFactory keyFactory = ECKeyFactory.INSTANCE;
  47. ECPrivateKey priKey = (ECPrivateKey) keyFactory
  48. .generatePrivate(pkcs8KeySpec);
  49. ECPrivateKeySpec ecPrivateKeySpec = new ECPrivateKeySpec(priKey.getS(),
  50. priKey.getParams());
  51. // 对数据解密
  52. // TODO Chipher不支持EC算法 未能实现
  53. Cipher cipher = new NullCipher();
  54. // Cipher.getInstance(ALGORITHM, keyFactory.getProvider());
  55. cipher.init(Cipher.DECRYPT_MODE, priKey, ecPrivateKeySpec.getParams());
  56. return cipher.doFinal(data);
  57. }
  58. /**
  59. * 加密<br>
  60. * 用公钥加密
  61. *
  62. * @param data
  63. * @param privateKey
  64. * @return
  65. * @throws Exception
  66. */
  67. public static byte[] encrypt(byte[] data, String privateKey)
  68. throws Exception {
  69. // 对公钥解密
  70. byte[] keyBytes = decryptBASE64(privateKey);
  71. // 取得公钥
  72. X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(keyBytes);
  73. KeyFactory keyFactory = ECKeyFactory.INSTANCE;
  74. ECPublicKey pubKey = (ECPublicKey) keyFactory
  75. .generatePublic(x509KeySpec);
  76. ECPublicKeySpec ecPublicKeySpec = new ECPublicKeySpec(pubKey.getW(),
  77. pubKey.getParams());
  78. // 对数据加密
  79. // TODO Chipher不支持EC算法 未能实现
  80. Cipher cipher = new NullCipher();
  81. // Cipher.getInstance(ALGORITHM, keyFactory.getProvider());
  82. cipher.init(Cipher.ENCRYPT_MODE, pubKey, ecPublicKeySpec.getParams());
  83. return cipher.doFinal(data);
  84. }
  85. /**
  86. * 取得私钥
  87. *
  88. * @param keyMap
  89. * @return
  90. * @throws Exception
  91. */
  92. public static String getPrivateKey(Map<String, Object> keyMap)
  93. throws Exception {
  94. Key key = (Key) keyMap.get(PRIVATE_KEY);
  95. return encryptBASE64(key.getEncoded());
  96. }
  97. /**
  98. * 取得公钥
  99. *
  100. * @param keyMap
  101. * @return
  102. * @throws Exception
  103. */
  104. public static String getPublicKey(Map<String, Object> keyMap)
  105. throws Exception {
  106. Key key = (Key) keyMap.get(PUBLIC_KEY);
  107. return encryptBASE64(key.getEncoded());
  108. }
  109. /**
  110. * 初始化密钥
  111. *
  112. * @return
  113. * @throws Exception
  114. */
  115. public static Map<String, Object> initKey() throws Exception {
  116. BigInteger x1 = new BigInteger(
  117. "2fe13c0537bbc11acaa07d793de4e6d5e5c94eee8", 16);
  118. BigInteger x2 = new BigInteger(
  119. "289070fb05d38ff58321f2e800536d538ccdaa3d9", 16);
  120. ECPoint g = new ECPoint(x1, x2);
  121. // the order of generator
  122. BigInteger n = new BigInteger(
  123. "5846006549323611672814741753598448348329118574063", 10);
  124. // the cofactor
  125. int h = 2;
  126. int m = 163;
  127. int[] ks = {
  128. 7, 6, 3 };
  129. ECFieldF2m ecField = new ECFieldF2m(m, ks);
  130. // y^2+xy=x^3+x^2+1
  131. BigInteger a = new BigInteger("1", 2);
  132. BigInteger b = new BigInteger("1", 2);
  133. EllipticCurve ellipticCurve = new EllipticCurve(ecField, a, b);
  134. ECParameterSpec ecParameterSpec = new ECParameterSpec(ellipticCurve, g,
  135. n, h);
  136. // 公钥
  137. ECPublicKey publicKey = new ECPublicKeyImpl(g, ecParameterSpec);
  138. BigInteger s = new BigInteger(
  139. "1234006549323611672814741753598448348329118574063", 10);
  140. // 私钥
  141. ECPrivateKey privateKey = new ECPrivateKeyImpl(s, ecParameterSpec);
  142. Map<String, Object> keyMap = new HashMap<String, Object>(2);
  143. keyMap.put(PUBLIC_KEY, publicKey);
  144. keyMap.put(PRIVATE_KEY, privateKey);
  145. return keyMap;
  146. }
  147. }

请注意上述代码中的TODO内容,再次提醒注意,Chipher不支持EC算法 ,以上代码仅供参考。Chipher、Signature、KeyPairGenerator、KeyAgreement、SecretKey均不支持EC算法。为了确保程序能够正常执行,我们使用了NullCipher类,验证程序。

照旧提供一个测试类:

  1. import static org.junit.Assert.*;
  2. import java.math.BigInteger;
  3. import java.security.spec.ECFieldF2m;
  4. import java.security.spec.ECParameterSpec;
  5. import java.security.spec.ECPoint;
  6. import java.security.spec.ECPrivateKeySpec;
  7. import java.security.spec.ECPublicKeySpec;
  8. import java.security.spec.EllipticCurve;
  9. import java.util.Map;
  10. import org.junit.Test;
  11. /**
  12. *
  13. * @author 梁栋
  14. * @version 1.0
  15. * @since 1.0
  16. */
  17. public class ECCCoderTest {
  18. @Test
  19. public void test() throws Exception {
  20. String inputStr = "abc";
  21. byte[] data = inputStr.getBytes();
  22. Map<String, Object> keyMap = ECCCoder.initKey();
  23. String publicKey = ECCCoder.getPublicKey(keyMap);
  24. String privateKey = ECCCoder.getPrivateKey(keyMap);
  25. System.err.println("公钥: \n" + publicKey);
  26. System.err.println("私钥: \n" + privateKey);
  27. byte[] encodedData = ECCCoder.encrypt(data, publicKey);
  28. byte[] decodedData = ECCCoder.decrypt(encodedData, privateKey);
  29. String outputStr = new String(decodedData);
  30. System.err.println("加密前: " + inputStr + "\n\r" + "解密后: " + outputStr);
  31. assertEquals(inputStr, outputStr);
  32. }
  33. }

控制台输出:

  1. 公钥:
  2. MEAwEAYHKoZIzj0CAQYFK4EEAAEDLAAEAv4TwFN7vBGsqgfXk95ObV5clO7oAokHD7BdOP9YMh8u
  3. gAU21TjM2qPZ
  4. 私钥:
  5. MDICAQAwEAYHKoZIzj0CAQYFK4EEAAEEGzAZAgEBBBTYJsR3BN7TFw7JHcAHFkwNmfil7w==
  6. 加密前: abc
  7. 解密后: abc

本篇的主要内容为Java证书体系的实现。

在构建Java代码实现前,我们需要完成证书的制作。
1.生成keyStroe文件
在命令行下执行以下命令:

  1. keytool -genkey -validity 36000 -alias www.zlex.org -keyalg RSA -keystore d:\zlex.keystore

其中
-genkey表示生成密钥
-validity指定证书有效期,这里是36000
-alias指定别名,这里是www.zlex.org
-keyalg指定算法,这里是RSA
-keystore指定存储位置,这里是d:\zlex.keystore

在这里我使用的密码为 123456

控制台输出:

  1. 输入keystore密码:
  2. 再次输入新密码:
  3. 您的名字与姓氏是什么?
  4. [Unknown]: www.zlex.org
  5. 您的组织单位名称是什么?
  6. [Unknown]: zlex
  7. 您的组织名称是什么?
  8. [Unknown]: zlex
  9. 您所在的城市或区域名称是什么?
  10. [Unknown]: BJ
  11. 您所在的州或省份名称是什么?
  12. [Unknown]: BJ
  13. 该单位的两字母国家代码是什么
  14. [Unknown]: CN
  15. CN=www.zlex.org, OU=zlex, O=zlex, L=BJ, ST=BJ, C=CN 正确吗?
  16. [否]: Y
  17. 输入<tomcat>的主密码
  18. (如果和 keystore 密码相同,按回车):
  19. 再次输入新密码:

这时,在D盘下会生成一个zlex.keystore的文件。

2.生成自签名证书
光有keyStore文件是不够的,还需要证书文件,证书才是直接提供给外界使用的公钥凭证。
导出证书:

  1. keytool -export -keystore d:\zlex.keystore -alias www.zlex.org -file d:\zlex.cer -rfc

其中
-export指定为导出操作
-keystore指定keystore文件
-alias指定导出keystore文件中的别名
-file指向导出路径
-rfc以文本格式输出,也就是以BASE64编码输出
这里的密码是 123456

控制台输出:

  1. 输入keystore密码:
  2. 保存在文件中的认证 <d:\zlex.cer>

当然,使用方是需要导入证书的!
可以通过自签名证书完成CAS单点登录系统的构建!

Ok,准备工作完成,开始Java实现!

通过java代码实现如下:Coder类见

  1. import java.io.FileInputStream;
  2. import java.security.KeyStore;
  3. import java.security.PrivateKey;
  4. import java.security.PublicKey;
  5. import java.security.Signature;
  6. import java.security.cert.Certificate;
  7. import java.security.cert.CertificateFactory;
  8. import java.security.cert.X509Certificate;
  9. import java.util.Date;
  10. import javax.crypto.Cipher;
  11. /**
  12. * 证书组件
  13. *
  14. * @author 梁栋
  15. * @version 1.0
  16. * @since 1.0
  17. */
  18. public abstract class CertificateCoder extends Coder {
  19. /**
  20. * Java密钥库(Java Key Store,JKS)KEY_STORE
  21. */
  22. public static final String KEY_STORE = "JKS";
  23. public static final String X509 = "X.509";
  24. /**
  25. * 由KeyStore获得私钥
  26. *
  27. * @param keyStorePath
  28. * @param alias
  29. * @param password
  30. * @return
  31. * @throws Exception
  32. */
  33. private static PrivateKey getPrivateKey(String keyStorePath, String alias,
  34. String password) throws Exception {
  35. KeyStore ks = getKeyStore(keyStorePath, password);
  36. PrivateKey key = (PrivateKey) ks.getKey(alias, password.toCharArray());
  37. return key;
  38. }
  39. /**
  40. * 由Certificate获得公钥
  41. *
  42. * @param certificatePath
  43. * @return
  44. * @throws Exception
  45. */
  46. private static PublicKey getPublicKey(String certificatePath)
  47. throws Exception {
  48. Certificate certificate = getCertificate(certificatePath);
  49. PublicKey key = certificate.getPublicKey();
  50. return key;
  51. }
  52. /**
  53. * 获得Certificate
  54. *
  55. * @param certificatePath
  56. * @return
  57. * @throws Exception
  58. */
  59. private static Certificate getCertificate(String certificatePath)
  60. throws Exception {
  61. CertificateFactory certificateFactory = CertificateFactory
  62. .getInstance(X509);
  63. FileInputStream in = new FileInputStream(certificatePath);
  64. Certificate certificate = certificateFactory.generateCertificate(in);
  65. in.close();
  66. return certificate;
  67. }
  68. /**
  69. * 获得Certificate
  70. *
  71. * @param keyStorePath
  72. * @param alias
  73. * @param password
  74. * @return
  75. * @throws Exception
  76. */
  77. private static Certificate getCertificate(String keyStorePath,
  78. String alias, String password) throws Exception {
  79. KeyStore ks = getKeyStore(keyStorePath, password);
  80. Certificate certificate = ks.getCertificate(alias);
  81. return certificate;
  82. }
  83. /**
  84. * 获得KeyStore
  85. *
  86. * @param keyStorePath
  87. * @param password
  88. * @return
  89. * @throws Exception
  90. */
  91. private static KeyStore getKeyStore(String keyStorePath, String password)
  92. throws Exception {
  93. FileInputStream is = new FileInputStream(keyStorePath);
  94. KeyStore ks = KeyStore.getInstance(KEY_STORE);
  95. ks.load(is, password.toCharArray());
  96. is.close();
  97. return ks;
  98. }
  99. /**
  100. * 私钥加密
  101. *
  102. * @param data
  103. * @param keyStorePath
  104. * @param alias
  105. * @param password
  106. * @return
  107. * @throws Exception
  108. */
  109. public static byte[] encryptByPrivateKey(byte[] data, String keyStorePath,
  110. String alias, String password) throws Exception {
  111. // 取得私钥
  112. PrivateKey privateKey = getPrivateKey(keyStorePath, alias, password);
  113. // 对数据加密
  114. Cipher cipher = Cipher.getInstance(privateKey.getAlgorithm());
  115. cipher.init(Cipher.ENCRYPT_MODE, privateKey);
  116. return cipher.doFinal(data);
  117. }
  118. /**
  119. * 私钥解密
  120. *
  121. * @param data
  122. * @param keyStorePath
  123. * @param alias
  124. * @param password
  125. * @return
  126. * @throws Exception
  127. */
  128. public static byte[] decryptByPrivateKey(byte[] data, String keyStorePath,
  129. String alias, String password) throws Exception {
  130. // 取得私钥
  131. PrivateKey privateKey = getPrivateKey(keyStorePath, alias, password);
  132. // 对数据加密
  133. Cipher cipher = Cipher.getInstance(privateKey.getAlgorithm());
  134. cipher.init(Cipher.DECRYPT_MODE, privateKey);
  135. return cipher.doFinal(data);
  136. }
  137. /**
  138. * 公钥加密
  139. *
  140. * @param data
  141. * @param certificatePath
  142. * @return
  143. * @throws Exception
  144. */
  145. public static byte[] encryptByPublicKey(byte[] data, String certificatePath)
  146. throws Exception {
  147. // 取得公钥
  148. PublicKey publicKey = getPublicKey(certificatePath);
  149. // 对数据加密
  150. Cipher cipher = Cipher.getInstance(publicKey.getAlgorithm());
  151. cipher.init(Cipher.ENCRYPT_MODE, publicKey);
  152. return cipher.doFinal(data);
  153. }
  154. /**
  155. * 公钥解密
  156. *
  157. * @param data
  158. * @param certificatePath
  159. * @return
  160. * @throws Exception
  161. */
  162. public static byte[] decryptByPublicKey(byte[] data, String certificatePath)
  163. throws Exception {
  164. // 取得公钥
  165. PublicKey publicKey = getPublicKey(certificatePath);
  166. // 对数据加密
  167. Cipher cipher = Cipher.getInstance(publicKey.getAlgorithm());
  168. cipher.init(Cipher.DECRYPT_MODE, publicKey);
  169. return cipher.doFinal(data);
  170. }
  171. /**
  172. * 验证Certificate
  173. *
  174. * @param certificatePath
  175. * @return
  176. */
  177. public static boolean verifyCertificate(String certificatePath) {
  178. return verifyCertificate(new Date(), certificatePath);
  179. }
  180. /**
  181. * 验证Certificate是否过期或无效
  182. *
  183. * @param date
  184. * @param certificatePath
  185. * @return
  186. */
  187. public static boolean verifyCertificate(Date date, String certificatePath) {
  188. boolean status = true;
  189. try {
  190. // 取得证书
  191. Certificate certificate = getCertificate(certificatePath);
  192. // 验证证书是否过期或无效
  193. status = verifyCertificate(date, certificate);
  194. } catch (Exception e) {
  195. status = false;
  196. }
  197. return status;
  198. }
  199. /**
  200. * 验证证书是否过期或无效
  201. *
  202. * @param date
  203. * @param certificate
  204. * @return
  205. */
  206. private static boolean verifyCertificate(Date date, Certificate certificate) {
  207. boolean status = true;
  208. try {
  209. X509Certificate x509Certificate = (X509Certificate) certificate;
  210. x509Certificate.checkValidity(date);
  211. } catch (Exception e) {
  212. status = false;
  213. }
  214. return status;
  215. }
  216. /**
  217. * 签名
  218. *
  219. * @param keyStorePath
  220. * @param alias
  221. * @param password
  222. *
  223. * @return
  224. * @throws Exception
  225. */
  226. public static String sign(byte[] sign, String keyStorePath, String alias,
  227. String password) throws Exception {
  228. // 获得证书
  229. X509Certificate x509Certificate = (X509Certificate) getCertificate(
  230. keyStorePath, alias, password);
  231. // 获取私钥
  232. KeyStore ks = getKeyStore(keyStorePath, password);
  233. // 取得私钥
  234. PrivateKey privateKey = (PrivateKey) ks.getKey(alias, password
  235. .toCharArray());
  236. // 构建签名
  237. Signature signature = Signature.getInstance(x509Certificate
  238. .getSigAlgName());
  239. signature.initSign(privateKey);
  240. signature.update(sign);
  241. return encryptBASE64(signature.sign());
  242. }
  243. /**
  244. * 验证签名
  245. *
  246. * @param data
  247. * @param sign
  248. * @param certificatePath
  249. * @return
  250. * @throws Exception
  251. */
  252. public static boolean verify(byte[] data, String sign,
  253. String certificatePath) throws Exception {
  254. // 获得证书
  255. X509Certificate x509Certificate = (X509Certificate) getCertificate(certificatePath);
  256. // 获得公钥
  257. PublicKey publicKey = x509Certificate.getPublicKey();
  258. // 构建签名
  259. Signature signature = Signature.getInstance(x509Certificate
  260. .getSigAlgName());
  261. signature.initVerify(publicKey);
  262. signature.update(data);
  263. return signature.verify(decryptBASE64(sign));
  264. }
  265. /**
  266. * 验证Certificate
  267. *
  268. * @param keyStorePath
  269. * @param alias
  270. * @param password
  271. * @return
  272. */
  273. public static boolean verifyCertificate(Date date, String keyStorePath,
  274. String alias, String password) {
  275. boolean status = true;
  276. try {
  277. Certificate certificate = getCertificate(keyStorePath, alias,
  278. password);
  279. status = verifyCertificate(date, certificate);
  280. } catch (Exception e) {
  281. status = false;
  282. }
  283. return status;
  284. }
  285. /**
  286. * 验证Certificate
  287. *
  288. * @param keyStorePath
  289. * @param alias
  290. * @param password
  291. * @return
  292. */
  293. public static boolean verifyCertificate(String keyStorePath, String alias,
  294. String password) {
  295. return verifyCertificate(new Date(), keyStorePath, alias, password);
  296. }
  297. }

再给出一个测试类:

  1. import static org.junit.Assert.*;
  2. import org.junit.Test;
  3. /**
  4. *
  5. * @author 梁栋
  6. * @version 1.0
  7. * @since 1.0
  8. */
  9. public class CertificateCoderTest {
  10. private String password = "123456";
  11. private String alias = "www.zlex.org";
  12. private String certificatePath = "d:/zlex.cer";
  13. private String keyStorePath = "d:/zlex.keystore";
  14. @Test
  15. public void test() throws Exception {
  16. System.err.println("公钥加密——私钥解密");
  17. String inputStr = "Ceritifcate";
  18. byte[] data = inputStr.getBytes();
  19. byte[] encrypt = CertificateCoder.encryptByPublicKey(data,
  20. certificatePath);
  21. byte[] decrypt = CertificateCoder.decryptByPrivateKey(encrypt,
  22. keyStorePath, alias, password);
  23. String outputStr = new String(decrypt);
  24. System.err.println("加密前: " + inputStr + "\n\r" + "解密后: " + outputStr);
  25. // 验证数据一致
  26. assertArrayEquals(data, decrypt);
  27. // 验证证书有效
  28. assertTrue(CertificateCoder.verifyCertificate(certificatePath));
  29. }
  30. @Test
  31. public void testSign() throws Exception {
  32. System.err.println("私钥加密——公钥解密");
  33. String inputStr = "sign";
  34. byte[] data = inputStr.getBytes();
  35. byte[] encodedData = CertificateCoder.encryptByPrivateKey(data,
  36. keyStorePath, alias, password);
  37. byte[] decodedData = CertificateCoder.decryptByPublicKey(encodedData,
  38. certificatePath);
  39. String outputStr = new String(decodedData);
  40. System.err.println("加密前: " + inputStr + "\n\r" + "解密后: " + outputStr);
  41. assertEquals(inputStr, outputStr);
  42. System.err.println("私钥签名——公钥验证签名");
  43. // 产生签名
  44. String sign = CertificateCoder.sign(encodedData, keyStorePath, alias,
  45. password);
  46. System.err.println("签名:\r" + sign);
  47. // 验证签名
  48. boolean status = CertificateCoder.verify(encodedData, sign,
  49. certificatePath);
  50. System.err.println("状态:\r" + status);
  51. assertTrue(status);
  52. }
  53. }

控制台输出:

  1. 公钥加密——私钥解密
  2. 加密前: Ceritificate
  3. 解密后: Ceritificate
  4. 私钥加密——公钥解密
  5. 加密前: sign
  6. 解密后: sign
  7. 私钥签名——公钥验证签名
  8. 签名:
  9. pqBn5m6PJlfOjH0A6U2o2mUmBsfgyEY1NWCbiyA/I5Gc3gaVNVIdj/zkGNZRqTjhf3+J9a9z9EI7
  10. 6F2eWYd7punHx5oh6hfNgcKbVb52EfItl4QEN+djbXiPynn07+Lbg1NOjULnpEd6ZhLP1YwrEAuM
  11. OfvX0e7/wplxLbySaKQ=
  12. 状态:
  13. true

由此完成了证书验证体系!

同样,我们可以对代码做签名——代码签名!
通过工具JarSigner可以完成代码签名。
这里我们对tools.jar做代码签名,命令如下:

  1. jarsigner -storetype jks -keystore zlex.keystore -verbose tools.jar www.zlex.org

控制台输出:

  1. 输入密钥库的口令短语:
  2. 正在更新: META-INF/WWW_ZLEX.SF
  3. 正在更新: META-INF/WWW_ZLEX.RSA
  4. 正在签名: org/zlex/security/Security.class
  5. 正在签名: org/zlex/tool/Main$1.class
  6. 正在签名: org/zlex/tool/Main$2.class
  7. 正在签名: org/zlex/tool/Main.class
  8. 警告:
  9. 签名者证书将在六个月内过期。

此时,我们可以对签名后的jar做验证!
验证tools.jar,命令如下:

  1. jarsigner -verify -verbose -certs tools.jar

控制台输出:

  1. 402 Sat Jun 20 16:25:14 CST 2009 META-INF/MANIFEST.MF
  2. 532 Sat Jun 20 16:25:14 CST 2009 META-INF/WWW_ZLEX.SF
  3. 889 Sat Jun 20 16:25:14 CST 2009 META-INF/WWW_ZLEX.RSA
  4. sm 590 Wed Dec 10 13:03:42 CST 2008 org/zlex/security/Security.class
  5. X.509, CN=www.zlex.org, OU=zlex, O=zlex, L=BJ, ST=BJ, C=CN
  6. [证书将在 09-9-18 下午3:27 到期]
  7. sm 705 Tue Dec 16 18:00:56 CST 2008 org/zlex/tool/Main$1.class
  8. X.509, CN=www.zlex.org, OU=zlex, O=zlex, L=BJ, ST=BJ, C=CN
  9. [证书将在 09-9-18 下午3:27 到期]
  10. sm 779 Tue Dec 16 18:00:56 CST 2008 org/zlex/tool/Main$2.class
  11. X.509, CN=www.zlex.org, OU=zlex, O=zlex, L=BJ, ST=BJ, C=CN
  12. [证书将在 09-9-18 下午3:27 到期]
  13. sm 12672 Tue Dec 16 18:00:56 CST 2008 org/zlex/tool/Main.class
  14. X.509, CN=www.zlex.org, OU=zlex, O=zlex, L=BJ, ST=BJ, C=CN
  15. [证书将在 09-9-18 下午3:27 到期]
  16. s = 已验证签名
  17. m = 在清单中列出条目
  18. k = 在密钥库中至少找到了一个证书
  19. i = 在身份作用域内至少找到了一个证书
  20. jar 已验证。
  21. 警告:
  22. jar 包含签名者证书将在六个月内过期的条目。

代码签名认证的用途主要是对发布的软件做验证,支持 Sun Java .jar (Java Applet) 文件(J2SE)和 J2ME MIDlet Suite 文件。

在中,我们模拟了一个基于RSA非对称加密网络的安全通信。现在我们深度了解一下现有的安全网络通信——SSL。
我们需要构建一个由CA机构签发的有效证书,这里我们使用上文中生成的自签名证书zlex.cer
这里,我们将证书导入到我们的密钥库。

  1. keytool -import -alias www.zlex.org -file d:/zlex.cer -keystore d:/zlex.keystore

其中
-import表示导入
-alias指定别名,这里是www.zlex.org
-file指定算法,这里是d:/zlex.cer
-keystore指定存储位置,这里是d:/zlex.keystore
在这里我使用的密码为654321

控制台输出:

  1. 输入keystore密码:
  2. 再次输入新密码:
  3. 所有者:CN=www.zlex.org, OU=zlex, O=zlex, L=BJ, ST=BJ, C=CN
  4. 签发人:CN=www.zlex.org, OU=zlex, O=zlex, L=BJ, ST=BJ, C=CN
  5. 序列号:4a1e48df
  6. 有效期: Thu May 28 16:18:39 CST 2009 Wed Aug 26 16:18:39 CST 2009
  7. 证书指纹:
  8. MD5:19:CA:E6:36:E2:DF:AD:96:31:97:2F:A9:AD:FC:37:6A
  9. SHA1:49:88:30:59:29:45:F1:69:CA:97:A9:6D:8A:CF:08:D2:C3:D5:C0:C4
  10. 签名算法名称:SHA1withRSA
  11. 版本: 3
  12. 信任这个认证? [否]: y
  13. 认证已添加至keystore

OK,最复杂的准备工作已经完成。
接下来我们将域名www.zlex.org定位到本机上。打开C:\Windows\System32\drivers\etc\hosts文件,将www.zlex.org绑定在本机上。在文件末尾追加127.0.0.1 www.zlex.org。现在通过地址栏访问http://www.zlex.org,或者通过ping命令,如果能够定位到本机,域名映射就搞定了。
现在,配置tomcat。先将zlex.keystore拷贝到tomcat的conf目录下,然后配置server.xml。将如下内容加入配置文件

  1. <Connector
  2. SSLEnabled="true"
  3. URIEncoding="UTF-8"
  4. clientAuth="false"
  5. keystoreFile="conf/zlex.keystore"
  6. keystorePass="123456"
  7. maxThreads="150"
  8. port="443"
  9. protocol="HTTP/1.1"
  10. scheme="https"
  11. secure="true"
  12. sslProtocol="TLS" />

注意clientAuth=”false”测试阶段,置为false,正式使用时建议使用true。现在启动tomcat,访问https://www.zlex.org/。![各种Java加密算法][Java 12]
显然,证书未能通过认证,这个时候你可以选择安装证书(上文中的zlex.cer文件就是证书),作为受信任的根证书颁发机构导入,再次重启浏览器(IE,其他浏览器对于域名www.zlex.org不支持本地方式访问),访问https://www.zlex.org/,你会看到地址栏中会有个小锁![各种Java加密算法][Java 13],就说明安装成功。所有的浏览器联网操作已经在RSA加密解密系统的保护之下了。但似乎我们感受不到。
这个时候很多人开始怀疑,如果我们要手工做一个这样的https的访问是不是需要把浏览器的这些个功能都实现呢?不需要!

接着上篇内容,给出如下代码实现:

  1. import java.io.FileInputStream;
  2. import java.security.KeyStore;
  3. import java.security.PrivateKey;
  4. import java.security.PublicKey;
  5. import java.security.Signature;
  6. import java.security.cert.Certificate;
  7. import java.security.cert.CertificateFactory;
  8. import java.security.cert.X509Certificate;
  9. import java.util.Date;
  10. import javax.crypto.Cipher;
  11. import javax.net.ssl.HttpsURLConnection;
  12. import javax.net.ssl.KeyManagerFactory;
  13. import javax.net.ssl.SSLContext;
  14. import javax.net.ssl.SSLSocketFactory;
  15. import javax.net.ssl.TrustManagerFactory;
  16. /**
  17. * 证书组件
  18. *
  19. * @author 梁栋
  20. * @version 1.0
  21. * @since 1.0
  22. */
  23. public abstract class CertificateCoder extends Coder {
  24. /**
  25. * Java密钥库(Java Key Store,JKS)KEY_STORE
  26. */
  27. public static final String KEY_STORE = "JKS";
  28. public static final String X509 = "X.509";
  29. public static final String SunX509 = "SunX509";
  30. public static final String SSL = "SSL";
  31. /**
  32. * 由KeyStore获得私钥
  33. *
  34. * @param keyStorePath
  35. * @param alias
  36. * @param password
  37. * @return
  38. * @throws Exception
  39. */
  40. private static PrivateKey getPrivateKey(String keyStorePath, String alias,
  41. String password) throws Exception {
  42. KeyStore ks = getKeyStore(keyStorePath, password);
  43. PrivateKey key = (PrivateKey) ks.getKey(alias, password.toCharArray());
  44. return key;
  45. }
  46. /**
  47. * 由Certificate获得公钥
  48. *
  49. * @param certificatePath
  50. * @return
  51. * @throws Exception
  52. */
  53. private static PublicKey getPublicKey(String certificatePath)
  54. throws Exception {
  55. Certificate certificate = getCertificate(certificatePath);
  56. PublicKey key = certificate.getPublicKey();
  57. return key;
  58. }
  59. /**
  60. * 获得Certificate
  61. *
  62. * @param certificatePath
  63. * @return
  64. * @throws Exception
  65. */
  66. private static Certificate getCertificate(String certificatePath)
  67. throws Exception {
  68. CertificateFactory certificateFactory = CertificateFactory
  69. .getInstance(X509);
  70. FileInputStream in = new FileInputStream(certificatePath);
  71. Certificate certificate = certificateFactory.generateCertificate(in);
  72. in.close();
  73. return certificate;
  74. }
  75. /**
  76. * 获得Certificate
  77. *
  78. * @param keyStorePath
  79. * @param alias
  80. * @param password
  81. * @return
  82. * @throws Exception
  83. */
  84. private static Certificate getCertificate(String keyStorePath,
  85. String alias, String password) throws Exception {
  86. KeyStore ks = getKeyStore(keyStorePath, password);
  87. Certificate certificate = ks.getCertificate(alias);
  88. return certificate;
  89. }
  90. /**
  91. * 获得KeyStore
  92. *
  93. * @param keyStorePath
  94. * @param password
  95. * @return
  96. * @throws Exception
  97. */
  98. private static KeyStore getKeyStore(String keyStorePath, String password)
  99. throws Exception {
  100. FileInputStream is = new FileInputStream(keyStorePath);
  101. KeyStore ks = KeyStore.getInstance(KEY_STORE);
  102. ks.load(is, password.toCharArray());
  103. is.close();
  104. return ks;
  105. }
  106. /**
  107. * 私钥加密
  108. *
  109. * @param data
  110. * @param keyStorePath
  111. * @param alias
  112. * @param password
  113. * @return
  114. * @throws Exception
  115. */
  116. public static byte[] encryptByPrivateKey(byte[] data, String keyStorePath,
  117. String alias, String password) throws Exception {
  118. // 取得私钥
  119. PrivateKey privateKey = getPrivateKey(keyStorePath, alias, password);
  120. // 对数据加密
  121. Cipher cipher = Cipher.getInstance(privateKey.getAlgorithm());
  122. cipher.init(Cipher.ENCRYPT_MODE, privateKey);
  123. return cipher.doFinal(data);
  124. }
  125. /**
  126. * 私钥解密
  127. *
  128. * @param data
  129. * @param keyStorePath
  130. * @param alias
  131. * @param password
  132. * @return
  133. * @throws Exception
  134. */
  135. public static byte[] decryptByPrivateKey(byte[] data, String keyStorePath,
  136. String alias, String password) throws Exception {
  137. // 取得私钥
  138. PrivateKey privateKey = getPrivateKey(keyStorePath, alias, password);
  139. // 对数据加密
  140. Cipher cipher = Cipher.getInstance(privateKey.getAlgorithm());
  141. cipher.init(Cipher.DECRYPT_MODE, privateKey);
  142. return cipher.doFinal(data);
  143. }
  144. /**
  145. * 公钥加密
  146. *
  147. * @param data
  148. * @param certificatePath
  149. * @return
  150. * @throws Exception
  151. */
  152. public static byte[] encryptByPublicKey(byte[] data, String certificatePath)
  153. throws Exception {
  154. // 取得公钥
  155. PublicKey publicKey = getPublicKey(certificatePath);
  156. // 对数据加密
  157. Cipher cipher = Cipher.getInstance(publicKey.getAlgorithm());
  158. cipher.init(Cipher.ENCRYPT_MODE, publicKey);
  159. return cipher.doFinal(data);
  160. }
  161. /**
  162. * 公钥解密
  163. *
  164. * @param data
  165. * @param certificatePath
  166. * @return
  167. * @throws Exception
  168. */
  169. public static byte[] decryptByPublicKey(byte[] data, String certificatePath)
  170. throws Exception {
  171. // 取得公钥
  172. PublicKey publicKey = getPublicKey(certificatePath);
  173. // 对数据加密
  174. Cipher cipher = Cipher.getInstance(publicKey.getAlgorithm());
  175. cipher.init(Cipher.DECRYPT_MODE, publicKey);
  176. return cipher.doFinal(data);
  177. }
  178. /**
  179. * 验证Certificate
  180. *
  181. * @param certificatePath
  182. * @return
  183. */
  184. public static boolean verifyCertificate(String certificatePath) {
  185. return verifyCertificate(new Date(), certificatePath);
  186. }
  187. /**
  188. * 验证Certificate是否过期或无效
  189. *
  190. * @param date
  191. * @param certificatePath
  192. * @return
  193. */
  194. public static boolean verifyCertificate(Date date, String certificatePath) {
  195. boolean status = true;
  196. try {
  197. // 取得证书
  198. Certificate certificate = getCertificate(certificatePath);
  199. // 验证证书是否过期或无效
  200. status = verifyCertificate(date, certificate);
  201. } catch (Exception e) {
  202. status = false;
  203. }
  204. return status;
  205. }
  206. /**
  207. * 验证证书是否过期或无效
  208. *
  209. * @param date
  210. * @param certificate
  211. * @return
  212. */
  213. private static boolean verifyCertificate(Date date, Certificate certificate) {
  214. boolean status = true;
  215. try {
  216. X509Certificate x509Certificate = (X509Certificate) certificate;
  217. x509Certificate.checkValidity(date);
  218. } catch (Exception e) {
  219. status = false;
  220. }
  221. return status;
  222. }
  223. /**
  224. * 签名
  225. *
  226. * @param keyStorePath
  227. * @param alias
  228. * @param password
  229. *
  230. * @return
  231. * @throws Exception
  232. */
  233. public static String sign(byte[] sign, String keyStorePath, String alias,
  234. String password) throws Exception {
  235. // 获得证书
  236. X509Certificate x509Certificate = (X509Certificate) getCertificate(
  237. keyStorePath, alias, password);
  238. // 获取私钥
  239. KeyStore ks = getKeyStore(keyStorePath, password);
  240. // 取得私钥
  241. PrivateKey privateKey = (PrivateKey) ks.getKey(alias, password
  242. .toCharArray());
  243. // 构建签名
  244. Signature signature = Signature.getInstance(x509Certificate
  245. .getSigAlgName());
  246. signature.initSign(privateKey);
  247. signature.update(sign);
  248. return encryptBASE64(signature.sign());
  249. }
  250. /**
  251. * 验证签名
  252. *
  253. * @param data
  254. * @param sign
  255. * @param certificatePath
  256. * @return
  257. * @throws Exception
  258. */
  259. public static boolean verify(byte[] data, String sign,
  260. String certificatePath) throws Exception {
  261. // 获得证书
  262. X509Certificate x509Certificate = (X509Certificate) getCertificate(certificatePath);
  263. // 获得公钥
  264. PublicKey publicKey = x509Certificate.getPublicKey();
  265. // 构建签名
  266. Signature signature = Signature.getInstance(x509Certificate
  267. .getSigAlgName());
  268. signature.initVerify(publicKey);
  269. signature.update(data);
  270. return signature.verify(decryptBASE64(sign));
  271. }
  272. /**
  273. * 验证Certificate
  274. *
  275. * @param keyStorePath
  276. * @param alias
  277. * @param password
  278. * @return
  279. */
  280. public static boolean verifyCertificate(Date date, String keyStorePath,
  281. String alias, String password) {
  282. boolean status = true;
  283. try {
  284. Certificate certificate = getCertificate(keyStorePath, alias,
  285. password);
  286. status = verifyCertificate(date, certificate);
  287. } catch (Exception e) {
  288. status = false;
  289. }
  290. return status;
  291. }
  292. /**
  293. * 验证Certificate
  294. *
  295. * @param keyStorePath
  296. * @param alias
  297. * @param password
  298. * @return
  299. */
  300. public static boolean verifyCertificate(String keyStorePath, String alias,
  301. String password) {
  302. return verifyCertificate(new Date(), keyStorePath, alias, password);
  303. }
  304. /**
  305. * 获得SSLSocektFactory
  306. *
  307. * @param password
  308. * 密码
  309. * @param keyStorePath
  310. * 密钥库路径
  311. *
  312. * @param trustKeyStorePath
  313. * 信任库路径
  314. * @return
  315. * @throws Exception
  316. */
  317. private static SSLSocketFactory getSSLSocketFactory(String password,
  318. String keyStorePath, String trustKeyStorePath) throws Exception {
  319. // 初始化密钥库
  320. KeyManagerFactory keyManagerFactory = KeyManagerFactory
  321. .getInstance(SunX509);
  322. KeyStore keyStore = getKeyStore(keyStorePath, password);
  323. keyManagerFactory.init(keyStore, password.toCharArray());
  324. // 初始化信任库
  325. TrustManagerFactory trustManagerFactory = TrustManagerFactory
  326. .getInstance(SunX509);
  327. KeyStore trustkeyStore = getKeyStore(trustKeyStorePath, password);
  328. trustManagerFactory.init(trustkeyStore);
  329. // 初始化SSL上下文
  330. SSLContext ctx = SSLContext.getInstance(SSL);
  331. ctx.init(keyManagerFactory.getKeyManagers(), trustManagerFactory
  332. .getTrustManagers(), null);
  333. SSLSocketFactory sf = ctx.getSocketFactory();
  334. return sf;
  335. }
  336. /**
  337. * 为HttpsURLConnection配置SSLSocketFactory
  338. *
  339. * @param conn
  340. * HttpsURLConnection
  341. * @param password
  342. * 密码
  343. * @param keyStorePath
  344. * 密钥库路径
  345. *
  346. * @param trustKeyStorePath
  347. * 信任库路径
  348. * @throws Exception
  349. */
  350. public static void configSSLSocketFactory(HttpsURLConnection conn,
  351. String password, String keyStorePath, String trustKeyStorePath)
  352. throws Exception {
  353. conn.setSSLSocketFactory(getSSLSocketFactory(password, keyStorePath,
  354. trustKeyStorePath));
  355. }
  356. }

增加了configSSLSocketFactory方法供外界调用,该方法为 HttpsURLConnection配置了SSLSocketFactory。当HttpsURLConnection配置了 SSLSocketFactory后,我们就可以通过HttpsURLConnection的getInputStream、 getOutputStream,像往常使用HttpURLConnection做操作了。尤其要说明一点,未配置SSLSocketFactory 前,HttpsURLConnection的getContentLength()获得值永远都是**-1**。

给出相应测试类:

  1. import static org.junit.Assert.*;
  2. import java.io.DataInputStream;
  3. import java.io.InputStream;
  4. import java.net.URL;
  5. import javax.net.ssl.HttpsURLConnection;
  6. import org.junit.Test;
  7. /**
  8. *
  9. * @author 梁栋
  10. * @version 1.0
  11. * @since 1.0
  12. */
  13. public class CertificateCoderTest {
  14. private String password = "123456";
  15. private String alias = "www.zlex.org";
  16. private String certificatePath = "d:/zlex.cer";
  17. private String keyStorePath = "d:/zlex.keystore";
  18. private String clientKeyStorePath = "d:/zlex-client.keystore";
  19. private String clientPassword = "654321";
  20. @Test
  21. public void test() throws Exception {
  22. System.err.println("公钥加密——私钥解密");
  23. String inputStr = "Ceritifcate";
  24. byte[] data = inputStr.getBytes();
  25. byte[] encrypt = CertificateCoder.encryptByPublicKey(data,
  26. certificatePath);
  27. byte[] decrypt = CertificateCoder.decryptByPrivateKey(encrypt,
  28. keyStorePath, alias, password);
  29. String outputStr = new String(decrypt);
  30. System.err.println("加密前: " + inputStr + "\n\r" + "解密后: " + outputStr);
  31. // 验证数据一致
  32. assertArrayEquals(data, decrypt);
  33. // 验证证书有效
  34. assertTrue(CertificateCoder.verifyCertificate(certificatePath));
  35. }
  36. @Test
  37. public void testSign() throws Exception {
  38. System.err.println("私钥加密——公钥解密");
  39. String inputStr = "sign";
  40. byte[] data = inputStr.getBytes();
  41. byte[] encodedData = CertificateCoder.encryptByPrivateKey(data,
  42. keyStorePath, alias, password);
  43. byte[] decodedData = CertificateCoder.decryptByPublicKey(encodedData,
  44. certificatePath);
  45. String outputStr = new String(decodedData);
  46. System.err.println("加密前: " + inputStr + "\n\r" + "解密后: " + outputStr);
  47. assertEquals(inputStr, outputStr);
  48. System.err.println("私钥签名——公钥验证签名");
  49. // 产生签名
  50. String sign = CertificateCoder.sign(encodedData, keyStorePath, alias,
  51. password);
  52. System.err.println("签名:\r" + sign);
  53. // 验证签名
  54. boolean status = CertificateCoder.verify(encodedData, sign,
  55. certificatePath);
  56. System.err.println("状态:\r" + status);
  57. assertTrue(status);
  58. }
  59. @Test
  60. public void testHttps() throws Exception {
  61. URL url = new URL("https://www.zlex.org/examples/");
  62. HttpsURLConnection conn = (HttpsURLConnection) url.openConnection();
  63. conn.setDoInput(true);
  64. conn.setDoOutput(true);
  65. CertificateCoder.configSSLSocketFactory(conn, clientPassword,
  66. clientKeyStorePath, clientKeyStorePath);
  67. InputStream is = conn.getInputStream();
  68. int length = conn.getContentLength();
  69. DataInputStream dis = new DataInputStream(is);
  70. byte[] data = new byte[length];
  71. dis.readFully(data);
  72. dis.close();
  73. System.err.println(new String(data));
  74. conn.disconnect();
  75. }
  76. }

注意testHttps方法,几乎和我们往常做HTTP访问没有差别,我们来看控制台输出:

  1. <!--
  2. Licensed to the Apache Software Foundation (ASF) under one or more
  3. contributor license agreements. See the NOTICE file distributed with
  4. this work for additional information regarding copyright ownership.
  5. The ASF licenses this file to You under the Apache License, Version 2.0
  6. (the "License"); you may not use this file except in compliance with
  7. the License. You may obtain a copy of the License at
  8. http://www.apache.org/licenses/LICENSE-2.0
  9. Unless required by applicable law or agreed to in writing, software
  10. distributed under the License is distributed on an "AS IS" BASIS,
  11. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. See the License for the specific language governing permissions and
  13. limitations under the License.
  14. -->
  15. <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
  16. <HTML><HEAD><TITLE>Apache Tomcat Examples</TITLE>
  17. <META http-equiv=Content-Type content="text/html">
  18. </HEAD>
  19. <BODY>
  20. <P>
  21. <H3>Apache Tomcat Examples</H3>
  22. <P></P>
  23. <ul>
  24. <li><a href="http://javaeye.shaduwang.com/?snowolf/blog/servlets">Servlets examples</a></li>
  25. <li><a href="http://javaeye.shaduwang.com/?snowolf/blog/jsp">JSP Examples</a></li>
  26. </ul>
  27. </BODY></HTML>

通过浏览器直接访问https://www.zlex.org/examples/你 也会获得上述内容。也就是说应用甲方作为服务器构建tomcat服务,乙方可以通过上述方式访问甲方受保护的SSL应用,并且不需要考虑具体的加密解密问 题。甲乙双方可以经过相应配置,通过双方的tomcat配置有效的SSL服务,简化上述代码实现,完全通过证书配置完成SSL双向认证!

我们使用自签名证书完成了认证。接下来,我们使用第三方CA签名机构完成证书签名。
这里我们使用thawte提供的测试用21天免费ca证书。
1.要在该网站上注明你的域名,这里使用www.zlex.org作为测试用域名(请勿使用该域名作为你的域名地址,该域名受法律保护!请使用其他非注册域名!)。
2.如果域名有效,你会收到邮件要求你访问https://www.thawte.com/cgi/server/try.exe获得ca证书。
3.复述密钥库的创建。

  1. keytool -genkey -validity 36000 -alias www.zlex.org -keyalg RSA -keystore d:\zlex.keystore

在这里我使用的密码为 123456

控制台输出:

  1. 输入keystore密码:
  2. 再次输入新密码:
  3. 您的名字与姓氏是什么?
  4. [Unknown]: www.zlex.org
  5. 您的组织单位名称是什么?
  6. [Unknown]: zlex
  7. 您的组织名称是什么?
  8. [Unknown]: zlex
  9. 您所在的城市或区域名称是什么?
  10. [Unknown]: BJ
  11. 您所在的州或省份名称是什么?
  12. [Unknown]: BJ
  13. 该单位的两字母国家代码是什么
  14. [Unknown]: CN
  15. CN=www.zlex.org, OU=zlex, O=zlex, L=BJ, ST=BJ, C=CN 正确吗?
  16. [否]: Y
  17. 输入<tomcat>的主密码
  18. (如果和 keystore 密码相同,按回车):
  19. 再次输入新密码:

4.通过如下命令,从zlex.keystore中导出CA证书申请。

  1. keytool -certreq -alias www.zlex.org -file d:\zlex.csr -keystore d:\zlex.keystore -v

你会获得zlex.csr文件,可以用记事本打开,内容如下格式:

  1. -----BEGIN NEW CERTIFICATE REQUEST-----
  2. MIIBnDCCAQUCAQAwXDELMAkGA1UEBhMCQ04xCzAJBgNVBAgTAkJKMQswCQYDVQQHEwJCSjENMAsG
  3. A1UEChMEemxleDENMAsGA1UECxMEemxleDEVMBMGA1UEAxMMd3d3LnpsZXgub3JnMIGfMA0GCSqG
  4. SIb3DQEBAQUAA4GNADCBiQKBgQCR6DXU9Mp+mCKO7cv9JPsj0n1Ec/GpM09qvhpgX3FNad/ZWSDc
  5. vU77YXZSoF9hQp3w1LC+eeKgd2MlVpXTvbVwBNVd2HiQPp37ic6BUUjSaX8LHtCl7l0BIEye9qQ2
  6. j8G0kak7e8ZA0s7nb3Ymq/K8BV7v0MQIdhIc1bifK9ZDewIDAQABoAAwDQYJKoZIhvcNAQEFBQAD
  7. gYEAMA1r2fbZPtNx37U9TRwadCH2TZZecwKJS/hskNm6ryPKIAp9APWwAyj8WJHRBz5SpZM4zmYO
  8. oMCI8BcnY2A4JP+R7/SwXTdH/xcg7NVghd9A2SCgqMpF7KMfc5dE3iygdiPu+UhY200Dvpjx8gmJ
  9. 1UbH3+nqMUyCrZgURFslOUY=
  10. -----END NEW CERTIFICATE REQUEST-----

5.将上述文件内容拷贝到https://www.thawte.com/cgi/server/try.exe中,点击next,获得回应内容,这里是p7b格式。
内容如下:

  1. -----BEGIN PKCS7-----
  2. MIIF3AYJKoZIhvcNAQcCoIIFzTCCBckCAQExADALBgkqhkiG9w0BBwGgggWxMIID
  3. EDCCAnmgAwIBAgIQA/mx/pKoaB+KGX2hveFU9zANBgkqhkiG9w0BAQUFADCBhzEL
  4. MAkGA1UEBhMCWkExIjAgBgNVBAgTGUZPUiBURVNUSU5HIFBVUlBPU0VTIE9OTFkx
  5. HTAbBgNVBAoTFFRoYXd0ZSBDZXJ0aWZpY2F0aW9uMRcwFQYDVQQLEw5URVNUIFRF
  6. U1QgVEVTVDEcMBoGA1UEAxMTVGhhd3RlIFRlc3QgQ0EgUm9vdDAeFw0wOTA1Mjgw
  7. MDIxMzlaFw0wOTA2MTgwMDIxMzlaMFwxCzAJBgNVBAYTAkNOMQswCQYDVQQIEwJC
  8. SjELMAkGA1UEBxMCQkoxDTALBgNVBAoTBHpsZXgxDTALBgNVBAsTBHpsZXgxFTAT
  9. BgNVBAMTDHd3dy56bGV4Lm9yZzCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA
  10. keg11PTKfpgiju3L/ST7I9J9RHPxqTNPar4aYF9xTWnf2Vkg3L1O+2F2UqBfYUKd
  11. 8NSwvnnioHdjJVaV0721cATVXdh4kD6d+4nOgVFI0ml/Cx7Qpe5dASBMnvakNo/B
  12. tJGpO3vGQNLO5292JqvyvAVe79DECHYSHNW4nyvWQ3sCAwEAAaOBpjCBozAMBgNV
  13. HRMBAf8EAjAAMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBABgNVHR8E
  14. OTA3MDWgM6Axhi9odHRwOi8vY3JsLnRoYXd0ZS5jb20vVGhhd3RlUHJlbWl1bVNl
  15. cnZlckNBLmNybDAyBggrBgEFBQcBAQQmMCQwIgYIKwYBBQUHMAGGFmh0dHA6Ly9v
  16. Y3NwLnRoYXd0ZS5jb20wDQYJKoZIhvcNAQEFBQADgYEATPuxZbtJJSPmXvfrr1yz
  17. xqM06IwTZ6UU0lZRG7I0WufMjNMKdpn8hklUhE17mxAhGSpewLVVeLR7uzBLFkuC
  18. X7wMXxhoYdJZtNai72izU6Rd1oknao7diahvRxPK4IuQ7y2oZ511/4T4vgY6iRAj
  19. q4q76HhPJrVRL/sduaiu+gYwggKZMIICAqADAgECAgEAMA0GCSqGSIb3DQEBBAUA
  20. MIGHMQswCQYDVQQGEwJaQTEiMCAGA1UECBMZRk9SIFRFU1RJTkcgUFVSUE9TRVMg
  21. T05MWTEdMBsGA1UEChMUVGhhd3RlIENlcnRpZmljYXRpb24xFzAVBgNVBAsTDlRF
  22. U1QgVEVTVCBURVNUMRwwGgYDVQQDExNUaGF3dGUgVGVzdCBDQSBSb290MB4XDTk2
  23. MDgwMTAwMDAwMFoXDTIwMTIzMTIxNTk1OVowgYcxCzAJBgNVBAYTAlpBMSIwIAYD
  24. VQQIExlGT1IgVEVTVElORyBQVVJQT1NFUyBPTkxZMR0wGwYDVQQKExRUaGF3dGUg
  25. Q2VydGlmaWNhdGlvbjEXMBUGA1UECxMOVEVTVCBURVNUIFRFU1QxHDAaBgNVBAMT
  26. E1RoYXd0ZSBUZXN0IENBIFJvb3QwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGB
  27. ALV9kG+Os6x/DOhm+tKUQfzVMWGhE95sFmEtkMMTX2Zi4n6i6BvzoReJ5njzt1LF
  28. cqu4EUk9Ji20egKKfmqRzmQFLP7+1niSdfJEUE7cKY40QoI99270PTrLjJeaMcCl
  29. +AYl+kD+RL5BtuKKU3PurYcsCsre6aTvjMcqpTJOGeSPAgMBAAGjEzARMA8GA1Ud
  30. EwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEEBQADgYEAgozj7BkD9O8si2V0v+EZ/t7E
  31. fz/LC8y6mD7IBUziHy5/53ymGAGLtyhXHvX+UIE6UWbHro3IqVkrmY5uC93Z2Wew
  32. A/6edK3KFUcUikrLeewM7gmqsiASEKx2mKRKlu12jXyNS5tXrPWRDvUKtFC1uL9a
  33. 12rFAQS2BkIk7aU+ghYxAA==
  34. -----END PKCS7-----

将其存储为zlex.p7b
6.将由CA签发的证书导入密钥库。

  1. keytool -import -trustcacerts -alias www.zlex.org -file d:\zlex.p7b -keystore d:\zlex.keystore -v

在这里我使用的密码为 123456

控制台输出:

  1. 输入keystore密码:
  2. 回复中的最高级认证:
  3. 所有者:CN=Thawte Test CA Root, OU=TEST TEST TEST, O=Thawte Certification, ST=FOR
  4. TESTING PURPOSES ONLY, C=ZA
  5. 签发人:CN=Thawte Test CA Root, OU=TEST TEST TEST, O=Thawte Certification, ST=FOR
  6. TESTING PURPOSES ONLY, C=ZA
  7. 序列号:0
  8. 有效期: Thu Aug 01 08:00:00 CST 1996 Fri Jan 01 05:59:59 CST 2021
  9. 证书指纹:
  10. MD5:5E:E0:0E:1D:17:B7:CA:A5:7D:36:D6:02:DF:4D:26:A4
  11. SHA1:39:C6:9D:27:AF:DC:EB:47:D6:33:36:6A:B2:05:F1:47:A9:B4:DA:EA
  12. 签名算法名称:MD5withRSA
  13. 版本: 3
  14. 扩展:
  15. #1: ObjectId: 2.5.29.19 Criticality=true
  16. BasicConstraints:[
  17. CA:true
  18. PathLen:2147483647
  19. ]
  20. ... 是不可信的。 还是要安装回复? [否]: Y
  21. 认证回复已安装在 keystore
  22. [正在存储 d:\zlex.keystore]

7.域名定位
将域名www.zlex.org定位到本机上。打开C:\Windows\System32\drivers\etc\hosts文件,将 www.zlex.org绑定在本机上。在文件末尾追加127.0.0.1 www.zlex.org。现在通过地址栏访问http://www.zlex.org,或者通过ping命令,如果能够定位到本机,域名映射就搞定 了。

8.配置server.xml

  1. <Connector
  2. keystoreFile="conf/zlex.keystore"
  3. keystorePass="123456"
  4. truststoreFile="conf/zlex.keystore"
  5. truststorePass="123456"
  6. SSLEnabled="true"
  7. URIEncoding="UTF-8"
  8. clientAuth="false"
  9. maxThreads="150"
  10. port="443"
  11. protocol="HTTP/1.1"
  12. scheme="https"
  13. secure="true"
  14. sslProtocol="TLS" />

将文件zlex.keystore拷贝到tomcat的conf目录下,重新启动tomcat。访问https://www.zlex.org/,我们发现联网有些迟钝。大约5秒钟后,网页正常显示,同时有如下图所示:
各种Java加密算法
浏览器验证了该CA机构的有效性。

打开证书,如下图所示:
各种Java加密算法

调整测试类:

  1. import static org.junit.Assert.*;
  2. import java.io.DataInputStream;
  3. import java.io.InputStream;
  4. import java.net.URL;
  5. import javax.net.ssl.HttpsURLConnection;
  6. import org.junit.Test;
  7. /**
  8. *
  9. * @author 梁栋
  10. * @version 1.0
  11. * @since 1.0
  12. */
  13. public class CertificateCoderTest {
  14. private String password = "123456";
  15. private String alias = "www.zlex.org";
  16. private String certificatePath = "d:/zlex.cer";
  17. private String keyStorePath = "d:/zlex.keystore";
  18. @Test
  19. public void test() throws Exception {
  20. System.err.println("公钥加密——私钥解密");
  21. String inputStr = "Ceritifcate";
  22. byte[] data = inputStr.getBytes();
  23. byte[] encrypt = CertificateCoder.encryptByPublicKey(data,
  24. certificatePath);
  25. byte[] decrypt = CertificateCoder.decryptByPrivateKey(encrypt,
  26. keyStorePath, alias, password);
  27. String outputStr = new String(decrypt);
  28. System.err.println("加密前: " + inputStr + "\n\r" + "解密后: " + outputStr);
  29. // 验证数据一致
  30. assertArrayEquals(data, decrypt);
  31. // 验证证书有效
  32. assertTrue(CertificateCoder.verifyCertificate(certificatePath));
  33. }
  34. @Test
  35. public void testSign() throws Exception {
  36. System.err.println("私钥加密——公钥解密");
  37. String inputStr = "sign";
  38. byte[] data = inputStr.getBytes();
  39. byte[] encodedData = CertificateCoder.encryptByPrivateKey(data,
  40. keyStorePath, alias, password);
  41. byte[] decodedData = CertificateCoder.decryptByPublicKey(encodedData,
  42. certificatePath);
  43. String outputStr = new String(decodedData);
  44. System.err.println("加密前: " + inputStr + "\n\r" + "解密后: " + outputStr);
  45. assertEquals(inputStr, outputStr);
  46. System.err.println("私钥签名——公钥验证签名");
  47. // 产生签名
  48. String sign = CertificateCoder.sign(encodedData, keyStorePath, alias,
  49. password);
  50. System.err.println("签名:\r" + sign);
  51. // 验证签名
  52. boolean status = CertificateCoder.verify(encodedData, sign,
  53. certificatePath);
  54. System.err.println("状态:\r" + status);
  55. assertTrue(status);
  56. }
  57. @Test
  58. public void testHttps() throws Exception {
  59. URL url = new URL("https://www.zlex.org/examples/");
  60. HttpsURLConnection conn = (HttpsURLConnection) url.openConnection();
  61. conn.setDoInput(true);
  62. conn.setDoOutput(true);
  63. CertificateCoder.configSSLSocketFactory(conn, password, keyStorePath,
  64. keyStorePath);
  65. InputStream is = conn.getInputStream();
  66. int length = conn.getContentLength();
  67. DataInputStream dis = new DataInputStream(is);
  68. byte[] data = new byte[length];
  69. dis.readFully(data);
  70. dis.close();
  71. conn.disconnect();
  72. System.err.println(new String(data));
  73. }
  74. }

再次执行,验证通过!
由此,我们了基于SSL协议的认证过程。测试类的testHttps方法模拟了一次浏览器的HTTPS访问。

发表评论

表情:
评论列表 (有 0 条评论,145人围观)

还没有评论,来说两句吧...

相关阅读

    相关 Java加密算法

    [Java加密算法][Java] JDK中带有部分加密算法的实现类,主要的是java.security和javax.crypto包下的类,还可以使用Bouncy Ca...

    相关 ios加密算法汇总

    把相关算法的代码也贴一下吧 (其实使用一些成熟的第三方库或许会来得更加简单,不过自己写,自由点)。注,这里的大部分加密算法都是参考一些现有成熟的算法,或者直接拿来用的。 1

    相关 加密算法

    在开发的过程中避免不了使用加密进行操作,例如密码,文件加密,软件激活,因为加密算法快上百种就不细说了,讲解下常用算法 简介 算法都是不能逆推的,既然不能破解为什么不安全