java的rsa算法代碼 rsa算法代碼c語言

求RSA算法JAVA實現(xiàn)源代碼(帶界面的)

import javax.crypto.Cipher;

創(chuàng)新互聯(lián)建站專注于東興網(wǎng)站建設(shè)服務(wù)及定制,我們擁有豐富的企業(yè)做網(wǎng)站經(jīng)驗。 熱誠為您提供東興營銷型網(wǎng)站建設(shè),東興網(wǎng)站制作、東興網(wǎng)頁設(shè)計、東興網(wǎng)站官網(wǎng)定制、重慶小程序開發(fā)服務(wù),打造東興網(wǎng)絡(luò)公司原創(chuàng)品牌,更為您提供東興網(wǎng)站排名全網(wǎng)營銷落地服務(wù)。

import java.security.*;

import java.security.spec.RSAPublicKeySpec;

import java.security.spec.RSAPrivateKeySpec;

import java.security.spec.InvalidKeySpecException;

import java.security.interfaces.RSAPrivateKey;

import java.security.interfaces.RSAPublicKey;

import java.io.*;

import java.math.BigInteger;

/**

* RSA 工具類。提供加密,解密,生成密鑰對等方法。

* 需要到下載bcprov-jdk14-123.jar。

* @author xiaoyusong

* mail: xiaoyusong@etang.com

* msn:xiao_yu_song@hotmail.com

* @since 2004-5-20

*

*/

public class RSAUtil {

/**

* 生成密鑰對

* @return KeyPair

* @throws EncryptException

*/

public static KeyPair generateKeyPair() throws EncryptException {

try {

KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance("RSA",

new org.bouncycastle.jce.provider.BouncyCastleProvider());

final int KEY_SIZE = 1024;//沒什么好說的了,這個值關(guān)系到塊加密的大小,可以更改,但是不要太大,否則效率會低

keyPairGen.initialize(KEY_SIZE, new SecureRandom());

KeyPair keyPair = keyPairGen.genKeyPair();

return keyPair;

} catch (Exception e) {

throw new EncryptException(e.getMessage());

}

}

/**

* 生成公鑰

* @param modulus

* @param publicExponent

* @return RSAPublicKey

* @throws EncryptException

*/

public static RSAPublicKey generateRSAPublicKey(byte[] modulus, byte[] publicExponent) throws EncryptException {

KeyFactory keyFac = null;

try {

keyFac = KeyFactory.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider());

} catch (NoSuchAlgorithmException ex) {

throw new EncryptException(ex.getMessage());

}

RSAPublicKeySpec pubKeySpec = new RSAPublicKeySpec(new BigInteger(modulus), new BigInteger(publicExponent));

try {

return (RSAPublicKey) keyFac.generatePublic(pubKeySpec);

} catch (InvalidKeySpecException ex) {

throw new EncryptException(ex.getMessage());

}

}

/**

* 生成私鑰

* @param modulus

* @param privateExponent

* @return RSAPrivateKey

* @throws EncryptException

*/

public static RSAPrivateKey generateRSAPrivateKey(byte[] modulus, byte[] privateExponent) throws EncryptException {

KeyFactory keyFac = null;

try {

keyFac = KeyFactory.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider());

} catch (NoSuchAlgorithmException ex) {

throw new EncryptException(ex.getMessage());

}

RSAPrivateKeySpec priKeySpec = new RSAPrivateKeySpec(new BigInteger(modulus), new BigInteger(privateExponent));

try {

return (RSAPrivateKey) keyFac.generatePrivate(priKeySpec);

} catch (InvalidKeySpecException ex) {

throw new EncryptException(ex.getMessage());

}

}

/**

* 加密

* @param key 加密的密鑰

* @param data 待加密的明文數(shù)據(jù)

* @return 加密后的數(shù)據(jù)

* @throws EncryptException

*/

public static byte[] encrypt(Key key, byte[] data) throws EncryptException {

try {

Cipher cipher = Cipher.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider());

cipher.init(Cipher.ENCRYPT_MODE, key);

int blockSize = cipher.getBlockSize();//獲得加密塊大小,如:加密前數(shù)據(jù)為128個byte,而key_size=1024 加密塊大小為127 byte,加密后為128個byte;因此共有2個加密塊,第一個127 byte第二個為1個byte

int outputSize = cipher.getOutputSize(data.length);//獲得加密塊加密后塊大小

int leavedSize = data.length % blockSize;

int blocksSize = leavedSize != 0 ? data.length / blockSize + 1 : data.length / blockSize;

byte[] raw = new byte[outputSize * blocksSize];

int i = 0;

while (data.length - i * blockSize 0) {

if (data.length - i * blockSize blockSize)

cipher.doFinal(data, i * blockSize, blockSize, raw, i * outputSize);

else

cipher.doFinal(data, i * blockSize, data.length - i * blockSize, raw, i * outputSize);

//這里面doUpdate方法不可用,查看源代碼后發(fā)現(xiàn)每次doUpdate后并沒有什么實際動作除了把byte[]放到ByteArrayOutputStream中,而最后doFinal的時候才將所有的byte[]進(jìn)行加密,可是到了此時加密塊大小很可能已經(jīng)超出了OutputSize所以只好用dofinal方法。

i++;

}

return raw;

} catch (Exception e) {

throw new EncryptException(e.getMessage());

}

}

/**

* 解密

* @param key 解密的密鑰

* @param raw 已經(jīng)加密的數(shù)據(jù)

* @return 解密后的明文

* @throws EncryptException

*/

public static byte[] decrypt(Key key, byte[] raw) throws EncryptException {

try {

Cipher cipher = Cipher.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider());

cipher.init(cipher.DECRYPT_MODE, key);

int blockSize = cipher.getBlockSize();

ByteArrayOutputStream bout = new ByteArrayOutputStream(64);

int j = 0;

while (raw.length - j * blockSize 0) {

bout.write(cipher.doFinal(raw, j * blockSize, blockSize));

j++;

}

return bout.toByteArray();

} catch (Exception e) {

throw new EncryptException(e.getMessage());

}

}

/**

*

* @param args

* @throws Exception

*/

public static void main(String[] args) throws Exception {

File file = new File("test.html");

FileInputStream in = new FileInputStream(file);

ByteArrayOutputStream bout = new ByteArrayOutputStream();

byte[] tmpbuf = new byte[1024];

int count = 0;

while ((count = in.read(tmpbuf)) != -1) {

bout.write(tmpbuf, 0, count);

tmpbuf = new byte[1024];

}

in.close();

byte[] orgData = bout.toByteArray();

KeyPair keyPair = RSAUtil.generateKeyPair();

RSAPublicKey pubKey = (RSAPublicKey) keyPair.getPublic();

RSAPrivateKey priKey = (RSAPrivateKey) keyPair.getPrivate();

byte[] pubModBytes = pubKey.getModulus().toByteArray();

byte[] pubPubExpBytes = pubKey.getPublicExponent().toByteArray();

byte[] priModBytes = priKey.getModulus().toByteArray();

byte[] priPriExpBytes = priKey.getPrivateExponent().toByteArray();

RSAPublicKey recoveryPubKey = RSAUtil.generateRSAPublicKey(pubModBytes,pubPubExpBytes);

RSAPrivateKey recoveryPriKey = RSAUtil.generateRSAPrivateKey(priModBytes,priPriExpBytes);

byte[] raw = RSAUtil.encrypt(priKey, orgData);

file = new File("encrypt_result.dat");

OutputStream out = new FileOutputStream(file);

out.write(raw);

out.close();

byte[] data = RSAUtil.decrypt(recoveryPubKey, raw);

file = new File("decrypt_result.html");

out = new FileOutputStream(file);

out.write(data);

out.flush();

out.close();

}

}

這個行吧

再參考這個吧

java RSA算法實現(xiàn)256位密鑰怎么做

參考下面代碼:

try?{

KeyPairGenerator?keyPairGen?=?KeyPairGenerator.getInstance("RSA",

new?org.bouncycastle.jce.provider.BouncyCastleProvider());

final?int?KEY_SIZE?=?128;//?沒什么好說的了,這個值關(guān)系到塊加密的大小,可以更改,但是不要太大,否則效率會低

keyPairGen.initialize(KEY_SIZE,?new?SecureRandom());

KeyPair?keyPair?=?keyPairGen.generateKeyPair();

return?keyPair;

}?catch?(Exception?e)?{

throw?new?Exception(e.getMessage());

}

高分求java的RSA 和IDEA 加密解密算法

RSA算法非常簡單,概述如下:

找兩素數(shù)p和q

取n=p*q

取t=(p-1)*(q-1)

取任何一個數(shù)e,要求滿足et并且e與t互素(就是最大公因數(shù)為1)

取d*e%t==1

這樣最終得到三個數(shù): n d e

設(shè)消息為數(shù)M (M n)

設(shè)c=(M**d)%n就得到了加密后的消息c

設(shè)m=(c**e)%n則 m == M,從而完成對c的解密。

注:**表示次方,上面兩式中的d和e可以互換。

在對稱加密中:

n d兩個數(shù)構(gòu)成公鑰,可以告訴別人;

n e兩個數(shù)構(gòu)成私鑰,e自己保留,不讓任何人知道。

給別人發(fā)送的信息使用e加密,只要別人能用d解開就證明信息是由你發(fā)送的,構(gòu)成了簽名機(jī)制。

別人給你發(fā)送信息時使用d加密,這樣只有擁有e的你能夠?qū)ζ浣饷堋?/p>

rsa的安全性在于對于一個大數(shù)n,沒有有效的方法能夠?qū)⑵浞纸?/p>

從而在已知n d的情況下無法獲得e;同樣在已知n e的情況下無法

求得d。

二實踐

接下來我們來一個實踐,看看實際的操作:

找兩個素數(shù):

p=47

q=59

這樣

n=p*q=2773

t=(p-1)*(q-1)=2668

取e=63,滿足et并且e和t互素

用perl簡單窮舉可以獲得滿主 e*d%t ==1的數(shù)d:

C:\Tempperl -e "foreach $i (1..9999){ print($i),last if $i*63%2668==1 }"

847

即d=847

最終我們獲得關(guān)鍵的

n=2773

d=847

e=63

取消息M=244我們看看

加密:

c=M**d%n = 244**847%2773

用perl的大數(shù)計算來算一下:

C:\Tempperl -Mbigint -e "print 244**847%2773"

465

即用d對M加密后獲得加密信息c=465

解密:

我們可以用e來對加密后的c進(jìn)行解密,還原M:

m=c**e%n=465**63%2773 :

C:\Tempperl -Mbigint -e "print 465**63%2773"

244

即用e對c解密后獲得m=244 , 該值和原始信息M相等。

三字符串加密

把上面的過程集成一下我們就能實現(xiàn)一個對字符串加密解密的示例了。

每次取字符串中的一個字符的ascii值作為M進(jìn)行計算,其輸出為加密后16進(jìn)制

的數(shù)的字符串形式,按3字節(jié)表示,如01F

代碼如下:

#!/usr/bin/perl -w

#RSA 計算過程學(xué)習(xí)程序編寫的測試程序

#watercloud 2003-8-12

#

use strict;

use Math::BigInt;

my %RSA_CORE = (n=2773,e=63,d=847); #p=47,q=59

my $N=new Math::BigInt($RSA_CORE{n});

my $E=new Math::BigInt($RSA_CORE{e});

my $D=new Math::BigInt($RSA_COREdvhfxf7);

print "N=$N D=$D E=$E\n";

sub RSA_ENCRYPT

{

my $r_mess = shift @_;

my ($c,$i,$M,$C,$cmess);

for($i=0;$i length($$r_mess);$i++)

{

$c=ord(substr($$r_mess,$i,1));

$M=Math::BigInt-new($c);

$C=$M-copy(); $C-bmodpow($D,$N);

$c=sprintf "%03X",$C;

$cmess.=$c;

}

return \$cmess;

}

sub RSA_DECRYPT

{

my $r_mess = shift @_;

my ($c,$i,$M,$C,$dmess);

for($i=0;$i length($$r_mess);$i+=3)

{

$c=substr($$r_mess,$i,3);

$c=hex($c);

$M=Math::BigInt-new($c);

$C=$M-copy(); $C-bmodpow($E,$N);

$c=chr($C);

$dmess.=$c;

}

return \$dmess;

}

my $mess="RSA 娃哈哈哈~~~";

$mess=$ARGV[0] if @ARGV = 1;

print "原始串:",$mess,"\n";

my $r_cmess = RSA_ENCRYPT(\$mess);

print "加密串:",$$r_cmess,"\n";

my $r_dmess = RSA_DECRYPT($r_cmess);

print "解密串:",$$r_dmess,"\n";

#EOF

測試一下:

C:\Tempperl rsa-test.pl

N=2773 D=847 E=63

原始串:RSA 娃哈哈哈~~~

加密串:5CB6CD6BC58A7709470AA74A0AA74A0AA74A6C70A46C70A46C70A4

解密串:RSA 娃哈哈哈~~~

C:\Tempperl rsa-test.pl 安全焦點(xfocus)

N=2773 D=847 E=63

原始串:安全焦點(xfocus)

加密串:3393EC12F0A466E0AA9510D025D7BA0712DC3379F47D51C325D67B

解密串:安全焦點(xfocus)

四提高

前面已經(jīng)提到,rsa的安全來源于n足夠大,我們測試中使用的n是非常小的,根本不能保障安全性,

我們可以通過RSAKit、RSATool之類的工具獲得足夠大的N 及D E。

通過工具,我們獲得1024位的N及D E來測試一下:

n=0x328C74784DF31119C526D18098EBEBB943B0032B599CEE13CC2BCE7B5FCD15F90B66EC3A85F5005D

BDCDED9BDFCB3C4C265AF164AD55884D8278F791C7A6BFDAD55EDBC4F017F9CCF1538D4C2013433B383B

47D80EC74B51276CA05B5D6346B9EE5AD2D7BE7ABFB36E37108DD60438941D2ED173CCA50E114705D7E2

BC511951

d=0x10001

e=0xE760A3804ACDE1E8E3D7DC0197F9CEF6282EF552E8CEBBB7434B01CB19A9D87A3106DD28C523C2995

4C5D86B36E943080E4919CA8CE08718C3B0930867A98F635EB9EA9200B25906D91B80A47B77324E66AFF2

C4D70D8B1C69C50A9D8B4B7A3C9EE05FFF3A16AFC023731D80634763DA1DCABE9861A4789BD782A592D2B

1965

設(shè)原始信息

M=0x11111111111122222222222233333333333

完成這么大數(shù)字的計算依賴于大數(shù)運(yùn)算庫,用perl來運(yùn)算非常簡單:

A) 用d對M進(jìn)行加密如下:

c=M**d%n :

C:\Tempperl -Mbigint -e " $x=Math::BigInt-bmodpow(0x11111111111122222222222233

333333333, 0x10001, 0x328C74784DF31119C526D18098EBEBB943B0032B599CEE13CC2BCE7B5F

CD15F90B66EC3A85F5005DBDCDED9BDFCB3C4C265AF164AD55884D8278F791C7A6BFDAD55EDBC4F0

17F9CCF1538D4C2013433B383B47D80EC74B51276CA05B5D6346B9EE5AD2D7BE7ABFB36E37108DD6

0438941D2ED173CCA50E114705D7E2BC511951);print $x-as_hex"

0x17b287be418c69ecd7c39227ab681ac422fcc84bb35d8a632543b304de288a8d4434b73d2576bd

45692b007f3a2f7c5f5aa1d99ef3866af26a8e876712ed1d4cc4b293e26bc0a1dc67e247715caa6b

3028f9461a3b1533ec0cb476441465f10d8ad47452a12db0601c5e8beda686dd96d2acd59ea89b91

f1834580c3f6d90898

即用d對M加密后信息為:

c=0x17b287be418c69ecd7c39227ab681ac422fcc84bb35d8a632543b304de288a8d4434b73d2576bd

45692b007f3a2f7c5f5aa1d99ef3866af26a8e876712ed1d4cc4b293e26bc0a1dc67e247715caa6b

3028f9461a3b1533ec0cb476441465f10d8ad47452a12db0601c5e8beda686dd96d2acd59ea89b91

f1834580c3f6d90898

B) 用e對c進(jìn)行解密如下:

m=c**e%n :

C:\Tempperl -Mbigint -e " $x=Math::BigInt-bmodpow(0x17b287be418c69ecd7c39227ab

681ac422fcc84bb35d8a632543b304de288a8d4434b73d2576bd45692b007f3a2f7c5f5aa1d99ef3

866af26a8e876712ed1d4cc4b293e26bc0a1dc67e247715caa6b3028f9461a3b1533ec0cb4764414

65f10d8ad47452a12db0601c5e8beda686dd96d2acd59ea89b91f1834580c3f6d90898, 0xE760A

3804ACDE1E8E3D7DC0197F9CEF6282EF552E8CEBBB7434B01CB19A9D87A3106DD28C523C29954C5D

86B36E943080E4919CA8CE08718C3B0930867A98F635EB9EA9200B25906D91B80A47B77324E66AFF

2C4D70D8B1C69C50A9D8B4B7A3C9EE05FFF3A16AFC023731D80634763DA1DCABE9861A4789BD782A

592D2B1965, 0x328C74784DF31119C526D18098EBEBB943B0032B599CEE13CC2BCE7B5FCD15F90

B66EC3A85F5005DBDCDED9BDFCB3C4C265AF164AD55884D8278F791C7A6BFDAD55EDBC4F017F9CCF

1538D4C2013433B383B47D80EC74B51276CA05B5D6346B9EE5AD2D7BE7ABFB36E37108DD60438941

D2ED173CCA50E114705D7E2BC511951);print $x-as_hex"

0x11111111111122222222222233333333333

(我的P4 1.6G的機(jī)器上計算了約5秒鐘)

得到用e解密后的m=0x11111111111122222222222233333333333 == M

C) RSA通常的實現(xiàn)

RSA簡潔幽雅,但計算速度比較慢,通常加密中并不是直接使用RSA 來對所有的信息進(jìn)行加密,

最常見的情況是隨機(jī)產(chǎn)生一個對稱加密的密鑰,然后使用對稱加密算法對信息加密,之后用

RSA對剛才的加密密鑰進(jìn)行加密。

最后需要說明的是,當(dāng)前小于1024位的N已經(jīng)被證明是不安全的

自己使用中不要使用小于1024位的RSA,最好使用2048位的。

----------------------------------------------------------

一個簡單的RSA算法實現(xiàn)JAVA源代碼:

filename:RSA.java

/*

* Created on Mar 3, 2005

*

* TODO To change the template for this generated file go to

* Window - Preferences - Java - Code Style - Code Templates

*/

import java.math.BigInteger;

import java.io.InputStream;

import java.io.OutputStream;

import java.io.FileInputStream;

import java.io.FileOutputStream;

import java.io.FileNotFoundException;

import java.io.IOException;

import java.io.FileWriter;

import java.io.FileReader;

import java.io.BufferedReader;

import java.util.StringTokenizer;

/**

* @author Steve

*

* TODO To change the template for this generated type comment go to

* Window - Preferences - Java - Code Style - Code Templates

*/

public class RSA {

/**

* BigInteger.ZERO

*/

private static final BigInteger ZERO = BigInteger.ZERO;

/**

* BigInteger.ONE

*/

private static final BigInteger ONE = BigInteger.ONE;

/**

* Pseudo BigInteger.TWO

*/

private static final BigInteger TWO = new BigInteger("2");

private BigInteger myKey;

private BigInteger myMod;

private int blockSize;

public RSA (BigInteger key, BigInteger n, int b) {

myKey = key;

myMod = n;

blockSize = b;

}

public void encodeFile (String filename) {

byte[] bytes = new byte[blockSize / 8 + 1];

byte[] temp;

int tempLen;

InputStream is = null;

FileWriter writer = null;

try {

is = new FileInputStream(filename);

writer = new FileWriter(filename + ".enc");

}

catch (FileNotFoundException e1){

System.out.println("File not found: " + filename);

}

catch (IOException e1){

System.out.println("File not found: " + filename + ".enc");

}

/**

* Write encoded message to 'filename'.enc

*/

try {

while ((tempLen = is.read(bytes, 1, blockSize / 8)) 0) {

for (int i = tempLen + 1; i bytes.length; ++i) {

bytes[i] = 0;

}

writer.write(encodeDecode(new BigInteger(bytes)) + " ");

}

}

catch (IOException e1) {

System.out.println("error writing to file");

}

/**

* Close input stream and file writer

*/

try {

is.close();

writer.close();

}

catch (IOException e1) {

System.out.println("Error closing file.");

}

}

public void decodeFile (String filename) {

FileReader reader = null;

OutputStream os = null;

try {

reader = new FileReader(filename);

os = new FileOutputStream(filename.replaceAll(".enc", ".dec"));

}

catch (FileNotFoundException e1) {

if (reader == null)

System.out.println("File not found: " + filename);

else

System.out.println("File not found: " + filename.replaceAll(".enc", "dec"));

}

BufferedReader br = new BufferedReader(reader);

int offset;

byte[] temp, toFile;

StringTokenizer st = null;

try {

while (br.ready()) {

st = new StringTokenizer(br.readLine());

while (st.hasMoreTokens()){

toFile = encodeDecode(new BigInteger(st.nextToken())).toByteArray();

System.out.println(toFile.length + " x " + (blockSize / 8));

if (toFile[0] == 0 toFile.length != (blockSize / 8)) {

temp = new byte[blockSize / 8];

offset = temp.length - toFile.length;

for (int i = toFile.length - 1; (i = 0) ((i + offset) = 0); --i) {

temp[i + offset] = toFile[i];

}

toFile = temp;

}

/*if (toFile.length != ((blockSize / 8) + 1)){

temp = new byte[(blockSize / 8) + 1];

System.out.println(toFile.length + " x " + temp.length);

for (int i = 1; i temp.length; i++) {

temp[i] = toFile[i - 1];

}

toFile = temp;

}

else

System.out.println(toFile.length + " " + ((blockSize / 8) + 1));*/

os.write(toFile);

}

}

}

catch (IOException e1) {

System.out.println("Something went wrong");

}

/**

* close data streams

*/

try {

os.close();

reader.close();

}

catch (IOException e1) {

System.out.println("Error closing file.");

}

}

/**

* Performs ttbase/tt^supttpow/tt/sup within the modular

* domain of ttmod/tt.

*

* @param base the base to be raised

* @param pow the power to which the base will be raisded

* @param mod the modular domain over which to perform this operation

* @return ttbase/tt^supttpow/tt/sup within the modular

* domain of ttmod/tt.

*/

public BigInteger encodeDecode(BigInteger base) {

BigInteger a = ONE;

BigInteger s = base;

BigInteger n = myKey;

while (!n.equals(ZERO)) {

if(!n.mod(TWO).equals(ZERO))

a = a.multiply(s).mod(myMod);

s = s.pow(2).mod(myMod);

n = n.divide(TWO);

}

return a;

}

}

在這里提供兩個版本的RSA算法JAVA實現(xiàn)的代碼下載:

1. 來自于 的RSA算法實現(xiàn)源代碼包:

2. 來自于 的實現(xiàn):

- 源代碼包

- 編譯好的jar包

另外關(guān)于RSA算法的php實現(xiàn)請參見文章:

php下的RSA算法實現(xiàn)

關(guān)于使用VB實現(xiàn)RSA算法的源代碼下載(此程序采用了psc1算法來實現(xiàn)快速的RSA加密):

RSA加密的JavaScript實現(xiàn):

如何用java實現(xiàn)128位密鑰的RSA算法

import?javax.crypto.Cipher;

import?sun.misc.BASE64Decoder;

import?sun.misc.BASE64Encoder;

import?java.io.FileInputStream;

import?java.io.FileOutputStream;

import?java.io.ObjectInputStream;

import?java.io.ObjectOutputStream;

import?java.security.Key;

import?java.security.KeyPair;

import?java.security.KeyPairGenerator;

import?java.security.SecureRandom;

public?class?RSA_Encrypt?{

/**?指定加密算法為DESede?*/

private?static?String?ALGORITHM?=?"RSA";

/**?指定key的大小?*/

private?static?int?KEYSIZE?=?128;

/**?指定公鑰存放文件?*/

private?static?String?PUBLIC_KEY_FILE?=?"PublicKey";

/**?指定私鑰存放文件?*/

private?static?String?PRIVATE_KEY_FILE?=?"PrivateKey";

//?private?static?String?PUBLIC_KEY_FILE?=?"D://PublicKey.a";

//?private?static?String?PRIVATE_KEY_FILE?=?"D://PrivateKey.a";

/**

*?生成密鑰對

*/

private?static?void?generateKeyPair()?throws?Exception{

/**?RSA算法要求有一個可信任的隨機(jī)數(shù)源?*/

SecureRandom?sr?=?new?SecureRandom();

/**?為RSA算法創(chuàng)建一個KeyPairGenerator對象?*/

KeyPairGenerator?kpg?=?KeyPairGenerator.getInstance(ALGORITHM);

/**?利用上面的隨機(jī)數(shù)據(jù)源初始化這個KeyPairGenerator對象?*/

kpg.initialize(KEYSIZE,?sr);

/**?生成密匙對?*/

KeyPair?kp?=?kpg.generateKeyPair();

/**?得到公鑰?*/

Key?publicKey?=?kp.getPublic();

/**?得到私鑰?*/

Key?privateKey?=?kp.getPrivate();

/**?用對象流將生成的密鑰寫入文件?*/

ObjectOutputStream?oos1?=?new?ObjectOutputStream(new?FileOutputStream(PUBLIC_KEY_FILE));

ObjectOutputStream?oos2?=?new?ObjectOutputStream(new?FileOutputStream(PRIVATE_KEY_FILE));

oos1.writeObject(publicKey);

oos2.writeObject(privateKey);

/**?清空緩存,關(guān)閉文件輸出流?*/

oos1.close();

oos2.close();

}

/**

*?加密方法

*?source:?源數(shù)據(jù)

*/

public?static?String?encrypt(String?source)?throws?Exception{

generateKeyPair();

/**?將文件中的公鑰對象讀出?*/

ObjectInputStream?ois?=?new?ObjectInputStream(new?FileInputStream(PUBLIC_KEY_FILE));

Key?key?=?(Key)?ois.readObject();

ois.close();

/**?得到Cipher對象來實現(xiàn)對源數(shù)據(jù)的RSA加密?*/

Cipher?cipher?=?Cipher.getInstance(ALGORITHM);

cipher.init(Cipher.ENCRYPT_MODE,?key);

byte[]?b?=?source.getBytes();

/**?執(zhí)行加密操作?*/

byte[]?b1?=?cipher.doFinal(b);

BASE64Encoder?encoder?=?new?BASE64Encoder();

return?encoder.encode(b1);

}

/**

*?解密算法

*?cryptograph:密文

*/

public?static?String?decrypt(String?cryptograph)?throws?Exception{

/**?將文件中的私鑰對象讀出?*/

ObjectInputStream?ois?=?new?ObjectInputStream(new?FileInputStream(PRIVATE_KEY_FILE));

Key?key?=?(Key)?ois.readObject();

/**?得到Cipher對象對已用公鑰加密的數(shù)據(jù)進(jìn)行RSA解密?*/

Cipher?cipher?=?Cipher.getInstance(ALGORITHM);

cipher.init(Cipher.DECRYPT_MODE,?key);

BASE64Decoder?decoder?=?new?BASE64Decoder();

byte[]?b1?=?decoder.decodeBuffer(cryptograph);

/**?執(zhí)行解密操作?*/

byte[]?b?=?cipher.doFinal(b1);

return?new?String(b);

}

public?static?void?main(String[]?args)?{

try?{

String?source?=?"Hello?World!";//要加密的字符串

String?cryptograph?=?encrypt(source);

System.out.println(cryptograph);

String?target?=?decrypt(cryptograph);//解密密文

System.out.println(target);

}?catch?(Exception?e)?{

//?TODO?Auto-generated?catch?block

e.printStackTrace();

}//生成的密文

}

}

網(wǎng)站欄目:java的rsa算法代碼 rsa算法代碼c語言
鏈接分享:http://www.muchs.cn/article38/hphjsp.html

成都網(wǎng)站建設(shè)公司_創(chuàng)新互聯(lián),為您提供外貿(mào)網(wǎng)站建設(shè)網(wǎng)站制作、標(biāo)簽優(yōu)化網(wǎng)站建設(shè)域名注冊、網(wǎng)站內(nèi)鏈

廣告

聲明:本網(wǎng)站發(fā)布的內(nèi)容(圖片、視頻和文字)以用戶投稿、用戶轉(zhuǎn)載內(nèi)容為主,如果涉及侵權(quán)請盡快告知,我們將會在第一時間刪除。文章觀點不代表本網(wǎng)站立場,如需處理請聯(lián)系客服。電話:028-86922220;郵箱:631063699@qq.com。內(nèi)容未經(jīng)允許不得轉(zhuǎn)載,或轉(zhuǎn)載時需注明來源: 創(chuàng)新互聯(lián)

網(wǎng)站建設(shè)網(wǎng)站維護(hù)公司