//DES 密钥生成工具
import java.io.File
import java.io.FileNotFoundException
import java.io.FileOutputStream
import java.io.IOException
import java.io.ObjectOutputStream
import java.security.InvalidKeyException
import java.security.NoSuchAlgorithmException
import java.security.SecureRandom
import java.security.spec.InvalidKeySpecException
import javax.crypto.KeyGenerator
import javax.crypto.SecretKey
import javax.crypto.SecretKeyFactory
import javax.crypto.spec.DESKeySpec
public class GenKey {
private static final String DES = "DES"
public static final String SKEY_NAME = "key.des"
public static void genKey1(String path) {
// 密钥
SecretKey skey = null
// 密钥随机数生成
SecureRandom sr = new SecureRandom()
//生成密钥文件
File file = genFile(path)
try {
// 获取密钥生成实例
KeyGenerator gen = KeyGenerator.getInstance(DES)
// 初始化密钥生成器
gen.init(sr)
// 生成密钥
skey = gen.generateKey()
// System.out.println(skey)
ObjectOutputStream oos = new ObjectOutputStream(
new FileOutputStream(file))
oos.writeObject(skey)
oos.close()
} catch (NoSuchAlgorithmException e) {
e.printStackTrace()
} catch (FileNotFoundException e) {
e.printStackTrace()
} catch (IOException e) {
e.printStackTrace()
}
}
/**
* @param file : 生成密钥的路径
* SecretKeyFactory 方式生成des密钥
* */
public static void genKey2(String path) {
// 密钥随机数生成
SecureRandom sr = new SecureRandom()
// byte[] bytes = {11,12,44,99,76,45,1,8}
byte[] bytes = sr.generateSeed(20)
// 密钥
SecretKey skey = null
//生成密钥文件路径
File file = genFile(path)
try {
//创建deskeyspec对象
DESKeySpec desKeySpec = new DESKeySpec(bytes,9)
//实例化des密钥工厂
SecretKeyFactory keyFactory = SecretKeyFactory.getInstance(DES)
//生成密钥对象
skey = keyFactory.generateSecret(desKeySpec)
//写出密钥对象
ObjectOutputStream oos = new ObjectOutputStream(
new FileOutputStream(file))
oos.writeObject(skey)
oos.close()
} catch (NoSuchAlgorithmException e) {
e.printStackTrace()
} catch (InvalidKeyException e) {
e.printStackTrace()
} catch (InvalidKeySpecException e) {
e.printStackTrace()
} catch (FileNotFoundException e) {
e.printStackTrace()
} catch (IOException e) {
e.printStackTrace()
}
}
private static File genFile(String path) {
String temp = null
File newFile = null
if (path.endsWith("/") || path.endsWith("\\")) {
temp = path
} else {
temp = path + "/"
}
File pathFile = new File(temp)
if (!pathFile.exists())
pathFile.mkdirs()
newFile = new File(temp+SKEY_NAME)
return newFile
}
/**
* @param args
*/
public static void main(String[] args) {
// TODO Auto-generated method stub
genKey2("E:/a/aa/")
}
}
//DES加解密方法
import java.io.BufferedInputStream
import java.io.BufferedOutputStream
import java.io.File
import java.io.FileInputStream
import java.io.FileNotFoundException
import java.io.FileOutputStream
import java.io.ObjectInputStream
import javax.crypto.Cipher
import javax.crypto.CipherInputStream
import javax.crypto.SecretKey
import org.apache.commons.logging.Log
import org.apache.commons.logging.LogFactory
/**
*制卡文件加/解密 加密方式DES
*/
public class SecUtil {
public static final Log log = LogFactory.getLog(SecUtil.class)
/**
* 解密
*
* @param keyPath
*密钥路径
* @param source
*解密前文件
* @param dest
*解密后文件
*/
public static void decrypt(String keyPath, String source, String dest) {
SecretKey key = null
try {
ObjectInputStream keyFile = new ObjectInputStream(
// 读取加密密钥
new FileInputStream(keyPath))
key = (SecretKey) keyFile.readObject()
keyFile.close()
} catch (FileNotFoundException ey1) {
log.info("Error when read keyFile")
throw new RuntimeException(ey1)
} catch (Exception ey2) {
log.info("error when read the keyFile")
throw new RuntimeException(ey2)
}
// 用key产生Cipher
Cipher cipher = null
try {
// 设置算法,应该与加密时的设置一样
cipher = Cipher.getInstance("DES")
// 设置解密模式
cipher.init(Cipher.DECRYPT_MODE, key)
} catch (Exception ey3) {
log.info("Error when create the cipher")
throw new RuntimeException(ey3)
}
// 取得要解密的文件并解密
File file = new File(source)
String filename = file.getName()
try {
// 输出流,请注意文件名称的获取
BufferedOutputStream out = new BufferedOutputStream(
new FileOutputStream(dest))
// 输入流
CipherInputStream in = new CipherInputStream(
new BufferedInputStream(new FileInputStream(file)), cipher)
int thebyte = 0
while ((thebyte = in.read()) != -1) {
out.write(thebyte)
}
in.close()
out.close()
} catch (Exception ey5) {
log.info("Error when encrypt the file")
throw new RuntimeException(ey5)
}
}
/**
* 加密
* @param keyPath 密钥路径
* @param source 加密前文件
* @param dest 加密后文件
*/
public static void encrypt(String keyPath, String source, String dest) {
SecretKey key = null
try {
ObjectInputStream keyFile = new ObjectInputStream(
// 读取加密密钥
new FileInputStream(keyPath))
key = (SecretKey) keyFile.readObject()
keyFile.close()
} catch (FileNotFoundException ey1) {
log.info("Error when read keyFile")
throw new RuntimeException(ey1)
} catch (Exception ey2) {
log.info("error when read the keyFile")
throw new RuntimeException(ey2)
}
// 用key产生Cipher
Cipher cipher = null
try {
// 设置算法,应该与加密时的设置一样
cipher = Cipher.getInstance("DES")
// 设置解密模式
cipher.init(Cipher.ENCRYPT_MODE, key)
} catch (Exception ey3) {
log.info("Error when create the cipher")
throw new RuntimeException(ey3)
}
// 取得要解密的文件并解密
File file = new File(source)
String filename = file.getName()
try {
// 输出流,请注意文件名称的获取
BufferedOutputStream out = new BufferedOutputStream(
new FileOutputStream(dest))
// 输入流
CipherInputStream in = new CipherInputStream(
new BufferedInputStream(new FileInputStream(file)), cipher)
int thebyte = 0
while ((thebyte = in.read()) != -1) {
out.write(thebyte)
}
in.close()
out.close()
} catch (Exception ey5) {
log.info("Error when encrypt the file")
throw new RuntimeException(ey5)
}
}
}
可以通过其它方法来实现:1:如果没用框架,直接加密、解密即可
2:如果用hibernate之类,可以绕过Configuration,读取Hibernate配置文件解密后再连接数据库
3:考虑集群影响
RSA算法非常简单,概述如下:找两素数p和q
取n=p*q
取t=(p-1)*(q-1)
取任何一个数e,要求满足e<t并且e与t互素(就是最大公因数为1)
取d*e%t==1
这样最终得到三个数: n d e
设消息为数M (M <n)
设c=(M**d)%n就得到了加密后的消息c
设m=(c**e)%n则 m == M,从而完成对c的解密。
注:**表示次方,上面两式中的d和e可以互换。
在对称加密中:
n d两个数构成公钥,可以告诉别人;
n e两个数构成私钥,e自己保留,不让任何人知道。
给别人发送的信息使用e加密,只要别人能用d解开就证明信息是由你发送的,构成了签名机制。
别人给你发送信息时使用d加密,这样只有拥有e的你能够对其解密。
rsa的安全性在于对于一个大数n,没有有效的方法能够将其分解
从而在已知n d的情况下无法获得e;同样在已知n e的情况下无法
求得d。
<二>实践
接下来我们来一个实践,看看实际的 *** 作:
找两个素数:
p=47
q=59
这样
n=p*q=2773
t=(p-1)*(q-1)=2668
取e=63,满足e<t并且e和t互素
用perl简单穷举可以获得满主 e*d%t ==1的数d:
C:\Temp>perl -e "foreach $i (1..9999){ print($i),last if $i*63%2668==1 }"
847
即d=847
最终我们获得关键的
n=2773
d=847
e=63
取消息M=244我们看看
加密:
c=M**d%n = 244**847%2773
用perl的大数计算来算一下:
C:\Temp>perl -Mbigint -e "print 244**847%2773"
465
即用d对M加密后获得加密信息c=465
解密:
我们可以用e来对加密后的c进行解密,还原M:
m=c**e%n=465**63%2773 :
C:\Temp>perl -Mbigint -e "print 465**63%2773"
244
即用e对c解密后获得m=244 , 该值和原始信息M相等。
<三>字符串加密
把上面的过程集成一下我们就能实现一个对字符串加密解密的示例了。
每次取字符串中的一个字符的ascii值作为M进行计算,其输出为加密后16进制
的数的字符串形式,按3字节表示,如01F
代码如下:
#!/usr/bin/perl -w
#RSA 计算过程学习程序编写的测试程序
#watercloud 2003-8-12
#
use strict
use Math::BigInt
my %RSA_CORE = (n=>2773,e=>63,d=>847)#p=47,q=59
my $N=new Math::BigInt($RSA_CORE{n})
my $E=new Math::BigInt($RSA_CORE{e})
my $D=new Math::BigInt($RSA_CORE{d})
print "N=$N D=$D E=$E\n"
sub RSA_ENCRYPT
{
my $r_mess = shift @_
my ($c,$i,$M,$C,$cmess)
for($i=0$i <length($$r_mess)$i++)
{
$c=ord(substr($$r_mess,$i,1))
$M=Math::BigInt->new($c)
$C=$M->copy()$C->bmodpow($D,$N)
$c=sprintf "%03X",$C
$cmess.=$c
}
return \$cmess
}
sub RSA_DECRYPT
{
my $r_mess = shift @_
my ($c,$i,$M,$C,$dmess)
for($i=0$i <length($$r_mess)$i+=3)
{
$c=substr($$r_mess,$i,3)
$c=hex($c)
$M=Math::BigInt->new($c)
$C=$M->copy()$C->bmodpow($E,$N)
$c=chr($C)
$dmess.=$c
}
return \$dmess
}
my $mess="RSA 娃哈哈哈~~~"
$mess=$ARGV[0] if @ARGV >= 1
print "原始串:",$mess,"\n"
my $r_cmess = RSA_ENCRYPT(\$mess)
print "加密串:",$$r_cmess,"\n"
my $r_dmess = RSA_DECRYPT($r_cmess)
print "解密串:",$$r_dmess,"\n"
#EOF
测试一下:
C:\Temp>perl rsa-test.pl
N=2773 D=847 E=63
原始串:RSA 娃哈哈哈~~~
加密串:5CB6CD6BC58A7709470AA74A0AA74A0AA74A6C70A46C70A46C70A4
解密串:RSA 娃哈哈哈~~~
C:\Temp>perl rsa-test.pl 安全焦点(xfocus)
N=2773 D=847 E=63
原始串:安全焦点(xfocus)
加密串:3393EC12F0A466E0AA9510D025D7BA0712DC3379F47D51C325D67B
解密串:安全焦点(xfocus)
<四>提高
前面已经提到,rsa的安全来源于n足够大,我们测试中使用的n是非常小的,根本不能保障安全性,
我们可以通过RSAKit、RSATool之类的工具获得足够大的N 及D E。
通过工具,我们获得1024位的N及D E来测试一下:
n=0x328C74784DF31119C526D18098EBEBB943B0032B599CEE13CC2BCE7B5FCD15F90B66EC3A85F5005D
BDCDED9BDFCB3C4C265AF164AD55884D8278F791C7A6BFDAD55EDBC4F017F9CCF1538D4C2013433B383B
47D80EC74B51276CA05B5D6346B9EE5AD2D7BE7ABFB36E37108DD60438941D2ED173CCA50E114705D7E2
BC511951
d=0x10001
e=0xE760A3804ACDE1E8E3D7DC0197F9CEF6282EF552E8CEBBB7434B01CB19A9D87A3106DD28C523C2995
4C5D86B36E943080E4919CA8CE08718C3B0930867A98F635EB9EA9200B25906D91B80A47B77324E66AFF2
C4D70D8B1C69C50A9D8B4B7A3C9EE05FFF3A16AFC023731D80634763DA1DCABE9861A4789BD782A592D2B
1965
设原始信息
M=0x11111111111122222222222233333333333
完成这么大数字的计算依赖于大数运算库,用perl来运算非常简单:
A) 用d对M进行加密如下:
c=M**d%n :
C:\Temp>perl -Mbigint -e " $x=Math::BigInt->bmodpow(0x11111111111122222222222233
333333333, 0x10001, 0x328C74784DF31119C526D18098EBEBB943B0032B599CEE13CC2BCE7B5F
CD15F90B66EC3A85F5005DBDCDED9BDFCB3C4C265AF164AD55884D8278F791C7A6BFDAD55EDBC4F0
17F9CCF1538D4C2013433B383B47D80EC74B51276CA05B5D6346B9EE5AD2D7BE7ABFB36E37108DD6
0438941D2ED173CCA50E114705D7E2BC511951)print $x->as_hex"
0x17b287be418c69ecd7c39227ab681ac422fcc84bb35d8a632543b304de288a8d4434b73d2576bd
45692b007f3a2f7c5f5aa1d99ef3866af26a8e876712ed1d4cc4b293e26bc0a1dc67e247715caa6b
3028f9461a3b1533ec0cb476441465f10d8ad47452a12db0601c5e8beda686dd96d2acd59ea89b91
f1834580c3f6d90898
即用d对M加密后信息为:
c=0x17b287be418c69ecd7c39227ab681ac422fcc84bb35d8a632543b304de288a8d4434b73d2576bd
45692b007f3a2f7c5f5aa1d99ef3866af26a8e876712ed1d4cc4b293e26bc0a1dc67e247715caa6b
3028f9461a3b1533ec0cb476441465f10d8ad47452a12db0601c5e8beda686dd96d2acd59ea89b91
f1834580c3f6d90898
B) 用e对c进行解密如下:
m=c**e%n :
C:\Temp>perl -Mbigint -e " $x=Math::BigInt->bmodpow(0x17b287be418c69ecd7c39227ab
681ac422fcc84bb35d8a632543b304de288a8d4434b73d2576bd45692b007f3a2f7c5f5aa1d99ef3
866af26a8e876712ed1d4cc4b293e26bc0a1dc67e247715caa6b3028f9461a3b1533ec0cb4764414
65f10d8ad47452a12db0601c5e8beda686dd96d2acd59ea89b91f1834580c3f6d90898, 0xE760A
3804ACDE1E8E3D7DC0197F9CEF6282EF552E8CEBBB7434B01CB19A9D87A3106DD28C523C29954C5D
86B36E943080E4919CA8CE08718C3B0930867A98F635EB9EA9200B25906D91B80A47B77324E66AFF
2C4D70D8B1C69C50A9D8B4B7A3C9EE05FFF3A16AFC023731D80634763DA1DCABE9861A4789BD782A
592D2B1965, 0x328C74784DF31119C526D18098EBEBB943B0032B599CEE13CC2BCE7B5FCD15F90
B66EC3A85F5005DBDCDED9BDFCB3C4C265AF164AD55884D8278F791C7A6BFDAD55EDBC4F017F9CCF
1538D4C2013433B383B47D80EC74B51276CA05B5D6346B9EE5AD2D7BE7ABFB36E37108DD60438941
D2ED173CCA50E114705D7E2BC511951)print $x->as_hex"
0x11111111111122222222222233333333333
(我的P4 1.6G的机器上计算了约5秒钟)
得到用e解密后的m=0x11111111111122222222222233333333333 == M
C) RSA通常的实现
RSA简洁幽雅,但计算速度比较慢,通常加密中并不是直接使用RSA 来对所有的信息进行加密,
最常见的情况是随机产生一个对称加密的密钥,然后使用对称加密算法对信息加密,之后用
RSA对刚才的加密密钥进行加密。
最后需要说明的是,当前小于1024位的N已经被证明是不安全的
自己使用中不要使用小于1024位的RSA,最好使用2048位的。
----------------------------------------------------------
一个简单的RSA算法实现JAVA源代码:
filename:RSA.java
/*
* Created on Mar 3, 2005
*
* TODO To change the template for this generated file go to
* Window - Preferences - Java - Code Style - Code Templates
*/
import java.math.BigInteger
import java.io.InputStream
import java.io.OutputStream
import java.io.FileInputStream
import java.io.FileOutputStream
import java.io.FileNotFoundException
import java.io.IOException
import java.io.FileWriter
import java.io.FileReader
import java.io.BufferedReader
import java.util.StringTokenizer
/**
* @author Steve
*
* TODO To change the template for this generated type comment go to
* Window - Preferences - Java - Code Style - Code Templates
*/
public class RSA {
/**
* BigInteger.ZERO
*/
private static final BigInteger ZERO = BigInteger.ZERO
/**
* BigInteger.ONE
*/
private static final BigInteger ONE = BigInteger.ONE
/**
* Pseudo BigInteger.TWO
*/
private static final BigInteger TWO = new BigInteger("2")
private BigInteger myKey
private BigInteger myMod
private int blockSize
public RSA (BigInteger key, BigInteger n, int b) {
myKey = key
myMod = n
blockSize = b
}
public void encodeFile (String filename) {
byte[] bytes = new byte[blockSize / 8 + 1]
byte[] temp
int tempLen
InputStream is = null
FileWriter writer = null
try {
is = new FileInputStream(filename)
writer = new FileWriter(filename + ".enc")
}
catch (FileNotFoundException e1){
System.out.println("File not found: " + filename)
}
catch (IOException e1){
System.out.println("File not found: " + filename + ".enc")
}
/**
* Write encoded message to 'filename'.enc
*/
try {
while ((tempLen = is.read(bytes, 1, blockSize / 8)) >0) {
for (int i = tempLen + 1i <bytes.length++i) {
bytes[i] = 0
}
writer.write(encodeDecode(new BigInteger(bytes)) + " ")
}
}
catch (IOException e1) {
System.out.println("error writing to file")
}
/**
* Close input stream and file writer
*/
try {
is.close()
writer.close()
}
catch (IOException e1) {
System.out.println("Error closing file.")
}
}
public void decodeFile (String filename) {
FileReader reader = null
OutputStream os = null
try {
reader = new FileReader(filename)
os = new FileOutputStream(filename.replaceAll(".enc", ".dec"))
}
catch (FileNotFoundException e1) {
if (reader == null)
System.out.println("File not found: " + filename)
else
System.out.println("File not found: " + filename.replaceAll(".enc", "dec"))
}
BufferedReader br = new BufferedReader(reader)
int offset
byte[] temp, toFile
StringTokenizer st = null
try {
while (br.ready()) {
st = new StringTokenizer(br.readLine())
while (st.hasMoreTokens()){
toFile = encodeDecode(new BigInteger(st.nextToken())).toByteArray()
System.out.println(toFile.length + " x " + (blockSize / 8))
if (toFile[0] == 0 &&toFile.length != (blockSize / 8)) {
temp = new byte[blockSize / 8]
offset = temp.length - toFile.length
for (int i = toFile.length - 1(i <= 0) &&((i + offset) <= 0)--i) {
temp[i + offset] = toFile[i]
}
toFile = temp
}
/*if (toFile.length != ((blockSize / 8) + 1)){
temp = new byte[(blockSize / 8) + 1]
System.out.println(toFile.length + " x " + temp.length)
for (int i = 1i <temp.lengthi++) {
temp[i] = toFile[i - 1]
}
toFile = temp
}
else
System.out.println(toFile.length + " " + ((blockSize / 8) + 1))*/
os.write(toFile)
}
}
}
catch (IOException e1) {
System.out.println("Something went wrong")
}
/**
* close data streams
*/
try {
os.close()
reader.close()
}
catch (IOException e1) {
System.out.println("Error closing file.")
}
}
/**
* Performs <tt>base</tt>^<sup><tt>pow</tt></sup>within the modular
* domain of <tt>mod</tt>.
*
* @param base the base to be raised
* @param pow the power to which the base will be raisded
* @param mod the modular domain over which to perform this operation
* @return <tt>base</tt>^<sup><tt>pow</tt></sup>within the modular
* domain of <tt>mod</tt>.
*/
public BigInteger encodeDecode(BigInteger base) {
BigInteger a = ONE
BigInteger s = base
BigInteger n = myKey
while (!n.equals(ZERO)) {
if(!n.mod(TWO).equals(ZERO))
a = a.multiply(s).mod(myMod)
s = s.pow(2).mod(myMod)
n = n.divide(TWO)
}
return a
}
}
在这里提供两个版本的RSA算法JAVA实现的代码下载:
1. 来自于 http://www.javafr.com/code.aspx?ID=27020 的RSA算法实现源代码包:
http://zeal.newmenbase.net/attachment/JavaFR_RSA_Source.rar
2. 来自于 http://www.ferrara.linux.it/Members/lucabariani/RSA/implementazioneRsa/ 的实现:
http://zeal.newmenbase.net/attachment/sorgentiJava.tar.gz - 源代码包
http://zeal.newmenbase.net/attachment/algoritmoRSA.jar - 编译好的jar包
另外关于RSA算法的php实现请参见文章:
php下的RSA算法实现
关于使用VB实现RSA算法的源代码下载(此程序采用了psc1算法来实现快速的RSA加密):
http://zeal.newmenbase.net/attachment/vb_PSC1_RSA.rar
RSA加密的JavaScript实现: http://www.ohdave.com/rsa/
参考资料:http://www.lenovonet.com/product/showarticle.asp?id=118
欢迎分享,转载请注明来源:内存溢出
评论列表(0条)