Android加密

Android加密,第1张

Android加密

java AES
库中有一个缺陷,它允许侦听器在适当的情况下解密发送的数据包。请参见对Oracle Exploit Tool和Apache
MyFaces进行填充

话说回来,]看看这个SO问题Java256位AES加密。

从以下位置盗窃了Bouncy CastleAES示例:http://www.java2s.com/Code/Java/Security/EncryptionanddecryptionwithAESECBPKCS7Padding.htm

import javax.crypto.Cipher;import javax.crypto.spec.SecretKeySpec;public class MainClass {  public static void main(String[] args) throws Exception {    Security.addProvider(new org.bouncycastle.jce.provider.BouncyCastleProvider());        byte[] input = "www.java2s.com".getBytes();    byte[] keyBytes = new byte[] { 0x00, 0x01, 0x02, 0x03, 0x04,       0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c,       0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14,       0x15, 0x16, 0x17 };    SecretKeySpec key = new SecretKeySpec(keyBytes, "AES");    Cipher cipher = Cipher.getInstance("AES/ECB/PKCS7Padding", "BC");    System.out.println(new String(input));    // encryption pass    cipher.init(Cipher.ENCRYPT_MODE, key);    byte[] cipherText = new byte[cipher.getOutputSize(input.length)];    int ctLength = cipher.update(input, 0, input.length, cipherText, 0);    ctLength += cipher.doFinal(cipherText, ctLength);    System.out.println(new String(cipherText));    System.out.println(ctLength);    // decryption pass    cipher.init(Cipher.DECRYPT_MODE, key);    byte[] plainText = new byte[cipher.getOutputSize(ctLength)];    int ptLength = cipher.update(cipherText, 0, ctLength, plainText, 0);    ptLength += cipher.doFinal(plainText, ptLength);    System.out.println(new String(plainText));    System.out.println(ptLength);  }}


欢迎分享,转载请注明来源:内存溢出

原文地址: http://outofmemory.cn/zaji/5560481.html

(0)
打赏 微信扫一扫 微信扫一扫 支付宝扫一扫 支付宝扫一扫
上一篇 2022-12-14
下一篇 2022-12-14

发表评论

登录后才能评论

评论列表(0条)

保存