Chinaunix首页 | 论坛 | 博客
  • 博客访问: 1676304
  • 博文数量: 585
  • 博客积分: 14610
  • 博客等级: 上将
  • 技术积分: 7402
  • 用 户 组: 普通用户
  • 注册时间: 2008-05-15 10:52
文章存档

2013年(5)

2012年(214)

2011年(56)

2010年(66)

2009年(44)

2008年(200)

分类: Java

2010-11-24 10:31:06

打算写这个类用于spark插件加密对话消息用。

RSA的Java实现不能一次加密很大的字符,自己处理了一下,见下面的代码。

Base64编码类用的是一个Public domain Base64 for java http://iharder.sourceforge.net/current/java/base64/

其他的保存公钥到文件等简单的实现,就不详细说了,看代码吧。

==============================================

import java.security.*;
import java.security.spec.PKCS8EncodedKeySpec;
import java.security.spec.X509EncodedKeySpec;
import java.util.HashMap;
import java.util.Map;
import javax.crypto.*;

import java.io.*;

public class Encryptor {
private static final String KEY_FILENAME = "c:\\mykey.dat";
private static final String OTHERS_KEY_FILENAME = "c:\\Otherskey.dat";
// private static final int KEY_SIZE = 1024;
// private static final int BLOCK_SIZE = 117;
// private static final int OUTPUT_BLOCK_SIZE = 128;
private static final int KEY_SIZE = 2048; //RSA key 是多少位的
private static final int BLOCK_SIZE = 245;    //一次RSA加密操作所允许的最大长度
   //这个值与 KEY_SIZE 已经padding方法有关。因为 1024的key的输出是128,2048key输出是256字节
   //可能11个字节用于保存padding信息了,所以最多可用的就只有245字节了。
private static final int OUTPUT_BLOCK_SIZE = 256;

private SecureRandom secrand;
private Cipher rsaCipher;
private KeyPair keys;

private Map allUserKeys;

public Encryptor() throws Exception {

   try {
    allUserKeys = new HashMap();
    secrand = new SecureRandom();
    //SunJCE Provider 中只支持ECB mode,试了一下只有PKCS1PADDING可以直接还原原始数据,
    //NOPadding导致解压出来的都是blocksize长度的数据,还要自己处理
    //参见 http://java.sun.com/javase/6/docs/technotes/guides/security/SunProviders.html#SunJCEProvider
    //
    //另外根据 Open-JDK-6.b17-src()
    // 中代码的注释,使用RSA来加密大量数据不是一种标准的用法。所以现有实现一次doFinal调用之进行一个RSA操作,
    //如果用doFinal来加密超过的一个操作所允许的长度数据将抛出异常。
    //根据keysize的长度,典型的1024个长度的key和PKCS1PADDING一起使用时
    //一次doFinal调用只能加密117个byte的数据。(NOPadding 和1024 keysize时128个字节长度)
    //(2048长度的key和PKCS1PADDING 最多允许245字节一次)
    //想用来加密大量数据的只能自己用其他办法实现了。可能RSA加密速度比较慢吧,要用AES才行
  

    rsaCipher = Cipher.getInstance("RSA/ECB/PKCS1PADDING");
   } catch (NoSuchAlgorithmException e) {
    e.printStackTrace();
   } catch (NoSuchPaddingException e) {
    e.printStackTrace();
    throw e;
   }

   ObjectInputStream in;

   try {
    in = new ObjectInputStream(new FileInputStream(KEY_FILENAME));
   } catch (FileNotFoundException e) {
    if (false == GenerateKeys())
    {
     throw e;
    }
    LoadKeys();
    return;
   }

   keys = (KeyPair) in.readObject();
   in.close();
   LoadKeys();

}

/*
* 生成自己的公钥和私钥
*/
private Boolean GenerateKeys() {

   try {
    KeyPairGenerator keygen = KeyPairGenerator.getInstance("RSA");
    // secrand = new SecureRandom();
    // sedSeed之后会造成 生成的密钥都是一样的
    // secrand.setSeed("chatencrptor".getBytes()); // 初始化随机产生器
    //key长度至少512长度,不过好像说现在用2048才算比较安全的了
    keygen.initialize(KEY_SIZE, secrand); // 初始化密钥生成器

    keys = keygen.generateKeyPair(); // 生成密钥组

    AddKey("me", EncodeKey(keys.getPublic()));

   } catch (NoSuchAlgorithmException e) {
    e.printStackTrace();
    return false;
   }

   ObjectOutputStream out;
   try {
    out = new ObjectOutputStream(new FileOutputStream(KEY_FILENAME));

   } catch (IOException e) {
    e.printStackTrace();
    return false;
   }

   try {
    out.writeObject(keys);

   } catch (IOException e) {
    e.printStackTrace();
    return false;
   } finally {
    try {
     out.close();
    } catch (IOException e) {
     e.printStackTrace();
     return false;
    }
   }

   return true;
}

public String EncryptMessage(String toUser, String Message) throws IOException {
  
   Key pubkey = allUserKeys.get(toUser);
   if ( pubkey == null )
   {
    throw new IOException("NoKeyForThisUser") ;
   }
  
   try {
    //PublicKey pubkey = keys.getPublic();
    rsaCipher.init(Cipher.ENCRYPT_MODE, pubkey, secrand);
    //System.out.println(rsaCipher.getBlockSize()); 返回0,非block 加密算法来的?
    //System.out.println(Message.getBytes("utf-8").length);
    //byte[] encryptedData = rsaCipher.doFinal(Message.getBytes("utf-8"));
    byte[] data = Message.getBytes("utf-8");
    int blocks = data.length / BLOCK_SIZE ;
    int lastBlockSize = data.length % BLOCK_SIZE ;
    byte [] encryptedData = new byte[ (lastBlockSize == 0 ? blocks : blocks + 1)* OUTPUT_BLOCK_SIZE];
    for (int i=0; i < blocks; i++)
    {
     //int thisBlockSize = ( i + 1 ) * BLOCK_SIZE > data.length ? data.length - i * BLOCK_SIZE : BLOCK_SIZE ;
     rsaCipher.doFinal(data,i * BLOCK_SIZE, BLOCK_SIZE, encryptedData ,i * OUTPUT_BLOCK_SIZE);
    }
    if (lastBlockSize != 0 ){
     rsaCipher.doFinal(data, blocks * BLOCK_SIZE, lastBlockSize,encryptedData ,blocks * OUTPUT_BLOCK_SIZE);
    }
   
   
    //System.out.println(encrypted.length); 如果要机密的数据不足128/256字节,加密后补全成为变为256长度的。
    //数量比较小时,Base64.GZIP产生的长度更长,没什么优势
    //System.out.println(Base64.encodeBytes(encrypted,Base64.GZIP).length());
    //System.out.println(Base64.encodeBytes(encrypted).length());
    //System.out.println (rsaCipher.getOutputSize(30));
    //这个getOutputSize 只对 输入小于最大的block时才能得到正确的结果。其实就是补全 数据为128/256 字节
   
    return Base64.encodeBytes(encryptedData);
   
   } catch (InvalidKeyException e) {
    e.printStackTrace();
    throw new IOException("InvalidKey") ;
  
   }catch (ShortBufferException e) {
    e.printStackTrace();
    throw new IOException("ShortBuffer") ;
   }
   catch (UnsupportedEncodingException e) {
    e.printStackTrace();
    throw new IOException("UnsupportedEncoding") ;
   } catch (IllegalBlockSizeException e) {
    e.printStackTrace();
    throw new IOException("IllegalBlockSize") ;
   } catch (BadPaddingException e) {
    e.printStackTrace();
    throw new IOException("BadPadding") ;
   }finally {
    //catch 中 return 或者throw之前都会先调用一下这里
   }

}

public String DecryptMessage(String Message) throws IOException {

   byte[] decoded = Base64.decode(Message);
   PrivateKey prikey = keys.getPrivate();

   try {

    rsaCipher.init(Cipher.DECRYPT_MODE, prikey, secrand);
    int blocks = decoded.length / OUTPUT_BLOCK_SIZE;
    ByteArrayOutputStream decodedStream = new ByteArrayOutputStream(decoded.length);
    for (int i =0 ;i < blocks ; i ++ )
    {
     decodedStream.write (rsaCipher.doFinal(decoded,i * OUTPUT_BLOCK_SIZE, OUTPUT_BLOCK_SIZE));
    }
    return new String(decodedStream.toByteArray(), "UTF-8");

   } catch (InvalidKeyException e) {
    e.printStackTrace();
    throw new IOException("InvalidKey");
   } catch (UnsupportedEncodingException e) {
    e.printStackTrace();
    throw new IOException("UnsupportedEncoding");
   } catch (IllegalBlockSizeException e) {
    e.printStackTrace();
    throw new IOException("IllegalBlockSize");
   } catch (BadPaddingException e) {
    e.printStackTrace();
    throw new IOException("BadPadding");
   } finally {
    // catch 中 return 或者throw之前都会先调用一下这里。
   }

}

public boolean AddKey(String user, String key) {
   PublicKey publickey;
   try {
    publickey = DecodePublicKey(key);
   } catch (Exception e) {
    return false;
   }

   allUserKeys.put(user, publickey);

   SaveKeys();

   return true;
}

private boolean LoadKeys() {
   BufferedReader input;

   try {
    input = new BufferedReader(new InputStreamReader(
      new FileInputStream(OTHERS_KEY_FILENAME)));
   } catch (FileNotFoundException e1) {
    // e1.printStackTrace();
    return false;
   }

   try {
    allUserKeys.clear();

    String line;
    while ((line = input.readLine()) != null) {
     String[] temp = line.split("\\|");
     String user = temp[0];
     PublicKey key = DecodePublicKey(temp[1]);
     allUserKeys.put(user, key);
    }

   } catch (Exception e) {
    return false;
   } finally {
    try {
     input.close();
    } catch (Exception e) {
     return false;
    }
   }
   return true;

}

private boolean SaveKeys() {
   FileWriter output;

   try {
    output = new FileWriter(OTHERS_KEY_FILENAME);
   } catch (IOException e1) {
    // 1.printStackTrace();
    return false;
   }

   try {

    for (String user : allUserKeys.keySet()) {
     Key key = allUserKeys.get(user);
     output.write(user + "|" + EncodeKey(key) + "\n");
    }

   } catch (IOException e1) {
    // 1.printStackTrace();
    return false;
   } finally {
    try {
     output.close();
    } catch (Exception e) {
     return false;
    }

   }

   return true;
}

/**
* 解密base64编码得到公钥
*
* @param key
*            密钥字符串(经过base64编码)
* @throws Exception
*/
public static PublicKey DecodePublicKey(String key) throws Exception {
   byte[] keyBytes;
   keyBytes = Base64.decode(key);

   X509EncodedKeySpec keySpec = new X509EncodedKeySpec(keyBytes);
   KeyFactory keyFactory = KeyFactory.getInstance("RSA");
   PublicKey publicKey = keyFactory.generatePublic(keySpec);
   return publicKey;
}

/**
* 解密base64编码得到私钥
*
* @param key
*            密钥字符串(经过base64编码)
* @throws Exception
*/
public static PrivateKey DecodePrivateKey(String key) throws Exception {
   byte[] keyBytes;
   keyBytes = Base64.decode(key);
   PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(keyBytes);
   KeyFactory keyFactory = KeyFactory.getInstance("RSA");
   PrivateKey privateKey = keyFactory.generatePrivate(keySpec);
   return privateKey;
}

/**
* 编码key为base64字符串
*
* @return
*/
public static String EncodeKey(Key key) {
   byte[] keyBytes = key.getEncoded();
   // System.out.print(key.getFormat()) ;
   String s = Base64.encodeBytes(keyBytes);
   return s;
}

}

===============测试类============================

import java.util.Iterator ;
import java.security.Security ;
import java.security.Provider ;

public class Test {

/**
* @param args
*/
public static void main(String[] args) {
//   Provider [ ] providers = Security.getProviders () ;
//   for ( int i = 0 ; i < providers.length ; i++ )
//   {
//   String name = providers[i].getName () ;
//   String info = providers[i].getInfo () ;
//   double version = providers[i].getVersion () ;
//   System.out.println ("-------------------------------------" ) ;
//   System.out.println ( "name: " + name ) ;
//   System.out.println ( "info: " + info ) ;
//   System.out.println ( "version: " + version ) ;
//
//   for ( Iterator iter = providers[i].keySet().iterator () ; iter.hasNext () ; )
//   {
//   String key = (String) iter.next () ;
//   System.out.println ( "\t" + key +
//   "\t" +
//   providers[i].getProperty ( key ) ) ;
//   }
//
//   System.out.println (
//    
//   "-------------------------------------" );
//   }
//
//   int i = 123/ 256;
//   System.out.println(i);
//   i = 257/ 256;
//   System.out.println(i);
//   i = 512/ 256;
//   System.out.println(i);
//   i = 513/ 256;
//   System.out.println(i);
  
   //String str = "widebriht的测试,哈哈^_^";
   //String str = "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4dYTv3xxgsu2SmgqJzPWzSOziMDnOV+tAxQGumNAJKcBxOlD5hQlqTGRnUoqIp8z3brioFJBtMs8wAeA+pfpJhFyqodI9frr0I3Y4PUgwRlL7ozGA9hu9CBOADQNKE7g7UgOTQ/joE26YoYPCHKx/vYQncOe45axOCqcXBWViw20WgPr1g0qj9CarQLM7e4dUNMCYcX0ZGvqIy7Js2FjuLsNaK249k9y2fjIqqu8FzhjvIEDCtrMNyTvV5coV5rDGTEC5KfJft0oeCTXrhcgzMBdaG9DXFQezQIepMdPAT+kga/qJ69b95I02LMwyCDhwPmH873UNQAmdMpJ7bZTTwIDAQAB";
   String str = "MIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0Bddddd";
   try {
    Encryptor ddd = new Encryptor();
    str = ddd.EncryptMessage("me", str);
    // System.out.println(str.length());
    String str2 = "jhahahh my god ";
    str2 = ddd.EncryptMessage("me", str2);
    str2 = ddd.DecryptMessage(str2);
    str = ddd.DecryptMessage(str);

   } catch (Exception e) {
    if (e.getMessage() == "NoKeyForThisUser") {
     System.out.println("NoKeyForThisUser");
    }

   }
   // str = ddd.DecryptMessage(
   // "inI5y3PfFXt0oNWXuYLBbTkIaaxZFzgWuMfYTqpT91b51UUQN0T8iK6l8XnS+WShC/ZGL9noX6vO8sDmiJ+z1I7/WTgvOOW5XE+G7+edGzh6bfRGPxhG16MJpl2y/FsIErsKgZmybERE8F0IP551/b0xGmrZhyj09/NwZln3qUg=");
   //System.out.println(str);

}

}

阅读(796) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~