https://github.com/zytc2009/BigTeam_learning
分类: Java
2010-11-11 14:02:01
打算写这个类用于spark插件加密对话消息用。
RSA的Java实现不能一次加密很大的字符,自己处理了一下,见下面的代码。
Base64编码类用的是一个Public domain Base64 for java http://iharder.sourceforge.net/current/java/base64/
其他的保存公钥到文件等简单的实现,就不详细说了,看代码吧。
==============================================
import java.security.*;
import java.security.spec.PKCS8EncodedKeySpec;
import java.security.spec.X509EncodedKeySpec;
import java.util.HashMap;
import java.util.Map;
import javax.crypto.*;
import java.io.*;
public class Encryptor {
private static final String KEY_FILENAME = "c:\\mykey.dat";
private static final String OTHERS_KEY_FILENAME = "c:\\Otherskey.dat";
// private static final int KEY_SIZE = 1024;
// private static final int BLOCK_SIZE = 117;
// private static final int OUTPUT_BLOCK_SIZE = 128;
private static final int KEY_SIZE = 2048; //RSA key 是多少位的
private static final int BLOCK_SIZE = 245; //一次RSA加密操作所允许的最大长度
//这个值与 KEY_SIZE 已经padding方法有关。因为 1024的key的输出是128,2048key输出是256字节
//可能11个字节用于保存padding信息了,所以最多可用的就只有245字节了。
private static final int OUTPUT_BLOCK_SIZE = 256;
private SecureRandom secrand;
private Cipher rsaCipher;
private KeyPair keys;
private Map
public Encryptor() throws Exception {
try {
allUserKeys = new HashMap
secrand = new SecureRandom();
//SunJCE Provider 中只支持ECB mode,试了一下只有PKCS1PADDING可以直接还原原始数据,
//NOPadding导致解压出来的都是blocksize长度的数据,还要自己处理
//参见 http://java.sun.com/javase/6/docs/technotes/guides/security/SunProviders.html#SunJCEProvider
//
//另外根据 Open-JDK-6.b17-src()
// 中代码的注释,使用RSA来加密大量数据不是一种标准的用法。所以现有实现一次doFinal调用之进行一个RSA操作,
//如果用doFinal来加密超过的一个操作所允许的长度数据将抛出异常。
//根据keysize的长度,典型的1024个长度的key和PKCS1PADDING一起使用时
//一次doFinal调用只能加密117个byte的数据。(NOPadding 和1024 keysize时128个字节长度)
//(2048长度的key和PKCS1PADDING 最多允许245字节一次)
//想用来加密大量数据的只能自己用其他办法实现了。可能RSA加密速度比较慢吧,要用AES才行
rsaCipher = Cipher.getInstance("RSA/ECB/PKCS1PADDING");
} catch (NoSuchAlgorithmException e) {
e.printStackTrace();
} catch (NoSuchPaddingException e) {
e.printStackTrace();
throw e;
}
ObjectInputStream in;
try {
in = new ObjectInputStream(new FileInputStream(KEY_FILENAME));
} catch (FileNotFoundException e) {
if (false == GenerateKeys())
{
throw e;
}
LoadKeys();
return;
}
keys = (KeyPair) in.readObject();
in.close();
LoadKeys();
}
/*
* 生成自己的公钥和私钥
*/
private Boolean GenerateKeys() {
try {
KeyPairGenerator keygen = KeyPairGenerator.getInstance("RSA");
// secrand = new SecureRandom();
// sedSeed之后会造成 生成的密钥都是一样的
// secrand.setSeed("chatencrptor".getBytes()); // 初始化随机产生器
//key长度至少512长度,不过好像说现在用2048才算比较安全的了
keygen.initialize(KEY_SIZE, secrand); // 初始化密钥生成器
keys = keygen.generateKeyPair(); // 生成密钥组
AddKey("me", EncodeKey(keys.getPublic()));
} catch (NoSuchAlgorithmException e) {
e.printStackTrace();
return false;
}
ObjectOutputStream out;
try {
out = new ObjectOutputStream(new FileOutputStream(KEY_FILENAME));
} catch (IOException e) {
e.printStackTrace();
return false;
}
try {
out.writeObject(keys);
} catch (IOException e) {
e.printStackTrace();
return false;
} finally {
try {
out.close();
} catch (IOException e) {
e.printStackTrace();
return false;
}
}
return true;
}
public String EncryptMessage(String toUser, String Message) throws IOException {
Key pubkey = allUserKeys.get(toUser);
if ( pubkey == null )
{
throw new IOException("NoKeyForThisUser") ;
}
try {
//PublicKey pubkey = keys.getPublic();
rsaCipher.init(Cipher.ENCRYPT_MODE, pubkey, secrand);
//System.out.println(rsaCipher.getBlockSize()); 返回0,非block 加密算法来的?
//System.out.println(Message.getBytes("utf-8").length);
//byte[] encryptedData = rsaCipher.doFinal(Message.getBytes("utf-8"));
byte[] data = Message.getBytes("utf-8");
int blocks = data.length / BLOCK_SIZE ;
int lastBlockSize = data.length % BLOCK_SIZE ;
byte [] encryptedData = new byte[ (lastBlockSize == 0 ? blocks : blocks + 1)* OUTPUT_BLOCK_SIZE];
for (int i=0; i < blocks; i++)
{
//int thisBlockSize = ( i + 1 ) * BLOCK_SIZE > data.length ? data.length - i * BLOCK_SIZE : BLOCK_SIZE ;
rsaCipher.doFinal(data,i * BLOCK_SIZE, BLOCK_SIZE, encryptedData ,i * OUTPUT_BLOCK_SIZE);
}
if (lastBlockSize != 0 ){
rsaCipher.doFinal(data, blocks * BLOCK_SIZE, lastBlockSize,encryptedData ,blocks * OUTPUT_BLOCK_SIZE);
}
//System.out.println(encrypted.length); 如果要机密的数据不足128/256字节,加密后补全成为变为256长度的。
//数量比较小时,Base64.GZIP产生的长度更长,没什么优势
//System.out.println(Base64.encodeBytes(encrypted,Base64.GZIP).length());
//System.out.println(Base64.encodeBytes(encrypted).length());
//System.out.println (rsaCipher.getOutputSize(30));
//这个getOutputSize 只对 输入小于最大的block时才能得到正确的结果。其实就是补全 数据为128/256 字节
return Base64.encodeBytes(encryptedData);
} catch (InvalidKeyException e) {
e.printStackTrace();
throw new IOException("InvalidKey") ;
}catch (ShortBufferException e) {
e.printStackTrace();
throw new IOException("ShortBuffer") ;
}
catch (UnsupportedEncodingException e) {
e.printStackTrace();
throw new IOException("UnsupportedEncoding") ;
} catch (IllegalBlockSizeException e) {
e.printStackTrace();
throw new IOException("IllegalBlockSize") ;
} catch (BadPaddingException e) {
e.printStackTrace();
throw new IOException("BadPadding") ;
}finally {
//catch 中 return 或者throw之前都会先调用一下这里
}
}
public String DecryptMessage(String Message) throws IOException {
byte[] decoded = Base64.decode(Message);
PrivateKey prikey = keys.getPrivate();
try {
rsaCipher.init(Cipher.DECRYPT_MODE, prikey, secrand);
int blocks = decoded.length / OUTPUT_BLOCK_SIZE;
ByteArrayOutputStream decodedStream = new ByteArrayOutputStream(decoded.length);
for (int i =0 ;i < blocks ; i ++ )
{
decodedStream.write (rsaCipher.doFinal(decoded,i * OUTPUT_BLOCK_SIZE, OUTPUT_BLOCK_SIZE));
}
return new String(decodedStream.toByteArray(), "UTF-8");
} catch (InvalidKeyException e) {
e.printStackTrace();
throw new IOException("InvalidKey");
} catch (UnsupportedEncodingException e) {
e.printStackTrace();
throw new IOException("UnsupportedEncoding");
} catch (IllegalBlockSizeException e) {
e.printStackTrace();
throw new IOException("IllegalBlockSize");
} catch (BadPaddingException e) {
e.printStackTrace();
throw new IOException("BadPadding");
} finally {
// catch 中 return 或者throw之前都会先调用一下这里。
}
}
public boolean AddKey(String user, String key) {
PublicKey publickey;
try {
publickey = DecodePublicKey(key);
} catch (Exception e) {
return false;
}
allUserKeys.put(user, publickey);
SaveKeys();
return true;
}
private boolean LoadKeys() {
BufferedReader input;
try {
input = new BufferedReader(new InputStreamReader(
new FileInputStream(OTHERS_KEY_FILENAME)));
} catch (FileNotFoundException e1) {
// e1.printStackTrace();
return false;
}
try {
allUserKeys.clear();
String line;
while ((line = input.readLine()) != null) {
String[] temp = line.split("\\|");
String user = temp[0];
PublicKey key = DecodePublicKey(temp[1]);
allUserKeys.put(user, key);
}
} catch (Exception e) {
return false;
} finally {
try {
input.close();
} catch (Exception e) {
return false;
}
}
return true;
}
private boolean SaveKeys() {
FileWriter output;
try {
output = new FileWriter(OTHERS_KEY_FILENAME);
} catch (IOException e1) {
// 1.printStackTrace();
return false;
}
try {
for (String user : allUserKeys.keySet()) {
Key key = allUserKeys.get(user);
output.write(user + "|" + EncodeKey(key) + "\n");
}
} catch (IOException e1) {
// 1.printStackTrace();
return false;
} finally {
try {
output.close();
} catch (Exception e) {
return false;
}
}
return true;
}
/**
* 解密base64编码得到公钥
*
* @param key
* 密钥字符串(经过base64编码)
* @throws Exception
*/
public static PublicKey DecodePublicKey(String key) throws Exception {
byte[] keyBytes;
keyBytes = Base64.decode(key);
X509EncodedKeySpec keySpec = new X509EncodedKeySpec(keyBytes);
KeyFactory keyFactory = KeyFactory.getInstance("RSA");
PublicKey publicKey = keyFactory.generatePublic(keySpec);
return publicKey;
}
/**
* 解密base64编码得到私钥
*
* @param key
* 密钥字符串(经过base64编码)
* @throws Exception
*/
public static PrivateKey DecodePrivateKey(String key) throws Exception {
byte[] keyBytes;
keyBytes = Base64.decode(key);
PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(keyBytes);
KeyFactory keyFactory = KeyFactory.getInstance("RSA");
PrivateKey privateKey = keyFactory.generatePrivate(keySpec);
return privateKey;
}
/**
* 编码key为base64字符串
*
* @return
*/
public static String EncodeKey(Key key) {
byte[] keyBytes = key.getEncoded();
// System.out.print(key.getFormat()) ;
String s = Base64.encodeBytes(keyBytes);
return s;
}
}
===============测试类============================
import java.util.Iterator ;
import java.security.Security ;
import java.security.Provider ;
public class Test {
/**
* @param args
*/
public static void main(String[] args) {
// Provider [ ] providers = Security.getProviders () ;
// for ( int i = 0 ; i < providers.length ; i++ )
// {
// String name = providers[i].getName () ;
// String info = providers[i].getInfo () ;
// double version = providers[i].getVersion () ;
// System.out.println ("-------------------------------------" ) ;
// System.out.println ( "name: " + name ) ;
// System.out.println ( "info: " + info ) ;
// System.out.println ( "version: " + version ) ;
//
// for ( Iterator iter = providers[i].keySet().iterator () ; iter.hasNext () ; )
// {
// String key = (String) iter.next () ;
// System.out.println ( "\t" + key +
// "\t" +
// providers[i].getProperty ( key ) ) ;
// }
//
// System.out.println (
//
// "-------------------------------------" );
// }
//
// int i = 123/ 256;
// System.out.println(i);
// i = 257/ 256;
// System.out.println(i);
// i = 512/ 256;
// System.out.println(i);
// i = 513/ 256;
// System.out.println(i);
//String str = "widebriht的测试,哈哈^_^";
//String str =
"MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4dYTv3xxgsu2SmgqJzPWzSOziMDnOV+tAxQGumNAJKcBxOlD5hQlqTGRnUoqIp8z3brioFJBtMs8wAeA+pfpJhFyqodI9frr0I3Y4PUgwRlL7ozGA9hu9CBOADQNKE7g7UgOTQ/joE26YoYPCHKx/vYQncOe45axOCqcXBWViw20WgPr1g0qj9CarQLM7e4dUNMCYcX0ZGvqIy7Js2FjuLsNaK249k9y2fjIqqu8FzhjvIEDCtrMNyTvV5coV5rDGTEC5KfJft0oeCTXrhcgzMBdaG9DXFQezQIepMdPAT+kga/qJ69b95I02LMwyCDhwPmH873UNQAmdMpJ7bZTTwIDAQAB";
String str =
"MIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0BMIIBIjANBgkqhkiG9w0Bddddd";
try {
Encryptor ddd = new Encryptor();
str = ddd.EncryptMessage("me", str);
// System.out.println(str.length());
String str2 = "jhahahh my god ";
str2 = ddd.EncryptMessage("me", str2);
str2 = ddd.DecryptMessage(str2);
str = ddd.DecryptMessage(str);
} catch (Exception e) {
if (e.getMessage() == "NoKeyForThisUser") {
System.out.println("NoKeyForThisUser");
}
}
// str = ddd.DecryptMessage(
//
"inI5y3PfFXt0oNWXuYLBbTkIaaxZFzgWuMfYTqpT91b51UUQN0T8iK6l8XnS+WShC/ZGL9noX6vO8sDmiJ+z1I7/WTgvOOW5XE+G7+edGzh6bfRGPxhG16MJpl2y/FsIErsKgZmybERE8F0IP551/b0xGmrZhyj09/NwZln3qUg=");
//System.out.println(str);
}
}