java使用bouncycastle加解密

2023-11-07 00:28

本文主要是介绍java使用bouncycastle加解密,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!

jdk默认带了一些常见的加解密方式,当我们常见的加解密不能满足时,就需要用到一些第三方的库了,bouncycastle就是其中一种。

但是bouncycastle文档比较少。简单介绍一下写法

1.导入依赖

   <dependency><groupId>org.bouncycastle</groupId><artifactId>bcprov-jdk15on</artifactId><version>1.69</version></dependency>

2.写代码

常见的有两种方式,一种使用BouncyCastleProvider,另一种使用BlockCipherEngine

BouncyCastleProvider使用方式跟原生jdk类似,多数getInstance的地方指定一下provider就行

BouncyCastleProvider方式DES加解密代码如下

package com.vvvtimes.demo.util.endecrypt;import lombok.extern.slf4j.Slf4j;
import org.bouncycastle.jce.provider.BouncyCastleProvider;import javax.crypto.Cipher;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.DESKeySpec;
import javax.crypto.spec.IvParameterSpec;
import java.security.Key;
import java.security.NoSuchAlgorithmException;@Slf4j
public class BcDesUtil {private static final BouncyCastleProvider provider;//BouncyCastle与JDK加解密类区别//KeyFactory.getInstance("RSA"); +provider-->KeyFactory.getInstance("RSA", provider)//Cipher.getInstance("RSA");  +provider-->Cipher.getInstance("RSA", provider)//Signature.getInstance("SHA1withRSA"); +provider-->Signature.getInstance("SHA1withRSA", provider);//KeyGenerator.getInstance("DES") ; +provider-->KeyGenerator.getInstance("DES", provider); 或者KeyGenerator.getInstance("DES","BC")/*** 偏移变量,固定占8位字节*/private final static String IV_PARAMETER = "12345678";/** 生成key*/public byte[] generateKey() {KeyGenerator keyGenerator = null;try {keyGenerator = KeyGenerator.getInstance("DES",provider);keyGenerator.init(56);SecretKey secretKey = keyGenerator.generateKey();byte[] encoded = secretKey.getEncoded();return encoded;} catch (NoSuchAlgorithmException e) {e.printStackTrace();}return null;}/*** 生成key** @param password 密钥字符串* @return 密钥对象* @throws Exception*/private static Key convertKey(byte[] password) throws Exception {DESKeySpec dks = new DESKeySpec(password);SecretKeyFactory keyFactory = SecretKeyFactory.getInstance("DES",provider);return keyFactory.generateSecret(dks);}/*** DES加密*/public static byte[] encrypt(byte[] data, byte[] password) {if (password == null || password.length < 8) {throw new RuntimeException("加密失败,key不能小于8位");}if (data == null)return null;try {Key secretKey = convertKey(password);Cipher cipher = Cipher.getInstance("DES/CBC/PKCS5Padding",provider);IvParameterSpec iv = new IvParameterSpec(IV_PARAMETER.getBytes("utf-8"));cipher.init(Cipher.ENCRYPT_MODE, secretKey, iv);byte[] bytes = cipher.doFinal(data);return bytes;} catch (Exception e) {e.printStackTrace();return data;}}/*** DES解密解密字符串*/public static byte[] decrypt(byte[] data, byte[] password) {if (password == null || password.length < 8) {throw new RuntimeException("加密失败,key不能小于8位");}if (data == null)return null;try {Key secretKey = convertKey(password);Cipher cipher = Cipher.getInstance("DES/CBC/PKCS5Padding",provider);IvParameterSpec iv = new IvParameterSpec(IV_PARAMETER.getBytes("utf-8"));cipher.init(Cipher.DECRYPT_MODE, secretKey, iv);byte[] bytes = cipher.doFinal(data);return bytes;} catch (Exception e) {e.printStackTrace();return data;}}/*** byte数组转十六进制** @param bytes* @return*/public static String byte2HexString(byte[] bytes) {StringBuilder hex = new StringBuilder();if (bytes != null) {for (Byte b : bytes) {hex.append(String.format("%02X", b.intValue() & 0xFF));}}return hex.toString();}//测试public static void main(String[] args) throws Exception {String source = "admin测试信息1234!@#$%^&*()_+";System.out.println("原  文: " + source);String password = "lw112190@2023";byte[] encryptDataBytes = encrypt(source.getBytes("utf-8"), password.getBytes("utf-8"));String encryptData = byte2HexString(encryptDataBytes);System.out.println("加密后: " + encryptData);byte[] decryptDataBytes = decrypt(encryptDataBytes, password.getBytes("utf-8"));String decryptData = new String(decryptDataBytes, "utf-8");;System.out.println("解密后: " + decryptData);}static {provider = new BouncyCastleProvider();}
}

BlockCipherEngine方式的DES加解密代码如下

package com.vvvtimes.demo.util.endecrypt;import org.bouncycastle.crypto.BlockCipher;
import org.bouncycastle.crypto.BufferedBlockCipher;
import org.bouncycastle.crypto.InvalidCipherTextException;
import org.bouncycastle.crypto.engines.DESEngine;
import org.bouncycastle.crypto.modes.CBCBlockCipher;
import org.bouncycastle.crypto.paddings.PKCS7Padding;
import org.bouncycastle.crypto.paddings.PaddedBufferedBlockCipher;
import org.bouncycastle.crypto.params.DESParameters;
import org.bouncycastle.crypto.params.ParametersWithIV;
import org.bouncycastle.jce.provider.BouncyCastleProvider;import javax.crypto.SecretKey;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.DESKeySpec;
import java.io.UnsupportedEncodingException;
import java.security.InvalidKeyException;
import java.security.NoSuchAlgorithmException;
import java.security.spec.InvalidKeySpecException;public class BcDesEngineUtil {private final static BlockCipher engine;private static final BouncyCastleProvider provider;/*** 偏移变量,固定占8位字节*/private final static String IV_PARAMETER = "12345678";/*** 生成key** @param password 密钥字符串* @return 密钥对象* @throws Exception*/private static byte[] convertKeyEncoded(byte[] password) {byte[] result = null;try {DESKeySpec dks  = new DESKeySpec(password);SecretKeyFactory keyFactory = SecretKeyFactory.getInstance("DES",provider);SecretKey secretKey = keyFactory.generateSecret(dks);return secretKey.getEncoded();} catch (InvalidKeyException e) {e.printStackTrace();} catch (NoSuchAlgorithmException e) {e.printStackTrace();} catch (InvalidKeySpecException e) {e.printStackTrace();}return result;}private static byte[] encrypt( byte[] ptBytes,byte[] key) throws InvalidCipherTextException, UnsupportedEncodingException {BufferedBlockCipher cipher = new PaddedBufferedBlockCipher(new CBCBlockCipher(engine), new PKCS7Padding());cipher.init(true, new ParametersWithIV(new DESParameters(key), IV_PARAMETER.getBytes("utf-8")));byte[] rv = new byte[cipher.getOutputSize(ptBytes.length)];int tam = cipher.processBytes(ptBytes, 0, ptBytes.length, rv, 0);cipher.doFinal(rv, tam);return rv;}private static byte[] decrypt( byte[] cipherText,byte[] key) throws InvalidCipherTextException, UnsupportedEncodingException {BufferedBlockCipher cipher = new PaddedBufferedBlockCipher(new CBCBlockCipher(engine), new PKCS7Padding());cipher.init(false, new ParametersWithIV(new DESParameters( key),IV_PARAMETER.getBytes("utf-8")));byte[] rv = new byte[cipher.getOutputSize(cipherText.length)];int tam = cipher.processBytes(cipherText, 0, cipherText.length, rv, 0);cipher.doFinal(rv, tam);return rv;}/*** byte数组转十六进制** @param bytes* @return*/public static String byte2HexString(byte[] bytes) {StringBuilder hex = new StringBuilder();if (bytes != null) {for (Byte b : bytes) {hex.append(String.format("%02X", b.intValue() & 0xFF));}}return hex.toString();}//测试public static void main(String[] args) throws Exception {String source = "admin测试信息1234!@#$%^&*()_+";System.out.println("原  文: " + source);String password = "lw112190@2023";//String password ="geffzhan";//String password ="lw112190";byte[] keyEncoded = convertKeyEncoded(password.getBytes("utf-8"));byte[] encryptDataBytes = encrypt(source.getBytes("utf-8"), keyEncoded);String encryptData = byte2HexString(encryptDataBytes);System.out.println("加密后: " + encryptData);byte[] decryptDataBytes = decrypt(encryptDataBytes, keyEncoded);String decryptData = new String(decryptDataBytes, "utf-8");;System.out.println("解密后: " + decryptData);/**原  文: admin测试信息1234!@#$%^&*()_+加密后: 1D5C21B694A9085A69BE7EA37C197D1632239545298613B944C3AC272750A519F66FB43EFEC55C89解密后: admin测试信息1234!@#$%^&*()_+*/}static {engine = new DESEngine();provider = new BouncyCastleProvider();}}

3.其他示例

AES加解密

package com.vvvtimes.demo.util.endecrypt;import lombok.extern.slf4j.Slf4j;
import org.bouncycastle.jce.provider.BouncyCastleProvider;import javax.crypto.Cipher;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.DESKeySpec;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
import java.security.AlgorithmParameters;
import java.security.Key;
import java.security.NoSuchAlgorithmException;
import java.security.spec.InvalidParameterSpecException;@Slf4j
public class BcAesUtil {private static final BouncyCastleProvider provider;/*** 偏移变量,固定占8位字节*/private final static String IV_PARAMETER = "1234567890123456";/*** AES加密*/public static byte[] encrypt(byte[] data, byte[] password, byte[] iv) {if (data == null)return null;try {Key secretKey = new SecretKeySpec(password,"AES");Cipher cipher = Cipher.getInstance("AES/CBC/PKCS7Padding",provider);AlgorithmParameters generateIV = generateIV(iv);cipher.init(Cipher.ENCRYPT_MODE, secretKey, generateIV);byte[] bytes = cipher.doFinal(data);return bytes;} catch (Exception e) {e.printStackTrace();return data;}}/*** AES解密解密字符串*/public static byte[] decrypt(byte[] data, byte[] password, byte[] iv) {if (data == null)return null;try {Key secretKey = new SecretKeySpec(password,"AES");Cipher cipher = Cipher.getInstance("AES/CBC/PKCS7Padding",provider);AlgorithmParameters generateIV = generateIV(iv);cipher.init(Cipher.DECRYPT_MODE, secretKey, generateIV);byte[] bytes = cipher.doFinal(data);return bytes;} catch (Exception e) {e.printStackTrace();return data;}}public static AlgorithmParameters generateIV(byte[] iv){AlgorithmParameters params = null;try {params = AlgorithmParameters.getInstance("AES");params.init(new IvParameterSpec(iv));} catch (NoSuchAlgorithmException | InvalidParameterSpecException e) {e.printStackTrace();}return params;}/*** byte数组转十六进制** @param bytes* @return*/public static String byte2HexString(byte[] bytes) {StringBuilder hex = new StringBuilder();if (bytes != null) {for (Byte b : bytes) {hex.append(String.format("%02X", b.intValue() & 0xFF));}}return hex.toString();}//测试public static void main(String[] args) throws Exception {String source = "admin测试信息1234!@#$%^&*()_+";System.out.println("原  文: " + source);String password = "passwordpassword";byte[] encryptDataBytes = encrypt(source.getBytes("utf-8"), password.getBytes("utf-8"),IV_PARAMETER.getBytes("utf-8"));String encryptData = byte2HexString(encryptDataBytes);System.out.println("加密后: " + encryptData);byte[] decryptDataBytes = decrypt(encryptDataBytes, password.getBytes("utf-8"),IV_PARAMETER.getBytes("utf-8"));String decryptData = new String(decryptDataBytes, "utf-8");System.out.println("解密后: " + decryptData);}static {provider = new BouncyCastleProvider();}
}

RSA私钥解密 签名

package com.vvvtimes.demo.util.endecrypt;import cn.hutool.core.codec.Base64;
import org.bouncycastle.jce.provider.BouncyCastleProvider;import javax.crypto.BadPaddingException;
import javax.crypto.Cipher;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.NoSuchPaddingException;
import java.nio.charset.Charset;
import java.security.*;
import java.security.spec.PKCS8EncodedKeySpec;public class BcRsaUtil {private static final BouncyCastleProvider provider;private static PrivateKey getPrivateKey(String pkcs8Key) {byte[] pkcs8Keybytes = Base64.decode(pkcs8Key.getBytes(Charset.forName("UTF-8")));final PKCS8EncodedKeySpec pkcs8EncodedKeySpec = new PKCS8EncodedKeySpec(pkcs8Keybytes);try {return KeyFactory.getInstance("RSA", provider).generatePrivate(pkcs8EncodedKeySpec);} catch (Exception ex) {ex.printStackTrace();return null;}}/*** RSA私钥解密** @param inputByte 待解密字节数组* @param pkcs8Key  私钥* @return 明文*/public static byte[] decrypt(byte[] inputByte, String pkcs8Key) {byte[] outputeByte = null;try {PrivateKey privateKey = getPrivateKey(pkcs8Key);//RSA解密Cipher cipher = Cipher.getInstance("RSA", provider);cipher.init(Cipher.DECRYPT_MODE, privateKey);outputeByte = cipher.doFinal(inputByte);} catch (NoSuchPaddingException | InvalidKeyException | IllegalBlockSizeException | BadPaddingException | NoSuchAlgorithmException e) {e.printStackTrace();}return outputeByte;}public static byte[] sign(final byte[] array, String pkcs8Key) {try {PrivateKey privateKey = getPrivateKey(pkcs8Key);final Signature instance = Signature.getInstance("SHA1withRSA", provider);instance.initSign(privateKey);instance.update(array);return instance.sign();} catch (GeneralSecurityException ex) {throw new RuntimeException("License Server installation error 0000000F2", ex);}}static {provider = new BouncyCastleProvider();}
}

实际上bouncycastle还支持部分国密算法,这一部分不用自己写实现了。

这篇关于java使用bouncycastle加解密的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!



http://www.chinasem.cn/article/360008

相关文章

C++使用栈实现括号匹配的代码详解

《C++使用栈实现括号匹配的代码详解》在编程中,括号匹配是一个常见问题,尤其是在处理数学表达式、编译器解析等任务时,栈是一种非常适合处理此类问题的数据结构,能够精确地管理括号的匹配问题,本文将通过C+... 目录引言问题描述代码讲解代码解析栈的状态表示测试总结引言在编程中,括号匹配是一个常见问题,尤其是在

Java实现检查多个时间段是否有重合

《Java实现检查多个时间段是否有重合》这篇文章主要为大家详细介绍了如何使用Java实现检查多个时间段是否有重合,文中的示例代码讲解详细,感兴趣的小伙伴可以跟随小编一起学习一下... 目录流程概述步骤详解China编程步骤1:定义时间段类步骤2:添加时间段步骤3:检查时间段是否有重合步骤4:输出结果示例代码结语作

Java中String字符串使用避坑指南

《Java中String字符串使用避坑指南》Java中的String字符串是我们日常编程中用得最多的类之一,看似简单的String使用,却隐藏着不少“坑”,如果不注意,可能会导致性能问题、意外的错误容... 目录8个避坑点如下:1. 字符串的不可变性:每次修改都创建新对象2. 使用 == 比较字符串,陷阱满

Java判断多个时间段是否重合的方法小结

《Java判断多个时间段是否重合的方法小结》这篇文章主要为大家详细介绍了Java中判断多个时间段是否重合的方法,文中的示例代码讲解详细,感兴趣的小伙伴可以跟随小编一起学习一下... 目录判断多个时间段是否有间隔判断时间段集合是否与某时间段重合判断多个时间段是否有间隔实体类内容public class D

Python使用国内镜像加速pip安装的方法讲解

《Python使用国内镜像加速pip安装的方法讲解》在Python开发中,pip是一个非常重要的工具,用于安装和管理Python的第三方库,然而,在国内使用pip安装依赖时,往往会因为网络问题而导致速... 目录一、pip 工具简介1. 什么是 pip?2. 什么是 -i 参数?二、国内镜像源的选择三、如何

使用C++实现链表元素的反转

《使用C++实现链表元素的反转》反转链表是链表操作中一个经典的问题,也是面试中常见的考题,本文将从思路到实现一步步地讲解如何实现链表的反转,帮助初学者理解这一操作,我们将使用C++代码演示具体实现,同... 目录问题定义思路分析代码实现带头节点的链表代码讲解其他实现方式时间和空间复杂度分析总结问题定义给定

IDEA编译报错“java: 常量字符串过长”的原因及解决方法

《IDEA编译报错“java:常量字符串过长”的原因及解决方法》今天在开发过程中,由于尝试将一个文件的Base64字符串设置为常量,结果导致IDEA编译的时候出现了如下报错java:常量字符串过长,... 目录一、问题描述二、问题原因2.1 理论角度2.2 源码角度三、解决方案解决方案①:StringBui

Linux使用nload监控网络流量的方法

《Linux使用nload监控网络流量的方法》Linux中的nload命令是一个用于实时监控网络流量的工具,它提供了传入和传出流量的可视化表示,帮助用户一目了然地了解网络活动,本文给大家介绍了Linu... 目录简介安装示例用法基础用法指定网络接口限制显示特定流量类型指定刷新率设置流量速率的显示单位监控多个

Java覆盖第三方jar包中的某一个类的实现方法

《Java覆盖第三方jar包中的某一个类的实现方法》在我们日常的开发中,经常需要使用第三方的jar包,有时候我们会发现第三方的jar包中的某一个类有问题,或者我们需要定制化修改其中的逻辑,那么应该如何... 目录一、需求描述二、示例描述三、操作步骤四、验证结果五、实现原理一、需求描述需求描述如下:需要在

Java中ArrayList和LinkedList有什么区别举例详解

《Java中ArrayList和LinkedList有什么区别举例详解》:本文主要介绍Java中ArrayList和LinkedList区别的相关资料,包括数据结构特性、核心操作性能、内存与GC影... 目录一、底层数据结构二、核心操作性能对比三、内存与 GC 影响四、扩容机制五、线程安全与并发方案六、工程