第十九篇:JAVA加密解密之RSA算法
RSA算法简介
RSA公钥加密算法是1977年由罗纳德·李维斯特(Ron Rivest)、阿迪·萨莫尔(Adi Shamir)和伦纳德·阿德曼(Leonard Adleman)一起提出的。1987年首次公布,当时他们三人都在麻省理工学院工作。RSA就是他们三人姓氏开头字母拼在一起组成的。RSA是目前最有影响力的公钥加密算法,它能够抵抗到目前为止已知的绝大多数密码攻击,已被ISO推荐为公钥数据加密标准。今天只有短的RSA钥匙才可能被强力方式解破。到2008年为止,世界上还没有任何可靠的攻击RSA算法的方式。只要其钥匙的长度足够长,用RSA加密的信息实际上是不能被解破的。但在分布式计算和量子计算机理论日趋成熟的今天,RSA加密安全性受到了挑战。RSA算法基于一个十分简单的数论事实:将两个大质数相乘十分容易,但是想要对其乘积进行因式分解却极其困难,因此可以将乘积公开作为加密密钥。
- 甲方构建密钥对儿,将公钥公布给乙方,将私钥保留。
- 甲方使用私钥加密数据,然后用私钥对加密后的数据签名,发送给乙方签名以及加密后的数据;乙方使用公钥、签名来验证待解密数据是否有效。
- 如果有效使用公钥对数据解密。 乙方使用公钥加密数据,向甲方发送经过加密后的数据;甲方获得加密数据,通过私钥解密。
RSA算法实现
package com.jianggujin.codec;import java.security.Key;
import java.security.KeyFactory;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.Signature;
import java.security.spec.PKCS8EncodedKeySpec;
import java.security.spec.X509EncodedKeySpec;import javax.crypto.Cipher;/*** RSA* * @author jianggujin**/
public class HQRSA
{private static HQRSA rsa = new HQRSA();public static HQRSA getInstance(){return rsa;}private HQRSA(){}/*** RSA签名算法* * @author jianggujin**/public static enum HQRSASignatureAlgorithm{MD2withRSA("MD2withRSA"), MD5withRSA("MD5withRSA"), SHA1withRSA("SHA1withRSA"), SHA224withRSA("SHA224withRSA"), SHA256withRSA("SHA256withRSA"), SHA384withRSA("SHA384withRSA"), SHA512withRSA("SHA512withRSA");private String name;private HQRSASignatureAlgorithm(String name){this.name = name;}public String getName(){return this.name;}}private static final String ALGORITHM = "RSA";public byte[] sign(byte[] data, byte[] privateKey, HQRSASignatureAlgorithm signatureAlgorithm) throws Exception{return sign(data, privateKey, signatureAlgorithm.getName());}public byte[] sign(byte[] data, byte[] privateKey, String signatureAlgorithm) throws Exception{PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(privateKey);KeyFactory keyFactory = KeyFactory.getInstance(ALGORITHM);PrivateKey priKey = keyFactory.generatePrivate(pkcs8KeySpec);Signature signature = Signature.getInstance(signatureAlgorithm);signature.initSign(priKey);signature.update(data);return signature.sign();}public boolean verify(byte[] data, byte[] publicKey, byte[] sign, HQRSASignatureAlgorithm signatureAlgorithm)throws Exception{return verify(data, publicKey, sign, signatureAlgorithm.getName());}public boolean verify(byte[] data, byte[] publicKey, byte[] sign, String signatureAlgorithm) throws Exception{X509EncodedKeySpec keySpec = new X509EncodedKeySpec(publicKey);KeyFactory keyFactory = KeyFactory.getInstance(ALGORITHM);PublicKey pubKey = keyFactory.generatePublic(keySpec);Signature signature = Signature.getInstance(signatureAlgorithm);signature.initVerify(pubKey);signature.update(data);return signature.verify(sign);}public byte[] encrypt(HQKeyType keyType, byte[] data, byte[] key) throws Exception{switch (keyType){case PRIVATE:return encryptByPrivateKey(data, key);case PUBLIC:return encryptByPublicKey(data, key);default:throw new IllegalArgumentException();}}/*** 公钥加密* * @param data* @param publicKey* @return* @throws Exception*/private byte[] encryptByPublicKey(byte[] data, byte[] publicKey) throws Exception{X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(publicKey);KeyFactory keyFactory = KeyFactory.getInstance(ALGORITHM);Key publicK = keyFactory.generatePublic(x509KeySpec);Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());cipher.init(Cipher.ENCRYPT_MODE, publicK);return cipher.doFinal(data);}/*** 私钥加密* * @param data* @param privateKey* @return* @throws Exception*/private byte[] encryptByPrivateKey(byte[] data, byte[] privateKey) throws Exception{PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(privateKey);KeyFactory keyFactory = KeyFactory.getInstance(ALGORITHM);Key privateK = keyFactory.generatePrivate(pkcs8KeySpec);Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());cipher.init(Cipher.ENCRYPT_MODE, privateK);return cipher.doFinal(data);}public byte[] decrypt(HQKeyType keyType, byte[] data, byte[] key) throws Exception{switch (keyType){case PRIVATE:return decryptByPrivateKey(data, key);case PUBLIC:return decryptByPublicKey(data, key);default:throw new IllegalArgumentException();}}/*** 公钥解密* * @param data* @param publicKey* @return* @throws Exception*/private byte[] decryptByPublicKey(byte[] data, byte[] publicKey) throws Exception{X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(publicKey);KeyFactory keyFactory = KeyFactory.getInstance(ALGORITHM);Key publicK = keyFactory.generatePublic(x509KeySpec);Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());cipher.init(Cipher.DECRYPT_MODE, publicK);return cipher.doFinal(data);}/*** 私钥解密* * @param data* @param privateKey* @return* @throws Exception*/private byte[] decryptByPrivateKey(byte[] data, byte[] privateKey) throws Exception{PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(privateKey);KeyFactory keyFactory = KeyFactory.getInstance(ALGORITHM);Key privateK = keyFactory.generatePrivate(pkcs8KeySpec);Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm());cipher.init(Cipher.DECRYPT_MODE, privateK);return cipher.doFinal(data);}/*** 初始化密钥* * @return*/public HQKeyPair initKey() throws Exception{return initKey(1024);}/*** 初始化密钥* * @param keySize* @return*/public HQKeyPair initKey(int keySize) throws Exception{KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance(ALGORITHM);keyPairGen.initialize(1024);KeyPair keyPair = keyPairGen.generateKeyPair();return new HQKeyPair(keyPair);}
}
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
测试代码:
import org.junit.Test;import com.jianggujin.codec.HQBase64;
import com.jianggujin.codec.HQKeyPair;
import com.jianggujin.codec.HQKeyType;
import com.jianggujin.codec.HQRSA;
import com.jianggujin.codec.HQRSA.HQRSASignatureAlgorithm;public class RSATest
{HQRSA rsa = HQRSA.getInstance();HQBase64 base64 = HQBase64.getInstance();@Testpublic void encode() throws Exception{byte[] data = "jianggujin".getBytes();HQKeyPair keyPair = rsa.initKey();System.err.println("私钥:" + base64.encodeToString(keyPair.getPrivateKey()));System.err.println("公钥:" + base64.encodeToString(keyPair.getPublicKey()));HQRSASignatureAlgorithm[] algorithms = HQRSASignatureAlgorithm.values();for (HQRSASignatureAlgorithm algorithm : algorithms){System.err.println("=========================================");System.err.println(algorithm);byte[] sign = rsa.sign(data, keyPair.getPrivateKey(), algorithm);System.err.println("签名:" + base64.encodeToString(sign));System.err.println("验签:" + rsa.verify(data, keyPair.getPublicKey(), sign, algorithm));byte[] prie = rsa.encrypt(HQKeyType.PRIVATE, data, keyPair.getPrivateKey());System.err.println("私钥加密:" + base64.encodeToString(prie));System.err.println("公钥解密:" + new String(rsa.decrypt(HQKeyType.PUBLIC, prie, keyPair.getPublicKey())));byte[] pube = rsa.encrypt(HQKeyType.PUBLIC, data, keyPair.getPublicKey());System.err.println("公钥加密:" + base64.encodeToString(pube));System.err.println("私钥解密:" + new String(rsa.decrypt(HQKeyType.PRIVATE, pube, keyPair.getPrivateKey())));}}
}
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
测试结果:
私钥:MIICdQIBADANBgkqhkiG9w0BAQEFAASCAl8wggJbAgEAAoGBAI82Zb82ZyxId/nZBXkrlnuVNhYu1eWLbL9L8/Kn+faP3rwM4iHt9QeqXlPyi+2KVe8LAe78jmH9whMqe4g0Lk4Z1QSKWWUwgXdd7x1jnUK+u/K1ebE0KEusmVDbXDP6FWbHtzTZdrhkl4+dqiSaSI0qkiLv0qMYRdipHvaeRsWTAgMBAAECgYBoPKrAC0P7KmAQ/ZILSNuF5evxJ3POWLX1Yr4Tj4nTmZIAA8yP75gaVTnFFlQcuESl8bgdj7u+vSmGM7SoRXqxiRRpRcYBoA/a2amgozcijcv6w0vlOgxQFbMueYvfBrpeT1HpzQK7NSVDuB0gt3OHhf0wa0ps85JoQAyR/OXXwQJBAOOy4umjGaGqvGN7JtNpJf0zxekoWMvDFg3UbNCxBF4NhRjMXjvuT015wpO87WaCOz2x0LaxXkN73HKDPMe4/XMCQQChA0ElUsWQy4qI/z1iSshkDP/YORsx3brreC7FG7PVJaq6sjlEgvDLgcSzwNl5Vl01dTmoK0xNP9ycgg0XFw9hAkAl0X9YuMs4C8iQaVLwiCVUIbY8XIQrC7LtBxwvqUcFbA9wJ/l60MEBKDkGGrn/bZ/zRkZZIap7YOYjauK8dWA7AkBOSL7L3sqf89aPdUnrGGEGBCwAfQNz41KWWgCjZSyyXXX8/9pILUHWMGnq28Dg9dSrwSsfUK3wgTRKBBFJQLUBAkBuDt9gM/Jzt5hmfceckf7TdBKV0UaBvU6byNPWeJJcoWd7LaBM5U4NXuyT5jmobNhftPQ1TCVViWxW8fi03jmv
公钥:MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCPNmW/NmcsSHf52QV5K5Z7lTYWLtXli2y/S/Pyp/n2j968DOIh7fUHql5T8ovtilXvCwHu/I5h/cITKnuINC5OGdUEilllMIF3Xe8dY51CvrvytXmxNChLrJlQ21wz+hVmx7c02Xa4ZJePnaokmkiNKpIi79KjGEXYqR72nkbFkwIDAQAB
=========================================
MD2withRSA
签名:cd6ZTjFByAEStmrdRvGYI1vdemC/BL1OMSZO5UuXTOmYs9W8gG1SKyq2vfmEG4XgY/jmocWb0lEuB+hMn9NTpWuo2b9azhueoLs8wqJ+Ryxgndudjv9x4XvlDMFrTZpne1hewxpnhHr1qaRtNeu0FHR0apGPwNxOA+gLH1aIRLA=
验签:true
私钥加密:d8dkS+obAvhw3XOukxi5UVmqJwOqV2OTJqnnit7nGDHBs/kkply+wFP/tw6z9ACJyYMdmME+Lycj9xU0LahyGE6mKAnTNL1cD/ZT+kF0+A5peOB6/d3dD1CGgby+h3Ojuju4ytfwDkrMTLl0RoxlxdW9RbUF+BU3D30nbQvcuQE=
公钥解密:jianggujin
公钥加密:g/K+fMxKWH4+Rh5cuunxLcFOi3N2q6XD38Oq2Qa5DN+t8BSXk0Akhwk4V054an945XXHu2fhBEBJ/Zy4UMfVJLQvjOjRR7rRgVbO1Cqs2XGLs07wL2gNV3wChoy33kNaz/mjq+FiQx4RLYQql4DS2MVzoFMb43h0BGUYL0SOCdg=
私钥解密:jianggujin
=========================================
MD5withRSA
签名:KXpqiNuMJjA6LkNCd+kZThrCJGpCVdB1EkE2mIHqjI6ji3Tu2le6ZHL76YFANR8yh0UO5CbO9+ZIYBduzZ43CRzJWWTr4mmEuNoDnBxS9ejqzGgjYep1MBLPzRql3ldWwh8s/wsIXgJ5Dp7peRufdZ8sriGLRDo84eZd9VjkirQ=
验签:true
私钥加密:d8dkS+obAvhw3XOukxi5UVmqJwOqV2OTJqnnit7nGDHBs/kkply+wFP/tw6z9ACJyYMdmME+Lycj9xU0LahyGE6mKAnTNL1cD/ZT+kF0+A5peOB6/d3dD1CGgby+h3Ojuju4ytfwDkrMTLl0RoxlxdW9RbUF+BU3D30nbQvcuQE=
公钥解密:jianggujin
公钥加密:PkFxsTREDTU5Bd/c9bQmgE1PIn7cSf80q+8PMJ0ZhsyNwMYivlKRFPQiymRU/hYV3DK37a6yC5z98/ZE6nykFbuDk2kWjQEGapRw7w565XvU3Cb7VMU3SgBXyWHvnbKhY8bAi86BVRItgzsXzqYiAiwIj6p/VVTBz8BFpvujJWc=
私钥解密:jianggujin
=========================================
SHA1withRSA
签名:jldqy5WTOfQw+bAdX4pt7bPeN0nZFel6vSPRzKvDOo5oXfGKwH+q2Kbft5LG68BKd6PgNR7p/SyTSkbJON/FP8OLZfBQQ5zFsrM2lk5aCX7FfOzkZDbTzSUJTp5OR602zCJRIM4bltrrQF+8P49LmjF1TrTDdhK0+vxTJ5970EM=
验签:true
私钥加密:d8dkS+obAvhw3XOukxi5UVmqJwOqV2OTJqnnit7nGDHBs/kkply+wFP/tw6z9ACJyYMdmME+Lycj9xU0LahyGE6mKAnTNL1cD/ZT+kF0+A5peOB6/d3dD1CGgby+h3Ojuju4ytfwDkrMTLl0RoxlxdW9RbUF+BU3D30nbQvcuQE=
公钥解密:jianggujin
公钥加密:K6tZzDEc6HcRLJvvnrGe2TXwu3d5nX7TERhCFoZ4OGrV2QuM7nrRN7QNYYaqK2r2iZR6R6Dk1i1yVJCBDyQfw7+Kz2EHVm7ioIiXJhy1XE7Gs9cRE5STB9MLtcfpsJSfaKIOJM5V16fuEBPBTwl/eZpYZKCRxXVztjUt4uJ87Gw=
私钥解密:jianggujin
=========================================
SHA224withRSA
签名:DVhYCFH3FLjoEeyV+oG6KLWzzvZBNVil938dmhRe4ipya0oX7TOINpFHR9wO+WoQwxJ6OvImKo8y3bqrlgD2MeGByz60TrprcYKBCWQ7aP8rnR6Jk77NOVpjeh2ENgx3i9TdjA0YCarKtZON4S0B2Yf0e/PT2yk0p6jO9aDhdDs=
验签:true
私钥加密:d8dkS+obAvhw3XOukxi5UVmqJwOqV2OTJqnnit7nGDHBs/kkply+wFP/tw6z9ACJyYMdmME+Lycj9xU0LahyGE6mKAnTNL1cD/ZT+kF0+A5peOB6/d3dD1CGgby+h3Ojuju4ytfwDkrMTLl0RoxlxdW9RbUF+BU3D30nbQvcuQE=
公钥解密:jianggujin
公钥加密:ZZLJ6OMPFInWgC+Z5v5gSN20DojnR3wdyaUDKVYO2rdWbnrSR2lPD8sml9mvnN1hSN+ZAg3M4MjBefCJPiylnNOFjKYVql1gwnNZ21/Oj51U3KUxLUSmxrODH2sovI1XGnAucEn/r7jX5vMfK5xLuvg2sOCFo7fRd2WDf8Oscaw=
私钥解密:jianggujin
=========================================
SHA256withRSA
签名:gE1w1oTYDoanut2Y3bib3mfSB4s35D/LuXjDW3Mvp2m1hNJB3n2ZSf0jbDwS8O9WGEwgHHrPYqEKsT3FR+qZZKB1zYqwyqCxaA1hpCrXYHOTGQMKUI5OfLh4oItTlSqc+Es9X/c6iHsyFbPz/auPaouJjfmgvMjp+zFKRFax8fU=
验签:true
私钥加密:d8dkS+obAvhw3XOukxi5UVmqJwOqV2OTJqnnit7nGDHBs/kkply+wFP/tw6z9ACJyYMdmME+Lycj9xU0LahyGE6mKAnTNL1cD/ZT+kF0+A5peOB6/d3dD1CGgby+h3Ojuju4ytfwDkrMTLl0RoxlxdW9RbUF+BU3D30nbQvcuQE=
公钥解密:jianggujin
公钥加密:AU4qRyytGEUhetmxVVocG2tGYCY1mPmU+m21Y4nuwMOEB9+g0X/UtBPfLBirGxwU5rjK0qC3h8l4EyI9PI/4AdC/Wa7Z46RJddMvyNui8qIXwMV4Kc+pgLylmehErZEULv1s0Ce1gQncwMyRHfebBMB/ZU7HOOPn3bpi4fcnG3w=
私钥解密:jianggujin
=========================================
SHA384withRSA
签名:crOpZmb0n6hciB28zpwk5nw/R2BaVMHVDqUrJnZCu6d9pqKJkUUb/etr/8HOs3D7nA8pSrtSq1yy7g8wwYlGtIGujbI3sJVc10DDL/2vNV58L4ufG9AvsG8vo0+5IHxwWT0V9ZtYmvxez9JSJ6S5L19+/nDas79c9TWfu3HNlTw=
验签:true
私钥加密:d8dkS+obAvhw3XOukxi5UVmqJwOqV2OTJqnnit7nGDHBs/kkply+wFP/tw6z9ACJyYMdmME+Lycj9xU0LahyGE6mKAnTNL1cD/ZT+kF0+A5peOB6/d3dD1CGgby+h3Ojuju4ytfwDkrMTLl0RoxlxdW9RbUF+BU3D30nbQvcuQE=
公钥解密:jianggujin
公钥加密:FuVJtG71Nn6IshJbXapt4wuZiFBRi95fxJg62vnde77U+VkOoCMsc+j4ktC3aWRWiBLDM3582/x186o+o/cJOiqYlNGU7GR3RgrrXnTsIIPEIhJoi7nXyeSBZD3ZiTFBAW2Jv88bgUf0dVteZNYA7h01VWhgxNbN/p+tlfwf77Y=
私钥解密:jianggujin
=========================================
SHA512withRSA
签名:QhUfuk8rxghcDyHOWUVh9wOBAXmW9KXwiAhNo3Hr+895eDmdv6xJFpJrsErAu56xtBz6eQ65G/4idZ3CMYu2flZmvMpgXmm0RlPB1bK9FIY1TpgH9A0/vgJu8UDMT0AsI8nKE0G4XG81gM5vrnjE7HObHWoIc4rW+YIUNZeaKyI=
验签:true
私钥加密:d8dkS+obAvhw3XOukxi5UVmqJwOqV2OTJqnnit7nGDHBs/kkply+wFP/tw6z9ACJyYMdmME+Lycj9xU0LahyGE6mKAnTNL1cD/ZT+kF0+A5peOB6/d3dD1CGgby+h3Ojuju4ytfwDkrMTLl0RoxlxdW9RbUF+BU3D30nbQvcuQE=
公钥解密:jianggujin
公钥加密:d8HT593xI2KnUeGGvQSRoSWmVXk9DdWHU3kMqSOONmj5Y0N8KZcA3Z7tz+MJX2Xgno9vCn5iXQXYEti5OkPfM53E/qf6MdFS6EhgiiNwhZu80ZtvVnjgfk0ZhxlFp9qYeY+HRwLjPyAG88yTZ3w31DbXW23TE0r6b4/piEy1/Gg=
私钥解密:jianggujin
第十九篇:JAVA加密解密之RSA算法相关推荐
- 二十九、Java的异常处理
@Author:Runsen @Date:2020/6/3 作者介绍:Runsen目前大三下学期,专业化学工程与工艺,大学沉迷日语,Python, Java和一系列数据分析软件.导致翘课严重,专业排名 ...
- java中解密技术是什么_详解Java 加密解密技术的分类和归纳
这篇文章主要介绍了Java加密解密基础分类方法汇总的相关资料,需要的朋友可以参考下 Java 加密解密基础: 密码学是研究编制密码和破译密码的技术科学.研究密码变化的客观规律,应用于编制密码以保守通信 ...
- java加密解密 pdf_JAVA加密与解密的艺术 第2版 PDF 下载
本书是Java安全领域公认的标杆之作,被奉为每一位Java开发工程师必读的著作之一.由资深专家撰写,第1版4年来畅销不衰,繁体版在台湾出版,大陆和台湾的读者都给予了极高的评价.第2版根据Java 7全 ...
- Java加密解密入门
一 概述 Java加密解密概述 Java安全领域分为四个部分:JCA-Java加密体系结构:JCE-Java加密扩展包:JSSE-Java安全套接字扩展包:JAAS-Java鉴别与安全服务. JCA提 ...
- java 加密解密编程,java 加密解密容易实现
当前位置:我的异常网» 编程 » java 加密解密容易实现 java 加密解密容易实现 www.myexceptions.net 网友分享于:2013-10-27 浏览:3次 java 加密解密 ...
- Java 加密解密之对称加密算法PBE
JAVA 加密解密系列 Java 加密解密基础 Java byte数组与十六进制字符串互转 Java BASE64加密解密 Java 加密解密之消息摘要算法(MD5 SHA MAC) Java 加密 ...
- CCNP-第十九篇-ISIS(二)
CCNP-第十九篇-ISIS(二) 首先来个对比的通信机制 首先呢,工作环境中,他没OSPF那么复杂哈,然后 底层启了ISIS,通了就不用管它了 实验环境 注意,上图是错误示范哦! 为什么呢? 为啥呢 ...
- vue使用DES模式加密解密,包括Java加密解密
前端加密解密 1.安装:npm install crypto-js 2.在utils下创建一个cryptoAES.js import CryptoJS from 'crypto-js';//与后端约定 ...
- Zsh 开发指南(第十九篇 脚本实例讲解)
导读 本文将讲解一些比较简单的 zsh 脚本实例. 实例一:复制一个目录的目录结构 功能: 将一个目录及它下边的所有目录复制到另一个目录中(即创建同名目录),但不复制目录下的其他类型文件. 例子: s ...
最新文章
- 智能车竞赛技术报告 | 双车接力组 - 沈阳航空航天大学 - 精神小车成双 - 双轮车
- 产品经理能力模型 答网友问
- PHP使用PDO方式的经验总结:连接 增删改查
- 德标螺纹规格对照表_抚顺船用外螺纹铜减压阀带NK船检证书
- 调用另一个cpp的变量_再谈条件变量—从入门到出家
- ensp完成chap配置_广域网链路安全认证CHAP,一分钟了解下
- MyBatis学习总结(4)——解决字段名与实体类属性名不相同的冲突
- vue下使用axios应用
- 4fsk调制matlab_数字调制解调技术的MATLAB与FPGA实现
- 人是什么垃圾?AI识别功能用到垃圾分类上时 网友试了试“扫自己”
- 一起谈.NET技术,ASP.NET2.0服务器控件之类型转换器
- python tkinter frame滚动条_如何在Tkinter中创建带有滚动条的LabelFrame?
- Dubbo架构设计详解(转载)
- Java语言编写一个简单彩票机的程序
- Element UI 官网以及其他技术文档
- java象棋人机_Java版中国象棋人机对战源代码(AI算法体现淋漓尽致)
- 快手短视频的流量及视频推荐算法解析,助你轻松上热门
- OSEK network management
- linux学习之使用piranha配置高可用集群
- 【年终终结】2021年年末总结