java和php实现RSA加密互通-b

java和PHP RSA加密实现互通

1:通过openssl 生成公钥和密钥文件(linux)

(1) 生产私钥文件命令

openssl genrsa -out rsa_private_key.pem 1024

生产结果

-----BEGIN PUBLIC KEY-----

MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCbrbo/JaPJTJLl+6hfZm7uuLIr

t/hivaLfot32wq/nSzoSsYkoNk27Yy+n10ODoZ75/91Y8QoJKeoWe0Ik1H1DmMuw

Ef3eBoBCFn+eNjgZq6SIVBCNEnUaS0STmWqGPFKRFJ1Ujd4rJQ1tGFG3z3v9Cw2b

Kq41AAYMD7ZqLv2zfQIDAQAB

-----END PUBLIC KEY-----

(2) 通过私钥文件生成公钥命令

openssl rsa -in rsa_private_key.pem -out rsa_public_key.pem -pubout

-----BEGIN RSA PRIVATE KEY-----

MIICXQIBAAKBgQCbrbo/JaPJTJLl+6hfZm7uuLIrt/hivaLfot32wq/nSzoSsYko

Nk27Yy+n10ODoZ75/91Y8QoJKeoWe0Ik1H1DmMuwEf3eBoBCFn+eNjgZq6SIVBCN

EnUaS0STmWqGPFKRFJ1Ujd4rJQ1tGFG3z3v9Cw2bKq41AAYMD7ZqLv2zfQIDAQAB

AoGAOzDkvZm8Go+I0vTKYet6hj2nUMQUJsbfpJQyPN5tL04E+JKUCbwL9hGSTwij

3OqYnYlRSb3sCOvs2ztmPMamEXOlLUb2SiFQ9hApie5r7ArdsiSz+OI+xrt8Q9zS

9dnYL/JMmaKnSHx3xVipSNrD4sxVaCLDv77k+54AtO7iZCkCQQDORC9B4UkfrfUd

t6FpOphctLbIejzl1oKb1bdowLsGD1Q78JGzU0nZIeaBTTIhFLjdcOXwOqdXYfhX

tmSRHIHTAkEAwTcCce1FM80mT4QOjdmAVaNPah1AjliuJBIDXN9vpP3+v0XMf4IS

9lEib/3eq+jXug0t9osdsHuIIVKc5A5TbwJBAI2iAjUhhb2MDJi4Q8xm4MIfkLb+

QJytfAeXa5YxaPqTQgraeKGDGl1PSuEUacyPVxUu9aTMEaYN7qID6vA9e+MCQQCa

2aeP/wUzWvuVRtUTQnnkKJqBBSiz7MbECdvAFyK3LQl56krW9jyURLpA30oSpO4g

Imfv69bDln2nlzo+XGzpAkBigEyscmneSvs9j78yhTKKiyvrkSRUuER3Xn1GmLIX

wnTJqJJchY7ZOd0SeFhwHGOUywb28+elra1yv9Pazany

-----END RSA PRIVATE KEY-----

(3) 将传统格式的私钥转换成 PKCS#8 格式的的密钥文件

openssl pkcs8 -topk8 -in rsa_private_key.pem -outpkcs8_rsa_private_key.pem -nocrypt

-----BEGIN PRIVATE KEY-----

MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAJutuj8lo8lMkuX7

qF9mbu64siu3+GK9ot+i3fbCr+dLOhKxiSg2TbtjL6fXQ4Ohnvn/3VjxCgkp6hZ7

QiTUfUOYy7AR/d4GgEIWf542OBmrpIhUEI0SdRpLRJOZaoY8UpEUnVSN3islDW0Y

UbfPe/0LDZsqrjUABgwPtmou/bN9AgMBAAECgYA7MOS9mbwaj4jS9Mph63qGPadQ

xBQmxt+klDI83m0vTgT4kpQJvAv2EZJPCKPc6pidiVFJvewI6+zbO2Y8xqYRc6Ut

RvZKIVD2ECmJ7mvsCt2yJLP44j7Gu3xD3NL12dgv8kyZoqdIfHfFWKlI2sPizFVo

IsO/vuT7ngC07uJkKQJBAM5EL0HhSR+t9R23oWk6mFy0tsh6POXWgpvVt2jAuwYP

VDvwkbNTSdkh5oFNMiEUuN1w5fA6p1dh+Fe2ZJEcgdMCQQDBNwJx7UUzzSZPhA6N

2YBVo09qHUCOWK4kEgNc32+k/f6/Rcx/ghL2USJv/d6r6Ne6DS32ix2we4ghUpzk

DlNvAkEAjaICNSGFvYwMmLhDzGbgwh+Qtv5AnK18B5drljFo+pNCCtp4oYMaXU9K

4RRpzI9XFS71pMwRpg3uogPq8D174wJBAJrZp4//BTNa+5VG1RNCeeQomoEFKLPs

xsQJ28AXIrctCXnqStb2PJREukDfShKk7iAiZ+/r1sOWfaeXOj5cbOkCQGKATKxy

ad5K+z2PvzKFMoqLK+uRJFS4RHdefUaYshfCdMmoklyFjtk53RJ4WHAcY5TLBvbz

56WtrXK/09rNqfI=

-----END PRIVATE KEY-----

由于php 进行openssl_public_encrypt 加密后返回的是二进制数据,需要对其返回的加密后的数据进行二进制16进制编码base64_encode才可以显示,相应的java生产加密后生产的16进制加密字符串需要进行base64_decode进行机密后在进行openssl_private_decrypt,例如:openssl_private_decrypt(base64_decode($encryptData), $decryptData,$privateKey);

<?php

$privateKeyFilePath = '-----BEGIN RSAPRIVATE KEY-----

MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAJutuj8lo8lMkuX7

qF9mbu64siu3+GK9ot+i3fbCr+dLOhKxiSg2TbtjL6fXQ4Ohnvn/3VjxCgkp6hZ7

QiTUfUOYy7AR/d4GgEIWf542OBmrpIhUEI0SdRpLRJOZaoY8UpEUnVSN3islDW0Y

UbfPe/0LDZsqrjUABgwPtmou/bN9AgMBAAECgYA7MOS9mbwaj4jS9Mph63qGPadQ

xBQmxt+klDI83m0vTgT4kpQJvAv2EZJPCKPc6pidiVFJvewI6+zbO2Y8xqYRc6Ut

RvZKIVD2ECmJ7mvsCt2yJLP44j7Gu3xD3NL12dgv8kyZoqdIfHfFWKlI2sPizFVo

IsO/vuT7ngC07uJkKQJBAM5EL0HhSR+t9R23oWk6mFy0tsh6POXWgpvVt2jAuwYP

VDvwkbNTSdkh5oFNMiEUuN1w5fA6p1dh+Fe2ZJEcgdMCQQDBNwJx7UUzzSZPhA6N

2YBVo09qHUCOWK4kEgNc32+k/f6/Rcx/ghL2USJv/d6r6Ne6DS32ix2we4ghUpzk

DlNvAkEAjaICNSGFvYwMmLhDzGbgwh+Qtv5AnK18B5drljFo+pNCCtp4oYMaXU9K

4RRpzI9XFS71pMwRpg3uogPq8D174wJBAJrZp4//BTNa+5VG1RNCeeQomoEFKLPs

xsQJ28AXIrctCXnqStb2PJREukDfShKk7iAiZ+/r1sOWfaeXOj5cbOkCQGKATKxy

ad5K+z2PvzKFMoqLK+uRJFS4RHdefUaYshfCdMmoklyFjtk53RJ4WHAcY5TLBvbz

56WtrXK/09rNqfI=

-----END RSA PRIVATE KEY-----';

/**

* 公钥文件的路径

*/

$publicKeyFilePath = '-----BEGIN PUBLICKEY-----

MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCbrbo/JaPJTJLl+6hfZm7uuLIr

t/hivaLfot32wq/nSzoSsYkoNk27Yy+n10ODoZ75/91Y8QoJKeoWe0Ik1H1DmMuw

Ef3eBoBCFn+eNjgZq6SIVBCNEnUaS0STmWqGPFKRFJ1Ujd4rJQ1tGFG3z3v9Cw2b

Kq41AAYMD7ZqLv2zfQIDAQAB

-----END PUBLIC KEY-----';

extension_loaded('openssl') or die('php需要openssl扩展支持');

/**

* 生成Resource类型的密钥,如果密钥文件内容被破坏,openssl_pkey_get_private函数返回false

*/

$privateKey =openssl_pkey_get_private($privateKeyFilePath);

/**

* 生成Resource类型的公钥,如果公钥文件内容被破坏,openssl_pkey_get_public函数返回false

*/

$publicKey =openssl_pkey_get_public($publicKeyFilePath);

($privateKey) or die('密钥不可用');

($publicKey) or die('公钥不可用');

/**

* 原数据

*/

$originalData = '我是PHP版本';

/**

* 加密以后的数据,用于在网路上传输

*/

$encryptData = '';

echo '原数据为:', $originalData, '<br />';

///////////////////////////////用公钥加密////////////////////////

if (openssl_public_encrypt($originalData,$encryptData, $publicKey)) {

echo '加密成功,加密后数据(base64_encode后)为:', base64_encode($encryptData), '<br />';

echo '加密成功,加密后数据(bin2hex后)为:',bin2hex($encryptData), '<br/>';

} else {

die('加密失败');

}

///////////////////////////////用私钥解密////////////////////////

$decryptData ='';

if (openssl_private_decrypt($encryptData,$decryptData, $privateKey)) {

echo '解密成功,解密后数据为:',$decryptData, '<br />';

} else {

die('解密成功');

}

?>

Java 版本RSA 进行加密解密

在网上查询了好几天,最终找到解决方案,网络上都是通过Cipher.getInstance("RSA");

而改成Cipher.getInstance("RSA/ECB/PKCS1Padding");就可以实现与php版本公钥和密钥互通了。

package RSA.test;

import java.io.BufferedReader;

import java.io.IOException;

import java.io.InputStream;

import java.io.InputStreamReader;

import java.security.InvalidKeyException;

import java.security.Key;

import java.security.KeyFactory;

import java.security.KeyPair;

import java.security.KeyPairGenerator;

import java.security.NoSuchAlgorithmException;

import java.security.SecureRandom;

import java.security.interfaces.RSAPrivateKey;

import java.security.interfaces.RSAPublicKey;

import java.security.spec.InvalidKeySpecException;

import java.security.spec.PKCS8EncodedKeySpec;

import java.security.spec.X509EncodedKeySpec;

import javax.crypto.BadPaddingException;

import javax.crypto.Cipher;

import javax.crypto.IllegalBlockSizeException;

import javax.crypto.NoSuchPaddingException;

import org.bouncycastle.jce.provider.BouncyCastleProvider;

import sun.misc.BASE64Decoder;

import sun.misc.BASE64Encoder;

publicclass RSAEncrypt {

privatestaticfinal StringDEFAULT_PUBLIC_KEY="MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCbrbo/JaPJTJLl+6hfZm7uuLIrt/hivaLfot32wq/nSzoSsYkoNk27Yy+n10ODoZ75/91Y8QoJKeoWe0Ik1H1DmMuwEf3eBoBCFn+eNjgZq6SIVBCNEnUaS0STmWqGPFKRFJ1Ujd4rJQ1tGFG3z3v9Cw2bKq41AAYMD7ZqLv2zfQIDAQAB";

privatestaticfinal StringDEFAULT_PRIVATE_KEY="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";

/*private static final StringDEFAULT_PUBLIC_KEY="MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCbrbo/JaPJTJLl+6hfZm7uuLIr"+"\r"

+"t/hivaLfot32wq/nSzoSsYkoNk27Yy+n10ODoZ75/91Y8QoJKeoWe0Ik1H1DmMuw"+"\r"

+"Ef3eBoBCFn+eNjgZq6SIVBCNEnUaS0STmWqGPFKRFJ1Ujd4rJQ1tGFG3z3v9Cw2b"+"\r"

+"Kq41AAYMD7ZqLv2zfQIDAQAB"+"\r";

private static final StringDEFAULT_PRIVATE_KEY="MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAJutuj8lo8lMkuX7"+"\r"

+"qF9mbu64siu3+GK9ot+i3fbCr+dLOhKxiSg2TbtjL6fXQ4Ohnvn/3VjxCgkp6hZ7"+"\r"

+"QiTUfUOYy7AR/d4GgEIWf542OBmrpIhUEI0SdRpLRJOZaoY8UpEUnVSN3islDW0Y"+"\r"

+"UbfPe/0LDZsqrjUABgwPtmou/bN9AgMBAAECgYA7MOS9mbwaj4jS9Mph63qGPadQ"+"\r"

+"xBQmxt+klDI83m0vTgT4kpQJvAv2EZJPCKPc6pidiVFJvewI6+zbO2Y8xqYRc6Ut"+"\r"

+"RvZKIVD2ECmJ7mvsCt2yJLP44j7Gu3xD3NL12dgv8kyZoqdIfHfFWKlI2sPizFVo"+"\r"

+"IsO/vuT7ngC07uJkKQJBAM5EL0HhSR+t9R23oWk6mFy0tsh6POXWgpvVt2jAuwYP"+"\r"

+"VDvwkbNTSdkh5oFNMiEUuN1w5fA6p1dh+Fe2ZJEcgdMCQQDBNwJx7UUzzSZPhA6N"+"\r"

+"2YBVo09qHUCOWK4kEgNc32+k/f6/Rcx/ghL2USJv/d6r6Ne6DS32ix2we4ghUpzk"+"\r"

+"DlNvAkEAjaICNSGFvYwMmLhDzGbgwh+Qtv5AnK18B5drljFo+pNCCtp4oYMaXU9K"+"\r"

+"4RRpzI9XFS71pMwRpg3uogPq8D174wJBAJrZp4//BTNa+5VG1RNCeeQomoEFKLPs"+"\r"

+"xsQJ28AXIrctCXnqStb2PJREukDfShKk7iAiZ+/r1sOWfaeXOj5cbOkCQGKATKxy"+"\r"

+"ad5K+z2PvzKFMoqLK+uRJFS4RHdefUaYshfCdMmoklyFjtk53RJ4WHAcY5TLBvbz"+"\r"

+"56WtrXK/09rNqfI="+"\r";*/

/**

* 私钥

*/

private RSAPrivateKey privateKey;

/**

* 公钥

*/

private RSAPublicKey publicKey;

/**

* 字节数据转字符串专用集合

*/

privatestaticfinalchar[] HEX_CHAR= {'0', '1', '2', '3', '4', '5', '6', '7', '8', '9', 'a', 'b', 'c', 'd', 'e', 'f'};

/**

* 获取私钥

* @return当前的私钥对象

*/

public RSAPrivateKey getPrivateKey() {

returnprivateKey;

}

/**

* 获取公钥

* @return当前的公钥对象

*/

public RSAPublicKey getPublicKey() {

returnpublicKey;

}

/**

* 随机生成密钥对

*/

publicvoid genKeyPair(){

KeyPairGeneratorkeyPairGen= null;

try {

keyPairGen=KeyPairGenerator.getInstance("RSA");

} catch (NoSuchAlgorithmException e) {

e.printStackTrace();

}

keyPairGen.initialize(1024, new SecureRandom());

KeyPair keyPair=keyPairGen.generateKeyPair();

this.privateKey= (RSAPrivateKey) keyPair.getPrivate();

this.publicKey= (RSAPublicKey)keyPair.getPublic();

}

/**

* 从文件中输入流中加载公钥

* @param in 公钥输入流

* @throws Exception 加载公钥时产生的异常

*/

publicvoid loadPublicKey(InputStreamin) throws Exception{

try {

BufferedReaderbr= new BufferedReader(new InputStreamReader(in));

String readLine= null;

StringBuildersb= new StringBuilder();

while((readLine= br.readLine())!=null){

if(readLine.charAt(0)=='-'){

continue;

}else{

sb.append(readLine);

sb.append('\r');

}

}

loadPublicKey(sb.toString());

} catch (IOException e) {

thrownew Exception("公钥数据流读取错误");

} catch (NullPointerException e) {

thrownew Exception("公钥输入流为空");

}

}

/**

* 从字符串中加载公钥

* @param publicKeyStr 公钥数据字符串

* @throws Exception 加载公钥时产生的异常

*/

publicvoid loadPublicKey(StringpublicKeyStr) throws Exception{

try {

BASE64Decoderbase64Decoder= new BASE64Decoder();

byte[] buffer= base64Decoder.decodeBuffer(publicKeyStr);

KeyFactorykeyFactory= KeyFactory.getInstance("RSA");

X509EncodedKeySpec keySpec= newX509EncodedKeySpec(buffer);

this.publicKey= (RSAPublicKey) keyFactory.generatePublic(keySpec);

} catch (NoSuchAlgorithmException e) {

thrownew Exception("无此算法");

} catch (InvalidKeySpecException e) {

thrownew Exception("公钥非法");

} catch (IOException e) {

thrownew Exception("公钥数据内容读取错误");

} catch (NullPointerException e) {

thrownew Exception("公钥数据为空");

}

}

/**

* 从文件中加载私钥

* @param keyFileName 私钥文件名

* @return是否成功

* @throws Exception

*/

publicvoid loadPrivateKey(InputStreamin) throws Exception{

try {

BufferedReader br= new BufferedReader(newInputStreamReader(in));

String readLine=null;

StringBuildersb= new StringBuilder();

while((readLine= br.readLine())!=null){

if(readLine.charAt(0)=='-'){

continue;

}else{

sb.append(readLine);

sb.append('\r');

}

}

loadPrivateKey(sb.toString());

} catch (IOException e) {

thrownew Exception("私钥数据读取错误");

} catch (NullPointerException e) {

thrownew Exception("私钥输入流为空");

}

}

publicvoid loadPrivateKey(StringprivateKeyStr) throws Exception{

try {

BASE64Decoder base64Decoder= new BASE64Decoder();

byte[] buffer= base64Decoder.decodeBuffer(privateKeyStr);

PKCS8EncodedKeySpec keySpec= newPKCS8EncodedKeySpec(buffer);

KeyFactorykeyFactory= KeyFactory.getInstance("RSA");

this.privateKey= (RSAPrivateKey) keyFactory.generatePrivate(keySpec);

} catch (NoSuchAlgorithmException e) {

thrownew Exception("无此算法");

} catch (InvalidKeySpecException e) {

thrownew Exception("私钥非法");

} catch (IOException e) {

thrownew Exception("私钥数据内容读取错误");

} catch (NullPointerException e) {

thrownew Exception("私钥数据为空");

}

}

/**

* 加密过程

* @param publicKey 公钥

* @param plainTextData 明文数据

* @return

* @throws Exception 加密过程中的异常信息

*/

publicbyte[] encrypt(RSAPublicKeypublicKey, byte[] plainTextData) throws Exception{

if(publicKey== null){

thrownew Exception("加密公钥为空, 请设置");

}

Cipher cipher= null;

try {

cipher= Cipher.getInstance("RSA/ECB/PKCS1Padding");

cipher.init(Cipher.ENCRYPT_MODE, publicKey);

byte[] output= cipher.doFinal(plainTextData);

return output;

} catch (NoSuchAlgorithmException e) {

thrownew Exception("无此加密算法");

} catch (NoSuchPaddingException e) {

e.printStackTrace();

returnnull;

}catch (InvalidKeyException e) {

thrownew Exception("加密公钥非法,请检查");

} catch (IllegalBlockSizeException e) {

thrownew Exception("明文长度非法");

} catch (BadPaddingException e) {

thrownew Exception("明文数据已损坏");

}

}

/**

* 解密过程

* @param privateKey 私钥

* @param cipherData 密文数据

* @return明文

* @throws Exception 解密过程中的异常信息

*/

publicbyte[] decrypt(RSAPrivateKeyprivateKey, byte[] cipherData) throws Exception{

if (privateKey== null){

thrownew Exception("解密私钥为空, 请设置");

}

Cipher cipher= null;

try {

cipher= Cipher.getInstance("RSA/ECB/PKCS1Padding");

cipher.init(Cipher.DECRYPT_MODE, privateKey);

byte[] output= cipher.doFinal(cipherData);

return output;

} catch (NoSuchAlgorithmException e) {

thrownew Exception("无此解密算法");

} catch (NoSuchPaddingException e) {

e.printStackTrace();

returnnull;

}catch (InvalidKeyException e) {

thrownew Exception("解密私钥非法,请检查");

} catch (IllegalBlockSizeException e) {

thrownew Exception("密文长度非法");

} catch (BadPaddingException e) {

thrownew Exception("密文数据已损坏");

}

}

/**

* 字节数据转十六进制字符串

* @param data 输入数据

* @return十六进制内容

*/

publicstatic String byteArrayToString(byte[] data){

StringBuilderstringBuilder= new StringBuilder();

for (int i=0; i<data.length; i++){

//取出字节的高四位 作为索引得到相应的十六进制标识符 注意无符号右移

stringBuilder.append(HEX_CHAR[(data[i] & 0xf0)>>> 4]);

//取出字节的低四位 作为索引得到相应的十六进制标识符

stringBuilder.append(HEX_CHAR[(data[i] &0x0f)]);

/*if (i<data.length-1){

stringBuilder.append(' ');

}*/

}

return stringBuilder.toString();

}

/**

* 得到密钥字符串(经过base64编码)

*

* @return

*/

publicstatic String getKeyString(Keykey) throws Exception {

byte[] keyBytes = key.getEncoded();

String s = (new BASE64Encoder()).encode(keyBytes);

return s;

}

publicstaticvoid main(String[] args){

RSAEncryptrsaEncrypt= new RSAEncrypt();

//rsaEncrypt.genKeyPair();

//加载公钥

try {

rsaEncrypt.loadPublicKey(RSAEncrypt.DEFAULT_PUBLIC_KEY);

System.out.println("加载公钥成功");

} catch (Exception e) {

System.err.println(e.getMessage());

System.err.println("加载公钥失败");

}

//加载私钥

try {

rsaEncrypt.loadPrivateKey(RSAEncrypt.DEFAULT_PRIVATE_KEY);

System.out.println("加载私钥成功");

} catch (Exception e) {

System.err.println(e.getMessage());

System.err.println("加载私钥失败");

}

//测试字符串

String encryptStr= "duhuawei";

try {

BASE64Encoder encoder = new BASE64Encoder();

BASE64Decoder decoder = new BASE64Decoder();

//加密

byte[] cipher = rsaEncrypt.encrypt(rsaEncrypt.getPublicKey(),encryptStr.getBytes());

//解密

//cipher="fF7DHU9MpBOS0WFrmb7Xplq1ctrsNAPCOHLxmwSd+X/w1cVMQLaQHH3bJYx7mrVRRYzxhCmwOcA+jMXe5sDbGmMU7YJrQGyqLCpbERfqDUbU6bSiVO/lxWDW2cciSBTiffSOHxbJPGkK0SSROs9+leBObh7W9FqNRvH83GdFIq8=".getBytes();

System.out.println("密文长度:"+ cipher.length);

System.out.println(RSAEncrypt.byteArrayToString(cipher));

String des="LniZFIzbkYokH5DTSI5tus3H7Wt9bFzV7MmQIIeVRP6bhsheTGI4IPghne8W9TN3AVRioZsj5A7FINdthsnGpnQpG8BwH0OFJZLMy3ZaZhFu6FR0ipuLB9CP60u9W0jovzwEqdIcfqTf6fQzBbkJBLoMx3BhII0546wsNW8+POU=";

System.out.println("密文如下:"+encoder.encode(cipher));

byte[] plainText = rsaEncrypt.decrypt(rsaEncrypt.getPrivateKey(),decoder.decodeBuffer(des));

//System.out.println("明文长度:"+plainText.length);

//System.out.println(RSAEncrypt.byteArrayToString(plainText));

System.out.println("解密后结果:"+new String(plainText));

} catch (Exception e) {

System.err.println(e.getMessage());

}

}

}