安卓與PHP間的RSA(openssl)交互加密的坑

這幾天在寫一個安卓的RSA公鑰加密算法,用于跟PHP后臺接口進(jìn)行交互晓淀。在實踐過程中發(fā)現(xiàn)了幾個坑所袁。其中我的公鑰和私鑰都是通過openssl生成的pem格式。

遇到的坑:

1.通過java的RSA公鑰加密后獲得的密文凶掰,在PHP中無法解密

2.通過java提取私鑰時報錯私鑰格式不對

以下是相關(guān)關(guān)鍵代碼[不完善的示例代碼]

(該代碼可直接百度燥爷,一大堆)

1.公鑰私鑰

<pre>
static String PUCLIC_KEY = "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCfRTdcPIH10gT9f31rQuIInLwe" + "\r"
+ "7fl2dtEJ93gTmjE9c2H+kLVENWgECiJVQ5sonQNfwToMKdO0b3Olf4pgBKeLThra" + "\r"
+ "z/L3nYJYlbqjHC3jTjUnZc0luumpXGsox62+PuSGBlfb8zJO6hix4GV/vhyQVCpG" + "\r"
+ "9aYqgE7zyTRZYX9byQIDAQAB" + "\r";
static String PRIVATE_KEY = "MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAJ9FN1w8gfXSBP1/" + "\r"
+ "fWtC4gicvB7t+XZ20Qn3eBOaMT1zYf6QtUQ1aAQKIlVDmyidA1/BOgwp07Rvc6V/" + "\r"
+ "imAEp4tOGtrP8vedgliVuqMcLeNONSdlzSW66alcayjHrb4+5IYGV9vzMk7qGLHg" + "\r"
+ "ZX++HJBUKkb1piqATvPJNFlhf1vJAgMBAAECgYA736xhG0oL3EkN9yhx8zG/5RP/" + "\r"
+ "WJzoQOByq7pTPCr4m/Ch30qVerJAmoKvpPumN+h1zdEBk5PHiAJkm96sG/PTndEf" + "\r"
+ "kZrAJ2hwSBqptcABYk6ED70gRTQ1S53tyQXIOSjRBcugY/21qeswS3nMyq3xDEPK" + "\r"
+ "XpdyKPeaTyuK86AEkQJBAM1M7p1lfzEKjNw17SDMLnca/8pBcA0EEcyvtaQpRvaL" + "\r"
+ "n61eQQnnPdpvHamkRBcOvgCAkfwa1uboru0QdXii/gUCQQDGmkP+KJPX9JVCrbRt" + "\r"
+ "7wKyIemyNM+J6y1ZBZ2bVCf9jacCQaSkIWnIR1S9UM+1CFE30So2CA0CfCDmQy+y" + "\r"
+ "7A31AkB8cGFB7j+GTkrLP7SX6KtRboAU7E0q1oijdO24r3xf/Imw4Cy0AAIx4KAu" + "\r"
+ "L29GOp1YWJYkJXCVTfyZnRxXHxSxAkEAvO0zkSv4uI8rDmtAIPQllF8+eRBT/deD" + "\r"
+ "JBR7ga/k+wctwK/Bd4Fxp9xzeETP0l8/I+IOTagK+Dos8d8oGQUFoQJBAI4Nwpfo" + "\r"
+ "MFaLJXGY9ok45wXrcqkJgM+SN6i8hQeujXESVHYatAIL/1DgLi+u46EFD69fw0w+" + "\r" + "c7o0HLlMsYPAzJw="
+ "\r";
</pre>

2.獲取公鑰并加密(PHP解密密文失敗)

<pre>
String source = "hello world";
PublicKey publicKey = RSAUtils.loadPublicKey(PUCLIC_KEY);
byte[] encryptByte = RSAUtils.encryptData(source.getBytes(), publicKey);
String afterencrypt = Base64Utils.encode(encryptByte);
</pre>

3.獲取私鑰并解密(私鑰獲取失斉尘健)

<pre>
PrivateKey privateKey = RSAUtils.loadPrivateKey(PRIVATE_KEY);
byte[] b1 = afterencrypt.getBytes();
String text = new String(RSAUtils.decryptData(encryptByte, privateKey));
</pre>

4.RSA算法工具類RSAUtils.class[不完善的示例代碼]

<pre>
public final class RSAUtils
{
static String RSA = "RSA";
public static byte[] encryptData(byte[] data, PublicKey publicKey) throws Exception
{
try
{
Cipher cipher = Cipher.getInstance(RSA);
cipher.init(Cipher.ENCRYPT_MODE, publicKey);
return cipher.doFinal(data);
} catch (NoSuchAlgorithmException e) {
throw new Exception("無此解密算法");
} catch (NoSuchPaddingException e) {
e.printStackTrace();
return null;
}catch (InvalidKeyException e) {
throw new Exception("解密私鑰非法,請檢查");
} catch (IllegalBlockSizeException e) {
throw new Exception("密文長度非法");
} catch (BadPaddingException e) {
throw new Exception("密文數(shù)據(jù)已損壞");
}
}

public static byte[] decryptData(byte[] encryptedData, PrivateKey privateKey) throws Exception
{
    try
    {
        Cipher cipher = Cipher.getInstance(RSA);
        cipher.init(Cipher.DECRYPT_MODE, privateKey);
        return cipher.doFinal(encryptedData);
    } catch (NoSuchAlgorithmException e) {  
        throw new Exception("無此解密算法");  
    } catch (NoSuchPaddingException e) {  
        e.printStackTrace();  
        return null;  
    }catch (InvalidKeyException e) {  
        throw new Exception("解密私鑰非法,請檢查");  
    } catch (IllegalBlockSizeException e) {  
        throw new Exception("密文長度非法");  
    } catch (BadPaddingException e) {  
        throw new Exception("密文數(shù)據(jù)已損壞");  
    }         
}

public static PublicKey getPublicKey(byte[] keyBytes) throws NoSuchAlgorithmException,
        InvalidKeySpecException
{
    X509EncodedKeySpec keySpec = new X509EncodedKeySpec(keyBytes);
    KeyFactory keyFactory = KeyFactory.getInstance(RSA);
    PublicKey publicKey = keyFactory.generatePublic(keySpec);
    return publicKey;
}

public static PrivateKey getPrivateKey(byte[] keyBytes) throws NoSuchAlgorithmException,
        InvalidKeySpecException
{
    PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(keyBytes);
    KeyFactory keyFactory = KeyFactory.getInstance(RSA);
    PrivateKey privateKey = keyFactory.generatePrivate(keySpec);
    return privateKey;
}

public static PublicKey loadPublicKey(String publicKeyStr) throws Exception
{
    try
    {
        byte[] buffer = Base64Utils.decode(publicKeyStr);
        KeyFactory keyFactory = KeyFactory.getInstance(RSA);
        X509EncodedKeySpec keySpec = new X509EncodedKeySpec(buffer);
        return (RSAPublicKey) keyFactory.generatePublic(keySpec);
    } catch (NoSuchAlgorithmException e)
    {
        throw new Exception("not this suanfa");
    } catch (InvalidKeySpecException e)
    {
        throw new Exception("invalid public key");
    } catch (NullPointerException e)
    {
        throw new Exception("public key is null");
    }
}

public static PrivateKey loadPrivateKey(String privateKeyStr) throws Exception
{
    try
    {
        byte[] buffer = Base64Utils.decode(privateKeyStr);
        PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(buffer);
        KeyFactory keyFactory = KeyFactory.getInstance(RSA);
        return (RSAPrivateKey) keyFactory.generatePrivate(keySpec);
    } catch (NoSuchAlgorithmException e)
    {
        throw new Exception("not this suanfa");
    } catch (InvalidKeySpecException e)
    {
        throw new Exception("invalid private key");
    } catch (NullPointerException e)
    {
        throw new Exception("private key is null");
    }
}

}
</pre>

問題解決(填坑)

1.通過java的RSA公鑰加密后獲得的密文前翎,在PHP中無法解密是因為JAVA和PHP加密模式和填充方式?jīng)]有統(tǒng)一
2.通過java提取私鑰時報錯私鑰格式不對,這個時候需要引入第三方算法提供商BouncyCastleProvider

于是乎

針對問題一畅涂,將加密過程RSAUtils.class中的公鑰加密函數(shù)encryptData()中的算法實例獲取
<pre>
Cipher cipher = Cipher.getInstance(RSA);
</pre>
改成
<pre>
Cipher cipher = Cipher.getInstance("RSA/ECB/PKCS1Padding");
</pre>
即指定了ECB加密模式以及PKCS1Padding填充方式


針對問題二港华,在RSAUtils.class中的私鑰加載函數(shù)loadPublicKey()中加入第三方算法提供商,以統(tǒng)一格式
<pre>
KeyFactory keyFactory = KeyFactory.getInstance(RSA);
</pre>
改成
<pre>
KeyFactory keyFactory = KeyFactory.getInstance(RSA, new BouncyCastleProvider());
</pre>

RSA算法工具類RSAUtils.class(完善版)

<pre>
public final class RSAUtils
{
static String RSA = "RSA";
public static byte[] encryptData(byte[] data, PublicKey publicKey) throws Exception
{
try
{
Cipher cipher = Cipher.getInstance("RSA/ECB/PKCS1Padding");
cipher.init(Cipher.ENCRYPT_MODE, publicKey);
return cipher.doFinal(data);
} catch (NoSuchAlgorithmException e) {
throw new Exception("無此解密算法");
} catch (NoSuchPaddingException e) {
e.printStackTrace();
return null;
}catch (InvalidKeyException e) {
throw new Exception("解密私鑰非法,請檢查");
} catch (IllegalBlockSizeException e) {
throw new Exception("密文長度非法");
} catch (BadPaddingException e) {
throw new Exception("密文數(shù)據(jù)已損壞");
}
}

public static byte[] decryptData(byte[] encryptedData, PrivateKey privateKey) throws Exception
{
    try
    {
        Cipher cipher = Cipher.getInstance("RSA/ECB/PKCS1Padding");
        cipher.init(Cipher.DECRYPT_MODE, privateKey);
        return cipher.doFinal(encryptedData);
    } catch (NoSuchAlgorithmException e) {  
        throw new Exception("無此解密算法");  
    } catch (NoSuchPaddingException e) {  
        e.printStackTrace();  
        return null;  
    }catch (InvalidKeyException e) {  
        throw new Exception("解密私鑰非法,請檢查");  
    } catch (IllegalBlockSizeException e) {  
        throw new Exception("密文長度非法");  
    } catch (BadPaddingException e) {  
        throw new Exception("密文數(shù)據(jù)已損壞");  
    }         
}

public static PublicKey getPublicKey(byte[] keyBytes) throws NoSuchAlgorithmException,
        InvalidKeySpecException
{
    X509EncodedKeySpec keySpec = new X509EncodedKeySpec(keyBytes);
    KeyFactory keyFactory = KeyFactory.getInstance(RSA);
    PublicKey publicKey = keyFactory.generatePublic(keySpec);
    return publicKey;
}

public static PrivateKey getPrivateKey(byte[] keyBytes) throws NoSuchAlgorithmException,
        InvalidKeySpecException
{
    PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(keyBytes);
    KeyFactory keyFactory = KeyFactory.getInstance(RSA);
    PrivateKey privateKey = keyFactory.generatePrivate(keySpec);
    return privateKey;
}

public static PublicKey loadPublicKey(String publicKeyStr) throws Exception
{
    try
    {
        byte[] buffer = Base64Utils.decode(publicKeyStr);
        KeyFactory keyFactory = KeyFactory.getInstance(RSA, new BouncyCastleProvider());
        X509EncodedKeySpec keySpec = new X509EncodedKeySpec(buffer);
        return (RSAPublicKey) keyFactory.generatePublic(keySpec);
    } catch (NoSuchAlgorithmException e)
    {
        throw new Exception("not this suanfa");
    } catch (InvalidKeySpecException e)
    {
        throw new Exception("invalid public key");
    } catch (NullPointerException e)
    {
        throw new Exception("public key is null");
    }
}

public static PrivateKey loadPrivateKey(String privateKeyStr) throws Exception
{
    try
    {
        byte[] buffer = Base64Utils.decode(privateKeyStr);
        PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(buffer);
        KeyFactory keyFactory = KeyFactory.getInstance(RSA, new BouncyCastleProvider());
        return (RSAPrivateKey) keyFactory.generatePrivate(keySpec);
    } catch (NoSuchAlgorithmException e)
    {
        throw new Exception("not this suanfa");
    } catch (InvalidKeySpecException e)
    {
        throw new Exception("invalid private key");
    } catch (NullPointerException e)
    {
        throw new Exception("private key is null");
    }
}

}
</pre>


在此感謝網(wǎng)友的分享

1. JAVA與PHP之間的openssl交互加密
2. Java中使用OpenSSL生成的RSA公私鑰進(jìn)行數(shù)據(jù)加解密

最后編輯于
?著作權(quán)歸作者所有,轉(zhuǎn)載或內(nèi)容合作請聯(lián)系作者
  • 序言:七十年代末午衰,一起剝皮案震驚了整個濱河市立宜,隨后出現(xiàn)的幾起案子,更是在濱河造成了極大的恐慌臊岸,老刑警劉巖橙数,帶你破解...
    沈念sama閱讀 221,695評論 6 515
  • 序言:濱河連續(xù)發(fā)生了三起死亡事件,死亡現(xiàn)場離奇詭異帅戒,居然都是意外死亡商模,警方通過查閱死者的電腦和手機,發(fā)現(xiàn)死者居然都...
    沈念sama閱讀 94,569評論 3 399
  • 文/潘曉璐 我一進(jìn)店門,熙熙樓的掌柜王于貴愁眉苦臉地迎上來施流,“玉大人响疚,你說我怎么就攤上這事〉纱祝” “怎么了忿晕?”我有些...
    開封第一講書人閱讀 168,130評論 0 360
  • 文/不壞的土叔 我叫張陵,是天一觀的道長银受。 經(jīng)常有香客問我践盼,道長,這世上最難降的妖魔是什么宾巍? 我笑而不...
    開封第一講書人閱讀 59,648評論 1 297
  • 正文 為了忘掉前任咕幻,我火速辦了婚禮,結(jié)果婚禮上顶霞,老公的妹妹穿的比我還像新娘肄程。我一直安慰自己,他們只是感情好选浑,可當(dāng)我...
    茶點故事閱讀 68,655評論 6 397
  • 文/花漫 我一把揭開白布蓝厌。 她就那樣靜靜地躺著,像睡著了一般古徒。 火紅的嫁衣襯著肌膚如雪拓提。 梳的紋絲不亂的頭發(fā)上,一...
    開封第一講書人閱讀 52,268評論 1 309
  • 那天隧膘,我揣著相機與錄音代态,去河邊找鬼。 笑死疹吃,一個胖子當(dāng)著我的面吹牛胆数,可吹牛的內(nèi)容都是我干的。 我是一名探鬼主播互墓,決...
    沈念sama閱讀 40,835評論 3 421
  • 文/蒼蘭香墨 我猛地睜開眼,長吁一口氣:“原來是場噩夢啊……” “哼蒋搜!你這毒婦竟也來了篡撵?” 一聲冷哼從身側(cè)響起,我...
    開封第一講書人閱讀 39,740評論 0 276
  • 序言:老撾萬榮一對情侶失蹤豆挽,失蹤者是張志新(化名)和其女友劉穎育谬,沒想到半個月后,有當(dāng)?shù)厝嗽跇淞掷锇l(fā)現(xiàn)了一具尸體帮哈,經(jīng)...
    沈念sama閱讀 46,286評論 1 318
  • 正文 獨居荒郊野嶺守林人離奇死亡膛檀,尸身上長有42處帶血的膿包…… 初始之章·張勛 以下內(nèi)容為張勛視角 年9月15日...
    茶點故事閱讀 38,375評論 3 340
  • 正文 我和宋清朗相戀三年,在試婚紗的時候發(fā)現(xiàn)自己被綠了。 大學(xué)時的朋友給我發(fā)了我未婚夫和他白月光在一起吃飯的照片咖刃。...
    茶點故事閱讀 40,505評論 1 352
  • 序言:一個原本活蹦亂跳的男人離奇死亡泳炉,死狀恐怖,靈堂內(nèi)的尸體忽然破棺而出嚎杨,到底是詐尸還是另有隱情花鹅,我是刑警寧澤,帶...
    沈念sama閱讀 36,185評論 5 350
  • 正文 年R本政府宣布枫浙,位于F島的核電站刨肃,受9級特大地震影響,放射性物質(zhì)發(fā)生泄漏箩帚。R本人自食惡果不足惜真友,卻給世界環(huán)境...
    茶點故事閱讀 41,873評論 3 333
  • 文/蒙蒙 一、第九天 我趴在偏房一處隱蔽的房頂上張望紧帕。 院中可真熱鬧盔然,春花似錦、人聲如沸焕参。這莊子的主人今日做“春日...
    開封第一講書人閱讀 32,357評論 0 24
  • 文/蒼蘭香墨 我抬頭看了看天上的太陽叠纷。三九已至刻帚,卻和暖如春,著一層夾襖步出監(jiān)牢的瞬間涩嚣,已是汗流浹背崇众。 一陣腳步聲響...
    開封第一講書人閱讀 33,466評論 1 272
  • 我被黑心中介騙來泰國打工, 沒想到剛下飛機就差點兒被人妖公主榨干…… 1. 我叫王不留航厚,地道東北人顷歌。 一個月前我還...
    沈念sama閱讀 48,921評論 3 376
  • 正文 我出身青樓,卻偏偏與公主長得像幔睬,于是被迫代替她去往敵國和親眯漩。 傳聞我的和親對象是個殘疾皇子,可洞房花燭夜當(dāng)晚...
    茶點故事閱讀 45,515評論 2 359

推薦閱讀更多精彩內(nèi)容