diff --git a/libs/bcprov-jdk16-1.46.jar b/libs/bcprov-jdk16-1.46.jar new file mode 100644 index 0000000..27d3481 Binary files /dev/null and b/libs/bcprov-jdk16-1.46.jar differ diff --git a/src/com/zftlive/android/library/tools/security/RSA.java b/src/com/zftlive/android/library/tools/security/RSA.java new file mode 100644 index 0000000..44da3c6 --- /dev/null +++ b/src/com/zftlive/android/library/tools/security/RSA.java @@ -0,0 +1,273 @@ + +package com.zftlive.android.library.tools.security; + +import org.bouncycastle.jce.provider.BouncyCastleProvider; + +import java.io.ByteArrayOutputStream; +import java.math.BigInteger; +import java.security.Key; +import java.security.KeyFactory; +import java.security.KeyPair; +import java.security.KeyPairGenerator; +import java.security.NoSuchAlgorithmException; +import java.security.SecureRandom; +import java.security.interfaces.RSAPrivateKey; +import java.security.interfaces.RSAPublicKey; +import java.security.spec.InvalidKeySpecException; +import java.security.spec.RSAPrivateKeySpec; +import java.security.spec.RSAPublicKeySpec; + +import javax.crypto.Cipher; + +/** + * RSA加密解密工具类
+ * RSA加密速度比DES慢很多,适合少量数据加密,生成秘钥对需要引入开源加解密方案bouncycastle,不能使用默认缺省的实现获取秘钥对,Android + * 、Windows不同平台默认算法不一样(DES/RSA都一样,MD5都一样)
+ * + * 目前被破解的最长RSA密钥是768个二进制位,RSA密钥一般是1024位,重要场合则为2048位,密钥长度越大加密越慢越安全,也容易OOM RSA + * 工具类。提供加密,解密,生成密钥对等方法。 需要到http://www.bouncycastle.org下载bcprov-jdk14-123.jar。 + * RSA加密原理概述 RSA的安全性依赖于大数的分解,公钥和私钥都是两个大素数(大于100的十进制位)的函数。 + * 据猜测,从一个密钥和密文推断出明文的难度等同于分解两个大素数的积
+ * ===================================================================
+ * (该算法的安全性未得到理论的证明)
+ * ===================================================================
+ * 密钥的产生:
+ * 1.选择两个大素数 p,q ,计算 n=p*q;
+ * 2.随机选择加密密钥 e ,要求 e 和 (p-1)*(q-1)互质
+ * 3.利用 Euclid算法计算解密密钥 d , 使其满足 e*d = 1(mod(p-1)*(q-1)) (其中 n,d 也要互质)
+ * 4:至此得出公钥为 (n,e)私钥为(n,d)
+ * ===================================================================
+ * 加解密方法:
+ * 1.首先将要加密的信息 m(二进制表示) 分成等长的数据块 m1,m
+ * 2,...,mi 块长 s(尽可能大) ,其中2^s + * 3:解密时作如下计算: mi = ci^d(mod n)
+ * ===================================================================
+ * RSA速度 + * 由于进行的都是大数计算,使得RSA最快的情况也比DES慢上100倍,无论 是软件还是硬件实现。 速度一直是RSA的缺陷。一般来说只用于少量数据 加密。
+ * 参考文献:
+ * http://repo1.maven.org/maven2/org/bouncycastle/ + * http://www.ruanyifeng.com/blog/2013/06/rsa_algorithm_part_one.html
+ * http://blog.csdn.net/yanzi1225627/article/details/26508035
+ * http://blog.csdn.net/bbld_/article/details/38777491
+ * + * @author 曾繁添 + * @version 1.0 + */ +public class RSA { + + /** + * 生成密钥对(公钥和私钥) + * + * @param mKeySize 密钥长度,默认1024 + * @return KeyPair 密钥对,包含公钥和私钥 + * @throws Exception 生成秘钥对异常 + */ + public static KeyPair genKeyPair(int mKeySize) throws Exception { + KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", new BouncyCastleProvider()); + kpg.initialize(mKeySize, new SecureRandom()); + return kpg.genKeyPair(); + } + + public void testRSA() { + try { + String str = "yanzi1225627"; + RSAPublicKey pubKey = getRSAPublicKey(); + RSAPrivateKey priKey = getRSAPrivateKey(); + byte[] enRsaBytes = encrypt(pubKey, str.getBytes()); + String enRsaStr = new String(enRsaBytes, "UTF-8"); + System.out.println("加密后==" + enRsaStr); + System.out.println("解密后=="+ new String(decrypt(priKey, encrypt(pubKey, str.getBytes())))); + } catch (Exception e) { + e.printStackTrace(); + } + } + + // 密钥对 + private KeyPair keyPair = null; + + /** + * 初始化密钥对 + */ + public void init() { + try { + this.keyPair = this.generateKeyPair(); + } catch (Exception e) { + e.printStackTrace(); + } + } + + /** + * 生成密钥对 + * + * @return KeyPair + * @throws Exception + */ + private KeyPair generateKeyPair() throws Exception { + try { + KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance("RSA", + new BouncyCastleProvider()); + // 这个值关系到块加密的大小,可以更改,但是不要太大,否则效率会低 + final int KEY_SIZE = 1024; + keyPairGen.initialize(KEY_SIZE, new SecureRandom()); + KeyPair keyPair = keyPairGen.genKeyPair(); + return keyPair; + } catch (Exception e) { + throw new Exception(e.getMessage()); + } + + } + + /** + * 生成公钥 + * + * @param modulus + * @param publicExponent + * @return RSAPublicKey + * @throws Exception + */ + private RSAPublicKey generateRSAPublicKey(byte[] modulus, byte[] publicExponent) + throws Exception { + + KeyFactory keyFac = null; + try { + keyFac = KeyFactory.getInstance("RSA", new BouncyCastleProvider()); + } catch (NoSuchAlgorithmException ex) { + throw new Exception(ex.getMessage()); + } + RSAPublicKeySpec pubKeySpec = new RSAPublicKeySpec(new BigInteger(modulus), new BigInteger( + publicExponent)); + try { + return (RSAPublicKey) keyFac.generatePublic(pubKeySpec); + } catch (InvalidKeySpecException ex) { + throw new Exception(ex.getMessage()); + } + + } + + /** + * 生成私钥 + * + * @param modulus + * @param privateExponent + * @return RSAPrivateKey + * @throws Exception + */ + private RSAPrivateKey generateRSAPrivateKey(byte[] modulus, byte[] privateExponent) + throws Exception { + KeyFactory keyFac = null; + try { + keyFac = KeyFactory.getInstance("RSA", new BouncyCastleProvider()); + } catch (NoSuchAlgorithmException ex) { + throw new Exception(ex.getMessage()); + } + RSAPrivateKeySpec priKeySpec = new RSAPrivateKeySpec(new BigInteger(modulus), + new BigInteger(privateExponent)); + try { + return (RSAPrivateKey) keyFac.generatePrivate(priKeySpec); + } catch (InvalidKeySpecException ex) { + throw new Exception(ex.getMessage()); + } + } + + /** + * 返回公钥 + * + * @return + * @throws Exception + */ + public RSAPublicKey getRSAPublicKey() throws Exception { + + // 获取公钥 + RSAPublicKey pubKey = (RSAPublicKey) keyPair.getPublic(); + // 获取公钥系数(字节数组形式) + byte[] pubModBytes = pubKey.getModulus().toByteArray(); + // 返回公钥公用指数(字节数组形式) + byte[] pubPubExpBytes = pubKey.getPublicExponent().toByteArray(); + // 生成公钥 + RSAPublicKey recoveryPubKey = this.generateRSAPublicKey(pubModBytes, pubPubExpBytes); + return recoveryPubKey; + } + + /** + * 获取私钥 + * + * @return + * @throws Exception + */ + public RSAPrivateKey getRSAPrivateKey() throws Exception { + + // 获取私钥 + RSAPrivateKey priKey = (RSAPrivateKey) keyPair.getPrivate(); + // 返回私钥系数(字节数组形式) + byte[] priModBytes = priKey.getModulus().toByteArray(); + // 返回私钥专用指数(字节数组形式) + byte[] priPriExpBytes = priKey.getPrivateExponent().toByteArray(); + // 生成私钥 + RSAPrivateKey recoveryPriKey = this.generateRSAPrivateKey(priModBytes, priPriExpBytes); + return recoveryPriKey; + } + + /** + * 加密 + * + * @param key 加密的密钥 + * @param data 待加密的明文数据 + * @return 加密后的数据 + * @throws Exception + */ + public byte[] encrypt(Key key, byte[] data) throws Exception { + try { + Cipher cipher = Cipher.getInstance("RSA", new BouncyCastleProvider()); + cipher.init(Cipher.ENCRYPT_MODE, key); + // 获得加密块大小,如:加密前数据为128个byte,而key_size=1024 加密块大小为127 + // byte,加密后为128个byte; + // 因此共有2个加密块,第一个127 byte第二个为1个byte + int blockSize = cipher.getBlockSize(); + int outputSize = cipher.getOutputSize(data.length);// 获得加密块加密后块大小 + int leavedSize = data.length % blockSize; + int blocksSize = leavedSize != 0 ? data.length / blockSize + 1 : data.length + / blockSize; + byte[] raw = new byte[outputSize * blocksSize]; + int i = 0; + while (data.length - i * blockSize > 0) { + if (data.length - i * blockSize > blockSize) + cipher.doFinal(data, i * blockSize, blockSize, raw, i * outputSize); + else + cipher.doFinal(data, i * blockSize, data.length - i * blockSize, raw, i + * outputSize); + // 这里面doUpdate方法不可用,查看源代码后发现每次doUpdate后并没有什么实际动作除了把byte[]放到ByteArrayOutputStream中 + // ,而最后doFinal的时候才将所有的byte[]进行加密,可是到了此时加密块大小很可能已经超出了OutputSize所以只好用dofinal方法。 + i++; + } + return raw; + } catch (Exception e) { + throw new Exception(e.getMessage()); + } + } + + /** + * 解密 + * + * @param key 解密的密钥 + * @param raw 已经加密的数据 + * @return 解密后的明文 + * @throws Exception + */ + public byte[] decrypt(Key key, byte[] raw) throws Exception { + try { + Cipher cipher = Cipher.getInstance("RSA", new BouncyCastleProvider()); + cipher.init(cipher.DECRYPT_MODE, key); + int blockSize = cipher.getBlockSize(); + ByteArrayOutputStream bout = new ByteArrayOutputStream(64); + int j = 0; + while (raw.length - j * blockSize > 0) { + bout.write(cipher.doFinal(raw, j * blockSize, blockSize)); + j++; + } + return bout.toByteArray(); + } catch (Exception e) { + throw new Exception(e.getMessage()); + } + } + +}