您的位置:首页 > 编程语言 > Java开发

WDSsoft免费源代码,java加密解密编程常用工具包 JCT 1.0 (整理)

2004-12-06 22:02 891 查看
package jct;

import java.security.*;

/**
* <p>计算字符串和byte[]的数字摘要 </p>
* @Copyright:WDSsoft
* @ad:WDSsoft “企业多级数字签名系统”- 最佳的企业电子文档多级数字签名方案
*/
public class Digest {



/**
* 计算字符串的SHA数字摘要,以byte[]形式返回
**/
public static byte[] MdigestSHA(String source){
byte[] nullreturn={0} ;
try{
MessageDigest thisMD=MessageDigest.getInstance("SHA");
byte[] digest=thisMD.digest(source.getBytes("UTF8"));
return digest;
} catch(Exception e){return null;}
}
/**
* 计算byte[]的SHA数字摘要,以byte[]形式返回
**/
public static byte[] MdigestSHA(byte[] source){
byte[] nullreturn={0} ;
try{
MessageDigest thisMD=MessageDigest.getInstance("SHA");
byte[] digest=thisMD.digest(source);
return digest;
} catch(Exception e){return null;}
}
/**
* 计算字符串的MD5数字摘要,以byte[]形式返回
**/
public static byte[] MdigestMD5(String source){
byte[] nullreturn={0} ;
try{
MessageDigest thisMD=MessageDigest.getInstance("MD5");
byte[] digest=thisMD.digest(source.getBytes("UTF8"));
return digest;
} catch(Exception e){return null;}
}
/**
* 计算byte[]的数MD5字摘要,以byte[]形式返回
**/
public static byte[] MdigestMD5(byte[] source){
byte[] nullreturn={0} ;
try{
MessageDigest thisMD=MessageDigest.getInstance("MD5");
byte[] digest=thisMD.digest(source);
return digest;
} catch(Exception e){return null;}
}
public static void main(String[] args){
String test="WDSsoft";

byte[] t1=MdigestSHA(test);
for(int i=0;i<t1.length;i++){
System.out.print(Integer.toString(Math.abs(t1[i])));
}
System.exit(0);
}

}



package jct;

import javax.crypto.*;
import javax.crypto.spec.*;
import java.security.Key;
import java.security.KeyFactory;
import java.security.spec.EncodedKeySpec;
import java.security.Security;
import java.util.Random;
import java.util.Vector;

/**
* <p>封装同PBE(基于口令的加密)算法有关的方法,可用使用PBE算法加密和解密</p>
* @Copyright:WDSsoft
*/

public class PBETool
{

public PBETool() { }
/**
*测试
*/
public static void main(String[] args)
{
String tt=new String("java");
char[] password=tt.toCharArray();
byte[] pp;
PBETool pbe=new PBETool();
try{

pp=pbe.PBEunwrap(pbe.PBEwrap(tt.getBytes("UTF8"),password),password);
System.out.print(new String(pp));

}
catch(Exception e){}
}
/**
* 使用PBE加密byte[],随即撒盐,和unwrap方法配套使用
* @param byte[] target:PBE加密对象
* @param char[] password: PBE加密口令
* @return Object[] object[0]1:byte[]:密文; object[1]:byte[]:盐
*/
public Object[] PBEwrap(byte[] target,char[] password){
try{

PBEKeySpec keySpec=new PBEKeySpec(password);
SecretKeyFactory keyFactory=SecretKeyFactory.getInstance("PBEWithMD5AndDES");
SecretKey key=keyFactory.generateSecret(keySpec);
Cipher cipher=Cipher.getInstance("PBEWithMD5AndDES");
byte[] salt=new byte[8];
Random random=new Random();
random.nextBytes(salt);
PBEParameterSpec paramSpec=new PBEParameterSpec(salt,100);
cipher.init(cipher.ENCRYPT_MODE,key,paramSpec);
Object[] encryptedByte=new Object[2];
encryptedByte[0]=cipher.doFinal(target);
encryptedByte[1]=salt;
return encryptedByte;

}catch(Exception e){e.printStackTrace();
return null;
}
}
/**
* 使用PBE加密byte[],撒固定的盐,和unwrape_2配套使用
* @param byte[] target:PBE加密对象
* @param char[] password: PBE加密口令
* @return byte[] :加密后的密文
*/
public byte[] PBEwrap_2(byte[] target,char[] password){
try{
PBEKeySpec keySpec=new PBEKeySpec(password);
SecretKeyFactory keyFactory=SecretKeyFactory.getInstance("PBEWithMD5AndDES");
SecretKey key=keyFactory.generateSecret(keySpec);
Cipher cipher=Cipher.getInstance("PBEWithMD5AndDES");
//固定的盐,实际试用时可自行更改盐,但要和unwrape_2一致
byte[] salt=new byte[8];
salt[2]=salt[4]=salt[7]=11;
salt[1]=salt[3]=salt[5]=36;
salt[0]=10;
PBEParameterSpec paramSpec=new PBEParameterSpec(salt,100);
cipher.init(cipher.ENCRYPT_MODE,key,paramSpec);
return cipher.doFinal(target);

}catch(Exception e){e.printStackTrace();
return null;
}
}



/**
* PBE解密,和wrap配套使用
* @param Object[] encrypted: object[0] byte[]:密文 object[1]:byte[]:盐
* @param char[] password:口令
* @return byte[] 明文
*/
public byte[] PBEunwrap(Object[] encrypted,char[] password){
try{

byte[] wraped=(byte[])encrypted[0];
byte[] salt=(byte[])encrypted[1];
PBEKeySpec keySpec=new PBEKeySpec(password);
SecretKeyFactory keyFactory=SecretKeyFactory.getInstance("PBEWithMD5AndDES");
SecretKey key=keyFactory.generateSecret(keySpec);
Cipher cipher=Cipher.getInstance("PBEWithMD5AndDES");
PBEParameterSpec paramSpec=new PBEParameterSpec(salt,100);
cipher.init(cipher.DECRYPT_MODE,key,paramSpec);
return cipher.doFinal(wraped);

}catch(Exception e){

return null;}
}

/**
* PBE解密,和wrap_2配套使用
* @param byte[] encrypted:密文
* @param char[] password:口令
* @return byte[] 明文
*/

public byte[] PBEunwrap_2(byte[] encrypted,char[] password){
try{

byte[] wraped=encrypted;

//固定的盐,实际试用时可自行更改盐,但要和unwrap_2一致
byte[] salt=new byte[8];
salt[2]=salt[4]=salt[7]=11;
salt[1]=salt[3]=salt[5]=36;
salt[0]=10;
PBEKeySpec keySpec=new PBEKeySpec(password);
SecretKeyFactory keyFactory=SecretKeyFactory.getInstance("PBEWithMD5AndDES");
SecretKey key=keyFactory.generateSecret(keySpec);
Cipher cipher=Cipher.getInstance("PBEWithMD5AndDES");
PBEParameterSpec paramSpec=new PBEParameterSpec(salt,100);
cipher.init(cipher.DECRYPT_MODE,key,paramSpec);
return cipher.doFinal(wraped);

}catch(Exception e){

return null;}
}
}



package jct;

import java.security.KeyFactory;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.Signature;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.SecureRandom;
import java.security.spec.PKCS8EncodedKeySpec;
import java.security.spec.X509EncodedKeySpec;
import java.security.Security;
import javax.crypto.Cipher;

/**
* <p>封装同RSA非对称加密算法有关的方法,可用于数字签名,RSA加密解密</p>
* @Copyright:WDSsoft
*/

public class RSATool {

public RSATool() { }

/**
* 用一个已打包成byte[]形式的私钥加密数据,即数字签名
* @param keyInByte 打包成byte[]的私钥
* @param source 要签名的数据,一般应是数字摘要
* @return 签名 byte[]
*/
public static byte[] sign(byte[] keyInByte,byte[] source){
try{
PKCS8EncodedKeySpec priv_spec=new PKCS8EncodedKeySpec(keyInByte);
KeyFactory mykeyFactory=KeyFactory.getInstance("RSA");
PrivateKey privKey= mykeyFactory.generatePrivate(priv_spec);
Signature sig=Signature.getInstance("SHA1withRSA");
sig.initSign(privKey);
sig.update(source);
return sig.sign();
}catch(Exception e){ return null; }
}
/**
* 验证数字签名
* @param keyInByte 打包成byte[]形式的公钥
* @param source 原文的数字摘要
* @param sign 签名(对原文的数字摘要的签名)
* @return 是否证实 boolean
*/
public static boolean verify(byte[] keyInByte,byte[] source,byte[] sign){
try{
KeyFactory mykeyFactory=KeyFactory.getInstance("RSA");
Signature sig=Signature.getInstance("SHA1withRSA");
X509EncodedKeySpec pub_spec=new X509EncodedKeySpec(keyInByte);
PublicKey pubKey=mykeyFactory.generatePublic(pub_spec);
sig.initVerify(pubKey);
sig.update(source);
return sig.verify(sign);
}catch(Exception e){
return false;
}
}
/**
* 建立新的密钥对,返回打包的byte[]形式私钥和公钥
* @return 包含打包成byte[]形式的私钥和公钥的object[],其中,object[0]为私钥byte[],object[1]为工要byte[]
*/
public static Object[] giveRSAKeyPairInByte(){
KeyPair newKeyPair=creatmyKey();
if(newKeyPair==null)return null;
Object[] re=new Object[2];
if(newKeyPair!=null){
PrivateKey priv=newKeyPair.getPrivate();
byte[] b_priv = priv.getEncoded();
PublicKey pub=newKeyPair.getPublic();
byte[] b_pub=pub.getEncoded();
re[0]=b_priv;
re[1]=b_pub;
return re;
}
return null;
}

/**
* 新建密钥对
* @return KeyPair对象
*/
public static KeyPair creatmyKey(){
KeyPair myPair;
long mySeed;
mySeed=System.currentTimeMillis();
try{
KeyPairGenerator keyGen=KeyPairGenerator.getInstance("RSA");
SecureRandom random=SecureRandom.getInstance("SHA1PRNG","SUN");
random.setSeed(mySeed);
keyGen.initialize(1024,random);
myPair=keyGen.generateKeyPair();
}catch(Exception e1){ return null; }
return myPair;
}

/**
* 使用RSA公钥加密数据
* @param pubKeyInByte 打包的byte[]形式公钥
* @param data 要加密的数据
* @return 加密数据
*/
public static byte[] encryptByRSA(byte[] pubKeyInByte,byte[] data){
try{
KeyFactory mykeyFactory=KeyFactory.getInstance("RSA");
X509EncodedKeySpec pub_spec=new X509EncodedKeySpec(pubKeyInByte);
PublicKey pubKey=mykeyFactory.generatePublic(pub_spec);
Cipher cipher=Cipher.getInstance("RSA/ECB/PKCS1Padding");
cipher.init(Cipher.ENCRYPT_MODE,pubKey);
return cipher.doFinal(data);
}catch(Exception e){ return null; }
}
/**
* 用RSA私钥解密
* @param privKeyInByte 私钥打包成byte[]形式
* @param data 要解密的数据
* @return 解密数据
*/
public static byte[] decryptByRSA(byte[] privKeyInByte,byte[] data){
try{
PKCS8EncodedKeySpec priv_spec=new PKCS8EncodedKeySpec(privKeyInByte);
KeyFactory mykeyFactory=KeyFactory.getInstance("RSA");
PrivateKey privKey= mykeyFactory.generatePrivate(priv_spec);
Cipher cipher=Cipher.getInstance("RSA/ECB/PKCS1Padding");
cipher.init(Cipher.DECRYPT_MODE,privKey);
return cipher.doFinal(data);
}catch(Exception e){ return null; }

}
/**
*测试
*/
public static void main(String[] args) {
try{

Object[] v=giveRSAKeyPairInByte();
byte[] source=Digest.MdigestSHA("haha");
byte[] sign=sign((byte[])v[0],source);
boolean yes=verify((byte[])v[1],source,sign);
if(yes) System.out.print("verify/n");
}catch(Exception e){e.printStackTrace();}

}
}



package jct;

import javax.crypto.*;
import javax.crypto.spec.*;
import java.security.Key;
import java.security.KeyFactory;
import java.security.spec.EncodedKeySpec;
import java.security.Security;
import java.security.*;
import java.util.Random;
import java.util.Vector;

/**
* <p>封装同Blowfish对称加密算法有关的方法,包括了使用创建Blowfish密码,使用Blowfish加密、解密, 使用PBE(基于口令的加密)存取blowfiwsh密码 </p>
* @Copyright:WDSsoft
*/



public class BlowfishTool {

public BlowfishTool() {
}
/**
* 使用Blowfish加密
* @param Key key:密码
* @param byte[] text:明文
* @return byte[]:密文
*/
public static byte[] encryptReturnByte(Key key,byte[] text){
try{
Cipher cipher=Cipher.getInstance("Blowfish/ECB/PKCS5Padding");
cipher.init(Cipher.ENCRYPT_MODE,key);
return cipher.doFinal(text);
}catch(Exception e){ return null; }
}
/**
* Blowfish解密
* @param Key key:密码
* @param byte[] text:密文
* @return byte[] : 明文
*/
public static byte[] decryptReturnByte(Key key,byte[] text){
try{
Cipher cipher=Cipher.getInstance("Blowfish/ECB/PKCS5Padding");
cipher.init(Cipher.DECRYPT_MODE,key);
return cipher.doFinal(text);
}catch(Exception e){ return null;}
}
/**
* 使用PBE保管Blowfish密码
* @param Key targetKey: Blowfish密码
* @param char[] password: 口令
* @return Vector-element1:byte[]:密文-element2:byte[]:盐
*/

public static Vector wrapKey(Key targetKey,char[] password){
try{
PBEKeySpec keySpec=new PBEKeySpec(password);
SecretKeyFactory keyFactory=SecretKeyFactory.getInstance("PBEWithMD5AndDES");
SecretKey key=keyFactory.generateSecret(keySpec);
Cipher cipher=Cipher.getInstance("PBEWithMD5AndDES");
byte[] salt=new byte[8];
Random random=new Random();
random.nextBytes(salt);
PBEParameterSpec paramSpec=new PBEParameterSpec(salt,100);
cipher.init(cipher.WRAP_MODE,key,paramSpec);
Vector encryptedKey=new Vector();
encryptedKey.addElement(cipher.wrap(targetKey));
encryptedKey.addElement(salt);
return encryptedKey;
}catch(Exception e){e.printStackTrace();
return null;
}
}
/**
* 取出PBE加密的密钥
* @param Vector encryptedKey-element1:byte[]:密文-element2:byte[]:盐
* @param char[] password:口令
* @return Key:Blowfish密码
*/
public static Key unwrapKey(Vector encryptedKey,char[] password){
try{

byte[] wrapedKey=(byte[])encryptedKey.elementAt(0);
byte[] salt=(byte[])encryptedKey.elementAt(1);
PBEKeySpec keySpec=new PBEKeySpec(password);
SecretKeyFactory keyFactory=SecretKeyFactory.getInstance("PBEWithMD5AndDES");
SecretKey key=keyFactory.generateSecret(keySpec);
Cipher cipher=Cipher.getInstance("PBEWithMD5AndDES");
PBEParameterSpec paramSpec=new PBEParameterSpec(salt,100);
cipher.init(cipher.UNWRAP_MODE,key,paramSpec);
return cipher.unwrap(wrapedKey,"Blowfish",cipher.SECRET_KEY);
}catch(Exception e){ return null; }
}
/**
* 产生一个Blowfish密码
* @return Key Blowfish 密码
*/
public static Key creatKey(){
try{
KeyGenerator keyGenerator=KeyGenerator.getInstance("Blowfish");
keyGenerator.init(128);
Key key=keyGenerator.generateKey();
return key;
}catch(Exception e){return null;}
}

/**
* 将Blowfish密码Key 对象转为byte[] 形式
* @param Key Blowfish密码Key 对象
* @return byte[]形式Blowfish密码
*/
public static byte[] encodeKey(Key key){
return key.getEncoded();
}

/**
* 将byte[] 形式Blowfish密码转为Key 对象
* @param byte[] 形式Blowfish密码
* @return Key Blowfish密码Key 对象
*/
public static Key decodeKey(byte[] keyByteCode){
SecretKeySpec myKey=new SecretKeySpec(keyByteCode,"Blowfish");
return myKey;
}

}



package jct;

/**
*<p>WDSsoft免费源代码,java加密解密编程常用工具包 JCT 1.0<p><br>
* WDSsoft的企业多级数字签名系统(MDSS)-目前最佳的企业文档数字签名系统<br>
*/

public class _Readme {

}
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签: