您的位置:首页 > 其它

用户登录增加密码RSA加密验证功能

2015-04-08 02:21 671 查看
用户登录增加密码RSA加密验证功能

/article/11260464.html

具体实现思路如下:

1。服务端生成公钥与私钥,保存。

2。客户端在请求到登录页面后,随机生成一字符串。

3。然后此随机字符串作为密钥加密密码,再用从服务端获取到的公钥加密生成的随机字符串。

4。将此两段密文传入服务端,服务端用私钥解出随机字符串,再用此私钥解出加密的密文。

这其中有一个关键是解决服务端的公钥,传入客户端,客户端用此公钥加密字符串后,后又能在服务端用私钥解出。

加密算法为RSA:

服务端的RSA JAVA实现

package com.camps.util;

import java.io.ByteArrayOutputStream;

import java.io.File;

import java.io.FileInputStream;

import java.io.FileOutputStream;

import java.io.ObjectInputStream;

import java.io.ObjectOutputStream;

import java.math.BigInteger;

import java.security.KeyFactory;

import java.security.KeyPair;

import java.security.KeyPairGenerator;

import java.security.NoSuchAlgorithmException;

import java.security.PrivateKey;

import java.security.PublicKey;

import java.security.SecureRandom;

import java.security.interfaces.RSAPrivateKey;

import java.security.interfaces.RSAPublicKey;

import java.security.spec.InvalidKeySpecException;

import java.security.spec.RSAPrivateKeySpec;

import java.security.spec.RSAPublicKeySpec;

import javax.crypto.Cipher;

public class RSAUtil {

/**

* 生成密钥对

*

* @return KeyPair *

* @throws EncryptException

*/

public static KeyPair generateKeyPair() throws Exception {

try {

KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance("RSA",

new org.bouncycastle.jce.provider.BouncyCastleProvider());

final int KEY_SIZE = 1024;// 没什么好说的了,这个值关系到块加密的大小,可以更改,但是不要太大,否则效率会低

keyPairGen.initialize(KEY_SIZE, new SecureRandom());

KeyPair keyPair = keyPairGen.generateKeyPair();

saveKeyPair(keyPair);

return keyPair;

} catch (Exception e) {

throw new Exception(e.getMessage());

}

}

public static KeyPair getKeyPair() throws Exception {

FileInputStream fis = new FileInputStream("D:/logs/RSAKey.txt");

ObjectInputStream oos = new ObjectInputStream(fis);

KeyPair kp = (KeyPair) oos.readObject();

oos.close();

fis.close();

return kp;

}

public static void saveKeyPair(KeyPair kp) throws Exception {

File file = new File("D:/logs/RSAKey.txt");

if(!file.exists()){

file.createNewFile();

}

FileOutputStream fos = new FileOutputStream(file);

ObjectOutputStream oos = new ObjectOutputStream(fos);

// 生成密钥

oos.writeObject(kp);

oos.close();

fos.close();

}

/**

* * 生成公钥

* @param modulus

* @param publicExponent

* @return RSAPublicKey *

* @throws Exception

*/

public static RSAPublicKey generateRSAPublicKey(byte[] modulus, byte[] publicExponent) throws Exception {

KeyFactory keyFac = null;

try {

keyFac = KeyFactory.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider());

} catch (NoSuchAlgorithmException ex) {

throw new Exception(ex.getMessage());

}

RSAPublicKeySpec pubKeySpec = new RSAPublicKeySpec(new BigInteger(modulus), new BigInteger(publicExponent));

try {

return (RSAPublicKey) keyFac.generatePublic(pubKeySpec);

} catch (InvalidKeySpecException ex) {

throw new Exception(ex.getMessage());

}

}

/**

* * 生成私钥

* @param modulus

* @param privateExponent

* @return RSAPrivateKey *

* @throws Exception

*/

public static RSAPrivateKey generateRSAPrivateKey(byte[] modulus, byte[] privateExponent) throws Exception {

KeyFactory keyFac = null;

try {

keyFac = KeyFactory.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider());

} catch (NoSuchAlgorithmException ex) {

throw new Exception(ex.getMessage());

}

RSAPrivateKeySpec priKeySpec = new RSAPrivateKeySpec(new BigInteger(modulus), new BigInteger(privateExponent));

try {

return (RSAPrivateKey) keyFac.generatePrivate(priKeySpec);

} catch (InvalidKeySpecException ex) {

throw new Exception(ex.getMessage());

}

}

/**

* * 加密

* @param key 加密的密钥 *

* @param data 待加密的明文数据 *

* @return 加密后的数据 *

* @throws Exception

*/

public static byte[] encrypt(PublicKey pk, byte[] data) throws Exception {

try {

Cipher cipher = Cipher.getInstance("RSA",new org.bouncycastle.jce.provider.BouncyCastleProvider());

cipher.init(Cipher.ENCRYPT_MODE, pk);

int blockSize = cipher.getBlockSize();// 获得加密块大小,如:加密前数据为128个byte,而key_size=1024

// 加密块大小为127 byte,加密后为128个byte;因此共有2个加密块,第一个127byte第二个为1个byte

int outputSize = cipher.getOutputSize(data.length);// 获得加密块加密后块大小

int leavedSize = data.length % blockSize;

int blocksSize = leavedSize != 0 ? data.length / blockSize + 1 : data.length / blockSize;

byte[] raw = new byte[outputSize * blocksSize];

int i = 0;

while (data.length - i * blockSize > 0) {

if (data.length - i * blockSize > blockSize)

cipher.doFinal(data, i * blockSize, blockSize, raw, i * outputSize);

else

cipher.doFinal(data, i * blockSize, data.length - i * blockSize, raw, i * outputSize);

// 这里面doUpdate方法不可用,查看源代码后发现每次doUpdate后并没有什么实际动作除了把byte[]放到

// ByteArrayOutputStream中,而最后doFinal的时候才将所有的byte[]进行加密,可是到了此时加密块大小很可能已经超出了

// OutputSize所以只好用dofinal方法。

i++;

}

return raw;

} catch (Exception e) {

throw new Exception(e.getMessage());

}

}

/**

* 解密

* @param key 解密的密钥 *

* @param raw 已经加密的数据 *

* @return 解密后的明文 *

* @throws Exception

*/

public static byte[] decrypt(PrivateKey pk, byte[] raw) throws Exception {

try {

Cipher cipher = Cipher.getInstance("RSA", new org.bouncycastle.jce.provider.BouncyCastleProvider());

cipher.init(Cipher.DECRYPT_MODE, pk);

int blockSize = cipher.getBlockSize();

ByteArrayOutputStream bout = new ByteArrayOutputStream(64);

int j = 0;

while (raw.length - j * blockSize > 0) {

bout.write(cipher.doFinal(raw, j * blockSize, blockSize));

j++;

}

return bout.toByteArray();

} catch (Exception e) {

throw new Exception(e.getMessage());

}

}

public static void main(String[] args) throws Exception {

RSAPublicKey rsap = (RSAPublicKey) RSAUtil.generateKeyPair().getPublic();

String test = "hello world";

byte[] en_test = encrypt(getKeyPair().getPublic(), test.getBytes());

byte[] de_test = decrypt(getKeyPair().getPrivate(), en_test);

System.out.println(new String(de_test));

}

}

2.页面

使用的JS : http://www.ohdave.com/rsa/

<%@ page language="java" pageEncoding="UTF-8"%>

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<head>

<title>login</title>

<meta http-equiv="pragma" content="no-cache">

<meta http-equiv="cache-control" content="no-cache">

<meta http-equiv="expires" content="0">

<meta http-equiv="keywords" content="keyword1,keyword2,keyword3">

<meta http-equiv="description" content="This is my page">

<script type="text/javascript" src="js/RSA.js"></script>

<script type="text/javascript" src="js/BigInt.js"></script>

<script type="text/javascript" src="js/Barrett.js"></script>

<script type="text/javascript">

var key;

function rsalogin(){

bodyRSA();

//如果是有中文 先使用 encodeURIComponent() 函数对中文进行编码,再加密。

// 解密后,使用 java.net.Decoder.decode(str, "UTF-8") 进行中文还原。

var pwd = document.getElementById("pwd").value;

var result = encryptedString(key, pwd);

document.getElementById("result").value=result;

document.getElementById('loginForm').submit();

}

function bodyRSA(){

setMaxDigits(130);

key = new RSAKeyPair('<%=request.getAttribute("e")%>',"",'<%=request.getAttribute("m")%>');

}

</script>

</head>

<body>

<form id="loginForm" action="rsa" method="post">

<table border="0">

<tr>

<td>command:</td>

<td><input type="text" name="command" value="login"/></td>

</tr>

<tr>

<td>result:</td>

<td><input id="result" type="text" name="result" value=""/></td>

</tr>

<tr>

<td>Login:</td>

<td><input type="text" name="username" value="username"/></td>

</tr>

<tr>

<td>Password:</td>

<td><input id="pwd" type="text" name="password" value="password"/></td>

</tr>

<tr>

<td colspan="2" align="center">

<input type="button" value="SUBMIT" onclick="rsalogin();" />

</td>

</tr>

<tr>

<td>message:</td>

<td colspan="2" align="center">

<%=request.getAttribute("message")%>

</td>

</tr>

</table>

</form>

</body>

3. Servlet

package com.camps.servlet;

import java.io.IOException;

import java.math.BigInteger;

import java.security.interfaces.RSAPublicKey;

import javax.servlet.ServletException;

import javax.servlet.http.HttpServlet;

import javax.servlet.http.HttpServletRequest;

import javax.servlet.http.HttpServletResponse;

import com.camps.util.RSAUtil;

public class RSAServlet extends HttpServlet {

private static final long serialVersionUID = 6142301428199861862L;

public void doGet(HttpServletRequest request, HttpServletResponse response)

throws ServletException, IOException {

doPost(request, response);

}

public void doPost(HttpServletRequest request, HttpServletResponse response)

throws ServletException, IOException {

try {

String command = request.getParameter("command");

if("index".equals(command)){

System.out.println("GO INDEX");

RSAPublicKey rsap = (RSAPublicKey) RSAUtil.getKeyPair().getPublic();

String module = rsap.getModulus().toString(16);

String empoent = rsap.getPublicExponent().toString(16);

System.out.println("index==module=" + module);

System.out.println("index==empoent=" + empoent);

request.setAttribute("m", module);

request.setAttribute("e", empoent);

request.getRequestDispatcher("login.jsp").forward(request, response);

//通过此action进入登录页面,并传入公钥的 Modulus 与PublicExponent的hex编码形式

}else{

System.out.println("GO DECRYPT");

String result = request.getParameter("result");

System.out.println("原文加密后为:" + result);

//有的时候你会发现数组en_result长度129,第一个元素为0,这肯定是不正确的!解决办法:自己写一个16进制转字节数组的方法

byte[] en_result = new BigInteger(result, 16).toByteArray();

System.out.println("转成byte[]"+new String(en_result));

byte[] de_result = RSAUtil.decrypt(RSAUtil.getKeyPair().getPrivate(),en_result);

System.out.println("还原密文:");

System.out.println(new String(de_result));

StringBuffer sb = new StringBuffer();

sb.append(new String(de_result));

System.out.println(sb.reverse().toString());

request.setAttribute("message", sb.toString());

request.getRequestDispatcher("login.jsp").forward(request, response);

}

} catch (Exception e) {

e.printStackTrace();

}

}

}

4.web.xml

<servlet>

<servlet-name>RSA</servlet-name>

<servlet-class>com.camps.servlet.RSAServlet</servlet-class>

</servlet>

<servlet-mapping>

<servlet-name>RSA</servlet-name>

<url-pattern>/rsa</url-pattern>

</servlet-mapping>
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签: 
相关文章推荐