前言
前段時間看到一篇文章講如何保證API呼叫時資料的安全性(傳送門:https://blog.csdn.net/ityouknow/article/details/80603617),文中講到利用RSA來加密傳輸AES的祕鑰,用AES來加密資料,並提供如下思路:
說人話就是前、後端各自生成自己的RSA祕鑰對(公鑰、私鑰),然後交換公鑰(後端給前端的是正常的明文公鑰,前端給後端的是用後端公鑰加密後的密文公鑰;PS:其實我覺得直接交換兩個明文公鑰就行了),後端生成AES的明文key,用明文key進行AES加密得到密文資料,用前端的公鑰進行RSA加密得到密文key,API互動時並將密文資料與密文key進行傳輸,前端用自己的私鑰進行RAS解密的到明文key,用明文key進行AES解密得到明文資料;前端給後端傳送資料時同理,這樣一來,傳輸的資料都是密文,且只有祕鑰才能解密
可惜這篇部落格只提供了思路,但並沒有具體的程式碼,我們在網上查詢一下資料,開始生擼程式碼,實現一個前後端API互動資料加密——AES與RSA混合加密,並應用到專案中
後端加、解密
從網上查詢工具類,再進行改造
先引入Base64工具類
<!-- Base64編碼需要 --> <dependency> <groupId>org.apache.directory.studio</groupId> <artifactId>org.apache.commons.codec</artifactId> <version>1.8</version> </dependency>
AES
package cn.huanzi.ims.util; import org.apache.tomcat.util.codec.binary.Base64; import org.bouncycastle.jce.provider.BouncyCastleProvider; import javax.crypto.Cipher; import javax.crypto.spec.SecretKeySpec; import java.nio.charset.StandardCharsets; import java.security.SecureRandom; import java.util.Random; /** * AES加、解密演算法工具類 */ public class AesUtil { /** * 加密演算法AES */ private static final String KEY_ALGORITHM = "AES"; /** * key的長度,Wrong key size: must be equal to 128, 192 or 256 * 傳入時需要16、24、36 */ private static final Integer KEY_LENGTH = 16 * 8; /** * 演算法名稱/加密模式/資料填充方式 * 預設:AES/ECB/PKCS5Padding */ private static final String ALGORITHMS = "AES/ECB/PKCS5Padding"; /** * 後端AES的key,由靜態程式碼塊賦值 */ public static String key; static { key = getKey(); } /** * 獲取key */ public static String getKey() { StringBuilder uid = new StringBuilder(); //產生16位的強隨機數 Random rd = new SecureRandom(); for (int i = 0; i < KEY_LENGTH / 8; i++) { //產生0-2的3位隨機數 int type = rd.nextInt(3); switch (type) { case 0: //0-9的隨機數 uid.append(rd.nextInt(10)); break; case 1: //ASCII在65-90之間為大寫,獲取大寫隨機 uid.append((char) (rd.nextInt(25) + 65)); break; case 2: //ASCII在97-122之間為小寫,獲取小寫隨機 uid.append((char) (rd.nextInt(25) + 97)); break; default: break; } } return uid.toString(); } /** * 加密 * * @param content 加密的字串 * @param encryptKey key值 */ public static String encrypt(String content, String encryptKey) throws Exception { //設定Cipher物件 Cipher cipher = Cipher.getInstance(ALGORITHMS,new BouncyCastleProvider()); cipher.init(Cipher.ENCRYPT_MODE, new SecretKeySpec(encryptKey.getBytes(), KEY_ALGORITHM)); //呼叫doFinal byte[] b = cipher.doFinal(content.getBytes(StandardCharsets.UTF_8)); // 轉base64 return Base64.encodeBase64String(b); } /** * 解密 * * @param encryptStr 解密的字串 * @param decryptKey 解密的key值 */ public static String decrypt(String encryptStr, String decryptKey) throws Exception { //base64格式的key字串轉byte byte[] decodeBase64 = Base64.decodeBase64(encryptStr); //設定Cipher物件 Cipher cipher = Cipher.getInstance(ALGORITHMS,new BouncyCastleProvider()); cipher.init(Cipher.DECRYPT_MODE, new SecretKeySpec(decryptKey.getBytes(), KEY_ALGORITHM)); //呼叫doFinal解密 byte[] decryptBytes = cipher.doFinal(decodeBase64); return new String(decryptBytes); } }
RSA
package cn.huanzi.ims.util; import org.apache.commons.codec.binary.Base64; import javax.crypto.Cipher; import java.io.ByteArrayOutputStream; import java.security.Key; import java.security.KeyFactory; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.interfaces.RSAPrivateKey; import java.security.interfaces.RSAPublicKey; import java.security.spec.PKCS8EncodedKeySpec; import java.security.spec.X509EncodedKeySpec; import java.util.HashMap; import java.util.Map; /** * RSA加、解密演算法工具類 */ public class RsaUtil { /** * 加密演算法AES */ private static final String KEY_ALGORITHM = "RSA"; /** * 演算法名稱/加密模式/資料填充方式 * 預設:RSA/ECB/PKCS1Padding */ private static final String ALGORITHMS = "RSA/ECB/PKCS1Padding"; /** * Map獲取公鑰的key */ private static final String PUBLIC_KEY = "publicKey"; /** * Map獲取私鑰的key */ private static final String PRIVATE_KEY = "privateKey"; /** * RSA最大加密明文大小 */ private static final int MAX_ENCRYPT_BLOCK = 117; /** * RSA最大解密密文大小 */ private static final int MAX_DECRYPT_BLOCK = 128; /** * RSA 位數 如果採用2048 上面最大加密和最大解密則須填寫: 245 256 */ private static final int INITIALIZE_LENGTH = 1024; /** * 後端RSA的金鑰對(公鑰和私鑰)Map,由靜態程式碼塊賦值 */ private static Map<String, Object> genKeyPair = new HashMap<>(); static { try { genKeyPair.putAll(genKeyPair()); } catch (Exception e) { e.printStackTrace(); } } /** * 生成金鑰對(公鑰和私鑰) */ private static Map<String, Object> genKeyPair() throws Exception { KeyPairGenerator keyPairGen = KeyPairGenerator.getInstance(KEY_ALGORITHM); keyPairGen.initialize(INITIALIZE_LENGTH); KeyPair keyPair = keyPairGen.generateKeyPair(); RSAPublicKey publicKey = (RSAPublicKey) keyPair.getPublic(); RSAPrivateKey privateKey = (RSAPrivateKey) keyPair.getPrivate(); Map<String, Object> keyMap = new HashMap<String, Object>(2); //公鑰 keyMap.put(PUBLIC_KEY, publicKey); //私鑰 keyMap.put(PRIVATE_KEY, privateKey); return keyMap; } /** * 私鑰解密 * * @param encryptedData 已加密資料 * @param privateKey 私鑰(BASE64編碼) */ public static byte[] decryptByPrivateKey(byte[] encryptedData, String privateKey) throws Exception { //base64格式的key字串轉Key物件 byte[] keyBytes = Base64.decodeBase64(privateKey); PKCS8EncodedKeySpec pkcs8KeySpec = new PKCS8EncodedKeySpec(keyBytes); KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM); Key privateK = keyFactory.generatePrivate(pkcs8KeySpec); //設定加密、填充方式 /* 如需使用更多加密、填充方式,引入 <dependency> <groupId>org.bouncycastle</groupId> <artifactId>bcprov-jdk16</artifactId> <version>1.46</version> </dependency> 並改成 Cipher cipher = Cipher.getInstance(ALGORITHMS ,new BouncyCastleProvider()); */ Cipher cipher = Cipher.getInstance(ALGORITHMS); cipher.init(Cipher.DECRYPT_MODE, privateK); //分段進行解密操作 return encryptAndDecryptOfSubsection(encryptedData, cipher, MAX_DECRYPT_BLOCK); } /** * 公鑰加密 * * @param data 源資料 * @param publicKey 公鑰(BASE64編碼) */ public static byte[] encryptByPublicKey(byte[] data, String publicKey) throws Exception { //base64格式的key字串轉Key物件 byte[] keyBytes = Base64.decodeBase64(publicKey); X509EncodedKeySpec x509KeySpec = new X509EncodedKeySpec(keyBytes); KeyFactory keyFactory = KeyFactory.getInstance(KEY_ALGORITHM); Key publicK = keyFactory.generatePublic(x509KeySpec); //設定加密、填充方式 /* 如需使用更多加密、填充方式,引入 <dependency> <groupId>org.bouncycastle</groupId> <artifactId>bcprov-jdk16</artifactId> <version>1.46</version> </dependency> 並改成 Cipher cipher = Cipher.getInstance(ALGORITHMS ,new BouncyCastleProvider()); */ Cipher cipher = Cipher.getInstance(ALGORITHMS); cipher.init(Cipher.ENCRYPT_MODE, publicK); //分段進行加密操作 return encryptAndDecryptOfSubsection(data, cipher, MAX_ENCRYPT_BLOCK); } /** * 獲取私鑰 */ public static String getPrivateKey() { Key key = (Key) genKeyPair.get(PRIVATE_KEY); return Base64.encodeBase64String(key.getEncoded()); } /** * 獲取公鑰 */ public static String getPublicKey() { Key key = (Key) genKeyPair.get(PUBLIC_KEY); return Base64.encodeBase64String(key.getEncoded()); } /** * 分段進行加密、解密操作 */ private static byte[] encryptAndDecryptOfSubsection(byte[] data, Cipher cipher, int encryptBlock) throws Exception { int inputLen = data.length; ByteArrayOutputStream out = new ByteArrayOutputStream(); int offSet = 0; byte[] cache; int i = 0; // 對資料分段加密 while (inputLen - offSet > 0) { if (inputLen - offSet > encryptBlock) { cache = cipher.doFinal(data, offSet, encryptBlock); } else { cache = cipher.doFinal(data, offSet, inputLen - offSet); } out.write(cache, 0, cache.length); i++; offSet = i * encryptBlock; } byte[] toByteArray = out.toByteArray(); out.close(); return toByteArray; } }
簡單測試
AES對稱加密、解密簡單測試
1、字串
public static void main(String[] args) { //16位 String key = "MIGfMA0GCSqGSIb3"; //字串 String str = "huanzi.qch@qq.com:歡子"; try { //加密 String encrypt = AesUtil.encrypt(str, key); //解密 String decrypt = AesUtil.decrypt(encrypt, key); System.out.println("加密前:" + str); System.out.println("加密後:" + encrypt); System.out.println("解密後:" + decrypt); } catch (Exception e) { e.printStackTrace(); } }
加密前:huanzi.qch@qq.com:歡子 加密後:dXPRtcdHPQSTwxLnmixkaSvNfGHhg5Gz8sGTtiqCpPo= 解密後:huanzi.qch@qq.com:歡子
2、複雜物件
public static void main(String[] args) { //16位 String key = "MIGfMA0GCSqGSIb3"; //複雜物件 ImsUserVo userVo = new ImsUserVo(); userVo.setUserName("123456"); userVo.setPassword("111111"); try { //加密 String encrypt = AesUtil.encrypt(userVo.toString(), key); //解密 String decrypt = AesUtil.decrypt(encrypt, key);
System.out.println("加密前:" + userVo.toString()); System.out.println("加密後:" + encrypt); System.out.println("解密後:" + decrypt); } catch (Exception e) { e.printStackTrace(); } }
加密前:ImsUserVo(id=null, userName=123456, password=111111, nickName=null, gender=null, avatar=null, email=null, phone=null, sign=null, createdTime=null, updataTime=null) 加密後:AXv8ewfY+gbuZ/dCmGAxngLry+Idlp1NKZ8yyf9+bmrBggUBo3b+e4XRwMAE/DP+vFS2HpgeYQTrZM1ECjo01uvZ/T6lY7b2C6L8PTotYHQyJM3kOs+YNXL/uyvFZ2EICSQWhmM1XX+g0juHLCbgQDMNXc56S/7eH2p+su1+CTMygUBCF0U/gZaSzqylqujTb3sg7q4xMuxCQ6ne6xmL3ebjanOLeMJHypTDy1rlJTw= 解密後:ImsUserVo(id=null, userName=123456, password=111111, nickName=null, gender=null, avatar=null, email=null, phone=null, sign=null, createdTime=null, updataTime=null)
RAS非對稱加密、解密簡單測試
1、字串的RSA公鑰加密、私鑰解密
public static void main(String[] args) { //字串 String str = "huanzi.qch@qq.com:歡子"; try { System.out.println("私鑰:" + RsaUtil.getPrivateKey()); System.out.println("公鑰:" + RsaUtil.getPublicKey()); //公鑰加密 byte[] ciphertext = RsaUtil.encryptByPublicKey(str.getBytes(), RsaUtil.getPublicKey()); //私鑰解密 byte[] plaintext = RsaUtil.decryptByPrivateKey(ciphertext, RsaUtil.getPrivateKey()); System.out.println("公鑰加密前:" + str); System.out.println("公鑰加密後:" + Base64.encodeBase64String(ciphertext)); System.out.println("私鑰解密後:" + new String(plaintext)); } catch (Exception e) { e.printStackTrace(); } }
私鑰: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 公鑰:MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDRtPG9i9B5NUAiV8k1COgOAqlvihDQnnWciQmDLXmf78fdynmGWz0oYSNyFiSbY/VPom4gFUY85opCPZZCnYJwmjoE5hGYrNkVoC84XDqUqnafyenfmLZgg+lA3jtxOkD8n1b/Xd6j66mmFAsYuwpqLs1Wmv3Caq32Ae6hmLd7uQIDAQAB 公鑰加密前:huanzi.qch@qq.com:歡子 公鑰加密後:MQa65DyVZg/L8SBilLX1yUiajtiTBqUFpQ/qlrSRyMGCubylbp9KisowRghPxk9BuI3+ea/4QpidIZKJaZAbQQ+ZKyslSTk3nm6H+0BF9pMA7BUeC33xHSy+3lJrNOr5S+Vup1Oir3Nu8i2vJYQV1pPkB5+zyUVEcNLD3xr/eNQ= 私鑰解密後:huanzi.qch@qq.com:歡子
2、複雜物件的RSA公鑰加密、私鑰解密
public static void main(String[] args) { //複雜物件 ImsUserVo userVo = new ImsUserVo(); userVo.setUserName("123456"); userVo.setPassword("111111"); try { System.out.println("私鑰:" + RsaUtil.getPrivateKey()); System.out.println("公鑰:" + RsaUtil.getPublicKey()); //公鑰加密 byte[] ciphertext = RsaUtil.encryptByPublicKey(userVo.toString().getBytes(), RsaUtil.getPublicKey()); //私鑰解密 byte[] plaintext = RsaUtil.decryptByPrivateKey(ciphertext, RsaUtil.getPrivateKey()); System.out.println("公鑰加密前:" + userVo.toString()); System.out.println("公鑰加密後:" + Base64.encodeBase64String(ciphertext)); System.out.println("私鑰解密後:" + new String(plaintext)); } catch (Exception e) { e.printStackTrace(); } }
私鑰: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 公鑰:MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC+oEirNhuIha4T6NGixC3xs7AgGgeYc7b3JQ/SdoWU9il37OkuScGdEVkUdvK6h5tHtkTVt382Mji70qKvd5/00QJJlwW1YmtwQk60syz6yhWPCby8l6m61dDa8csGPuGZYEeUfrHFmo9y7VEet7El2+XXZjoPV3La1gRr7CqzSQIDAQAB 公鑰加密前:ImsUserVo(id=null, userName=123456, password=111111, nickName=null, gender=null, avatar=null, email=null, phone=null, sign=null, createdTime=null, updataTime=null) 公鑰加密後:Un+1m/CbpzVkkxYrwNOWyEXqpsawxcdv4p3G+9b+SQRiC/THL8YG+IvqFCHnxizzYGB9LEvLbQxw72JB0Wlo1+/SvX7AJb2h0ddpvVUkPjmtXNo073SV1zMK+9NTCJUMMoHu/TIptxRbVxlBoGMHa+jq8h2y3RUOPtx/9zhBWlQmzZEifv0MjgAhKX5ucExYfXctcAVGHL959+TwKqKQmTENw5o0ElksaA0KIF+4L7RvpWVSqZT1Y4O2gMP9ALjamCx6ziRcmk4b4Q5Goph0nmw6nA387qVi3Vz6rQHrIpL0HT5OSiz1O7+2L3N0Him2IZeAgg3EZCi5xTGl54jGEw== 私鑰解密後:ImsUserVo(id=null, userName=123456, password=111111, nickName=null, gender=null, avatar=null, email=null, phone=null, sign=null, createdTime=null, updataTime=null)
如需使用更多加密、填充方式,引入
<dependency> <groupId>org.bouncycastle</groupId> <artifactId>bcprov-jdk16</artifactId> <version>1.46</version> </dependency>
加解密的時候改成
Cipher cipher = Cipher.getInstance(ALGORITHMS ,new BouncyCastleProvider());
前端加、解密
AES我們採用CryptoJS,是一個標準和安全加密演算法的JavaScript庫,它的AES加密支援AES-128、AES-192和AES-256。下載或檢視詳情介紹請戳官網地址
GitHub地址:https://github.com/brix/crypto-js
官網地址:https://code.google.com/archive/p/crypto-js/
RSA我們採用JSEncrypt,它是一個很好用的RSA加密演算法的JavaScript庫,使用PKCS#1進行填充,加解密使用方式很簡單,具體的介紹或者下載請移步官網
GitHub地址:https://github.com/travist/jsencrypt
官網地址:http://travistidwell.com/jsencrypt/
下載下來後我們在專案頭部head.html引入,並新建兩個小工具類
AES
/** * 簡單封裝一下 */ var aesUtil = { //獲取key, genKey : function (length = 16) { let random = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789"; let str = ""; for (let i = 0; i < length; i++) { str = str + random.charAt(Math.random() * random.length) } return str; }, //加密 encrypt : function (plaintext,key) { if (plaintext instanceof Object) { //JSON.stringify plaintext = JSON.stringify(plaintext) } let encrypted = CryptoJS.AES.encrypt(CryptoJS.enc.Utf8.parse(plaintext), CryptoJS.enc.Utf8.parse(key), {mode:CryptoJS.mode.ECB,padding: CryptoJS.pad.Pkcs7}); return encrypted.toString(); }, //解密 decrypt : function (ciphertext,key) { let decrypt = CryptoJS.AES.decrypt(ciphertext, CryptoJS.enc.Utf8.parse(key), {mode:CryptoJS.mode.ECB,padding: CryptoJS.pad.Pkcs7}); //JSON.parse return JSON.parse(CryptoJS.enc.Utf8.stringify(decrypt).toString()); } };
RSA
/** * 簡單封裝一下 */ var rsaUtil = { //RSA 位數,這裡要跟後端對應 bits: 1024, //當前JSEncrypted物件 thisKeyPair: {}, //生成金鑰對(公鑰和私鑰) genKeyPair: function (bits = rsaUtil.bits) { let genKeyPair = {}; rsaUtil.thisKeyPair = new JSEncrypt({default_key_size: bits}); //獲取私鑰 genKeyPair.privateKey = rsaUtil.thisKeyPair.getPrivateKey(); //獲取公鑰 genKeyPair.publicKey = rsaUtil.thisKeyPair.getPublicKey(); return genKeyPair; }, //公鑰加密 encrypt: function (plaintext, publicKey) { if (plaintext instanceof Object) { //1、JSON.stringify plaintext = JSON.stringify(plaintext) } publicKey && rsaUtil.thisKeyPair.setPublicKey(publicKey); return rsaUtil.thisKeyPair.encrypt(JSON.stringify(plaintext)); }, //私鑰解密 decrypt: function (ciphertext, privateKey) { privateKey && rsaUtil.thisKeyPair.setPrivateKey(privateKey); return rsaUtil.thisKeyPair.decrypt(ciphertext); } };
簡單測試
AES對稱加密、解密簡單測試
1、字串
//字串 let text = "huanzi.qch@qq.com:歡子"; //key let genKey = aesUtil.genKey(); //key加密 let ciphertext = aesUtil.encrypt(text,genKey); //key解密 let plaintext = aesUtil.decrypt(ciphertext,genKey); console.log("key:");console.log(genKey); console.log("加密前:");console.log(text); console.log("key加密後:" + ciphertext); console.log("key解密後:");console.log(plaintext);
key:q99IsnEuryk1ZvgX 加密前:huanzi.qch@qq.com:歡子 key加密後:aZn58GtEj9Is0hNWbJoqpRD6RkiBVPCHOvva3Xq2PYo= key解密後:huanzi.qch@qq.com:歡子
2、複雜物件
//複雜物件 let user = {username: "歡子", password: 123456, remark: "abcd!@#$:"}; //key let genKey = aesUtil.genKey(); //key加密 let ciphertext = aesUtil.encrypt(user,genKey); //key解密 let plaintext = aesUtil.decrypt(ciphertext,genKey); console.log("key:");console.log(genKey); console.log("加密前:");console.log(user); console.log("key加密後:" + ciphertext); console.log("key解密後:");console.log(plaintext);
key:e6gzizHIpDfc6hbg 加密前:{username: "歡子", password: 123456, remark: "abcd!@#$:"} key加密後:YdNw5AwteEp8WZs5xMv0YiGcXvX81P9MCLOvroHjfLUyQV/GwJ6obRqi4DT2ucJy8DWrKueOzLGLSQXUVhAgIA== key解密後:{username: "歡子", password: 123456, remark: "abcd!@#$:"}
RAS非對稱加密、解密簡單測試
1、字串的RSA公鑰加密、私鑰解密
//普通字串 let text = "huanzi.qch@qq.com:歡子"; //祕鑰對 let keyPair = rsaUtil.genKeyPair(); //公鑰加密 let ciphertext = rsaUtil.encrypt(text,keyPair.publicKey); //私鑰解密 let plaintext = rsaUtil.decrypt(ciphertext,keyPair.privateKey); console.log("祕鑰:");console.log(keyPair.privateKey); console.log("公鑰:" + keyPair.publicKey); console.log("加密前:" + text); console.log("公鑰加密後:" + ciphertext); console.log("解密後:" + plaintext);
祕鑰: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 公鑰:MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDtBKNg9NJ0+mMWq+99geoi32t+xkbJuvQ4Wr7x8I+zGT8xiG+jG+OAuSjvi5yA7IEMMAj8Y8vS7IPPo2mAr/PH0DsNiHMATJm8mNIEDzfP4WOFOdidzqP+6/9iOLMfe4cHtGq+kdX7QPx4uabnIXAREnR4nVl5Mtxf+vEHXGmEPwIDAQAB 加密前:huanzi.qch@qq.com:歡子 公鑰加密後:aUkUMYC7lF8M1xzcx5ZEdc0DQt4FrqvWqEnD30raV++j7rwsfEcyXpPmeF1g2LR86FVG3oxgdTptorkwUDSXB3Tv4av7toGg7Zcf9l1vs5WQX7kCDTitwBVwyBNTZq22xed1J/LAkDujDav6tUJHdMmRKYVe2NeTswvWLOqWWW4= 解密後:"huanzi.qch@qq.com:歡子"
2、複雜物件的RSA公鑰加密、私鑰解密
//複雜物件 let user = {username:"歡子",password:123456,remark:"abcd!@#$:"}; //祕鑰對 let keyPair = rsaUtil.genKeyPair(); //公鑰加密 let ciphertext = rsaUtil.encrypt(user,keyPair.publicKey); //私鑰解密 let plaintext = rsaUtil.decrypt(ciphertext,keyPair.privateKey); console.log("祕鑰:");console.log(keyPair.privateKey); console.log("公鑰:" + keyPair.publicKey); console.log("加密前:" + user); console.log("公鑰加密後:" + ciphertext); console.log("解密後:" + plaintext);
祕鑰:MIICXAIBAAKBgQCsAE5TN8kD7U4mFyxBzN1w23Rkf4K8MQ3B0bCZE5crjYp81eUtWrfUM+zLPmF9e1P/ws2yGHvL6mueU9PxtDJn5rSLsQBSxIkN0QB/nq76S4uh2Nrmmrjomejy5LqXnTVbEoIW2RTFBzyMWy4AjQY6P2pAJ8zCagvcdYcweUIqMQIDAQABAoGAbwrLhkIvjk938nNnaRufoqqrW+5OMrzgis6bWlghckawr6NPj5ZPs7nKF/Sv79jdA/N55I6V7bHrxI2N+S9Ckm2ygv8nNYimSjzspR48SqVRuH/xYmQQ9hi8Iy4dTlCMud34oXsV2sYI5tEn7f3bypOVfJa6kHSqxe1PIQTxirkCQQDjmHOp2JMcltpL+639nnNgZ2U06cRhPHX+tcGTIgoqu1Sqp0bKH7QuUF9WPNWxHrbYY5+s5jnnhTTwQZg74atTAkEAwXelo0JLYHpML7+sLs8aUzitRJXjkW3dY4JPf1wLTNLbawvi4KA/6NA3jx7kCD6KzM7vsWWsRgArrUWa1Dbn6wJARY5pAuZyh1E/I+umEBWl0zemQZaT8tekhBSONWY4zzhzNrhqtQkdau4bROLQuBHX9af0u8WcuroGJMsXOG3OiwJBALc91OPJ8cziaPC80Z/QRvXV877HXTCsZ4lNrnBJxOYxvOMp8eyhu4aOWGE1d/QbEKolwj86tq3ikXvfNmOT0ZsCQBkfviB7CKdHCrUCnpAK0upa9x8uFraomDNxFP/HwTFPSOPGhA5pgAzJgygSu2hpEwFFIwfC3E+pQ2EAhoeIcdw= 公鑰:MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCsAE5TN8kD7U4mFyxBzN1w23Rkf4K8MQ3B0bCZE5crjYp81eUtWrfUM+zLPmF9e1P/ws2yGHvL6mueU9PxtDJn5rSLsQBSxIkN0QB/nq76S4uh2Nrmmrjomejy5LqXnTVbEoIW2RTFBzyMWy4AjQY6P2pAJ8zCagvcdYcweUIqMQIDAQAB 加密前:[object Object] 公鑰加密後:LwggD8SIeWoqzh4gHh/vJ9nEZsqeNZfoxgrRRPD7k0wpp9/uZmR5kfRJ8O59yW5IaOt1z50mJ26ylRBOKNoTTl7Rt4zVmBYX4EXr4Ajq3CINFcPI/j5l8yQRSIgLPUvOxhIAKmfrgNKCaLjSdjK/CnTbPrZoDArI8iAHq/ih4r8= 解密後:"{\"username\":\"歡子\",\"password\":123456,\"remark\":\"abcd!@#$:\"}"
聯調測試
自己解密自己加密的的資料基本上沒有什麼問題,重要的是解密對方加密的資料會不會成功,前後端相互加解密的工程中,最重要的就是保持兩邊的加密、填充方式一致、加密位數一致,還有就是後端轉成字串轉成byte[]陣列的時候要注意,Base64工具類轉跟直接字串getByte()跟用輸入輸出流來轉,得到的陣列結果有差異,在本次測試中我也是搞了好久才使得前後端一致,緊跟上面的簡單測試,接下來我們進行前後端聯調測試
1、AES:前後端相互用對方的key解密對方加密的資料
2、前後端相互用對方的公鑰進行加密資料,然後將資料叫給對方解密
這裡要講一下步驟,不然大家看不懂下面這幾張圖,為了確保後端加密解密用的是同一個金鑰對,我們採用控制檯輸入前端祕鑰跟前端使用後端公鑰加密後的密文,然後再使用私鑰去解密從而得到前端的明文,而js前端部分,只有不重新整理頁面,物件資料會存在瀏覽器記憶體中,確保了加密解密是用同一個對金鑰對
總而言之,測試結果是正確的,接下來就可以再專案中進行加解密了
專案應用
理論思路
前、後端的程式碼都封裝好了,並且都通過了簡單測試,接下來就是應用到專案中,首先我們要解決的是生成公鑰祕鑰並交換的問題,思路如下:
生成:
1、後端:在專案啟動的時候生成RSA公鑰祕鑰、AES的key,並在整個專案執行中不發生改變(或者每隔一段時間更新一次也行)
2、前端:我們在訪問頁面開始生成RSA公鑰祕鑰、AES的key,並且希望頁面在重新整理之前都不發生改變,因此將它們存在window物件中(如果需要更加健全,使用H5的本地儲存localStorage、sessionStorage),因為在head.html中生成比較合適
交換:
1、前端獲取後端RSA公鑰:前端訪問登入頁面(網站入口),後臺返回modelAndView時注入RSA的公鑰,前端獲取用存到sessionStorage中,直到回話關閉
2、後端獲取前端RSA公鑰:前端公鑰跟隨http請求傳送到後端
生成與交換公鑰的問題解決了,接下來就是如何傳輸AES加密後的資料跟RSA公鑰加密後的AES的key,思路如下:
1、前端:重寫$.ajax方法(或者封裝一個ajax),傳送資料前用AES加密資料,RSA公鑰加密AES的key,在傳送到後端;觸發回撥後,先用RSA私鑰解密AES的key,在用明文key去解密
2、後端:寫兩個自定義註解Encrypt、Decrypt,一個aop攔截所有帶自定義註解的post請求進行加密解密,有@Encrypt需要對返回值進行加密,有@Decrypt需要對引數進行解密,加密解密過程與前端的操作同理
前端程式碼
引入js
<!--CryptoJS jsencrypt --> <script th:src="@{/js/cryptojs.js}"></script> <script th:src="@{/js/jsencrypt.js}"></script> <script th:src="@{/js/aesUtil.js}"></script> <script th:src="@{/js/rsaUtil.js}"></script>
下載CryptoJs跟jsencrypt下來發現CryptoJs需要引入很多js,因此在網上找了這個整合的js,引它就夠了
!function(t,n){"object"==typeof exports?module.exports=exports=n():"function"==typeof define&&define.amd?define([],n):t.CryptoJS=n()}(this,function(){var t=t||function(t,n){var i=Object.create||function(){function t(){}return function(n){var i;return t.prototype=n,i=new t,t.prototype=null,i}}(),e={},r=e.lib={},o=r.Base=function(){return{extend:function(t){var n=i(this);return t&&n.mixIn(t),n.hasOwnProperty("init")&&this.init!==n.init||(n.init=function(){n.$super.init.apply(this,arguments)}),n.init.prototype=n,n.$super=this,n},create:function(){var t=this.extend();return t.init.apply(t,arguments),t},init:function(){},mixIn:function(t){for(var n in t)t.hasOwnProperty(n)&&(this[n]=t[n]);t.hasOwnProperty("toString")&&(this.toString=t.toString)},clone:function(){return this.init.prototype.extend(this)}}}(),s=r.WordArray=o.extend({init:function(t,i){t=this.words=t||[],i!=n?this.sigBytes=i:this.sigBytes=4*t.length},toString:function(t){return(t||c).stringify(this)},concat:function(t){var n=this.words,i=t.words,e=this.sigBytes,r=t.sigBytes;if(this.clamp(),e%4)for(var o=0;o<r;o++){var s=i[o>>>2]>>>24-o%4*8&255;n[e+o>>>2]|=s<<24-(e+o)%4*8}else for(var o=0;o<r;o+=4)n[e+o>>>2]=i[o>>>2];return this.sigBytes+=r,this},clamp:function(){var n=this.words,i=this.sigBytes;n[i>>>2]&=4294967295<<32-i%4*8,n.length=t.ceil(i/4)},clone:function(){var t=o.clone.call(this);return t.words=this.words.slice(0),t},random:function(n){for(var i,e=[],r=function(n){var n=n,i=987654321,e=4294967295;return function(){i=36969*(65535&i)+(i>>16)&e,n=18e3*(65535&n)+(n>>16)&e;var r=(i<<16)+n&e;return r/=4294967296,r+=.5,r*(t.random()>.5?1:-1)}},o=0;o<n;o+=4){var a=r(4294967296*(i||t.random()));i=987654071*a(),e.push(4294967296*a()|0)}return new s.init(e,n)}}),a=e.enc={},c=a.Hex={stringify:function(t){for(var n=t.words,i=t.sigBytes,e=[],r=0;r<i;r++){var o=n[r>>>2]>>>24-r%4*8&255;e.push((o>>>4).toString(16)),e.push((15&o).toString(16))}return e.join("")},parse:function(t){for(var n=t.length,i=[],e=0;e<n;e+=2)i[e>>>3]|=parseInt(t.substr(e,2),16)<<24-e%8*4;return new s.init(i,n/2)}},u=a.Latin1={stringify:function(t){for(var n=t.words,i=t.sigBytes,e=[],r=0;r<i;r++){var o=n[r>>>2]>>>24-r%4*8&255;e.push(String.fromCharCode(o))}return e.join("")},parse:function(t){for(var n=t.length,i=[],e=0;e<n;e++)i[e>>>2]|=(255&t.charCodeAt(e))<<24-e%4*8;return new s.init(i,n)}},f=a.Utf8={stringify:function(t){try{return decodeURIComponent(escape(u.stringify(t)))}catch(t){throw new Error("Malformed UTF-8 data")}},parse:function(t){return u.parse(unescape(encodeURIComponent(t)))}},h=r.BufferedBlockAlgorithm=o.extend({reset:function(){this._data=new s.init,this._nDataBytes=0},_append:function(t){"string"==typeof t&&(t=f.parse(t)),this._data.concat(t),this._nDataBytes+=t.sigBytes},_process:function(n){var i=this._data,e=i.words,r=i.sigBytes,o=this.blockSize,a=4*o,c=r/a;c=n?t.ceil(c):t.max((0|c)-this._minBufferSize,0);var u=c*o,f=t.min(4*u,r);if(u){for(var h=0;h<u;h+=o)this._doProcessBlock(e,h);var p=e.splice(0,u);i.sigBytes-=f}return new s.init(p,f)},clone:function(){var t=o.clone.call(this);return t._data=this._data.clone(),t},_minBufferSize:0}),p=(r.Hasher=h.extend({cfg:o.extend(),init:function(t){this.cfg=this.cfg.extend(t),this.reset()},reset:function(){h.reset.call(this),this._doReset()},update:function(t){return this._append(t),this._process(),this},finalize:function(t){t&&this._append(t);var n=this._doFinalize();return n},blockSize:16,_createHelper:function(t){return function(n,i){return new t.init(i).finalize(n)}},_createHmacHelper:function(t){return function(n,i){return new p.HMAC.init(t,i).finalize(n)}}}),e.algo={});return e}(Math);return t}); //# sourceMappingURL=core.min.js.map !function(e,t,i){"object"==typeof exports?module.exports=exports=t(require("./core.min"),require("./sha1.min"),require("./hmac.min")):"function"==typeof define&&define.amd?define(["./core.min","./sha1.min","./hmac.min"],t):t(e.CryptoJS)}(this,function(e){return function(){var t=e,i=t.lib,r=i.Base,n=i.WordArray,o=t.algo,a=o.MD5,c=o.EvpKDF=r.extend({cfg:r.extend({keySize:4,hasher:a,iterations:1}),init:function(e){this.cfg=this.cfg.extend(e)},compute:function(e,t){for(var i=this.cfg,r=i.hasher.create(),o=n.create(),a=o.words,c=i.keySize,f=i.iterations;a.length<c;){s&&r.update(s);var s=r.update(e).finalize(t);r.reset();for(var u=1;u<f;u++)s=r.finalize(s),r.reset();o.concat(s)}return o.sigBytes=4*c,o}});t.EvpKDF=function(e,t,i){return c.create(i).compute(e,t)}}(),e.EvpKDF}); //# sourceMappingURL=evpkdf.min.js.map !function(r,e){"object"==typeof exports?module.exports=exports=e(require("./core.min")):"function"==typeof define&&define.amd?define(["./core.min"],e):e(r.CryptoJS)}(this,function(r){return function(){function e(r,e,t){for(var n=[],i=0,o=0;o<e;o++)if(o%4){var f=t[r.charCodeAt(o-1)]<<o%4*2,c=t[r.charCodeAt(o)]>>>6-o%4*2;n[i>>>2]|=(f|c)<<24-i%4*8,i++}return a.create(n,i)}var t=r,n=t.lib,a=n.WordArray,i=t.enc;i.Base64={stringify:function(r){var e=r.words,t=r.sigBytes,n=this._map;r.clamp();for(var a=[],i=0;i<t;i+=3)for(var o=e[i>>>2]>>>24-i%4*8&255,f=e[i+1>>>2]>>>24-(i+1)%4*8&255,c=e[i+2>>>2]>>>24-(i+2)%4*8&255,s=o<<16|f<<8|c,h=0;h<4&&i+.75*h<t;h++)a.push(n.charAt(s>>>6*(3-h)&63));var p=n.charAt(64);if(p)for(;a.length%4;)a.push(p);return a.join("")},parse:function(r){var t=r.length,n=this._map,a=this._reverseMap;if(!a){a=this._reverseMap=[];for(var i=0;i<n.length;i++)a[n.charCodeAt(i)]=i}var o=n.charAt(64);if(o){var f=r.indexOf(o);f!==-1&&(t=f)}return e(r,t,a)},_map:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/="}}(),r.enc.Base64}); //# sourceMappingURL=enc-base64.min.js.map !function(e,t,r){"object"==typeof exports?module.exports=exports=t(require("./core.min"),require("./evpkdf.min")):"function"==typeof define&&define.amd?define(["./core.min","./evpkdf.min"],t):t(e.CryptoJS)}(this,function(e){e.lib.Cipher||function(t){var r=e,i=r.lib,n=i.Base,c=i.WordArray,o=i.BufferedBlockAlgorithm,s=r.enc,a=(s.Utf8,s.Base64),f=r.algo,p=f.EvpKDF,d=i.Cipher=o.extend({cfg:n.extend(),createEncryptor:function(e,t){return this.create(this._ENC_XFORM_MODE,e,t)},createDecryptor:function(e,t){return this.create(this._DEC_XFORM_MODE,e,t)},init:function(e,t,r){this.cfg=this.cfg.extend(r),this._xformMode=e,this._key=t,this.reset()},reset:function(){o.reset.call(this),this._doReset()},process:function(e){return this._append(e),this._process()},finalize:function(e){e&&this._append(e);var t=this._doFinalize();return t},keySize:4,ivSize:4,_ENC_XFORM_MODE:1,_DEC_XFORM_MODE:2,_createHelper:function(){function e(e){return"string"==typeof e?B:x}return function(t){return{encrypt:function(r,i,n){return e(i).encrypt(t,r,i,n)},decrypt:function(r,i,n){return e(i).decrypt(t,r,i,n)}}}}()}),h=(i.StreamCipher=d.extend({_doFinalize:function(){var e=this._process(!0);return e},blockSize:1}),r.mode={}),u=i.BlockCipherMode=n.extend({createEncryptor:function(e,t){return this.Encryptor.create(e,t)},createDecryptor:function(e,t){return this.Decryptor.create(e,t)},init:function(e,t){this._cipher=e,this._iv=t}}),l=h.CBC=function(){function e(e,r,i){var n=this._iv;if(n){var c=n;this._iv=t}else var c=this._prevBlock;for(var o=0;o<i;o++)e[r+o]^=c[o]}var r=u.extend();return r.Encryptor=r.extend({processBlock:function(t,r){var i=this._cipher,n=i.blockSize;e.call(this,t,r,n),i.encryptBlock(t,r),this._prevBlock=t.slice(r,r+n)}}),r.Decryptor=r.extend({processBlock:function(t,r){var i=this._cipher,n=i.blockSize,c=t.slice(r,r+n);i.decryptBlock(t,r),e.call(this,t,r,n),this._prevBlock=c}}),r}(),_=r.pad={},v=_.Pkcs7={pad:function(e,t){for(var r=4*t,i=r-e.sigBytes%r,n=i<<24|i<<16|i<<8|i,o=[],s=0;s<i;s+=4)o.push(n);var a=c.create(o,i);e.concat(a)},unpad:function(e){var t=255&e.words[e.sigBytes-1>>>2];e.sigBytes-=t}},y=(i.BlockCipher=d.extend({cfg:d.cfg.extend({mode:l,padding:v}),reset:function(){d.reset.call(this);var e=this.cfg,t=e.iv,r=e.mode;if(this._xformMode==this._ENC_XFORM_MODE)var i=r.createEncryptor;else{var i=r.createDecryptor;this._minBufferSize=1}this._mode&&this._mode.__creator==i?this._mode.init(this,t&&t.words):(this._mode=i.call(r,this,t&&t.words),this._mode.__creator=i)},_doProcessBlock:function(e,t){this._mode.processBlock(e,t)},_doFinalize:function(){var e=this.cfg.padding;if(this._xformMode==this._ENC_XFORM_MODE){e.pad(this._data,this.blockSize);var t=this._process(!0)}else{var t=this._process(!0);e.unpad(t)}return t},blockSize:4}),i.CipherParams=n.extend({init:function(e){this.mixIn(e)},toString:function(e){return(e||this.formatter).stringify(this)}})),m=r.format={},k=m.OpenSSL={stringify:function(e){var t=e.ciphertext,r=e.salt;if(r)var i=c.create([1398893684,1701076831]).concat(r).concat(t);else var i=t;return i.toString(a)},parse:function(e){var t=a.parse(e),r=t.words;if(1398893684==r[0]&&1701076831==r[1]){var i=c.create(r.slice(2,4));r.splice(0,4),t.sigBytes-=16}return y.create({ciphertext:t,salt:i})}},x=i.SerializableCipher=n.extend({cfg:n.extend({format:k}),encrypt:function(e,t,r,i){i=this.cfg.extend(i);var n=e.createEncryptor(r,i),c=n.finalize(t),o=n.cfg;return y.create({ciphertext:c,key:r,iv:o.iv,algorithm:e,mode:o.mode,padding:o.padding,blockSize:e.blockSize,formatter:i.format})},decrypt:function(e,t,r,i){i=this.cfg.extend(i),t=this._parse(t,i.format);var n=e.createDecryptor(r,i).finalize(t.ciphertext);return n},_parse:function(e,t){return"string"==typeof e?t.parse(e,this):e}}),g=r.kdf={},S=g.OpenSSL={execute:function(e,t,r,i){i||(i=c.random(8));var n=p.create({keySize:t+r}).compute(e,i),o=c.create(n.words.slice(t),4*r);return n.sigBytes=4*t,y.create({key:n,iv:o,salt:i})}},B=i.PasswordBasedCipher=x.extend({cfg:x.cfg.extend({kdf:S}),encrypt:function(e,t,r,i){i=this.cfg.extend(i);var n=i.kdf.execute(r,e.keySize,e.ivSize);i.iv=n.iv;var c=x.encrypt.call(this,e,t,n.key,i);return c.mixIn(n),c},decrypt:function(e,t,r,i){i=this.cfg.extend(i),t=this._parse(t,i.format);var n=i.kdf.execute(r,e.keySize,e.ivSize,t.salt);i.iv=n.iv;var c=x.decrypt.call(this,e,t,n.key,i);return c}})}()}); //# sourceMappingURL=cipher-core.min.js.map !function(e,i){"object"==typeof exports?module.exports=exports=i(require("./core.min")):"function"==typeof define&&define.amd?define(["./core.min"],i):i(e.CryptoJS)}(this,function(e){!function(){var i=e,t=i.lib,n=t.Base,s=i.enc,r=s.Utf8,o=i.algo;o.HMAC=n.extend({init:function(e,i){e=this._hasher=new e.init,"string"==typeof i&&(i=r.parse(i));var t=e.blockSize,n=4*t;i.sigBytes>n&&(i=e.finalize(i)),i.clamp();for(var s=this._oKey=i.clone(),o=this._iKey=i.clone(),a=s.words,f=o.words,c=0;c<t;c++)a[c]^=1549556828,f[c]^=909522486;s.sigBytes=o.sigBytes=n,this.reset()},reset:function(){var e=this._hasher;e.reset(),e.update(this._iKey)},update:function(e){return this._hasher.update(e),this},finalize:function(e){var i=this._hasher,t=i.finalize(e);i.reset();var n=i.finalize(this._oKey.clone().concat(t));return n}})}()}); //# sourceMappingURL=hmac.min.js.map !function(e,o,r){"object"==typeof exports?module.exports=exports=o(require("./core.min"),require("./cipher-core.min")):"function"==typeof define&&define.amd?define(["./core.min","./cipher-core.min"],o):o(e.CryptoJS)}(this,function(e){return e.mode.ECB=function(){var o=e.lib.BlockCipherMode.extend();return o.Encryptor=o.extend({processBlock:function(e,o){this._cipher.encryptBlock(e,o)}}),o.Decryptor=o.extend({processBlock:function(e,o){this._cipher.decryptBlock(e,o)}}),o}(),e.mode.ECB}); //# sourceMappingURL=mode-ecb.min.js.map !function(e,r,i){"object"==typeof exports?module.exports=exports=r(require("./core.min"),require("./cipher-core.min")):"function"==typeof define&&define.amd?define(["./core.min","./cipher-core.min"],r):r(e.CryptoJS)}(this,function(e){return e.pad.Pkcs7}); //# sourceMappingURL=pad-pkcs7.min.js.map !function(e,r,i){"object"==typeof exports?module.exports=exports=r(require("./core.min"),require("./enc-base64.min"),require("./md5.min"),require("./evpkdf.min"),require("./cipher-core.min")):"function"==typeof define&&define.amd?define(["./core.min","./enc-base64.min","./md5.min","./evpkdf.min","./cipher-core.min"],r):r(e.CryptoJS)}(this,function(e){return function(){var r=e,i=r.lib,n=i.BlockCipher,o=r.algo,t=[],c=[],s=[],f=[],a=[],d=[],u=[],v=[],h=[],y=[];!function(){for(var e=[],r=0;r<256;r++)r<128?e[r]=r<<1:e[r]=r<<1^283;for(var i=0,n=0,r=0;r<256;r++){var o=n^n<<1^n<<2^n<<3^n<<4;o=o>>>8^255&o^99,t[i]=o,c[o]=i;var p=e[i],l=e[p],_=e[l],k=257*e[o]^16843008*o;s[i]=k<<24|k>>>8,f[i]=k<<16|k>>>16,a[i]=k<<8|k>>>24,d[i]=k;var k=16843009*_^65537*l^257*p^16843008*i;u[o]=k<<24|k>>>8,v[o]=k<<16|k>>>16,h[o]=k<<8|k>>>24,y[o]=k,i?(i=p^e[e[e[_^p]]],n^=e[e[n]]):i=n=1}}();var p=[0,1,2,4,8,16,32,64,128,27,54],l=o.AES=n.extend({_doReset:function(){if(!this._nRounds||this._keyPriorReset!==this._key){for(var e=this._keyPriorReset=this._key,r=e.words,i=e.sigBytes/4,n=this._nRounds=i+6,o=4*(n+1),c=this._keySchedule=[],s=0;s<o;s++)if(s<i)c[s]=r[s];else{var f=c[s-1];s%i?i>6&&s%i==4&&(f=t[f>>>24]<<24|t[f>>>16&255]<<16|t[f>>>8&255]<<8|t[255&f]):(f=f<<8|f>>>24,f=t[f>>>24]<<24|t[f>>>16&255]<<16|t[f>>>8&255]<<8|t[255&f],f^=p[s/i|0]<<24),c[s]=c[s-i]^f}for(var a=this._invKeySchedule=[],d=0;d<o;d++){var s=o-d;if(d%4)var f=c[s];else var f=c[s-4];d<4||s<=4?a[d]=f:a[d]=u[t[f>>>24]]^v[t[f>>>16&255]]^h[t[f>>>8&255]]^y[t[255&f]]}}},encryptBlock:function(e,r){this._doCryptBlock(e,r,this._keySchedule,s,f,a,d,t)},decryptBlock:function(e,r){var i=e[r+1];e[r+1]=e[r+3],e[r+3]=i,this._doCryptBlock(e,r,this._invKeySchedule,u,v,h,y,c);var i=e[r+1];e[r+1]=e[r+3],e[r+3]=i},_doCryptBlock:function(e,r,i,n,o,t,c,s){for(var f=this._nRounds,a=e[r]^i[0],d=e[r+1]^i[1],u=e[r+2]^i[2],v=e[r+3]^i[3],h=4,y=1;y<f;y++){var p=n[a>>>24]^o[d>>>16&255]^t[u>>>8&255]^c[255&v]^i[h++],l=n[d>>>24]^o[u>>>16&255]^t[v>>>8&255]^c[255&a]^i[h++],_=n[u>>>24]^o[v>>>16&255]^t[a>>>8&255]^c[255&d]^i[h++],k=n[v>>>24]^o[a>>>16&255]^t[d>>>8&255]^c[255&u]^i[h++];a=p,d=l,u=_,v=k}var p=(s[a>>>24]<<24|s[d>>>16&255]<<16|s[u>>>8&255]<<8|s[255&v])^i[h++],l=(s[d>>>24]<<24|s[u>>>16&255]<<16|s[v>>>8&255]<<8|s[255&a])^i[h++],_=(s[u>>>24]<<24|s[v>>>16&255]<<16|s[a>>>8&255]<<8|s[255&d])^i[h++],k=(s[v>>>24]<<24|s[a>>>16&255]<<16|s[d>>>8&255]<<8|s[255&u])^i[h++];e[r]=p,e[r+1]=l,e[r+2]=_,e[r+3]=k},keySize:8});r.AES=n._createHelper(l)}(),e.AES}); //# sourceMappingURL=aes.min.js.map !function(e,n){"object"==typeof exports?module.exports=exports=n(require("./core.min")):"function"==typeof define&&define.amd?define(["./core.min"],n):n(e.CryptoJS)}(this,function(e){return e.enc.Utf8}); //# sourceMappingURL=enc-utf8.min.js.map
獲取後端公鑰
<script th:inline="javascript"> //獲取後端RSA公鑰並存到sessionStorage sessionStorage.setItem('javaPublicKey', [[${publicKey}]]); </script>
重寫ajax以及生成前端金鑰對,因為我們專案中大部分都是使用$.ajax方法,所有重寫它比較合適,並且我們只攔截post請求
<script> //獲取前端RSA公鑰密碼、AES的key,並放到window let genKeyPair = rsaUtil.genKeyPair(); window.jsPublicKey = genKeyPair.publicKey; window.jsPrivateKey = genKeyPair.privateKey; window.aesKey = aesUtil.genKey(); /** * 重寫jquery的ajax方法 */ let _ajax = $.ajax;//首先備份下jquery的ajax方法 $.ajax = function (opt) { //備份opt中error和success方法 let fn = { error: function (XMLHttpRequest, textStatus, errorThrown) { }, success: function (data, textStatus) { } }; if (opt.error) { fn.error = opt.error; } if (opt.success) { fn.success = opt.success; } //加密再傳輸 if (opt.type.toLowerCase() === "post") { let data = opt.data; data = { data: aesUtil.encrypt(data, window.aesKey),//AES加密後的資料 aesKey: rsaUtil.encrypt(window.aesKey, sessionStorage.getItem('javaPublicKey')),//後端RSA公鑰加密後的AES的key publicKey: window.jsPublicKey//前端公鑰 }; opt.data = data; } //擴充套件增強處理 let _opt = $.extend(opt, { //成功回撥方法增強處理 success: function (data, textStatus) { if (opt.type.toLowerCase() === "post") { data = aesUtil.decrypt(data.data.data, rsaUtil.decrypt(data.data.aesKey, window.jsPrivateKey)); } //先獲取明文aesKey,再用明文key去解密資料 fn.success(data, textStatus); } }); return _ajax(_opt); }; </script>
後端程式碼
兩個自定義註解
package cn.huanzi.ims.annotation; import java.lang.annotation.ElementType; import java.lang.annotation.Retention; import java.lang.annotation.RetentionPolicy; import java.lang.annotation.Target; @Target({ElementType.METHOD, ElementType.TYPE}) @Retention(RetentionPolicy.RUNTIME) public @interface Decrypt { }
package cn.huanzi.ims.annotation; import java.lang.annotation.ElementType; import java.lang.annotation.Retention; import java.lang.annotation.RetentionPolicy; import java.lang.annotation.Target; @Target({ElementType.METHOD, ElementType.TYPE}) @Retention(RetentionPolicy.RUNTIME) public @interface Encrypt { }
aop掃描所有的controller,攔截帶自定義標籤的post請求,進行解密、加密再將明文設定回去(如何使用aop?請戳我之前的部落格:SpringBoot系列——aop 面向切面)
要注意的是:
1、我們在aop只設定了第一個引數,因此controller方法需要是實體接參且第一個引數就是;
2、對於返回值,需要是統一的返回值,因為我們目前是按統一的返回值設定值的,例如本例中的Result,是我們約定好的統一返回值(後續升級可以用反射來設定值)
package cn.huanzi.ims.aspect; import cn.huanzi.ims.annotation.Decrypt; import cn.huanzi.ims.annotation.Encrypt; import cn.huanzi.ims.common.pojo.Result; import cn.huanzi.ims.util.AesUtil; import cn.huanzi.ims.util.RsaUtil; import com.fasterxml.jackson.databind.DeserializationFeature; import com.fasterxml.jackson.databind.ObjectMapper; import org.apache.commons.codec.binary.Base64; import org.aspectj.lang.ProceedingJoinPoint; import org.aspectj.lang.annotation.Around; import org.aspectj.lang.annotation.Aspect; import org.aspectj.lang.annotation.Pointcut; import org.aspectj.lang.reflect.MethodSignature; import org.springframework.stereotype.Component; import org.springframework.web.context.request.RequestContextHolder; import org.springframework.web.context.request.ServletRequestAttributes; import javax.servlet.http.HttpServletRequest; import java.lang.annotation.Annotation; import java.lang.reflect.Method; @Aspect @Component public class SafetyAspect { /** * Pointcut 切入點 * 匹配cn.huanzi.ims.*.controller包下面的所有方法 */ @Pointcut("execution(public * cn.huanzi.ims.*.controller.*.*(..))") public void SafetyAspect() { } /** * 環繞通知 */ @Around(value = "SafetyAspect()") public Object arround(ProceedingJoinPoint pjp) { try { ServletRequestAttributes attributes = (ServletRequestAttributes) RequestContextHolder.getRequestAttributes(); assert attributes != null; //request物件 HttpServletRequest request = attributes.getRequest(); //http請求方法 post get String httpMethod = request.getMethod().toLowerCase(); //method方法 Method method = ((MethodSignature) pjp.getSignature()).getMethod(); //method方法上面的註解 Annotation[] annotations = method.getAnnotations(); //方式的形參引數 Object[] args = pjp.getArgs(); //是否有@Decrypt boolean hasDecrypt = false; //是否有@Encrypt boolean hasEncrypt = false; for (Annotation annotation : annotations) { if (annotation.annotationType() == Decrypt.class) { hasDecrypt = true; } if (annotation.annotationType() == Encrypt.class) { hasEncrypt = true; } } //前端公鑰 String publicKey = null; //執行方法之前解密,且只攔截post請求 if ("post".equals(httpMethod) && hasDecrypt) { //AES加密後的資料 String data = request.getParameter("data"); //後端RSA公鑰加密後的AES的key String aesKey = request.getParameter("aesKey"); //前端公鑰 publicKey = request.getParameter("publicKey"); System.out.println("前端公鑰:" + publicKey); //後端私鑰解密的到AES的key byte[] plaintext = RsaUtil.decryptByPrivateKey(Base64.decodeBase64(aesKey), RsaUtil.getPrivateKey()); aesKey = new String(plaintext); System.out.println("解密出來的AES的key:" + aesKey); //RSA解密出來字串多一對雙引號 aesKey = aesKey.substring(1, aesKey.length() - 1); //AES解密得到明文data資料 String decrypt = AesUtil.decrypt(data, aesKey); System.out.println("解密出來的data資料:" + decrypt); //設定到方法的形參中,目前只能設定只有一個引數的情況 new ObjectMapper().configure(DeserializationFeature.FAIL_ON_UNKNOWN_PROPERTIES, false); args[0] = new ObjectMapper().readValue(decrypt, args[0].getClass()); } //執行並替換最新形參引數 PS:這裡有一個個需要注意的地方,method方法必須是要public修飾的才能設定值,private的設定不了 Object o = pjp.proceed(args); //返回結果之前加密 if (hasEncrypt) { new ObjectMapper().configure(DeserializationFeature.FAIL_ON_UNKNOWN_PROPERTIES, false); //AES加密data資料 String key = AesUtil.getKey(); System.out.println("AES的key:" + key); String dataString = new ObjectMapper().writeValueAsString(o); System.out.println("需要加密的data資料:" + dataString); String data = AesUtil.encrypt(dataString, key); //用前端的公鑰來解密AES的key,並轉成Base64 String aesKey = Base64.encodeBase64String(RsaUtil.encryptByPublicKey(key.getBytes(), publicKey)); //轉json字串並轉成Object物件 o = Result.of(new ObjectMapper().readValue("{\"data\":\"" + data + "\",\"aesKey\":\"" + aesKey + "\"}", Object.class)); } //返回 return o; } catch (Throwable e) { System.err.println(pjp.getSignature()); e.printStackTrace(); return Result.of(null, false, "加解密出現異常:" + e.getMessage()); } } }
在需要進行加密解密的controller方法上加自定義註解,需要加密@Encrypt,需要解密@Decrypt,兩個都有就兩個都加
/** * 登入 */ @PostMapping("login") @Decrypt @Encrypt public Result<ImsUserVo> login(ImsUserVo userVo, HttpServletResponse response)
效果演示
未加密之前的效果
資料直接暴露在http資料包中
AES與RSA混合加密之後的效果
http資料包中傳輸的是密文
解密之後才能看到明文資料
到這裡我們實現了加解密與專案的結合,如果專案已經是按照我前面說的約定的話,即插即用,不影響專案原有業務,直接可以使用這一套,把我的程式碼拿過去就可以跑起來
後記
前後端API互動資料加密——AES與RSA混合加密完整例項先記錄到這裡,後續有空再更新升級,雖然說沒有絕對的安全,但加密總比不加密的要好,整篇文章從頭看起來也沒什麼,比較簡單,實際上...中間踩了很多坑,心酸血淚史就不在這裡闡述了,希望這篇部落格能幫到你