不加密妥善解密 [英] Not Encrypting & Decrypting Properly

查看:157
本文介绍了不加密妥善解密的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

使用以下AES类编写的进行加密和解密的东西很有趣。当我复制AES对象,我选择加密纯文本,然后我立即尝试解密我刚刚加密的文本,它不会完全解密它(每次都会有所不同)。



eg我使用简单的JSP初始化它:

 <%@ page import =com.myclass.util。 AES%> 
<%
String hexMessage =0xe800a86d90d2074fbf339aa70b6d0f62f047db15ef04c86b488a1dda3c6c4f2f2bbb444a8c709bbb4c29c7ff1f1e;
String keyText =12345678abcdefgh; // * /

AES e = new AES();
//e.setKey(keyText);
String plaintext =This should decode& encode!;
String ciphertext = e.encrypt(plaintext);
out.println(ciphertext);
out.println(< BR>);
out.println(e.decrypt(ciphertext));
%>

输出在每个页面加载时有所不同:
一次:

  0x663D64E6A0AE455AB3D25D5AF2F77C72202627EBA068E6DEBE5F22C31 
这应该是decoÁdìmèåV4ÉkÓ

另一个:

  0x5F5CF31961505F01EA9D5B7D7BFC656BD3117725D2EA041183F48 
这个s2 ??XêêÈ&ÀܧF?

等:

 code> 0xC7178A34C59F74E5D68F7CE5ED655B670A0B4E715101B4DDC2122460E8 
Tà@¼R×ËÖ?_U?x????b4r!©F

我创建的类在下面:

  package com.myclass.util; 

import java.io.UnsupportedEncodingException;
import java.security.InvalidAlgorithmParameterException;
import java.security.InvalidKeyException;
import java.security.NoSuchAlgorithmException;
import java.security.NoSuchProviderException;
import java.security.Security;
import java.util.regex.Pattern;
import javax.crypto。*;
import javax.crypto.spec。*;

public class AES {
private static String provider =AES / CTR / NoPadding;
private static String providerkey =AES;
private static int size = 128;
私钥SecretKeySpec密钥;
私密密码;
private byte [] ivBytes = new byte [size / 8];
private IvParameterSpec ivSpec = new IvParameterSpec(ivBytes);


public AES()throws NoSuchAlgorithmException,NoSuchPaddingException,NoSuchProviderException {
Security.addProvider(new org.bouncycastle.jce.provider.BouncyCastleProvider());
KeyGenerator kgen = KeyGenerator.getInstance(providerkey);
kgen.init(size); // 192和256位可能不可用
SecretKey skey = kgen.generateKey();
byte [] raw = skey.getEncoded();
key = new SecretKeySpec(raw,providerkey);
cipher = Cipher.getInstance(provider); (int x = 0; x<(size / 8); x ++)
ivBytes [x] = 00;
ivSpec = new IvParameterSpec(ivBytes);
}

public void setKey(String keyText){
byte [] bText = new byte [size / 8];
bText = keyText.getBytes();
key = new SecretKeySpec(bText,providerkey);
}

public void setIV(String ivText){
setIV(ivText.getBytes());
}

public void setIV(byte [] ivByte){
byte [] bText = new byte [size / 8];
bText = ivByte;
ivBytes = bText;
ivSpec = new IvParameterSpec(ivBytes);
}

public String encrypt(String message)throws InvalidKeyException,IllegalBlockSizeException,BadPaddingException,InvalidAlgorithmParameterException {
cipher.init(Cipher.ENCRYPT_MODE,key,ivSpec);
byte [] encrypted = cipher.doFinal(message.getBytes());
return byteArrayToHexString(encrypted);
}
public String decrypt(String hexCiphertext)throws IllegalBlockSizeException,BadPaddingException,InvalidKeyException,InvalidAlgorithmParameterException,UnsupportedEncodingException {
cipher.init(Cipher.DECRYPT_MODE,key,ivSpec);
byte [] dec = hexStringToByteArray(hexCiphertext);
byte [] decryptpted = cipher.doFinal(dec);
return new String(decryptpted);
}

private static String byteArrayToHexString(byte [] raw){
String hex =0x;
String s = new String(raw); (int x = 0; x< s.length(); x ++){
char [] t = s.substring(x,x + 1).toCharArray();
hex + = Integer.toHexString((int)t [0])。toUpperCase();
}
返回十六进制;
}

private static byte [] hexStringToByteArray(String hex){
模式替换= Pattern.compile(^ 0x);
String s = replace.matcher(hex).replaceAll();

byte [] b = new byte [s.length()/ 2]; (int i = 0; i< b.length; i ++){
int index = i * 2;

int v = Integer.parseInt(s.substring(index,index + 2),16);
b [i] =(byte)v;
}
return b;
}


}

根据各种各样的结果,我想知道如果有什么东西被弄坏了IV不知何故,但我真的不明白为什么...



看起来像不是IV,如果我硬编码解密仍然不同。如果我硬编码,它会停止变化,但仍然不能正确解密文本: - (。



------------ --------- ===================== -------------------- -



根据owlstead的代码和建议,添加以下创建的最终解决方案,它执行以下操作:

1)有一个随机密钥和iv。初始化。

2)允许您将键或iv指定为常规字符串或十六进制编码字符串。

3)自动截断或填充任何给定的键或iv使其适当的长度。



注意:项目#3可以被视为非常不安全,因为它允许您做一些愚蠢的事情。为了我的目的,我需要它,但请谨慎使用。如果您填空键,则您的内容不会非常安全。



----------- ---------- ===================== ------------------- -

  package com.myclass.util; 

import java.io.UnsupportedEncodingException;
import java.nio.charset.Charset;
import java.security.InvalidAlgorithmParameterException;
import java.security.InvalidKeyException;
import java.security.NoSuchAlgorithmException;
import java.security.NoSuchProviderException;
import java.security.spec.InvalidParameterSpecException;
import java.util.regex.Pattern;
import javax.crypto.BadPaddingException;
import javax.crypto.Cipher;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.KeyGenerator;
import javax.crypto.NoSuchPaddingException;
import javax.crypto.SecretKey;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;

public class AES {
private static Charset PLAIN_TEXT_ENCODING = Charset.forName(UTF-8);
private static String CIPHER_TRANSFORMATION =AES / CTR / NoPadding;
private static String KEY_TYPE =AES;
private static int KEY_SIZE_BITS = 128;

私钥SecretKey键;
private Cipher cipher = Cipher.getInstance(CIPHER_TRANSFORMATION);
private byte [] ivBytes = new byte [KEY_SIZE_BITS / 8];

public AES()throws NoSuchAlgorithmException,NoSuchPaddingException,NoSuchProviderException,InvalidParameterSpecException,InvalidKeyException,InvalidAlgorithmParameterException {
KeyGenerator kgen = KeyGenerator.getInstance(KEY_TYPE);
kgen.init(KEY_SIZE_BITS);
key = kgen.generateKey();
cipher.init(Cipher.ENCRYPT_MODE,key);
ivBytes = cipher.getParameters()。getParameterSpec(IvParameterSpec.class).getIV();
}

public String getIVAsHex(){
return byteArrayToHexString(ivBytes);
}

public String getKeyAsHex(){
return byteArrayToHexString(key.getEncoded());
}

public void setStringToKey(String keyText){
setKey(keyText.getBytes());
}

public void setHexToKey(String hexKey){
setKey(hexStringToByteArray(hexKey));
}

private void setKey(byte [] bArray){
byte [] bText = new byte [KEY_SIZE_BITS / 8];
int end = Math.min(KEY_SIZE_BITS / 8,bArray.length);
System.arraycopy(bArray,0,bText,0,end);
key = new SecretKeySpec(bText,KEY_TYPE);
}

public void setStringToIV(String ivText){
setIV(ivText.getBytes());
}

public void setHexToIV(String hexIV){
setIV(hexStringToByteArray(hexIV));
}

private void setIV(byte [] bArray){
byte [] bText = new byte [KEY_SIZE_BITS / 8];
int end = Math.min(KEY_SIZE_BITS / 8,bArray.length);
System.arraycopy(bArray,0,bText,0,end);
ivBytes = bText;
}

public String encrypt(String message)throws InvalidKeyException,
IllegalBlockSizeException,BadPaddingException,
InvalidAlgorithmParameterException {
cipher.init(Cipher.ENCRYPT_MODE,key ,新的IvParameterSpec(ivBytes));
byte [] encrypted = cipher.doFinal(message.getBytes(PLAIN_TEXT_ENCODING));
return byteArrayToHexString(encrypted);
}

public String decrypt(String hexCiphertext)
throws IllegalBlockSizeException,BadPaddingException,
InvalidKeyException,InvalidAlgorithmParameterException,
UnsupportedEncodingException {
cipher.init (Cipher.DECRYPT_MODE,key,new IvParameterSpec(ivBytes));
byte [] dec = hexStringToByteArray(hexCiphertext);
byte [] decryptpted = cipher.doFinal(dec);
return new String(解密,PLAIN_TEXT_ENCODING);
}

private static String byteArrayToHexString(byte [] raw){
StringBuilder sb = new StringBuilder(2 + raw.length * 2);
sb.append(0x); (int i = 0; i< raw.length; i ++){
sb.append(String.format(%02X,Integer.valueOf(raw [i]& 0xFF))
));
}
return sb.toString();
}

private static byte [] hexStringToByteArray(String hex){
模式替换= Pattern.compile(^ 0x);
String s = replace.matcher(hex).replaceAll();

byte [] b = new byte [s.length()/ 2]; (int i = 0; i< b.length; i ++){
int index = i * 2;

int v = Integer.parseInt(s.substring(index,index + 2),16);
b [i] =(byte)v;
}
return b;
}

}

解决方案

重写,内嵌评论。有趣的是,最大的错误是生成十六进制数,所以我重写了这个方法。这不是完美的,但是我尽可能地保持原始来源。

  import java.io.UnsupportedEncodingException; 
import java.nio.charset.Charset;
import java.security.GeneralSecurityException;
import java.security.InvalidAlgorithmParameterException;
import java.security.InvalidKeyException;
import java.security.NoSuchAlgorithmException;
import java.security.NoSuchProviderException;
import java.security.Security;
import java.util.regex.Pattern;

import javax.crypto.BadPaddingException;
import javax.crypto.Cipher;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.NoSuchPaddingException;
import javax.crypto.SecretKey;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;

import org.bouncycastle.jce.provider.BouncyCastleProvider;

/ *
*添加状态处理!不允许使用相同的密钥/ iv来加密不同的密文!
* /
public class AES {

private static Charset PLAIN_TEXT_ENCODING = Charset.forName(UTF-8);
private static String CIPHER_TRANSFORMATION =AES / CTR / NoPadding;
private static String KEY_TYPE =AES;
// 192和256位可能不可用
private static int KEY_SIZE_BITS = 128;

私人密码密码;
私钥密钥;
private IvParameterSpec iv;

static {
//仅当平台不包含CTR加密时才需要
if(Security.getProvider(BouncyCastleProvider.PROVIDER_NAME)== null){
//只需要一些平台,我假定
Security.addProvider(new org.bouncycastle.jce.provider.BouncyCastleProvider());
}
}

public AES()throws NoSuchAlgorithmException,NoSuchPaddingException,
NoSuchProviderException {
//没有多少使用没有getter
/ /最后的KeyGenerator kgen = KeyGenerator.getInstance(KEY_TYPE);
// kgen.init(KEY_SIZE_BITS);
// key = kgen.generateKey();
cipher = Cipher.getInstance(CIPHER_TRANSFORMATION);
}

public void setKeyHex(String keyText){

byte [] bText = hexStringToByteArray(keyText);
如果(bText.length * Byte.SIZE!= KEY_SIZE_BITS){
抛出新的IllegalArgumentException(
密钥大小错误,期望+ KEY_SIZE_BITS / Byte.SIZE +十六进制字节) ;
}
key = new SecretKeySpec(bText,KEY_TYPE);
}

public void setIVHex(String ivText){
byte [] bText = hexStringToByteArray(ivText);
if(bText.length!= cipher.getBlockSize()){
throw new IllegalArgumentException(
错了IV大小,期待+ cipher.getBlockSize()+十六进制字节) ;
}
iv = new IvParameterSpec(bText);
}

public String encrypt(String message)throws InvalidKeyException,
IllegalBlockSizeException,BadPaddingException,
InvalidAlgorithmParameterException {
cipher.init(Cipher.ENCRYPT_MODE,key ,iv);
byte [] encrypted = cipher.doFinal(message.getBytes(PLAIN_TEXT_ENCODING));
return byteArrayToHexString(encrypted);
}

public String decrypt(String hexCiphertext)
throws IllegalBlockSizeException,BadPaddingException,
InvalidKeyException,InvalidAlgorithmParameterException,
UnsupportedEncodingException {
cipher.init (Cipher.DECRYPT_MODE,key,iv);
byte [] dec = hexStringToByteArray(hexCiphertext);
byte [] decryptpted = cipher.doFinal(dec);
return new String(解密,PLAIN_TEXT_ENCODING);
}

private static String byteArrayToHexString(byte [] raw){
StringBuilder sb = new StringBuilder(2 + raw.length * 2);
sb.append(0x); (int i = 0; i< raw.length; i ++){
sb.append(String.format(%02X,Integer.valueOf(raw [i]& 0xFF))
));
}
return sb.toString();
}

//更好地添加一些输入验证
private static byte [] hexStringToByteArray(String hex){
模式替换= Pattern.compile(^ 0x );
String s = replace.matcher(hex).replaceAll();

byte [] b = new byte [s.length()/ 2]; (int i = 0; i< b.length; i ++){
int index = i * 2;

int v = Integer.parseInt(s.substring(index,index + 2),16);
b [i] =(byte)v;
}
return b;
}

public static void main(String [] args){
try {
String key =0x00010203040406060808090A0B0C0D0E0F;
String iv =0x000102030405060708090A0B0C0D0E0F;

String text =Owlsteads answer;
AES aes = new AES();
aes.setKeyHex(key);
aes.setIVHex(iv);
String cipherHex = aes.encrypt(text);
System.out.println(cipherHex);
String deciphered = aes.decrypt(cipherHex);
System.out.println(解密);
} catch(GeneralSecurityException e){
throw new IllegalStateException(丹麦状态恶化,e);
} catch(UnsupportedEncodingException e){
//即使解密失败也不会总是抛出,添加完整性检查如MAC
throw new IllegalStateException(解密和/或解码纯文本消息失败 ,e);
}
}
}


Something is funky with the following AES class I've written to do encryption and decryption. When I copy of the AES object and I choose to encrypt plain text, and then I immediately attempt to decrypt the text I just encrypted, it doesn't decrypt it fully (and does it differently every time).

e.g. I'm initializing it with a simple JSP like this:

<%@page import="com.myclass.util.AES"%>
<%
        String hexMessage = "0xe800a86d90d2074fbf339aa70b6d0f62f047db15ef04c86b488a1dda3c6c4f2f2bbb444a8c709bbb4c29c7ff1f1e"; 
        String keyText = "12345678abcdefgh";//*/

        AES e = new AES();
        //e.setKey(keyText);
        String plaintext = "This should decode & encode!";
        String ciphertext = e.encrypt(plaintext);
        out.println(ciphertext);
        out.println("<BR>");
        out.println(e.decrypt(ciphertext));    
%>

The output varies on each page load: One time:

0x663D64E6A0AE455AB3D25D5AF2F77C72202627EBA068E6DEBE5F22C31
This should decoÁdìmèåV4ÉkÓ 

Another:

0x5F5CF31961505F01EA9D5B7D7BFC656BD3117725D2EA041183F48
This s2??XêêÈ&ÀܧF?ÒDÒ­?

etc:

0xC7178A34C59F74E5D68F7CE5ED655B670A0B4E715101B4DDC2122460E8
Tà@¼R×ËÖ?_U?xÎÚ?Ba?b4r!©F 

The class I created is below:

package com.myclass.util;

import java.io.UnsupportedEncodingException;
import java.security.InvalidAlgorithmParameterException;
import java.security.InvalidKeyException;
import java.security.NoSuchAlgorithmException;
import java.security.NoSuchProviderException;
import java.security.Security;
import java.util.regex.Pattern;
import javax.crypto.*;
import javax.crypto.spec.*;    

   public class AES {
       private static String provider = "AES/CTR/NoPadding";
       private static String providerkey = "AES";
       private static int size = 128;
       private SecretKeySpec key;
       private Cipher cipher;
       private byte[] ivBytes = new byte[size/8];
       private IvParameterSpec ivSpec = new IvParameterSpec(ivBytes);


       public AES() throws NoSuchAlgorithmException, NoSuchPaddingException, NoSuchProviderException{
           Security.addProvider(new org.bouncycastle.jce.provider.BouncyCastleProvider());
           KeyGenerator kgen = KeyGenerator.getInstance(providerkey);
           kgen.init(size); // 192 and 256 bits may not be available
           SecretKey skey = kgen.generateKey();
           byte[] raw = skey.getEncoded();
           key = new SecretKeySpec(raw, providerkey);
           cipher = Cipher.getInstance(provider);
           for(int x = 0; x < (size/8); x++)
               ivBytes[x] = 00;
           ivSpec = new IvParameterSpec(ivBytes);
       }

       public void setKey(String keyText){
           byte[] bText = new byte[size/8];
           bText = keyText.getBytes();
           key = new SecretKeySpec(bText, providerkey);
       }

       public void setIV(String ivText){
           setIV(ivText.getBytes());
       }

       public void setIV(byte[] ivByte){
           byte[] bText = new byte[size/8];
           bText = ivByte;
           ivBytes = bText;
           ivSpec = new IvParameterSpec(ivBytes);
       }

       public String encrypt(String message) throws InvalidKeyException, IllegalBlockSizeException, BadPaddingException, InvalidAlgorithmParameterException{
           cipher.init(Cipher.ENCRYPT_MODE, key, ivSpec);
           byte[] encrypted = cipher.doFinal(message.getBytes());
           return byteArrayToHexString(encrypted);
       }
       public String decrypt(String hexCiphertext) throws IllegalBlockSizeException, BadPaddingException, InvalidKeyException, InvalidAlgorithmParameterException, UnsupportedEncodingException{
           cipher.init(Cipher.DECRYPT_MODE, key, ivSpec);
           byte[] dec = hexStringToByteArray(hexCiphertext);
           byte[] decrypted = cipher.doFinal(dec);
           return new String(decrypted);
       }

       private static String byteArrayToHexString( byte [] raw ) {
            String hex = "0x";
            String s = new String(raw);
            for(int x = 0; x < s.length(); x++){
                char[] t = s.substring(x, x + 1).toCharArray();
                hex += Integer.toHexString((int) t[0]).toUpperCase();
            }
            return hex;
       }

       private static byte[] hexStringToByteArray(String hex) {
            Pattern replace = Pattern.compile("^0x");
            String s = replace.matcher(hex).replaceAll("");

            byte[] b = new byte[s.length() / 2];
            for (int i = 0; i < b.length; i++){
              int index = i * 2;
              int v = Integer.parseInt(s.substring(index, index + 2), 16);
              b[i] = (byte)v;
            }
            return b;
       }


   }

Based on the varied results, I'm wondering if something is getting messed up with the IV somehow, but I don't really understand why...

[EDIT] Looks like its not the IV, if I hard code that the decrypting still varies. If I hard code the key it stops varying, but still doesn't decrypt the text properly :-(.

--------------------- ===================== ---------------------

Adding the final solution I created below, based on owlstead's code and suggestions. It does the following:
1) Has a random key and iv on initialization.
2) Allows you to specify a key or iv as either a regular string, or as a hex encoded string.
3) Automatically truncates or null pads any given key or iv to make it the appropriate length.

NOTE: Item #3 could be viewed as extremely insecure since it allows you to do something stupid. For my purposes I need it, but please use with caution. If you null pad a short string for a key, your content is not going to be very secure.

--------------------- ===================== ---------------------

package com.myclass.util;

import java.io.UnsupportedEncodingException;
import java.nio.charset.Charset;
import java.security.InvalidAlgorithmParameterException;
import java.security.InvalidKeyException;
import java.security.NoSuchAlgorithmException;
import java.security.NoSuchProviderException;
import java.security.spec.InvalidParameterSpecException;
import java.util.regex.Pattern;
import javax.crypto.BadPaddingException;
import javax.crypto.Cipher;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.KeyGenerator;
import javax.crypto.NoSuchPaddingException;
import javax.crypto.SecretKey;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;

   public class AES {
       private static Charset PLAIN_TEXT_ENCODING = Charset.forName("UTF-8");
       private static String CIPHER_TRANSFORMATION = "AES/CTR/NoPadding";
       private static String KEY_TYPE = "AES";
       private static int KEY_SIZE_BITS = 128;

       private SecretKey key;
       private Cipher cipher = Cipher.getInstance(CIPHER_TRANSFORMATION);
       private byte[] ivBytes = new byte[KEY_SIZE_BITS/8];

   public AES() throws NoSuchAlgorithmException, NoSuchPaddingException, NoSuchProviderException, InvalidParameterSpecException, InvalidKeyException, InvalidAlgorithmParameterException{
       KeyGenerator kgen = KeyGenerator.getInstance(KEY_TYPE);
       kgen.init(KEY_SIZE_BITS); 
       key = kgen.generateKey();
       cipher.init(Cipher.ENCRYPT_MODE, key);
       ivBytes = cipher.getParameters().getParameterSpec(IvParameterSpec.class).getIV();
   }

   public String getIVAsHex(){
       return byteArrayToHexString(ivBytes);
   }

   public String getKeyAsHex(){
       return byteArrayToHexString(key.getEncoded());
   }

   public void setStringToKey(String keyText){
       setKey(keyText.getBytes());
   }

   public void setHexToKey(String hexKey){
       setKey(hexStringToByteArray(hexKey));
   }

   private void setKey(byte[] bArray){
       byte[] bText = new byte[KEY_SIZE_BITS/8];
       int end = Math.min(KEY_SIZE_BITS/8, bArray.length);
       System.arraycopy(bArray, 0, bText, 0, end);
       key = new SecretKeySpec(bText, KEY_TYPE);
   }

   public void setStringToIV(String ivText){
       setIV(ivText.getBytes());
   }

   public void setHexToIV(String hexIV){
       setIV(hexStringToByteArray(hexIV));
   }

   private void setIV(byte[] bArray){
       byte[] bText = new byte[KEY_SIZE_BITS/8];
       int end = Math.min(KEY_SIZE_BITS/8, bArray.length);
       System.arraycopy(bArray, 0, bText, 0, end);
       ivBytes = bText;
   }

    public String encrypt(String message) throws InvalidKeyException,
            IllegalBlockSizeException, BadPaddingException,
            InvalidAlgorithmParameterException {
        cipher.init(Cipher.ENCRYPT_MODE, key, new IvParameterSpec(ivBytes));
        byte[] encrypted = cipher.doFinal(message.getBytes(PLAIN_TEXT_ENCODING));
        return byteArrayToHexString(encrypted);
    }

    public String decrypt(String hexCiphertext)
            throws IllegalBlockSizeException, BadPaddingException,
            InvalidKeyException, InvalidAlgorithmParameterException,
            UnsupportedEncodingException {
        cipher.init(Cipher.DECRYPT_MODE, key, new IvParameterSpec(ivBytes));
        byte[] dec = hexStringToByteArray(hexCiphertext);
        byte[] decrypted = cipher.doFinal(dec);
        return new String(decrypted, PLAIN_TEXT_ENCODING);
    }

    private static String byteArrayToHexString(byte[] raw) {
        StringBuilder sb = new StringBuilder(2 + raw.length * 2);
        sb.append("0x");
        for (int i = 0; i < raw.length; i++) {
            sb.append(String.format("%02X", Integer.valueOf(raw[i] & 0xFF)));
        }
        return sb.toString();
    }

   private static byte[] hexStringToByteArray(String hex) {
        Pattern replace = Pattern.compile("^0x");
        String s = replace.matcher(hex).replaceAll("");

        byte[] b = new byte[s.length() / 2];
        for (int i = 0; i < b.length; i++){
          int index = i * 2;
          int v = Integer.parseInt(s.substring(index, index + 2), 16);
          b[i] = (byte)v;
        }
        return b;
   }

}

解决方案

Rewrote, with comments inline. Funny enough, the biggest mistake was generating the hexadecimals, so I rewrote that method. It's not perfect, but I kept to your original source as much as possible.

import java.io.UnsupportedEncodingException;
import java.nio.charset.Charset;
import java.security.GeneralSecurityException;
import java.security.InvalidAlgorithmParameterException;
import java.security.InvalidKeyException;
import java.security.NoSuchAlgorithmException;
import java.security.NoSuchProviderException;
import java.security.Security;
import java.util.regex.Pattern;

import javax.crypto.BadPaddingException;
import javax.crypto.Cipher;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.NoSuchPaddingException;
import javax.crypto.SecretKey;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;

import org.bouncycastle.jce.provider.BouncyCastleProvider;

/*
 * Add state handling! Don't allow same key/iv for encrypting different cipher text!
 */
public class AES {

    private static Charset PLAIN_TEXT_ENCODING = Charset.forName("UTF-8"); 
    private static String CIPHER_TRANSFORMATION = "AES/CTR/NoPadding";
    private static String KEY_TYPE = "AES";
    // 192 and 256 bits may not be available
    private static int KEY_SIZE_BITS = 128;

    private Cipher cipher;
    private SecretKey key;
    private IvParameterSpec iv;

    static {
        // only needed if the platform does not contain CTR encryption by default
        if (Security.getProvider(BouncyCastleProvider.PROVIDER_NAME) == null) {
            // only needed for some platforms I presume
            Security.addProvider(new org.bouncycastle.jce.provider.BouncyCastleProvider());
        }
    }

    public AES() throws NoSuchAlgorithmException, NoSuchPaddingException,
            NoSuchProviderException {
        // not much use without a getter
//      final KeyGenerator kgen = KeyGenerator.getInstance(KEY_TYPE);
//      kgen.init(KEY_SIZE_BITS);
//      key = kgen.generateKey();
        cipher = Cipher.getInstance(CIPHER_TRANSFORMATION);
    }

    public void setKeyHex(String keyText) {

        byte[] bText = hexStringToByteArray(keyText);
        if (bText.length * Byte.SIZE != KEY_SIZE_BITS) {
            throw new IllegalArgumentException(
                    "Wrong key size, expecting " + KEY_SIZE_BITS / Byte.SIZE + " bytes in hex");
        }
        key = new SecretKeySpec(bText, KEY_TYPE);
    }

    public void setIVHex(String ivText) {
        byte[] bText = hexStringToByteArray(ivText);
        if (bText.length != cipher.getBlockSize()) {
            throw new IllegalArgumentException(
                    "Wrong IV size, expecting " + cipher.getBlockSize() + " bytes in hex");
        }
        iv = new IvParameterSpec(bText);
    }

    public String encrypt(String message) throws InvalidKeyException,
            IllegalBlockSizeException, BadPaddingException,
            InvalidAlgorithmParameterException {
        cipher.init(Cipher.ENCRYPT_MODE, key, iv);
        byte[] encrypted = cipher.doFinal(message.getBytes(PLAIN_TEXT_ENCODING));
        return byteArrayToHexString(encrypted);
    }

    public String decrypt(String hexCiphertext)
            throws IllegalBlockSizeException, BadPaddingException,
            InvalidKeyException, InvalidAlgorithmParameterException,
            UnsupportedEncodingException {
        cipher.init(Cipher.DECRYPT_MODE, key, iv);
        byte[] dec = hexStringToByteArray(hexCiphertext);
        byte[] decrypted = cipher.doFinal(dec);
        return new String(decrypted, PLAIN_TEXT_ENCODING);
    }

    private static String byteArrayToHexString(byte[] raw) {
        StringBuilder sb = new StringBuilder(2 + raw.length * 2);
        sb.append("0x");
        for (int i = 0; i < raw.length; i++) {
            sb.append(String.format("%02X", Integer.valueOf(raw[i] & 0xFF)));
        }
        return sb.toString();
    }

    // better add some input validation
    private static byte[] hexStringToByteArray(String hex) {
        Pattern replace = Pattern.compile("^0x");
        String s = replace.matcher(hex).replaceAll("");

        byte[] b = new byte[s.length() / 2];
        for (int i = 0; i < b.length; i++) {
            int index = i * 2;
            int v = Integer.parseInt(s.substring(index, index + 2), 16);
            b[i] = (byte) v;
        }
        return b;
    }

    public static void main(String[] args) {
        try {
            String key = "0x000102030405060708090A0B0C0D0E0F";
            String iv = "0x000102030405060708090A0B0C0D0E0F";

            String text = "Owlsteads answer";
            AES aes = new AES();
            aes.setKeyHex(key);
            aes.setIVHex(iv);
            String cipherHex = aes.encrypt(text);
            System.out.println(cipherHex);
            String deciphered = aes.decrypt(cipherHex);
            System.out.println(deciphered);
        } catch (GeneralSecurityException e) {
            throw new IllegalStateException("Something is rotten in the state of Denmark", e);
        } catch (UnsupportedEncodingException e) {
            // not always thrown even if decryption fails, add integrity check such as MAC
            throw new IllegalStateException("Decryption and/or decoding plain text message failed", e);
        }
    }
}

这篇关于不加密妥善解密的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆