之前要写接口aes加密传输,涉及到经常会遇到
后端代码
import cn.hutool.core.codec.Base64; import cn.hutool.core.util.HexUtil; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.springframework.stereotype.Component; import javax.crypto.Cipher; import javax.crypto.NoSuchPaddingException; import javax.crypto.spec.IvParameterSpec; import javax.crypto.spec.SecretKeySpec; import java.security.Key; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import java.util.Arrays; /** * @Date: 1900/7/7 11:01 * @Description: AES加密工具类 * @Version: 1.0 */ @Component public class AesUtil { /** * @author ngh * AES128 算法 * <p> * CBC 模式 * <p> * PKCS7Padding 填充模式 * <p> * CBC模式需要添加一个参数iv * <p> * 介于java 不支持PKCS7Padding,只支持PKCS5Padding 但是PKCS7Padding 和 PKCS5Padding 没有什么区别 */ private Key key; private Cipher cipher; String aesKey = "1111bat1977"; byte[] iv = "7773066605060999".getBytes(); byte[] keyBytes = aesKey.getBytes(); public void init(byte[] keyBytes) { // 如果密钥不足16位,那么就补足. 这个if 中的内容很重要 int base = 16; if (keyBytes.length % base != 0) { int groups = keyBytes.length / base + (keyBytes.length % base != 0 ? 1 : 0); byte[] temp = new byte[groups * base]; Arrays.fill(temp, (byte) 0); System.arraycopy(keyBytes, 0, temp, 0, keyBytes.length); keyBytes = temp; } // 初始化 Security.addProvider(new BouncyCastleProvider()); // 转化成JAVA的密钥格式 key = new SecretKeySpec(keyBytes, CipherType.AES_ALGORITHM); try { // 初始化cipher cipher = Cipher.getInstance(CipherType.AES_CBC_PKC7PADDING, "BC"); } catch (NoSuchAlgorithmException e) { // TODO Auto-generated catch block e.printStackTrace(); } catch (NoSuchPaddingException e) { // TODO Auto-generated catch block e.printStackTrace(); } catch (NoSuchProviderException e) { // TODO Auto-generated catch block e.printStackTrace(); } } public String encrypt(String content) { return Base64.encode(encrypt(content.getBytes(), keyBytes)); } public String encrypt(String content, String keyBytes) { return Base64.encode(encrypt(content.getBytes(), keyBytes.getBytes())); } public String encryptByHex(String content, String keyBytes) { return HexUtil.encodeHexStr(encrypt(content.getBytes(), keyBytes.getBytes())); } public String encryptByHex(String content) { return HexUtil.encodeHexStr(encrypt(content.getBytes(), keyBytes)); } /** * 加密方法 * * @param content 要加密的字符串 * @param keyBytes 加密密钥 * @return */ public byte[] encrypt(byte[] content, byte[] keyBytes) { byte[] encryptedText = null; keyBytes = new String(keyBytes).getBytes(); init(keyBytes); try { cipher.init(Cipher.ENCRYPT_MODE, key, new IvParameterSpec(iv)); encryptedText = cipher.doFinal(content); } catch (Exception e) { // TODO Auto-generated catch block e.printStackTrace(); } return encryptedText; } public String decrypt(String encryptedData) { return new String(decrypt(Base64.decode(encryptedData), keyBytes)); } public String decrypt(String encryptedData, String keyData) { return new String(decrypt(Base64.decode(encryptedData), keyData.getBytes())); } public String decryptByHex(String encryptedData, String keyData) { return new String(decrypt(HexUtil.decodeHex(encryptedData), keyData.getBytes())); } public String decryptByHex(String encryptedData) { return new String(decrypt(HexUtil.decodeHex(encryptedData), keyBytes)); } /** * 解密方法 * * @param encryptedData 要解密的字符串 * @param keyBytes 解密密钥 * @return */ public byte[] decrypt(byte[] encryptedData, byte[] keyBytes) { byte[] encryptedText = null; init(keyBytes); try { cipher.init(Cipher.DECRYPT_MODE, key, new IvParameterSpec(iv)); encryptedText = cipher.doFinal(encryptedData); } catch (Exception e) { e.printStackTrace(); } return encryptedText; } public static void main(String[] args) { AesUtil aes = new AesUtil(); //加密字符串 String content = "{/"userName/":/"12/",/"userPhone/":/"123/"}"; System.out.println("加密前的:" + content); // 加密方法 String encStr = aes.encryptByHex(content); System.out.println("加密后的内容:" + encStr); // 解密方法 String decStr = aes.decryptByHex(encStr); System.out.println("解密后的内容:" + decStr); } }
跑一下main方法,执行结果
加密前的:{"userName":"12","userPhone":"123"} 加密后的内容:989f16833c907f8168a6dc81424f136726a2fdf587f83360d8e24ef4506ffbfd69f0a7453a97dcc609acb3d312b4bf77 解密后的内容:{"userName":"12","userPhone":"123"}
前端代码
import CryptoJS from 'crypto-js'; const KEY = '1111bat1977';
const IV = '7773066605060999';
// 添加偏移量 function fillKey(key, keySize) { keySize = keySize || 128; let filledKey = Buffer.alloc(keySize / 8); let keys = Buffer.from(key); if (keys.length < filledKey.length) { for (let i = 0; i < filledKey.length; i++) { filledKey[i] = keys[i]; } } return filledKey; } // 加密 export const encrypt = message => { const keyAccept = CryptoJS.lib.WordArray.create(fillKey(KEY, 128)); const giv = CryptoJS.enc.Utf8.parse(IV); let messageJson = ''; if (typeof message === 'object') { messageJson = JSON.stringify(message); } else { messageJson = message; } return base64ToHex(CryptoJS.AES.encrypt(messageJson, keyAccept, { iv: giv, mode: CryptoJS.mode.CBC, padding: CryptoJS.pad.Pkcs7, }).toString()); }; // 解密 export const decrypt = encryptedBase64Str => { const resBase64 = hexToBase64(encryptedBase64Str) const keyResponse = CryptoJS.lib.WordArray.create(fillKey(KEY, 128)); const giv = CryptoJS.enc.Utf8.parse(IV); const decrypt = CryptoJS.AES.decrypt(resBase64, keyResponse, { iv: giv, mode: CryptoJS.mode.CBC, padding: CryptoJS.pad.Pkcs7, }); const message = decrypt.toString(CryptoJS.enc.Utf8); return JSON.parse(message); }; export const hexToBase64 = data => { const d = CryptoJS.enc.Hex.parse(data); return CryptoJS.enc.Base64.stringify(d); }; export const base64ToHex = data => { const d = CryptoJS.enc.Base64.parse(data); return CryptoJS.enc.Hex.stringify(d); };
1111bat1977
原创文章,作者:,如若转载,请注明出处:https://blog.ytso.com/273828.html