JWT,JWE,JWS和RSA2
发布时间
阅读量:
阅读量
JWT,以及与JWS和JWE之间的关系
简而言之,JWT是一种安全规范,主要用于在双方之间传递安全数据。而JWS和JWE是实现安全传输的两种方式,JWS用于对传输报文的签名与验签,JWE用于对敏感数据的加密解密。
JWS
官方文档直通车:JWS文档
JWS由三部分组成,header,payload和sign
header主要包含alg:标识用的什么算法加密。
crit:包括header里除了文档里规定字段之外的其他字段。
其他的字段,可视情况而定。
example
{
"alg": "RS256",
"kid": "201909031543",
"crit": ["UPI-UUID", "UPI-TIMESTAMP", "UPI-APPID", "UPI-REQPATH"],
"UPI-UUID": "07d2d-dfaa-412e-88e0-75d038b98237",
"UPI-TIMESTAMP": "1568263226",
"UPI-APPID": "M0050001",
"UPI-REQPATH": "/getInfo"
}
payload,这里可以放非加密数据的报文也可以放官方文档里要求的字段,我在实际应用中,是将报文经过Base64编码之后放在payload里,
sign,对(base64enc)header.(base64enc)payload进行签名,具体用的什么签名算法,根据header里的alg字段判断。
Q1:sign通过base64编码,因为官方文档,我见有写需要base64编码,不然验签报错:
java.security.SignatureException: Signature length not correct: got 344 but was expecting 256
这个问题解决参考博客。概述就是签名和验签的时候用的编码和解码方式要一致。
RSA
以下代码借鉴别人博客,但连接我忘了,
/** * RSA最大加密明文大小
*/
private static final int MAX_ENCRYPT_BLOCK = 1024;
/** * RSA最大解密密文大小
*/
private static final int MAX_DECRYPT_BLOCK = 1024;
/** * 获取密钥对
* * @return 密钥对
*/
public static KeyPair getKeyPair() throws Exception {
KeyPairGenerator generator = KeyPairGenerator.getInstance("RSA");
generator.initialize(1024);
return generator.generateKeyPair();
}
/** * 获取私钥
* * @param privateKey 私钥字符串
* @return
*/
public static PrivateKey getPrivateKey(String privateKey) throws Exception {
KeyFactory keyFactory = KeyFactory.getInstance("RSA");
byte[] decodedKey = Base64.decodeBase64(privateKey.getBytes());
PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(decodedKey);
return keyFactory.generatePrivate(keySpec);
}
/** * 获取公钥
* * @param publicKey 公钥字符串
* @return
*/
public static PublicKey getPublicKey(String publicKey) throws Exception {
KeyFactory keyFactory = KeyFactory.getInstance("RSA");
byte[] decodedKey = Base64.decodeBase64(publicKey.getBytes());
X509EncodedKeySpec keySpec = new X509EncodedKeySpec(new BASE64Decoder().decodeBuffer(publicKey));
return keyFactory.generatePublic(keySpec);
}
/** * RSA加密
* * @param data 待加密数据
* @param publicKey 公钥
* @return
*/
public static String encrypt(String data, PublicKey publicKey) throws Exception {
Cipher cipher = Cipher.getInstance("RSA");
cipher.init(Cipher.ENCRYPT_MODE, publicKey);
int inputLen = data.getBytes().length;
ByteArrayOutputStream out = new ByteArrayOutputStream();
int offset = 0;
byte[] cache;
int i = 0;
// 对数据分段加密
while (inputLen - offset > 0) {
if (inputLen - offset > MAX_ENCRYPT_BLOCK) {
cache = cipher.doFinal(data.getBytes(), offset, MAX_ENCRYPT_BLOCK);
} else {
cache = cipher.doFinal(data.getBytes(), offset, inputLen - offset);
}
out.write(cache, 0, cache.length);
i++;
offset = i * MAX_ENCRYPT_BLOCK;
}
byte[] encryptedData = out.toByteArray();
out.close();
// 获取加密内容使用base64进行编码,并以UTF-8为标准转化成字符串
// 加密后的字符串
return new String(Base64.encodeBase64String(encryptedData));
}
/** * RSA解密
* * @param data 待解密数据
* @param privateKey 私钥
* @return
*/
public static String decrypt(String data, PrivateKey privateKey) throws Exception {
Cipher cipher = Cipher.getInstance("RSA");
cipher.init(Cipher.DECRYPT_MODE, privateKey);
byte[] dataBytes = Base64.decodeBase64(data);
int inputLen = dataBytes.length;
ByteArrayOutputStream out = new ByteArrayOutputStream();
int offset = 0;
byte[] cache;
int i = 0;
// 对数据分段解密
while (inputLen - offset > 0) {
if (inputLen - offset > MAX_DECRYPT_BLOCK) {
cache = cipher.doFinal(dataBytes, offset, MAX_DECRYPT_BLOCK);
} else {
cache = cipher.doFinal(dataBytes, offset, inputLen - offset);
}
out.write(cache, 0, cache.length);
i++;
offset = i * MAX_DECRYPT_BLOCK;
}
byte[] decryptedData = out.toByteArray();
out.close();
// 解密后的内容
return new String(decryptedData, "UTF-8");
}
/** * 签名
* * @param data 待签名数据
* @param privateKey 私钥
* @return 签名
*/
public static String sign(String data, PrivateKey privateKey) throws Exception {
byte[] keyBytes = privateKey.getEncoded();
PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(keyBytes);
KeyFactory keyFactory = KeyFactory.getInstance("RSA");
PrivateKey key = keyFactory.generatePrivate(keySpec);
Signature signature = Signature.getInstance("SHA256withRSA");
signature.initSign(key);
signature.update(data.getBytes());
return new String(Base64.encodeBase64(signature.sign()));
}
/** * 验签
* * @param srcData 原始字符串
* @param publicKey 公钥
* @param sign 签名
* @return 是否验签通过
*/
public static boolean verify(String srcData, PublicKey publicKey, String sign) throws Exception {
byte[] keyBytes = publicKey.getEncoded();
X509EncodedKeySpec keySpec = new X509EncodedKeySpec(keyBytes);
KeyFactory keyFactory = KeyFactory.getInstance("RSA");
PublicKey key = keyFactory.generatePublic(keySpec);
Signature signature = Signature.getInstance("SHA256withRSA");
signature.initVerify(key);
signature.update(srcData.getBytes());
return signature.verify(Base64.decodeBase64(sign.getBytes()));
}
public static PublicKey getPublicKey1(String key) throws Exception {
X509Certificate cert = null;
try {
cert = X509Certificate.getInstance(key.getBytes());
} catch (Exception e) {
e.printStackTrace();
}
PublicKey publicKey = cert.getPublicKey();
return publicKey;
}
比较好使。其中getPublicKey1 是另一种将密钥字符串转publicKey的方式,不同格式的密钥字符串规范,转publicKey类型的时候,是不一样的,对方开发人员没有签名验签和加解密的sdk或者demo。让对方把代码发过来,我才知道,哪里的问题, 关键还是自己知道的少,多读书多看报多敲代码少睡觉,头发一天比一天少。
全部评论 (0)
还没有任何评论哟~
