先说下RSA概率:

公钥和私钥是通过本地openssl软件生成。

正常:

公钥加密=》私钥解密;

私钥签名=》公钥校验签名

最近做一个项目,对方用java公钥去校验签名,这边java的Demo使用私钥来加密的。

代码如下:

public class SignAccess {

    public String REQ_SERIAL_NO="";
public String REQ_TIME="";
public String ENV_FLAG="";
public String APP_ID="";
public String PRIVATE_KEY=""; public SignAccess(String REQ_SERIAL_NO, String REQ_TIME, String ENV_FLAG, String APP_ID,String PRIVATE_KEY) {
this.REQ_SERIAL_NO = REQ_SERIAL_NO;
this.REQ_TIME = REQ_TIME;
this.ENV_FLAG = ENV_FLAG;
this.APP_ID = APP_ID;
this.PRIVATE_KEY = PRIVATE_KEY;
} /**
* 获取对应的sign值
* @return
*/
public String getSign(){
//组装输入参数map
Map<String,Object> map = new HashMap<>();
map.put("REQ_SERIAL_NO", REQ_SERIAL_NO);
map.put("REQ_TIME", REQ_TIME);
map.put("ENV_FLAG", ENV_FLAG);
map.put("APP_ID", APP_ID);
//给map排序后转换为字符串
StringBuilder sb = new StringBuilder();
final Map<String,Object> sortMap = new TreeMap(new Comparator<String>() { @Override
public int compare(String str1, String str2) {
return str1.compareTo(str2);
}
});
sortMap.putAll(map);
for (final Map.Entry<String,Object> entry : sortMap.entrySet()) {
sb = sb.append(entry.getKey()).append(entry.getValue());
}
String dest = sb.toString();
//sha256加密
String strDes=encrypt(dest);
//私钥加密
byte[] enBytes = null;
byte[] data;
try {
data = strDes.getBytes("UTF-8");
final Cipher cipher = Cipher.getInstance("RSA/ECB/PKCS1Padding");
cipher.init(Cipher.ENCRYPT_MODE, getPrivateKey(PRIVATE_KEY));
for (int i = ; i < data.length; i += ) {
final byte[] doFinal = cipher.doFinal(ArrayUtils.subarray(data, i, i + ));
enBytes = ArrayUtils.addAll(enBytes, doFinal);
}
try {
return Base64.encodeBase64String(enBytes);
} catch (final Exception e) {
System.err.println("Base64出错");
}
} catch (final Exception e) {
System.err.println("私钥加密出错");
}
return "";
} /**
* 秘钥转换方法
* @param key
* @return
*/
public PrivateKey getPrivateKey(String key){
java.security.Security.addProvider(
new org.bouncycastle.jce.provider.BouncyCastleProvider()
);
byte[] keyBytes;
keyBytes = Base64.decodeBase64(key);
final PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(keyBytes);
KeyFactory keyFactory;
try {
keyFactory = KeyFactory.getInstance("RSA");
final PrivateKey privateKey = keyFactory.generatePrivate(keySpec);
return privateKey;
} catch (final Exception e) {
System.err.println("获取私钥出错");
}
return null;
} private String encrypt(final String strSrc) { MessageDigest md = null;
String strDes = null;
try {
// byte[] bt = strSrc.getBytes();
md = MessageDigest.getInstance("SHA-256");
// md.update(bt);
try {
strDes = bytesToHexString(md.digest(strSrc.getBytes("UTF-8")));
} catch (final UnsupportedEncodingException e) {
System.err.println("编码失败");
}
} catch (final NoSuchAlgorithmException e) {
System.err.println("编码失败"); }
return strDes;
}
/**
* 转16进制
*
* @param src
* @return
*/
private String bytesToHexString(final byte[] src) { final StringBuilder stringBuilder = new StringBuilder("");
if (src == null || src.length <= ) {
return null;
}
for (int i = ; i < src.length; i++) {
final int v = src[i] & 0xFF;
final String hv = Integer.toHexString(v);
if (hv.length() < ) {
stringBuilder.append();
}
stringBuilder.append(hv);
}
return stringBuilder.toString();
} public static void main(String args[])
{ String privateKey="MIICWwIBAAKBgQC2TSwydOrZ0Ija3YbloMWXQP6xOIn1DUOiOHCYJkRYTk+FviR+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";
String reqSerialNo="";
String reqTime="";
String envFlag="";
String appId="";
SignAccess signAccess=new SignAccess(reqSerialNo,reqTime,envFlag,appId,privateKey);
System.out.println(signAccess.getSign());
}
}

c#试了N多方式,没有做到签名一致。这里贴下c#的加密和签名的代码

加密解密代码:

using System;
using System.Collections.Generic;
using System.Linq;
using System.Security.Cryptography;
using System.Text;
using System.Threading.Tasks; namespace RSA加密
{
public class RSACSharp
{ public static void test()
{
string de = "iBILuPJFgPMxgpbgN3F2JjD6XjcqRSApjVVbvBBEBDV21Pjj7lTrfhEjSVnJX/MVoZrmX0lxsvoXTMvvVwVF7K7W5hs7Qo+aMN96yWke7wiLEM9M4pPz60A/KSckskiona67tXcqOLXb8N18TKaNCKHv0Ce+GyEKK5+MT7e1vao=";
//string encrypt = RSAEncrypt("", "chenhailong");
byte[] encrypt = RSAEncrypt("APP_IDA2018030910304500031ENV_FLAG0REQ_SERIAL_NO20170310155124REQ_TIME20170310155124");
string name = RSADecrypt(encrypt);
//string name = RSADecrypt(Convert.FromBase64String(de));
Console.WriteLine(encrypt.Length);
Console.WriteLine(Convert.ToBase64String(encrypt));
Console.WriteLine(name);
Console.ReadKey();
} /// <summary>
/// RSA encrypt
/// </summary>
/// <param name="publickey"></param>
/// <param name="content"></param>
/// <returns></returns>
public static byte[] RSAEncrypt(string content)
{
string publickey = @"<RSAKeyValue><Modulus>5m9m14XH3oqLJ8bNGw9e4rGpXpcktv9MSkHSVFVMjHbfv+SJ5v0ubqQxa5YjLN4vc49z7SVju8s0X4gZ6AzZTn06jzWOgyPRV54Q4I0DCYadWW4Ze3e+BOtwgVU1Og3qHKn8vygoj40J6U85Z/PTJu3hN1m75Zr195ju7g9v4Hk=</Modulus><Exponent>AQAB</Exponent></RSAKeyValue>"; string pKey = @"-----BEGIN PUBLIC KEY-----
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC2TSwydOrZ0Ija3YbloMWXQP6x
OIn1DUOiOHCYJkRYTk+FviR+P6EOOSwPLFcd91k65jHZOF91pifQf6tHzFQjhc0p
hTGWsjpHPhGeJ6tgzSZr5xIQmCp4xPW4x7N0Y1vciz3ZBfTZyMu2k3iHgbxT8uPe
KDKD2vZhC0FEOVU0oQIDAQAB
-----END PUBLIC KEY-----";
string pk= EncryptionHelper.RSA_KeyJavaToCsharp(pKey, false);
RSACryptoServiceProvider rsa = new RSACryptoServiceProvider();
byte[] cipherbytes;
rsa.FromXmlString(pk);
cipherbytes = rsa.Encrypt(Encoding.UTF8.GetBytes(content), false); //return Convert.ToBase64String(cipherbytes);
return cipherbytes;
} /// <summary>
/// RSA decrypt
/// </summary>
/// <param name="privatekey"></param>
/// <param name="content"></param>
/// <returns></returns>
public static string RSADecrypt(byte[] content)
{
string privatekey = @"<RSAKeyValue><Modulus>5m9m14XH3oqLJ8bNGw9e4rGpXpcktv9MSkHSVFVMjHbfv+SJ5v0ubqQxa5YjLN4vc49z7SVju8s0X4gZ6AzZTn06jzWOgyPRV54Q4I0DCYadWW4Ze3e+BOtwgVU1Og3qHKn8vygoj40J6U85Z/PTJu3hN1m75Zr195ju7g9v4Hk=</Modulus><Exponent>AQAB</Exponent><P>/hf2dnK7rNfl3lbqghWcpFdu778hUpIEBixCDL5WiBtpkZdpSw90aERmHJYaW2RGvGRi6zSftLh00KHsPcNUMw==</P><Q>6Cn/jOLrPapDTEp1Fkq+uz++1Do0eeX7HYqi9rY29CqShzCeI7LEYOoSwYuAJ3xA/DuCdQENPSoJ9KFbO4Wsow==</Q><DP>ga1rHIJro8e/yhxjrKYo/nqc5ICQGhrpMNlPkD9n3CjZVPOISkWF7FzUHEzDANeJfkZhcZa21z24aG3rKo5Qnw==</DP><DQ>MNGsCB8rYlMsRZ2ek2pyQwO7h/sZT8y5ilO9wu08Dwnot/7UMiOEQfDWstY3w5XQQHnvC9WFyCfP4h4QBissyw==</DQ><InverseQ>EG02S7SADhH1EVT9DD0Z62Y0uY7gIYvxX/uq+IzKSCwB8M2G7Qv9xgZQaQlLpCaeKbux3Y59hHM+KpamGL19Kg==</InverseQ><D>vmaYHEbPAgOJvaEXQl+t8DQKFT1fudEysTy31LTyXjGu6XiltXXHUuZaa2IPyHgBz0Nd7znwsW/S44iql0Fen1kzKioEL3svANui63O3o5xdDeExVM6zOf1wUUh/oldovPweChyoAdMtUzgvCbJk1sYDJf++Nr0FeNW1RB1XG30=</D></RSAKeyValue>"; string priK = @"-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----";
string pk = EncryptionHelper.RSA_KeyJavaToCsharp(priK, true);
RSACryptoServiceProvider rsa = new RSACryptoServiceProvider();
byte[] cipherbytes;
rsa.FromXmlString(pk);
cipherbytes = rsa.Decrypt(content, false); return Encoding.UTF8.GetString(cipherbytes);
}
}
}

将java密钥转换为c#密钥方法:

        ///RSA秘钥
///是否为RSA私钥:true:是|false:否
///
public static string RSA_KeyJavaToCsharp(string rsakeys, bool isPrivateKey)
{
try
{
using (var memoryStream = new MemoryStream())
using (var streamWriter = new StreamWriter(memoryStream))
using (var streamReader = new StreamReader(memoryStream))
{
streamWriter.Write(rsakeys);
streamWriter.Flush();
memoryStream.Position = ;
var pemReader = new PemReader(streamReader);
object keys = pemReader.ReadObject();
RSA rsaservice = isPrivateKey ? GetPrivateRSACSharp(keys) : GetPublicRSACsharp(keys);
return rsaservice.ToXmlString(isPrivateKey);
}
}
catch (Exception ex)
{
throw new Exception("Asymmetric cipher key is error");
}
} /// /// 传入RSA秘钥对象返回读取秘钥后的RSA对象
/// ///RSA私钥
///
private static RSA GetPrivateRSACSharp(object rsakeys)
{
//根据传入对象 强制转化为需要的对象 提供已经读取私钥的RSA对象
if ((rsakeys as RsaPrivateCrtKeyParameters) != null)
return DotNetUtilities.ToRSA((RsaPrivateCrtKeyParameters)rsakeys);
var keys = (AsymmetricCipherKeyPair)rsakeys;
return DotNetUtilities.ToRSA((RsaPrivateCrtKeyParameters)keys.Private);
} /// /// 传入RSA秘钥对象返回读取秘钥后的RSA对象
/// ///RSA公钥
///
private static RSA GetPublicRSACsharp(object rsakeys)
{
//提供已经读取公钥钥的RSA对象
var keys = (RsaKeyParameters)rsakeys;
return DotNetUtilities.ToRSA(keys);
}

签名的方法:

        ///

        /// RSA C# 填充签名
/// ///私钥
///待签名字符串
///编码对象
///加密算法
///
public static string RSA_GetSignCsharp(string privateKey, string body, Encoding encoding, EncryptType encryptType = EncryptType.MD5)
{
try
{
using (RSACryptoServiceProvider rsaservice = new RSACryptoServiceProvider())
{
rsaservice.FromXmlString(privateKey);
RSAPKCS1SignatureFormatter rsasignformatter = new RSAPKCS1SignatureFormatter(rsaservice);
rsasignformatter.SetHashAlgorithm(encryptType.ToString());
encoding = encoding ?? Encoding.UTF8;
byte[] hashBytes = GetComputeHash(body, encoding, encryptType);
byte[] signBytes = rsasignformatter.CreateSignature(hashBytes);
return Convert.ToBase64String(signBytes);
}
}
catch (Exception ex)
{
throw ex;
}
} /// /// 根据编码及Hash类型计算Hash值
/// ///待计算Hash值得字符串
///编码对象
///Hash类型
///
public static byte[] GetComputeHash(string body, Encoding encoding, EncryptType encryptType)
{
encoding = encoding ?? Encoding.UTF8;
byte[] sourceBytes = encoding.GetBytes(body);
return GetComputeHash(sourceBytes, encryptType);
}

校验签名方法:

        ///

        /// RSA C# 验证签名
/// ///公钥
///待验证数据
///签名结果
///编码 可传NULL
///签名时加密方式 可传NULL
///
public static bool RSA_GetVerifyCsharp(string publicKey, string body, string signature, Encoding encoding, EncryptType encryptType = EncryptType.MD5)
{
try
{
using (RSACryptoServiceProvider rsaservice = new RSACryptoServiceProvider())
{
rsaservice.FromXmlString(publicKey);//加载公钥
RSAPKCS1SignatureDeformatter rsasignformatter = new RSAPKCS1SignatureDeformatter(rsaservice);
rsasignformatter.SetHashAlgorithm(encryptType.ToString());//设置算法
encoding = encoding ?? Encoding.UTF8;
var dataBytes = GetComputeHash(body, encoding, encryptType);
var signBytes = Convert.FromBase64String(signature);
return rsasignformatter.VerifySignature(dataBytes, signBytes);
}
}
catch (Exception ex)
{
throw ex;
}
}

最后按照java代码来翻译代码也没有成功,就用IKVM将jar包转换为dll终于达到目的。

第一步:将java代码打包,我这里用的idea打的包,百度下都有,这里不重复介绍。

https://www.cnblogs.com/qifengshi/p/6036870.html

https://jingyan.baidu.com/article/7e4409531fbf292fc1e2ef51.html

第二步:将jar包转换为dll。

转的步骤:https://www.cnblogs.com/rucwxb/p/7494586.html

这里要注意下:IKVM一定要用最新版本8.1.7版本,才能转java8,开始用的7.2版本,怎么转引用包都出问题。

第三步:将dll引用。

RSA加密、解密、签名、校验签名的更多相关文章

  1. Cryptopp iOS 使用 RSA加密解密和签名验证签名

    Cryptopp 是一个c++写的功能完善的密码学工具,类似于openssl 官网:https://www.cryptopp.com 以下主要演示Cryptopp 在iOS上的RSA加密解密签名与验证 ...

  2. RSA 加密 解密 公钥 私钥 签名 加签 验签

    http://blog.csdn.net/21aspnet/article/details/7249401# http://www.ruanyifeng.com/blog/2013/06/rsa_al ...

  3. openssl 非对称加密 RSA 加密解密以及签名验证签名

    1. 简介 openssl  rsa.h 提供了密码学中公钥加密体系的一些接口, 本文主要讨论利用rsa.h接口开发以下功能 公钥私钥的生成 公钥加密,私钥解密 私钥加密,公钥解密 签名:私钥签名 验 ...

  4. Java使用RSA加密解密签名及校验

    RSA加密解密类: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ...

  5. iOS使用Security.framework进行RSA 加密解密签名和验证签名

    iOS 上 Security.framework为我们提供了安全方面相关的api: Security框架提供的RSA在iOS上使用的一些小结 支持的RSA keySize 大小有:512,768,10 ...

  6. C#的RSA加密解密签名,就为了支持PEM PKCS#8格式密钥对的导入导出

    差点造了一整个轮子 .Net Framework 4.5 里面的RSA功能,并未提供简单对PEM密钥格式的支持(.Net Core有咩?),差点(还远着)造了一整个轮子,就为了支持PEM PKCS#8 ...

  7. RSA加密解密及RSA签名和验证及证书

    RSA加密解密及RSA签名和验证及证书 公钥是给别人的 发送密文使用公钥加密 验证签名使用公钥验证 私钥是自己保留的 接受密文使用私钥解密 发送签名使用私钥签名 上述过程逆转是不行的,比如使用私钥加密 ...

  8. 【转】C#中RSA加密解密和签名与验证的实现

    [转]C#中RSA加密解密和签名与验证的实现 RSA加密算法是一种非对称加密算法.在公钥加密标准和电子商业中RSA被广泛使用.RSA是1977年由罗纳德•李维斯特(Ron Rivest).阿迪•萨莫尔 ...

  9. RSA加密解密及RSA签名和验证

    原文:RSA加密解密及RSA签名和验证 1.RSA加密解密: (1)获取密钥,这里是产生密钥,实际应用中可以从各种存储介质上读取密钥 (2)加密 (3)解密2.RSA签名和验证 (1)获取密钥,这里是 ...

  10. RSA加密解密及数字签名Java实现--转

    RSA公钥加密算法是1977年由罗纳德·李维斯特(Ron Rivest).阿迪·萨莫尔(Adi Shamir)和伦纳德·阿德曼(Leonard Adleman)一起提出的.当时他们三人都在麻省理工学院 ...

随机推荐

  1. bootstrap导航菜单

    <!DOCTYPE html><html lang="zh-cn"><head><meta charset="utf-8&quo ...

  2. HDU 1540 Tunnel Warfare (线段树或set水过)

    题意:D代表破坏村庄,R代表修复最后被破坏的那个村庄,Q代表询问包括x在内的最大连续区间是多少. 析:首先可以用set水过,set用来记录每个被破坏的村庄,然后查找时,只要查找左右两个端点好. 用线段 ...

  3. portableDFS-可便携的分布式文件系统

    PPT下载(因附件大小有限制,删除了PPT中的隐藏页,如需完整版本,请转到it168文库下载):portableDFS-可便携的分布式文件系统.ppt 完整版本请上这里下载:http://wenku. ...

  4. android获取USB设备的名称

    1.注释内 .是三星设备可能不支持,需要更换的代码. 2.mUsbManager.是getSystemService(Context.USB_SERVICE)获的. 3. 从stackoverflow ...

  5. 【留用】C#的一些好的书籍

    浏览博客的时候发现一篇推荐的C#书籍,感觉真的不错,涉略过几本,水平问题,没看的很深入,正在努力,留用了!!! http://www.cnblogs.com/tongming/p/3879752.ht ...

  6. asp.net get图

    前段 <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1" runat=& ...

  7. 第八篇 Python异常

    程序在运行时,如果Python解释器遇到一个错误,会停止程序的执行,并且提示一些错误信息,这就是异常,程序通知执行并且提示错误信息,这个动作,我们通常称之为:抛出异常. 1.简单的捕获异常的语法 在程 ...

  8. 【bzoj1009】: [HNOI2008]GT考试 字符串-kmp-矩阵乘法-DP

    [bzoj1009]: [HNOI2008]GT考试 先用kmp写个暴力 /* http://www.cnblogs.com/karl07/ */ #include <cstdlib> # ...

  9. html->head->body

    ps:大师兄的博客链接http://www.imdsx.cn/ http://ui.imdsx.cn/html/ html 相当于一个人 css 相当于为这个人穿上漂亮的衣服,化妆 js    相当于 ...

  10. centos6.7安装tomcat

    一.配置环境 安装环境: centos6.7   jdk1.8.0   tomcat8.5 1.到官网下载tomcat 二.下载安装tomcat 1.通过xsheel工具rz命令上传tomcat安装包 ...