这篇文章主要介绍了Js参数RSA加密传输之jsencrypt.js的使用,本文给大家介绍的非常详细,具有一定的参考借鉴价值,需要的朋友可以参考下
注意几点: 1、参数传递的+号处理,在传输时会把+变成空格,不处理后端就报错了。(使用正则处理)
前端代码 <!DOCTYPE html> <html lang="en"> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>Login</title> <script src="https://cdn.bootcdn.net/ajax/libs/jquery/3.5.1/jquery.min.js"></script> <script src="https://cdn.bootcdn.net/ajax/libs/jsencrypt/2.1.0/jsencrypt.min.js"></script> <script type="text/javascript"> const publicKey = "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDMWfnBMLY1SbmgHbrDvFEZ/RIc\n" + "zdHvH8VfkrRqEB/8FVX+IPiuNy0Lr5SJjbRaUy2CLwwOyTbUsYEOqIb3j7R/MxpL\n" + "fkZ9ap66hiEtXwwu0pb23/T16lto5cLV87g0r1wi8dHbpEmuvWx8IaH+rOywns5g\n" + "zjjzX8vRZGZBOG41eQIDAQAB"; const privateKey = "MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMxZ+cEwtjVJuaAd\n" + "usO8URn9EhzN0e8fxV+StGoQH/wVVf4g+K43LQuvlImNtFpTLYIvDA7JNtSxgQ6o\n" + "hvePtH8zGkt+Rn1qnrqGIS1fDC7Slvbf9PXqW2jlwtXzuDSvXCLx0dukSa69bHwh\n" + "of6s7LCezmDOOPNfy9FkZkE4bjV5AgMBAAECgYAYvGd0EC5uIt96Vz7tRJVYnP6d\n" + "R/i6hlEA8aQvFoaYoAiJu3n+tKUaPgWv5NxI9rqSgJloDMk7U8U4fgPgYZ/KcnJE\n" + "n8L5hehveywT1S59KZ6yRy5JpCHBsLWvNVZfUoGBZAEZYqH2yF8U9gSveGezRwS6\n" + "+ouHmgvt6DwU/jWeAQJBAPH1VEPZJdVLk1c+QFL22UBkicG5G8Xv5DYJbtsU9QyO\n" + "Sa0tT6L+tPa7FUiAY6tJVSuWHdZLUjLXa2Bn2BsIq0ECQQDYNfAH7+X+6hnNvCMP\n" + "K8BAyJ2HB4P3lXFwNEpgADKq0AviPCPYZSptyvL2YSmCS01K4bZ8tDdPf740ds25\n" + "XxQ5AkEA6bmtc3jwpfDCXJVCt6HCTQSRWbQBUxwfW9+S2UiOSlmsbAAIHJBkqK4h\n" + "qg5zuQM2pcr1+Yp61afoDpFhXQPrwQJBAKP2o4UhZOYgWlkvJ9dFcpKukOfpxyZm\n" + "6pQQ06ZiAAqRo7F5siVU8ww4MHCv1m689GypJ18CvD9JvNDEl9bQR+ECQFxG+0tC\n" + "gTrgJNY/y6p+Bnh5MStjHEwHNoN+d+gzjcl44LMhR16P/nJ8KGHdpe7E9v6WJAjl\n" + "ETKS7Al3+E6nINg="; $(function () { //实例化一个JSEncrypt对象 var encrypt = new JSEncrypt(); //设置公钥 encrypt.setPublicKey(publicKey); //加密得到加密结果 var encodeData = encrypt.encrypt("123456789"); $("#btn").click(function () { $.ajax({ url: '/testRsa', data: "pwd=" + encodeURI(encodeData).replace(/\+/g, '%2B'), //+号的处理:因为数据在网络上传输时,非字母数字字符都将被替换成百分号(%)后跟两位十六进制数,而base64编码在传输到后端的时候,+会变成空格,因此先替换掉。后端再替换回来 type: 'post', success: function (msg) { alert(msg); } }); }); }); </script> </head> <body> <div> <input type="button" id="btn" value="点我" /> </div> </body> </html>2.后端代码
package com.rsa.boot.controller; import com.rsa.boot.utils.RsaUtils; import lombok.extern.slf4j.Slf4j; import org.springframework.web.bind.annotation.PostMapping; import org.springframework.web.bind.annotation.RequestParam; import org.springframework.web.bind.annotation.RestController; /** * @author tanghailan * @date 2020-10-20 15:51 */ @RestController @Slf4j public class RsaController { public static final String privateKey= "MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMxZ+cEwtjVJuaAd\n" + "usO8URn9EhzN0e8fxV+StGoQH/wVVf4g+K43LQuvlImNtFpTLYIvDA7JNtSxgQ6o\n" + "hvePtH8zGkt+Rn1qnrqGIS1fDC7Slvbf9PXqW2jlwtXzuDSvXCLx0dukSa69bHwh\n" + "of6s7LCezmDOOPNfy9FkZkE4bjV5AgMBAAECgYAYvGd0EC5uIt96Vz7tRJVYnP6d\n" + "R/i6hlEA8aQvFoaYoAiJu3n+tKUaPgWv5NxI9rqSgJloDMk7U8U4fgPgYZ/KcnJE\n" + "n8L5hehveywT1S59KZ6yRy5JpCHBsLWvNVZfUoGBZAEZYqH2yF8U9gSveGezRwS6\n" + "+ouHmgvt6DwU/jWeAQJBAPH1VEPZJdVLk1c+QFL22UBkicG5G8Xv5DYJbtsU9QyO\n" + "Sa0tT6L+tPa7FUiAY6tJVSuWHdZLUjLXa2Bn2BsIq0ECQQDYNfAH7+X+6hnNvCMP\n" + "K8BAyJ2HB4P3lXFwNEpgADKq0AviPCPYZSptyvL2YSmCS01K4bZ8tDdPf740ds25\n" + "XxQ5AkEA6bmtc3jwpfDCXJVCt6HCTQSRWbQBUxwfW9+S2UiOSlmsbAAIHJBkqK4h\n" + "qg5zuQM2pcr1+Yp61afoDpFhXQPrwQJBAKP2o4UhZOYgWlkvJ9dFcpKukOfpxyZm\n" + "6pQQ06ZiAAqRo7F5siVU8ww4MHCv1m689GypJ18CvD9JvNDEl9bQR+ECQFxG+0tC\n" + "gTrgJNY/y6p+Bnh5MStjHEwHNoN+d+gzjcl44LMhR16P/nJ8KGHdpe7E9v6WJAjl\n" + "ETKS7Al3+E6nINg="; /** * 测试RSA加解密 * @param pwd 使用公钥加密过的密码 * @return * @throws Exception */ @PostMapping("/testRsa") public String testRsa(@RequestParam String pwd) throws Exception { log.info("加密之后的明文是:"+pwd); log.info("privateKey是:"+privateKey); String password = RsaUtils.decryptByPrivateKey(privateKey,pwd); log.info("解密后的密码为:"+password); return password; } }RsaUtils.java
package com.rsa.boot.utils; import org.apache.commons.codec.binary.Base64; import javax.crypto.Cipher; import java.security.*; import java.security.interfaces.RSAPrivateKey; import java.security.interfaces.RSAPublicKey; import java.security.spec.PKCS8EncodedKeySpec; import java.security.spec.X509EncodedKeySpec; /** * @author https://www.cnblogs.com/nihaorz/p/10690643.html * @description Rsa 工具类,公钥私钥生成,加解密 * @date 2020-05-18 **/ public class RsaUtils { private static final String SRC = "123456"; public static void main(String[] args) throws Exception { System.out.println("\n"); RsaKeyPair keyPair = generateKeyPair(); System.out.println("公钥:" + keyPair.getPublicKey()); System.out.println("私钥:" + keyPair.getPrivateKey()); System.out.println("\n"); test1(keyPair); System.out.println("\n"); test2(keyPair); System.out.println("\n"); } /** * 公钥加密私钥解密 */ private static void test1(RsaKeyPair keyPair) throws Exception { System.out.println("***************** 公钥加密私钥解密开始 *****************"); String text1 = encryptByPublicKey(keyPair.getPublicKey(), RsaUtils.SRC); String text2 = decryptByPrivateKey(keyPair.getPrivateKey(), text1); System.out.println("加密前:" + RsaUtils.SRC); System.out.println("加密后:" + text1); System.out.println("解密后:" + text2); if (RsaUtils.SRC.equals(text2)) { System.out.println("解密字符串和原始字符串一致,解密成功"); } else { System.out.println("解密字符串和原始字符串不一致,解密失败"); } System.out.println("***************** 公钥加密私钥解密结束 *****************"); } /** * 私钥加密公钥解密 * @throws Exception / */ private static void test2(RsaKeyPair keyPair) throws Exception { System.out.println("***************** 私钥加密公钥解密开始 *****************"); String text1 = encryptByPrivateKey(keyPair.getPrivateKey(), RsaUtils.SRC); String text2 = decryptByPublicKey(keyPair.getPublicKey(), text1); System.out.println("加密前:" + RsaUtils.SRC); System.out.println("加密后:" + text1); System.out.println("解密后:" + text2); if (RsaUtils.SRC.equals(text2)) { System.out.println("解密字符串和原始字符串一致,解密成功"); } else { System.out.println("解密字符串和原始字符串不一致,解密失败"); } System.out.println("***************** 私钥加密公钥解密结束 *****************"); } /** * 公钥解密 * * @param publicKeyText 公钥 * @param text 待解密的信息 * @return / * @throws Exception / */ public static String decryptByPublicKey(String publicKeyText, String text) throws Exception { X509EncodedKeySpec x509EncodedKeySpec = new X509EncodedKeySpec(Base64.decodeBase64(publicKeyText)); KeyFactory keyFactory = KeyFactory.getInstance("RSA"); PublicKey publicKey = keyFactory.generatePublic(x509EncodedKeySpec); Cipher cipher = Cipher.getInstance("RSA"); cipher.init(Cipher.DECRYPT_MODE, publicKey); byte[] result = cipher.doFinal(Base64.decodeBase64(text)); return new String(result); } /** * 私钥加密 * * @param privateKeyText 私钥 * @param text 待加密的信息 * @return / * @throws Exception / */ public static String encryptByPrivateKey(String privateKeyText, String text) throws Exception { PKCS8EncodedKeySpec pkcs8EncodedKeySpec = new PKCS8EncodedKeySpec(Base64.decodeBase64(privateKeyText)); KeyFactory keyFactory = KeyFactory.getInstance("RSA"); PrivateKey privateKey = keyFactory.generatePrivate(pkcs8EncodedKeySpec); Cipher cipher = Cipher.getInstance("RSA"); cipher.init(Cipher.ENCRYPT_MODE, privateKey); byte[] result = cipher.doFinal(text.getBytes()); return Base64.encodeBase64String(result); } /** * 私钥解密 * * @param privateKeyText 私钥 * @param text 待解密的文本 * @return / * @throws Exception / */ public static String decryptByPrivateKey(String privateKeyText, String text) throws Exception { PKCS8EncodedKeySpec pkcs8EncodedKeySpec5 = new PKCS8EncodedKeySpec(Base64.decodeBase64(privateKeyText)); KeyFactory keyFactory = KeyFactory.getInstance("RSA"); PrivateKey privateKey = keyFactory.generatePrivate(pkcs8EncodedKeySpec5); Cipher cipher = Cipher.getInstance("RSA"); cipher.init(Cipher.DECRYPT_MODE, privateKey); byte[] result = cipher.doFinal(Base64.decodeBase64(text)); return new String(result); } /** * 公钥加密 * * @param publicKeyText 公钥 * @param text 待加密的文本 * @return / */ public static String encryptByPublicKey(String publicKeyText, String text) throws Exception { X509EncodedKeySpec x509EncodedKeySpec2 = new X509EncodedKeySpec(Base64.decodeBase64(publicKeyText)); KeyFactory keyFactory = KeyFactory.getInstance("RSA"); PublicKey publicKey = keyFactory.generatePublic(x509EncodedKeySpec2); Cipher cipher = Cipher.getInstance("RSA"); cipher.init(Cipher.ENCRYPT_MODE, publicKey); byte[] result = cipher.doFinal(text.getBytes()); return Base64.encodeBase64String(result); } /** * 构建RSA密钥对 * * @return / * @throws NoSuchAlgorithmException / */ public static RsaKeyPair generateKeyPair() throws NoSuchAlgorithmException { KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance("RSA"); keyPairGenerator.initialize(1024); KeyPair keyPair = keyPairGenerator.generateKeyPair(); RSAPublicKey rsaPublicKey = (RSAPublicKey) keyPair.getPublic(); RSAPrivateKey rsaPrivateKey = (RSAPrivateKey) keyPair.getPrivate(); String publicKeyString = Base64.encodeBase64String(rsaPublicKey.getEncoded()); String privateKeyString = Base64.encodeBase64String(rsaPrivateKey.getEncoded()); return new RsaKeyPair(publicKeyString, privateKeyString); } /** * RSA密钥对对象 */ public static class RsaKeyPair { private final String publicKey; private final String privateKey; public RsaKeyPair(String publicKey, String privateKey) { this.publicKey = publicKey; this.privateKey = privateKey; } public String getPublicKey() { return publicKey; } public String getPrivateKey() { return privateKey; } } }需要引入的maven坐标
<dependency> <groupId>commons-codec</groupId> <artifactId>commons-codec</artifactId> </dependency>测试效果如下