0


解决cryptoJS.AES默认参数加密,java无法解密的问题

有时候我们需要跨编程语言进行加密加密。比如nodejs里面加密,java里面解密,或者反过来java加密,nodejs解密。node可以使用cryptojs,java可以使用javax.crypto.Cipher包。

网上有很多关于这方面的文章。然而如果node使用了默认的参数进行加密(比如现有业务已经生成了一些已经加密的数据),需要java进行解密,这时候按照默认的方法就无法正常解密了。一般的aes加密使用的是16位的key,而cryptojs默认的key可以任意长度。

cryptoJS.AES默认参数加密代码:

const cryptoJS = require("crypto-js");
const encryptedValue = cryptoJS.AES.encrypt(value, secret).toString()

对应的java解密的示例代码:

  try {
            byte[] cipherData = cn.hutool.core.codec.Base64.decode(encryptedText);

            byte[] saltData = Arrays.copyOfRange(cipherData, 8, 16);

            MessageDigest md5 = MessageDigest.getInstance("MD5");

            final byte[][] keyAndIV = GenerateKeyAndIV(32, 16, 1, saltData, secret.getBytes(StandardCharsets.UTF_8), md5);

            SecretKeySpec key = new SecretKeySpec(keyAndIV[0], "AES");

            IvParameterSpec iv = new IvParameterSpec(keyAndIV[1]);

            byte[] encrypted = Arrays.copyOfRange(cipherData, 16, cipherData.length);

            Cipher aesCBC = Cipher.getInstance("AES/CBC/PKCS5Padding");

            aesCBC.init(Cipher.DECRYPT_MODE, key, iv);

            byte[] decryptedData = aesCBC.doFinal(encrypted);
            return new String(decryptedData, StandardCharsets.UTF_8);
        } catch (Exception e) {
            //log.error("aesDecrypt error.param={}", encryptedText, e);
            return null;
        }

以上代码来自参考自:https://www.pianshen.com/question/31931314701/

上面只是演示了如何进行node加密,java解密;而java默认加密的值,node也是无法解密的,需要采用以下写法。

java加密示例代码

        try {
            byte[] input = datastr.getBytes();
            // 以下两个变量不可修改,否则java加密的,node无法解密
            byte[] saltData = "DFބf$t:".getBytes();
            byte[] preData = "Salted__".getBytes();
            MessageDigest md5 = MessageDigest.getInstance("MD5");
            final byte[][] keyAndIV = GenerateKeyAndIV(32, 16, 1, saltData, secret.getBytes(StandardCharsets.UTF_8), md5);

            SecretKeySpec key = new SecretKeySpec(keyAndIV[0], "AES");

            IvParameterSpec iv = new IvParameterSpec(keyAndIV[1]);
            Cipher aesCBC = Cipher.getInstance("AES/CBC/PKCS5Padding");

            aesCBC.init(Cipher.ENCRYPT_MODE, key, iv);

            byte[] encrypt = aesCBC.doFinal(input);
            byte[] encryptedData = addBytes(saltData, encrypt);
            return cn.hutool.core.codec.Base64.encode(addBytes(preData, encryptedData));
        } catch (Exception e) {
            log.error("aesEncrypt error.param={}", datastr, e);
            return null;
        }

上述代码亲测有效,使用前可以自己测试测试

对应的node解密示例代码

const cryptoJS = require("crypto-js");
let decryptedValue = cryptoJS.AES.decrypt(value, secret).toString(cryptoJS.enc.Utf8);

完整代码示例


import lombok.extern.slf4j.Slf4j;

import javax.crypto.Cipher;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
import java.nio.charset.StandardCharsets;
import java.security.DigestException;
import java.security.MessageDigest;
import java.util.Arrays;

/**
 *
 * 兼容node
 *
 */
@Slf4j
public class AESUtils {

    public static String aesEncrypt(String datastr, String secret) {
        try {
            byte[] input = datastr.getBytes();
            // 以下两个变量不可修改,否则java加密的,node无法解密
            byte[] saltData = "DFބf$t:".getBytes();
            byte[] preData = "Salted__".getBytes();
            MessageDigest md5 = MessageDigest.getInstance("MD5");
            final byte[][] keyAndIV = GenerateKeyAndIV(32, 16, 1, saltData, secret.getBytes(StandardCharsets.UTF_8), md5);

            SecretKeySpec key = new SecretKeySpec(keyAndIV[0], "AES");

            IvParameterSpec iv = new IvParameterSpec(keyAndIV[1]);
            Cipher aesCBC = Cipher.getInstance("AES/CBC/PKCS5Padding");

            aesCBC.init(Cipher.ENCRYPT_MODE, key, iv);

            byte[] encrypt = aesCBC.doFinal(input);
            byte[] encryptedData = addBytes(saltData, encrypt);
            return cn.hutool.core.codec.Base64.encode(addBytes(preData, encryptedData));
        } catch (Exception e) {
            log.error("aesEncrypt error.param={}", datastr, e);
            return null;
        }
    }

    public static String aesDecrypt(String encryptedText, String secret){
        // 参考文章:https://www.pianshen.com/question/31931314701/
        try {
            byte[] cipherData = cn.hutool.core.codec.Base64.decode(encryptedText);

            byte[] saltData = Arrays.copyOfRange(cipherData, 8, 16);

            MessageDigest md5 = MessageDigest.getInstance("MD5");

            final byte[][] keyAndIV = GenerateKeyAndIV(32, 16, 1, saltData, secret.getBytes(StandardCharsets.UTF_8), md5);

            SecretKeySpec key = new SecretKeySpec(keyAndIV[0], "AES");

            IvParameterSpec iv = new IvParameterSpec(keyAndIV[1]);

            byte[] encrypted = Arrays.copyOfRange(cipherData, 16, cipherData.length);

            Cipher aesCBC = Cipher.getInstance("AES/CBC/PKCS5Padding");

            aesCBC.init(Cipher.DECRYPT_MODE, key, iv);

            byte[] decryptedData = aesCBC.doFinal(encrypted);
            return new String(decryptedData, StandardCharsets.UTF_8);
        } catch (Exception e) {
            log.error("aesDecrypt error.param={}", encryptedText, e);
            return null;
        }
    }

    public static byte[][] GenerateKeyAndIV(int keyLength, int ivLength, int iterations, byte[] salt, byte[] password, MessageDigest md) {

        int digestLength = md.getDigestLength();

        int requiredLength = (keyLength + ivLength + digestLength - 1) / digestLength * digestLength;

        byte[] generatedData = new byte[requiredLength];

        int generatedLength = 0;

        try {

            md.reset();

// Repeat process until sufficient data has been generated

            while (generatedLength < keyLength + ivLength) {

// Digest data (last digest if available, password data, salt if available)

                if (generatedLength > 0)

                    md.update(generatedData, generatedLength - digestLength, digestLength);

                md.update(password);

                if (salt != null)

                    md.update(salt, 0, 8);

                md.digest(generatedData, generatedLength, digestLength);

// additional rounds

                for (int i = 1; i < iterations; i++) {

                    md.update(generatedData, generatedLength, digestLength);

                    md.digest(generatedData, generatedLength, digestLength);

                }

                generatedLength += digestLength;

            }

// Copy key and IV into separate byte arrays

            byte[][] result = new byte[2][];

            result[0] = Arrays.copyOfRange(generatedData, 0, keyLength);

            if (ivLength > 0)

                result[1] = Arrays.copyOfRange(generatedData, keyLength, keyLength + ivLength);

            return result;

        } catch (DigestException e) {

            throw new RuntimeException(e);

        } finally {

// Clean out temporary data

            Arrays.fill(generatedData, (byte)0);

        }

    }

    public static byte[] addBytes(byte[] data1, byte[] data2) {

        byte[] data3 = new byte[data1.length + data2.length];

        System.arraycopy(data1, 0, data3, 0, data1.length);

        System.arraycopy(data2, 0, data3, data1.length, data2.length);

        return data3;

    }

    public static void main(String[] args) {
        String secret = "aabbccddeeff";
        String datastr = "{\"m\":\"images\",\"u\":\"0\",\"t\":\"20230322\",\"f\":\"16794597950146230.png\"}";

        String t = aesEncrypt(datastr, secret);
        System.out.println(t);
        System.out.println(aesDecrypt(t, secret));

    }
}
标签: 安全 node.js java

本文转载自: https://blog.csdn.net/koppel/article/details/129735097
版权归原作者 kaiping.liu 所有, 如有侵权,请联系我们删除。

“解决cryptoJS.AES默认参数加密,java无法解密的问题”的评论:

还没有评论