Java前后端AES加密解密
之前要写接口aes加密传输,涉及到前后端交互,经常会遇到各种问题,这边记录一下,方便后期避坑
后端代码
import cn.hutool.core.codec.Base64; import cn.hutool.core.util.HexUtil; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.springframework.stereotype.Component; import javax.crypto.Cipher; import javax.crypto.NoSuchPaddingException; import javax.crypto.spec.IvParameterSpec; import javax.crypto.spec.SecretKeySpec; import java.security.Key; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Security; import java.util.Arrays; /** * @Date: 1900/7/7 11:01 * @Description: AES加密工具类 * @Version: 1.0 */ @Component public class AesUtil { /** * @author ngh * AES128 算法 * <p> * CBC 模式 * <p> * PKCS7Padding 填充模式 * <p> * CBC模式需要添加一个参数iv * <p> * 介于java 不支持PKCS7Padding,只支持PKCS5Padding 但是PKCS7Padding 和 PKCS5Padding 没有什么区别 */ private Key key; private Cipher cipher; String aesKey = "1111bat1977"; byte[] iv = "7773066605060999".getBytes(); byte[] keyBytes = aesKey.getBytes(); public void init(byte[] keyBytes) { // 如果密钥不足16位,那么就补足. 这个if 中的内容很重要 int base = 16; if (keyBytes.length % base != 0) { int groups = keyBytes.length / base + (keyBytes.length % base != 0 ? 1 : 0); byte[] temp = new byte[groups * base]; Arrays.fill(temp, (byte) 0); System.arraycopy(keyBytes, 0, temp, 0, keyBytes.length); keyBytes = temp; } // 初始化 Security.addProvider(new BouncyCastleProvider()); // 转化成JAVA的密钥格式 key = new SecretKeySpec(keyBytes, CipherType.AES_ALGORITHM); try { // 初始化cipher cipher = Cipher.getInstance(CipherType.AES_CBC_PKC7PADDING, "BC"); } catch (NoSuchAlgorithmException e) { // TODO Auto-generated catch block e.printStackTrace(); } catch (NoSuchPaddingException e) { // TODO Auto-generated catch block e.printStackTrace(); } catch (NoSuchProviderException e) { // TODO Auto-generated catch block e.printStackTrace(); } } public String encrypt(String content) { return Base64.encode(encrypt(content.getBytes(), keyBytes)); } public String encrypt(String content, String keyBytes) { return Base64.encode(encrypt(content.getBytes(), keyBytes.getBytes())); } public String encryptByHex(String content, String keyBytes) { return HexUtil.encodeHexStr(encrypt(content.getBytes(), keyBytes.getBytes())); } public String encryptByHex(String content) { return HexUtil.encodeHexStr(encrypt(content.getBytes(), keyBytes)); } /** * 加密方法 * * @param content 要加密的字符串 * @param keyBytes 加密密钥 * @return */ public byte[] encrypt(byte[] content, byte[] keyBytes) { byte[] encryptedText = null; keyBytes = new String(keyBytes).getBytes(); init(keyBytes); try { cipher.init(Cipher.ENCRYPT_MODE, key, new IvParameterSpec(iv)); encryptedText = cipher.doFinal(content); } catch (Exception e) { // TODO Auto-generated catch block e.printStackTrace(); } return encryptedText; } public String decrypt(String encryptedData) { return new String(decrypt(Base64.decode(encryptedData), keyBytes)); } public String decrypt(String encryptedData, String keyData) { return new String(decrypt(Base64.decode(encryptedData), keyData.getBytes())); } public String decryptByHex(String encryptedData, String keyData) { return new String(decrypt(HexUtil.decodeHex(encryptedData), keyData.getBytes())); } public String decryptByHex(String encryptedData) { return new String(decrypt(HexUtil.decodeHex(encryptedData), keyBytes)); } /** * 解密方法 * * @param encryptedData 要解密的字符串 * @param keyBytes 解密密钥 * @return */ public byte[] decrypt(byte[] encryptedData, byte[] keyBytes) { byte[] encryptedText = null; init(keyBytes); try { cipher.init(Cipher.DECRYPT_MODE, key, new IvParameterSpec(iv)); encryptedText = cipher.doFinal(encryptedData); } catch (Exception e) { e.printStackTrace(); } return encryptedText; } public static void main(String[] args) { AesUtil aes = new AesUtil(); //加密字符串 String content = "{\"userName\":\"12\",\"userPhone\":\"123\"}"; System.out.println("加密前的:" + content); // 加密方法 String encStr = aes.encryptByHex(content); System.out.println("加密后的内容:" + encStr); // 解密方法 String decStr = aes.decryptByHex(encStr); System.out.println("解密后的内容:" + decStr); } }
跑一下main方法,执行结果
加密前的:{"userName":"12","userPhone":"123"}
加密后的内容:989f16833c907f8168a6dc81424f136726a2fdf587f83360d8e24ef4506ffbfd69f0a7453a97dcc609acb3d312b4bf77
解密后的内容:{"userName":"12","userPhone":"123"}
前端代码
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 | import CryptoJS from 'crypto-js' ; const KEY = '1111bat1977' ;<br>const IV = '7773066605060999' ;<br> // 添加偏移量 function fillKey(key, keySize) { keySize = keySize || 128; let filledKey = Buffer.alloc(keySize / 8); let keys = Buffer.from(key); if (keys.length < filledKey.length) { for ( let i = 0; i < filledKey.length; i++) { filledKey[i] = keys[i]; } } return filledKey; } // 加密 export const encrypt = message => { const keyAccept = CryptoJS.lib.WordArray.create(fillKey(KEY, 128)); const giv = CryptoJS.enc.Utf8.parse(IV); let messageJson = '' ; if ( typeof message === 'object' ) { messageJson = JSON.stringify(message); } else { messageJson = message; } return base64ToHex(CryptoJS.AES.encrypt(messageJson, keyAccept, { iv: giv, mode: CryptoJS.mode.CBC, padding: CryptoJS.pad.Pkcs7, }).toString()); }; // 解密 export const decrypt = encryptedBase64Str => { const resBase64 = hexToBase64(encryptedBase64Str) const keyResponse = CryptoJS.lib.WordArray.create(fillKey(KEY, 128)); const giv = CryptoJS.enc.Utf8.parse(IV); const decrypt = CryptoJS.AES.decrypt(resBase64, keyResponse, { iv: giv, mode: CryptoJS.mode.CBC, padding: CryptoJS.pad.Pkcs7, }); const message = decrypt.toString(CryptoJS.enc.Utf8); return JSON.parse(message); }; export const hexToBase64 = data => { const d = CryptoJS.enc.Hex.parse(data); return CryptoJS.enc.Base64.stringify(d); }; export const base64ToHex = data => { const d = CryptoJS.enc.Base64.parse(data); return CryptoJS.enc.Hex.stringify(d); }; |
1111bat1977
【推荐】国内首个AI IDE,深度理解中文开发场景,立即下载体验Trae
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步
· 开源Multi-agent AI智能体框架aevatar.ai,欢迎大家贡献代码
· Manus重磅发布:全球首款通用AI代理技术深度解析与实战指南
· 被坑几百块钱后,我竟然真的恢复了删除的微信聊天记录!
· 没有Manus邀请码?试试免邀请码的MGX或者开源的OpenManus吧
· 园子的第一款AI主题卫衣上架——"HELLO! HOW CAN I ASSIST YOU TODAY
2018-07-12 Linux下的vi编辑命令中查找·替换详解
2018-07-12 Linux中more和less命令用法
2017-07-12 设计模式之组合模式学习理解