gpt4 book ai didi

java - 错误填充异常 : Decryption error

转载 作者:塔克拉玛干 更新时间:2023-11-03 04:17:32 27 4
gpt4 key购买 nike

我正在编写一个程序,它接受来自控制台的输入 - 一个 zip 文件的名称,一个包含从第一个 zip 生成的(de/en)加密文件的 zip 文件的名称和一个包含公钥。解密时出现异常:

exception Exception in thread "main" javax.crypto.BadPaddingException:     Decryption error
at sun.security.rsa.RSAPadding.unpadV15(RSAPadding.java:380)
at sun.security.rsa.RSAPadding.unpad(RSAPadding.java:291)
at com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:363)
at com.sun.crypto.provider.RSACipher.engineDoFinal(RSACipher.java:389)
at javax.crypto.Cipher.doFinal(Cipher.java:2165)
at com.Main.decrypt(Main.java:67)
at com.Main.main(Main.java:201)

无法弄清楚为什么会出现此异常?

公钥:

MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCE3pA746UfpC8sFk8ZJp0yupyJqj5jy6cjdxUYoP7mCm7c0mqQDeCcDNBYW2eSozCioPrH/9L+CDQEPLYakoem+jFnUKDH5+pru/0PJTJJF8Xh/ZT9eJlvsYBr1/qSfICf6RTs7kzwq9IuSZBw7/tfNEF9i0A8FVox6HOopXod1QIDAQAB

私钥:

MIICXQIBAAKBgQCE3pA746UfpC8sFk8ZJp0yupyJqj5jy6cjdxUYoP7mCm7c0mqQDeCcDNBYW2eSozCioPrH/9L+CDQEPLYakoem+jFnUKDH5+pru/0PJTJJF8Xh/ZT9eJlvsYBr1/qSfICf6RTs7kzwq9IuSZBw7/tfNEF9i0A8FVox6HOopXod1QIDAQABAoGANOFrYBqK5lvu1koOswDWQZFZqcSSzh8IZyoGwGWa7S0r0EECXlDXmuPSq8e9IfRG8ALHrH+ZlrbnFOSgyVSWHfpj3aH+qknoSX5TW2rMQHih8865xuqheMQ+RTZ7+BRDqNsYkzxB/Z8mqzpoJQSYf+H7nWxdDCgAJVYZzxl3DmUCQQD32iEjnwiwUjii8slcmvCEZl+z84DWNdvJOg6Z38sI4AvrfpKc1WAcDg1rNZCKrRgokh54wpLt08cpFcrD04c3AkEAiTzDmc0bdgfg5wj6xHFZpYlBwiGm/bjOR2PS57P0GNU5PsDllRbFqIuzArITutO5lvZZImzuYz7Lf+cQ73pxUwJBAOdEwmdaneDo17A0m2+to3/nhqWDMVSwLMU3RyiNigZeCMFU+bkd4PBMrHi9IoJDwacZsRU9eZwxYEUV8H2Jg0ECQEEkOqRSm2pXKwX/WSjNtQPCNxhy6NUeV6vDUmTxIjh3XYjP/ynZeVEbnoj1BjB0N2/U11Jj6nPpZqb7gyppMEkCQQCoGdVYDipU+hMMnvxa0zOIyQc/a+HE0lESqn+2ZPafYi9Z1RldRMvUXhP8U7s+OuhRwprdw2ivvOFrnWyz9lL2

程序代码如下。欢迎任何帮助:)

package com;

import java.io.BufferedReader;
import java.io.FileOutputStream;
import java.io.FileReader;
import java.io.IOException;
import java.io.InputStream;
import java.security.GeneralSecurityException;
import java.security.KeyFactory;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.spec.PKCS8EncodedKeySpec;
import java.security.spec.X509EncodedKeySpec;
import java.util.Base64;
import java.util.Enumeration;
import java.util.Scanner;
import java.util.zip.ZipEntry;
import java.util.zip.ZipFile;
import java.util.zip.ZipOutputStream;

import javax.crypto.Cipher;
import org.bouncycastle.asn1.ASN1EncodableVector;
import org.bouncycastle.asn1.ASN1Integer;
import org.bouncycastle.asn1.ASN1ObjectIdentifier;
import org.bouncycastle.asn1.ASN1Sequence;
import org.bouncycastle.asn1.DERNull;
import org.bouncycastle.asn1.DEROctetString;
import org.bouncycastle.asn1.DERSequence;
import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;

public class Main {

public final static int BUFFER_SIZE = 117;

public static void decrypt(String originalZipFileName, String newZipFileName, String privateKeyFileName) throws Exception {
byte[] buffer = new byte[128];

ZipFile originalZipFile = new ZipFile(originalZipFileName);
ZipOutputStream newZipFile = new ZipOutputStream(new FileOutputStream(newZipFileName));

Enumeration<? extends ZipEntry> zipEntries = originalZipFile.entries();

String privateKey = getKeyString(privateKeyFileName);
PrivateKey key = makePrivateKey(privateKey);

Cipher cipher = Cipher.getInstance("RSA");

cipher.init(Cipher.DECRYPT_MODE, key);


while(zipEntries.hasMoreElements()){

ZipEntry entry = zipEntries.nextElement();

ZipEntry copy = new ZipEntry(entry.getName());
newZipFile.putNextEntry(copy);

InputStream inputEntry = originalZipFile.getInputStream(entry);

while(inputEntry.read(buffer) != -1){
newZipFile.write(cipher.doFinal(buffer));
}

newZipFile.closeEntry();
inputEntry.close();
}
newZipFile.close();
originalZipFile.close();
}

public static void encrypt(String originalZipFileName, String newZipFileName, String publicKeyFileName) throws Exception{

byte[] buffer = new byte[BUFFER_SIZE];

ZipFile originalZipFile = new ZipFile(originalZipFileName);
ZipOutputStream newZipFile = new ZipOutputStream(new FileOutputStream(newZipFileName));

Enumeration<? extends ZipEntry> zipEntries = originalZipFile.entries();

String publicKey = getKeyString(publicKeyFileName);
PublicKey key = makePublicKey(publicKey);

Cipher cipher = Cipher.getInstance("RSA");

cipher.init(Cipher.ENCRYPT_MODE, key);


while(zipEntries.hasMoreElements()){

ZipEntry entry = zipEntries.nextElement();

ZipEntry copy = new ZipEntry(entry.getName());
newZipFile.putNextEntry(copy);

InputStream inputEntry = originalZipFile.getInputStream(entry);

while(inputEntry.read(buffer) != -1){
newZipFile.write(cipher.doFinal(buffer));
}

newZipFile.closeEntry();
inputEntry.close();
}
newZipFile.close();
originalZipFile.close();
}

public static String getKeyString(String fileName){

String key = new String();
try {
BufferedReader buf = new BufferedReader(new FileReader(fileName));
key = buf.readLine();
} catch ( IOException e) {
e.printStackTrace();
}

return key.trim();
}

public static PublicKey makePublicKey(String stored) throws GeneralSecurityException {
byte[] data = Base64.getDecoder().decode(stored);
X509EncodedKeySpec spec = new X509EncodedKeySpec(data);
KeyFactory fact = KeyFactory.getInstance("RSA");
return fact.generatePublic(spec);
}

public static PrivateKey makePrivateKey(String stored) throws GeneralSecurityException, Exception {
/*byte[] data = Base64.getDecoder().decode(stored);
PKCS8EncodedKeySpec spec = new PKCS8EncodedKeySpec(data);
KeyFactory fact = KeyFactory.getInstance("RSA");
return fact.generatePrivate(spec);*/

byte[] data = Base64.getDecoder().decode(stored);

ASN1EncodableVector v = new ASN1EncodableVector();
v.add(new ASN1Integer(0));
ASN1EncodableVector v2 = new ASN1EncodableVector();
v2.add(new ASN1ObjectIdentifier(PKCSObjectIdentifiers.rsaEncryption.getId()));
v2.add(DERNull.INSTANCE);
v.add(new DERSequence(v2));
v.add(new DEROctetString(data));
ASN1Sequence seq = new DERSequence(v);
byte[] privKey = seq.getEncoded("DER");

PKCS8EncodedKeySpec spec = new PKCS8EncodedKeySpec(privKey);
KeyFactory fact = KeyFactory.getInstance("RSA");
PrivateKey key = fact.generatePrivate(spec);

return key;

}

public static void main(String[] args) throws Exception {

Scanner scan = new Scanner(System.in);

System.out.println("Enter type of operation:");
String line = scan.nextLine();

if(line.equals("encrypt")){
System.out.println("Enter name of original ZIP file:");
String originalZipFileName = scan.nextLine();

System.out.println("Enter name of new ZIP file:");
String newZipFileName = scan.nextLine();

System.out.println("Enter name of file containg public key:");
String publicKeyFileName = scan.nextLine();

encrypt(originalZipFileName, newZipFileName, publicKeyFileName);
}

if(line.equals("decrypt")){
System.out.println("Enter name of original ZIP file:");
String originalZipFileName = scan.nextLine();

System.out.println("Enter name of new ZIP file:");
String newZipFileName = scan.nextLine();

System.out.println("Enter name of file containg private key:");
String privateKeyFileName = scan.nextLine();

decrypt(originalZipFileName, newZipFileName, privateKeyFileName);
}

}

}

PS:更新了decrypt方法。仍然给出相同的错误。

public static void decrypt(String originalZipFileName, String newZipFileName, String privateKeyFileName) throws Exception {
byte[] buffer = new byte[128];

ZipFile originalZipFile = new ZipFile(originalZipFileName);
ZipOutputStream newZipFile = new ZipOutputStream(new FileOutputStream(newZipFileName));

Enumeration<? extends ZipEntry> zipEntries = originalZipFile.entries();

String privateKey = getKeyString(privateKeyFileName);
PrivateKey key = makePrivateKey(privateKey);

Cipher cipher = Cipher.getInstance("RSA");

cipher.init(Cipher.DECRYPT_MODE, key);


while(zipEntries.hasMoreElements()){

ZipEntry entry = zipEntries.nextElement();

ZipEntry copy = new ZipEntry(entry.getName());
newZipFile.putNextEntry(copy);


InputStream inputEntry = originalZipFile.getInputStream(entry);


while(inputEntry.read(buffer) != -1){
newZipFile.write(cipher.doFinal(buffer));
}

newZipFile.closeEntry();
inputEntry.close();
}
newZipFile.close();
originalZipFile.close();
}

最佳答案

约瑟夫是对的。

当您使用默认参数创建密码时,它默认为“RSA/ECB/PKCS1Padding”。如果您不喜欢令人讨厌的惊喜,您应该明确指定填充。因为其他安全提供者可能有不同的默认参数。而且您永远不会事先知道每个特定 JRE 具有哪些安全设置。

因此 PKCS1 填充将 11 个字节添加到您的原始数据中,将其从 117 个字节增加到 128 个字节。您应该考虑到这些数字特定于 1024 位 RSA key (安全性较低),并且对于更长的 key 会有所不同。由于您是从文件加载 key ,请考虑检查其长度。

@Test
public void testPadding() throws Exception {
SecureRandom random = SecureRandom.getInstance("SHA1PRNG");

KeyPairGenerator keyGen = KeyPairGenerator.getInstance("RSA");
keyGen.initialize(1024, random);
KeyPair keyPair = keyGen.generateKeyPair();

/* constant 117 is a public key size - 11 */
byte[] plaintext = new byte[117];
random.nextBytes(plaintext);

Cipher cipher = Cipher.getInstance("RSA");
cipher.init(Cipher.ENCRYPT_MODE, keyPair.getPublic());
byte[] ciphertext = cipher.doFinal(plaintext);
System.out.println(plaintext.length + " becomes " + ciphertext.length);
}

这打印

117 becomes 128

最后,考虑使用 AES 代替 RSA 进行文件加密。

因此,要解决此问题,您需要使用大小为公钥长度的缓冲区 - 11 (117) 用于加密,公钥大小 (128) 用于解密。

改变

outputFile.write(cipher.doFinal(buffer), 0, read);

outputFile.write(cipher.doFinal(buffer));

因为缓冲区读取是 117 字节,doFinal 结果的大小是 128 字节。

您还需要缓冲输入流。当您从文件中读取时,它有时会很慢,然后 InputStream 读取的数据将少于缓冲区可能包含的数据。通过使用 BufferedInputStream,可以确保在读取调用返回之前有足够的数据。然而,对于解密来说,拥有完整的数据 block 是至关重要的

InputStream inputEntry = new BufferedInputStream(originalZipFile.getInputStream(entry));

关于java - 错误填充异常 : Decryption error,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/31944374/

27 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com