SM国密算法
package com.abc.apollo.common.util; import javax.crypto.IllegalBlockSizeException;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.util.ArrayList;
import java.util.Base64;
import java.util.List;
import java.util.concurrent.TimeUnit; public class SmUtil {
private static PublicKey publicKey = null;
private static PrivateKey privateKey = null;
private static byte[] key = null;
private static byte[] iv = null; static {
try {
setup();
} catch (Exception e) {
e.printStackTrace();
}
} /**
* 生成公私钥对
* @throws Exception
*/
public static void setup() throws Exception {
String[] keys = KeyUtils.generateSmKey();
publicKey = KeyUtils.createPublicKey(keys[0]);
privateKey = KeyUtils.createPrivateKey(keys[1]); key = Sm4.generateKey();
iv = AbstractSymmetric.initIv(16);
} public static void main(String[] args) throws Exception {
// System.out.println(encryptSm4String("apollo"));
// System.out.println(encryptSm4String("Apollo_123")); // System.out.println(decryptSm4String("P82APgvQtFuBVT2Sg4ycdA=="));
// System.out.println(decryptSm4String("2NT7rME/kkcTMRV8xNjsig==")); System.out.println(sm3Hex("158"));
System.out.println(sm3bcHex("158"));
System.out.println(hmacSm3Hex("".getBytes(), "abc"));
} public static void main2(String[] args) throws InterruptedException {
List<String> algorithm = new ArrayList<>();
algorithm.add(("SM4/ECB/NOPADDING"));
algorithm.add(("SM4/ECB/PKCS5PADDING"));
algorithm.add(("SM4/ECB/ISO10126PADDING"));
algorithm.add(("SM4/CBC/NOPADDING"));
algorithm.add(("SM4/CBC/PKCS5PADDING"));
algorithm.add(("SM4/CBC/ISO10126PADDING"));
algorithm.add(("SM4/PCBC/NOPADDING"));
algorithm.add(("SM4/PCBC/PKCS5PADDING"));
algorithm.add(("SM4/PCBC/ISO10126PADDING"));
algorithm.add(("SM4/CTR/NOPADDING"));
algorithm.add(("SM4/CTR/PKCS5PADDING"));
algorithm.add(("SM4/CTR/ISO10126PADDING"));
algorithm.add(("SM4/CTS/NOPADDING"));
algorithm.add(("SM4/CTS/PKCS5PADDING"));
algorithm.add(("SM4/CTS/ISO10126PADDING"));
if (iv == null)
iv = AbstractSymmetric.initIv(16); String text = "apollo";
for (String s : algorithm) {
//SM4加密
try {
System.out.println("SM4加密算法: " + s);
System.out.println("SM4加密原始数据: " + text);
System.out.println("SM4加密key: " + Base64.getEncoder().encodeToString(key));
System.out.println("SM4加密iv: " + Base64.getEncoder().encodeToString(iv)); byte[] encrypt = Sm4.encrypt(s, key, iv, text.getBytes());
System.out.println("SM4加密数据密文: " + Base64.getEncoder().encodeToString(encrypt)); //SM4解密
byte[] decrypt = Sm4.decrypt(s, key, iv, encrypt);
System.out.println("SM4解密数据: " + new String(decrypt));
} catch (Exception e) {
if (e instanceof IllegalBlockSizeException) {
System.err.println("SM4解密数据:算法 " + s + "数据需自己手工对齐");
} else {
System.err.println("SM4解密数据:算法 " + s +"::"+ e.getMessage());
}
} finally {
System.err.println("---------------------------------------");
TimeUnit.SECONDS.sleep(1);
}
}
} public static byte[] decryptSm2(byte[] encryptByte) {
return Sm2.decrypt(encryptByte, privateKey);
} public static byte[] encryptSm2(String text) {
return Sm2.encrypt(text.getBytes(), publicKey);
} public static String sm3Hex(String text){
return Sm3.sm3Hex(text.getBytes());
} public static String sm3bcHex(String text) throws Exception {
return Sm3.sm3bcHex(text.getBytes());
} public static String hmacSm3Hex(byte[] key, String text) {
return Sm3.hmacSm3Hex(key ,text.getBytes());
} public static byte[] decryptSm4(byte[] encryptByte) throws Exception {
return Sm4.decrypt("SM4/CBC/PKCS5PADDING", key, iv, encryptByte);
} public static byte[] encryptSm4(String text) throws Exception {
byte[] encrypt = Sm4.encrypt("SM4/CBC/PKCS5PADDING", key, iv, text.getBytes());
return encrypt;
} public static String encryptSm4String(String text) throws Exception {
return encodeToString(encryptSm4(text));
} public static String decryptSm4String(String text) throws Exception {
return new String(decryptSm4(Base64.getDecoder().decode(text)));
} public static byte[] signByPrivateKey(byte[] data, PrivateKey pk) throws Exception {
return Sm2.signByPrivateKey(data, pk);
} public static boolean verifyByPublicKey(byte[] data, PublicKey publicKey, byte[] signature) throws Exception {
return Sm2.verifyByPublicKey(data, publicKey, signature);
} public static String encryptSm2String(String text) {
return encodeToString(encryptSm2(text));
} public static String decryptSm2String(String text) {
return new String(decryptSm2(Base64.getDecoder().decode(text)));
} public static String encodeToString(byte[] input){
return Base64.getEncoder().encodeToString(input);
} public static byte[] decodeToByte(String src){
return Base64.getDecoder().decode(src);
}
}
package com.abc.apollo.common.util; import org.bouncycastle.asn1.gm.GMObjectIdentifiers;
import org.bouncycastle.crypto.InvalidCipherTextException;
import org.bouncycastle.crypto.engines.SM2Engine;
import org.bouncycastle.crypto.params.ECDomainParameters;
import org.bouncycastle.crypto.params.ECPrivateKeyParameters;
import org.bouncycastle.crypto.params.ECPublicKeyParameters;
import org.bouncycastle.crypto.params.ParametersWithRandom;
import org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey;
import org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPublicKey;
import org.bouncycastle.jce.provider.BouncyCastleProvider;
import org.bouncycastle.jce.spec.ECParameterSpec; import java.security.*; public class Sm2 {
static {
Security.addProvider(new BouncyCastleProvider());
} /**
* 根据publicKey对原始数据data,使用SM2加密
*/
public static byte[] encrypt(byte[] data, PublicKey publicKey) {
ECPublicKeyParameters localECPublicKeyParameters = null; if (publicKey instanceof BCECPublicKey) {
BCECPublicKey localECPublicKey = (BCECPublicKey) publicKey;
ECParameterSpec localECParameterSpec = localECPublicKey.getParameters();
ECDomainParameters localECDomainParameters = new ECDomainParameters(localECParameterSpec.getCurve(),
localECParameterSpec.getG(), localECParameterSpec.getN());
localECPublicKeyParameters = new ECPublicKeyParameters(localECPublicKey.getQ(), localECDomainParameters);
}
SM2Engine localSM2Engine = new SM2Engine();
localSM2Engine.init(true, new ParametersWithRandom(localECPublicKeyParameters, new SecureRandom()));
byte[] arrayOfByte2;
try {
arrayOfByte2 = localSM2Engine.processBlock(data, 0, data.length);
return arrayOfByte2;
} catch (InvalidCipherTextException e) { e.printStackTrace();
return null;
}
} /**
* 根据privateKey对加密数据encodedata,使用SM2解密
*/
public static byte[] decrypt(byte[] encodedata, PrivateKey privateKey) {
SM2Engine localSM2Engine = new SM2Engine();
BCECPrivateKey sm2PriK = (BCECPrivateKey) privateKey;
ECParameterSpec localECParameterSpec = sm2PriK.getParameters();
ECDomainParameters localECDomainParameters = new ECDomainParameters(localECParameterSpec.getCurve(),
localECParameterSpec.getG(), localECParameterSpec.getN());
ECPrivateKeyParameters localECPrivateKeyParameters = new ECPrivateKeyParameters(sm2PriK.getD(),
localECDomainParameters);
localSM2Engine.init(false, localECPrivateKeyParameters);
try {
byte[] arrayOfByte3 = localSM2Engine.processBlock(encodedata, 0, encodedata.length);
return arrayOfByte3;
} catch (InvalidCipherTextException e) {
e.printStackTrace();
return null;
}
} /**
* 私钥签名
*/
public static byte[] signByPrivateKey(byte[] data, PrivateKey privateKey) throws Exception {
Signature sig = Signature.getInstance(GMObjectIdentifiers.sm2sign_with_sm3.toString(), BouncyCastleProvider.PROVIDER_NAME);
sig.initSign(privateKey);
sig.update(data);
byte[] ret = sig.sign();
return ret;
} /**
* 公钥验签
*/
public static boolean verifyByPublicKey(byte[] data, PublicKey publicKey, byte[] signature) throws Exception {
Signature sig = Signature.getInstance(GMObjectIdentifiers.sm2sign_with_sm3.toString(), BouncyCastleProvider.PROVIDER_NAME);
sig.initVerify(publicKey);
sig.update(data);
boolean ret = sig.verify(signature);
return ret;
}
}
package com.abc.apollo.common.util; import org.bouncycastle.crypto.digests.SM3Digest;
import org.bouncycastle.crypto.macs.HMac;
import org.bouncycastle.crypto.params.KeyParameter;
import org.bouncycastle.jce.provider.BouncyCastleProvider; import java.security.MessageDigest;
import java.security.Security; public class Sm3 {
static {
Security.addProvider(new BouncyCastleProvider());
} public static byte[] sm3(byte[] srcData) {
SM3Digest sm3Digest = new SM3Digest();
sm3Digest.update(srcData, 0, srcData.length);
byte[] hash = new byte[sm3Digest.getDigestSize()];
sm3Digest.doFinal(hash, 0);
return hash;
} public static String sm3Hex(byte[] srcData) {
byte[] hash = sm3(srcData);
String hexString = org.apache.commons.codec.binary.Hex.encodeHexString(hash);
return hexString;
} public static byte[] hmacSm3(byte[] key, byte[] srcData) {
KeyParameter keyParameter = new KeyParameter(key);
SM3Digest digest = new SM3Digest();
HMac mac = new HMac(digest);
mac.init(keyParameter);
mac.update(srcData, 0, srcData.length);
byte[] hash = new byte[mac.getMacSize()];
mac.doFinal(hash, 0);
return hash;
} public static String hmacSm3Hex(byte[] key, byte[] srcData) {
byte[] hash = hmacSm3(key, srcData);
String hexString = org.apache.commons.codec.binary.Hex.encodeHexString(hash);
return hexString;
} public static byte[] sm3bc(byte[] srcData) throws Exception {
MessageDigest messageDigest = MessageDigest.getInstance("SM3", "BC");
byte[] digest = messageDigest.digest(srcData);
return digest;
} public static String sm3bcHex(byte[] srcData) throws Exception {
byte[] hash = sm3bc(srcData);
String hexString = org.apache.commons.codec.binary.Hex.encodeHexString(hash);
return hexString;
}
}
package com.aaaa.apollo.common.util; import org.bouncycastle.jce.provider.BouncyCastleProvider; import javax.crypto.Cipher;
import javax.crypto.KeyGenerator;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
import java.security.*; public class Sm4 {
static {
Security.addProvider(new BouncyCastleProvider());
} public static final String ALGORITHM_NAME = "SM4";
public static final String DEFAULT_KEY = "random_seed";
// 128-32位16进制;256-64位16进制
public static final int DEFAULT_KEY_SIZE = 128; static {
Security.addProvider(new BouncyCastleProvider());
} public static byte[] generateKey() throws NoSuchAlgorithmException, NoSuchProviderException {
return generateKey(DEFAULT_KEY, DEFAULT_KEY_SIZE);
} public static byte[] generateKey(String seed) throws NoSuchAlgorithmException, NoSuchProviderException {
return generateKey(seed, DEFAULT_KEY_SIZE);
} public static byte[] generateKey(String seed, int keySize) throws NoSuchAlgorithmException, NoSuchProviderException {
KeyGenerator kg = KeyGenerator.getInstance(ALGORITHM_NAME, BouncyCastleProvider.PROVIDER_NAME);
SecureRandom random = SecureRandom.getInstance("SHA1PRNG");
if (null != seed && !"".equals(seed)) {
random.setSeed(seed.getBytes());
}
kg.init(keySize, random);
return kg.generateKey().getEncoded();
} /**
* @description 加密
*/
public static byte[] encrypt(String algorithmName, byte[] key, byte[] iv, byte[] data) throws Exception {
return sm4core(algorithmName, Cipher.ENCRYPT_MODE, key, iv, data);
} /**
* @description 解密
*/
public static byte[] decrypt(String algorithmName, byte[] key, byte[] iv, byte[] data) throws Exception {
return sm4core(algorithmName, Cipher.DECRYPT_MODE, key, iv, data);
} private static byte[] sm4core(String algorithmName, int type, byte[] key, byte[] iv, byte[] data) throws Exception {
Cipher cipher = Cipher.getInstance(algorithmName, BouncyCastleProvider.PROVIDER_NAME);
Key sm4Key = new SecretKeySpec(key, ALGORITHM_NAME);
if (algorithmName.contains("/ECB/")) {
cipher.init(type, sm4Key);
} else {
IvParameterSpec ivParameterSpec = new IvParameterSpec(iv);
cipher.init(type, sm4Key, ivParameterSpec);
} return cipher.doFinal(data);
}
}
SM国密算法的更多相关文章
- SM 国密算法踩坑指南
各位,好久不见~ 最近接手网联的国密改造项目,由于对国密算法比较陌生,前期碰到了一系列国密算法加解密的问题. 所以这次总结一下,分享这个过程遇到的问题,希望帮到大家. 国密 什么是国密算法? 国密就是 ...
- SM系列国密算法(转)
原文地址:科普一下SM系列国密算法(从零开始学区块链 189) 众所周知,为了保障商用密码的安全性,国家商用密码管理办公室制定了一系列密码标准,包括SM1(SCB2).SM2.SM3.SM4.SM7. ...
- Hyperledger Fabric密码模块系列之BCCSP(五) - 国密算法实现
Talk is cheap, show me your code. 代码也看了,蛋也扯了,之后总该做点什么.响应国家政策,把我们的国密算法融合进去吧-- 先附两张bccsp下国密算法的设计实现图. ...
- 关于国密算法 SM1,SM2,SM3,SM4 的笔记
国密即国家密码局认定的国产密码算法.主要有SM1,SM2,SM3,SM4.密钥长度和分组长度均为128位. SM1 为对称加密.其加密强度与AES相当.该算法不公开,调用该算法时,需要通过加密芯片的接 ...
- 20155206赵飞 基于《Arm试验箱的国密算法应用》课程设计个人报告
20155206赵飞 基于<Arm试验箱的国密算法应用>课程设计个人报告 课程设计中承担的任务 完成试验箱测试功能1,2,3 . 1:LED闪烁实验 一.实验目的 学习GPIO原理 ...
- 《基于Arm实验箱的国密算法应用》课程设计 结题报告
<基于Arm实验箱的国密算法应用>课程设计 结题报告 小组成员姓名:20155206赵飞 20155220吴思其 20155234昝昕明 指导教师:娄嘉鹏 设计方案 题目要求:基于Arm实 ...
- 2015520吴思其 基于《Arm试验箱的国密算法应用》课程设计个人报告
20155200吴思其 基于<Arm试验箱的国密算法应用>课程设计个人报告 课程设计中承担的任务 完成试验箱测试功能4,5,6以及SM3加密实验的实现 测试四 GPIO0按键中断实验 实验 ...
- 20155234 昝昕明《基于ARM实验箱的国密算法应用》课程设计个人报告
20155234 昝昕明<基于ARM实验箱的国密算法应用>课程设计个人报告 个人贡献 参与课设题目讨论及完成全过程: 资料收集: SM1算法及和ARM之间通信 负责串口代码调试: 协调完成 ...
- java sm4国密算法加密、解密
java sm4国密算法加密.解密 CreationTime--2018年7月5日09点20分 Author:Marydon 1.准备工作 所需jar包: bcprov-jdk15on-1.59. ...
- 国密算法--Openssl 实现国密算法(基础介绍和产生秘钥对)
国密非对称加密算法 又称sm2,它是采取了ECC(曲线加密算法)中的一条固定的曲线,实际上就是ECC算法. 因为openssl里面不包含sm2算法,所以就要重新进行封装-. - 对于ECC算法我就不介 ...
随机推荐
- C# 的空类型
// 空类型 null int iii; // 默认 0 bool bbb; // 默认 false bool? b; // 空值 null int? i; // 空值 null string str ...
- grafana配置告警
首先,进入grafana控制面板,选择需要监控指标的区域,然后点击编辑 此时进入Alert页面会发现提示 Template variables are not supported in alert q ...
- NJU ICS2024 PA 作业心得(一)
NJU ICS2024 PA 作业心得(一) 由于自己并不是NJU 2024的学生,因此"堂而皇之"的把这份心得发在了网上,并且只是仅供非以此课程作为自己当前学年保研课的同学参考. ...
- 华为Ensp拓扑,使用MSTP、OSPF、DHCP、VRRP、链路聚合、CHAP
OSPF+DHCP+VRRP+Eth-trunk+PPP(CHAP)+MSTP 实验目标: LSW1和LSW2核心交换机互为备份,配置链路聚合,设备冗余设计,LSW1和LSW2作为核心交换机配置DHC ...
- DRF-Authention组件源码分析及扩展
drf 认证组件 1.认证组件源码执行流程 在该图中,我把与认证组件无关的代码都删除了,只留下了认证的代码,方便解析.每行注释的开头数字即代表了执行顺序 注意事项: 第5步中的self.authent ...
- 什么是AOP面向切面编程?怎么简单理解?
本文原文地址:什么是AOP面向切面编程?怎么简单理解? 什么是AOP面向切面编程 面向切面编程(AOP)通过将横切关注点(cross-cutting concerns)分离出来,提供了一种增强代码模块 ...
- 3.9 Linux查看目录中的文件(ls命令)
通过学习cd 和 pwd 命令,相信读者已经能够在庞大的 Linux 文件系统中,随心所欲地游荡并确定自己所在的位置了.本节继续来学习,如何知道某目录中存放了哪些文件或子目录. ls 命令,list ...
- 前段生成二维码下载,打印 QrCode
首先引用js,一个是生成二维码一个是调用打印 2.直接上代码 <div class="container-div"> <div id="qrcodeCa ...
- C#验证IP是否为局域网地址的三种方法
C#验证IP是否为局域网地址的三种方法 前一阵子有[广州.NET群]的客户问起这个问题,说他们需要验证客户输入的网站是否为局域网.其实局域网的IP并没有确定的定义,只要是局域网中,即可设置为任何一个I ...
- jQuery.validator验证无效的可能原因
最近用jQuery.validator做表单的前端验证,却发现验证规则都无效.最后发现以下原因会导致校验无效 1.jquery.min.js重复引用. 2.js中有bug存在. 3.<input ...