2012-04-27 64 views
1

我基本上需要解密从Rijndael加密的服务器上检索的密码,之前我从来没有使用过加密/解密,而且完全丢失了。我发现在这个网络的某个地方,Java有一些方法可以在不需要外部库的情况下实现,但我没有得到它。我唯一需要的就是解密,因为无论如何我都不会写回服务器。在Android中解密Rijndael

任何想法如何做到这一点或我可以找到有关它的文档?

我不知道这个代码是否来自我正在寻找的答案here,我不太了解,正如我所说的,我从来没有使用过这种东西:

byte[] sessionKey = null; //Where you get this from is beyond the scope of this post 
byte[] iv = null ; //Ditto 
byte[] plaintext = null; //Whatever you want to encrypt/decrypt 
Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); 
//You can use ENCRYPT_MODE or DECRYPT_MODE 
cipher.calling init(Cipher.ENCRYPT_MODE, new SecretKeySpec(sessionKey, "AES"), new IvParameterSpec(iv)); 
byte[] ciphertext = cipher.doFinal(plaintext); 

在此先感谢。

+0

看起来是代码右边的一块。你有没有试过使用它?我猜它应该是'cipher.init(Cipher.DECRYPT_MODE,...',我不知道你从哪里得到会话密钥和初始化向量(iv),或者是否“AES/CBC/PKCS5Padding”是但是如果你知道你所要做的就是把加密后的密码填入'plaintext'中,最后在'cyphertext'中解密它。 – zapl 2012-04-27 21:11:13

+0

我没有尝试过,主要是因为我没有't知道在哪里放置密码检索,现在就像你说的那样尝试它。谢谢。 – 2012-04-27 21:22:51

+0

@zapl显然它无法解决.calling并找不到init()方法。任何想法? – 2012-04-27 22:02:08

回答

0

这是一个简单的加密工具类,可能对您有所帮助。它基于ferenc.hechler编写的代码发布在以下网址: http://www.androidsnippets.com/encryptdecrypt-strings 我已经做了一些更改以适应我的需要。

import java.math.BigInteger; 
import java.security.InvalidKeyException; 
import java.security.MessageDigest; 
import java.security.NoSuchAlgorithmException; 
import java.security.SecureRandom; 

import javax.crypto.BadPaddingException; 
import javax.crypto.Cipher; 
import javax.crypto.IllegalBlockSizeException; 
import javax.crypto.KeyGenerator; 
import javax.crypto.NoSuchPaddingException; 
import javax.crypto.SecretKey; 
import javax.crypto.spec.SecretKeySpec; 

public class SimpleCrypto { 

    private static final int KEY_SIZE = 128; 

    public static String encrypt(String seed, String cleartext) throws NoSuchAlgorithmException, InvalidKeyException, NoSuchPaddingException, IllegalBlockSizeException, BadPaddingException { 
     final byte[] rawKey = getRawKey(seed.getBytes()); 
     final byte[] result = encrypt(rawKey, cleartext.getBytes()); 
     return bin2hex(result); 
    } 

    public static String decrypt(String seed, String encrypted) throws NoSuchAlgorithmException, InvalidKeyException, IllegalBlockSizeException, BadPaddingException, NoSuchPaddingException { 
     final byte[] rawKey = getRawKey(seed.getBytes()); 
     final byte[] enc = toByte(encrypted); 
     final byte[] result = decrypt(rawKey, enc); 
     return new String(result); 
    } 

    public static String decrypt(String seed, byte[] encrypted) throws NoSuchAlgorithmException, InvalidKeyException, IllegalBlockSizeException, BadPaddingException, NoSuchPaddingException { 
     final byte[] rawKey = getRawKey(seed.getBytes()); 
     final byte[] result = decrypt(rawKey, encrypted); 
     return new String(result); 
    } 

    private static byte[] getRawKey(byte[] seed) throws NoSuchAlgorithmException { 
     final KeyGenerator kgen = KeyGenerator.getInstance("AES"); 
     final SecureRandom sr = SecureRandom.getInstance("SHA1PRNG"); 
     sr.setSeed(seed); 
     kgen.init(KEY_SIZE, sr); // 192 and 256 bits may not be available 
     final SecretKey skey = kgen.generateKey(); 
     byte[] raw = skey.getEncoded(); 
     return raw; 
    } 

    public static byte[] encrypt(byte[] raw, byte[] clear) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, IllegalBlockSizeException, BadPaddingException { 
     final SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES"); 
     final Cipher cipher = Cipher.getInstance("AES"); 
     cipher.init(Cipher.ENCRYPT_MODE, skeySpec); 
     final byte[] encrypted = cipher.doFinal(clear); 
     return encrypted; 
    } 

    public static byte[] decrypt(byte[] raw, byte[] encrypted) throws IllegalBlockSizeException, BadPaddingException, NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException { 
     final SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES"); 
     final Cipher cipher = Cipher.getInstance("AES"); 
     cipher.init(Cipher.DECRYPT_MODE, skeySpec); 
     final byte[] decrypted = cipher.doFinal(encrypted); 
     return decrypted; 
    } 

    public static String toHex(String txt) { 
     return bin2hex(txt.getBytes()); 
    } 

    public static String fromHex(String hex) { 
     return new String(toByte(hex)); 
    } 

    public static byte[] toByte(String hexString) { 
     final int len = hexString.length()/2; 
     final byte[] result = new byte[len]; 
     for (int i = 0; i < len; i++) { 
      result[i] = Integer.valueOf(hexString.substring(2 * i, 2 * i + 2), 16).byteValue(); 
     } 
     return result; 
    } 

    public static byte[] getHash(String str) { 
     MessageDigest digest = null; 
     try { 
      digest = MessageDigest.getInstance("SHA-256"); 
     } catch (NoSuchAlgorithmException ex) { 
      ex.printStackTrace(); 
     } 
     digest.reset(); 
     return digest.digest(str.getBytes()); 
    } 

    static String bin2hex(byte[] data) { 
     return String.format("%0" + (data.length * 2) + "X", new BigInteger(1, data)); 
    } 
} 

这里是你将如何使用它来解密的东西:

final String ssid = "MY_WIFI_SSID"; 
    final String encWifiKey = "myEncryptedWifiKeyString"; 

    String wifiKey = ""; 
    try { 
     wifiKey = new String(SimpleCrypto.decrypt(SimpleCrypto.getHash(ssid), Base64.decode(encWifiKey, Base64.DEFAULT))); 
    } catch (InvalidKeyException e) { 
     e.printStackTrace(); 
    } catch (IllegalBlockSizeException e) { 
     e.printStackTrace(); 
    } catch (BadPaddingException e) { 
     e.printStackTrace(); 
    } catch (NoSuchAlgorithmException e) { 
     e.printStackTrace(); 
    } catch (NoSuchPaddingException e) { 
     e.printStackTrace(); 
    } 
+0

还没有尝试过,但有一点我不明白,在我看到的每一种方法中,结果似乎都是一种字节类型。解密后不应该有一个字符串?我的意思是,用户输入的内容是以字符串形式捕获的,因此...... – 2012-04-27 23:50:23

+0

加密(或至少是分组密码)通常只能用于字节。因此,字符串需要在加密之前转换为字节,并在解密后转回。通常这是通过使用特定的字符编码(如UTF-8)来执行的。使用'new String(byte [],Charset.forName(“UTF-8”))'来实现最常用的UTF-8编码。 – 2012-05-10 01:21:23

+1

不要使用这个例子!我已经多次遇到过这个例子,它可以做错误的事情。阿科斯Cz,不要发布你不明白的代码。 – 2012-05-10 01:24:01