HarmonyOS RSA公钥解密

项目中java服务端使用的是RSA私钥加密,我这边需要根据返回的模数

生成RSA公钥,然后使用RSA进行公钥解密,目前看到文档上使用的都是RSA私钥解密,请问可以使用公钥解密么?

let pubKey1 = EncryptTools.genRsa2048PubKeySpec(apppublickeyOrigin)
let rsaGeneratorSpec1 = cryptoFramework.createAsyKeyGeneratorBySpec(pubKey1);
let content3desKey = await EncryptTools.rsaDecryptBySegment(rsaGeneratorSpec1.generatePriKeySync(), StringTools.byteToHexString(commkeyByte))
  • 1.
  • 2.
  • 3.

如果在rsaDecryptBySegment 该解密方法中await decoder.init(cryptoFramework.CryptoMode.DECRYPT_MODE, priKey, null);

把第二个参数key换为公钥参数的话会报如下错误

IsClassMatch[54]: class is not match. expect class: OPENSSL.RSA.PRI_KEY, input class: OPENSSL.RSA.PUB_KEY

如何使用模数生成的公钥进行RSA解密

HarmonyOS
2024-12-25 15:37:07
572浏览
收藏 0
回答 1
回答 1
按赞同
/
按时间
Excelsior_abit

参考下述demo:

import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { util } from '@kit.ArkTS';

@Entry
@Component
struct Index {
  @State message: string = 'Hello World';
  @State jmMessage: string = '暂无'
  @State jiemMessage: string = '暂无'
  @State jieStr: string = ''
  private keyPair: cryptoFramework.KeyPair | undefined = undefined
  private jmBlob: cryptoFramework.DataBlob = { data: new Uint8Array() }

  aboutToAppear(): void {
    let rsaGenerator = cryptoFramework.createAsyKeyGenerator('RSA1024|PRIMES_2')
    console.log('-1')
    // 指定公钥和密钥,生成keypair
    // let pkUnit8 = this.convertBase64ToUnit8Array(this.pubKeyString)
    // let prUnit8 = this.convertBase64ToUnit8Array(this.privateKey)
    // let pkBlob: cryptoFramework.DataBlob = { data: pkUnit8 }
    // let prBlob: cryptoFramework.DataBlob = { data: prUnit8 }
    // let keyPair:cryptoFramework.KeyPair = await rsaGenerator.convertKey(pkBlob, null)
    // 随机生成keypair的代码
    this.keyPair = rsaGenerator.generateKeyPairSync()
    console.log('-2')
  }
  //私钥加密
  async signMessagePromise(priKey: cryptoFramework.PriKey, data:string) {
    let signAlg = "RSA1024|PKCS1|NoHash|OnlySign";
    let signer = cryptoFramework.createSign(signAlg);
    await signer.init(priKey);
    let signData = await signer.sign({data: this.convertStringToUnit8Array(data)});
    return signData;
  }

  // 公钥解密
  async verifyMessagePromise(signMessageBlob: cryptoFramework.DataBlob, pubKey: cryptoFramework.PubKey) {
    let verifyAlg = "RSA1024|PKCS1|NoHash|Recover";
    let verifier = cryptoFramework.createVerify(verifyAlg);
    await verifier.init(pubKey);
    let rawSignData = await verifier.recover(signMessageBlob);
    console.log("rsa puk data " + this.convertUnit8ArrayToString(rawSignData?.data))
    return rawSignData;
  }

  // 加密
  async jm(text: string) {

    // this.keyPair = sjkeyPair
    let Base64Helper = new util.Base64Helper()
    // let sjpubKey = Base64Helper.encodeToStringSync(this.keyPair.pubKey.getEncoded().data)
    // let sjprKey = Base64Helper.encodeToStringSync(this.keyPair.priKey.getEncoded().data)

    // 获取相应的Cipher实例
    let cipher = await cryptoFramework.createCipher("RSA1024|PKCS1");
    await cipher.init(cryptoFramework.CryptoMode.ENCRYPT_MODE, this.keyPair!.pubKey, null)
    // 将明文string转化成UnitArray
    let inputUnit8Array = this.convertStringToUnit8Array(this.message)
    // let inputUnit8Array = Base64Helper.decodeSync(this.message)
    let inputBlob: cryptoFramework.DataBlob = { data: inputUnit8Array }
    console.log('jm:-3')
    let resultBlob = await cipher.doFinal(inputBlob)

    this.jmBlob = resultBlob
    // let resStr = this.convertUnit8ArrayToString(resultBlob.data)
    // 将blob转成str
    let resStr = Base64Helper.encodeToStringSync(resultBlob.data)
    console.log('jm:' + resultBlob.data.toString())
    this.jieStr = resStr
    return resStr
  }

  // 解密

  async jiem(text: string) {
    try {
      let decoder = await cryptoFramework.createCipher('RSA1024|PKCS1');
      console.log('ji_priKey:' + this.keyPair!.priKey.getEncoded().data.toString())
      await decoder.init(cryptoFramework.CryptoMode.DECRYPT_MODE, this.keyPair!.priKey, null);
      let Base64Helper = new util.Base64Helper()
      let jiemessage = Base64Helper.decodeSync(text)
      console.log('jiem:' + jiemessage.toString())
      let decryptData = await decoder.doFinal({ data: jiemessage });
      // let decryptData = await decoder.doFinal(this.jmBlob);
      let decryptDataString = this.convertUnit8ArrayToString(decryptData.data)
      // let decryptDataString = Base64Helper.encodeToStringSync(decryptData.data)
      return decryptDataString
    } catch (e) {
      console.log('error123:' + JSON.stringify(e))
      return ''
    }
  }

  // 将base64转成unit8
  convertBase64ToUnit8Array(text: string) {
    let base64Helper = new util.Base64Helper();
    return base64Helper.decodeSync(text)
  }

  // 将unit8转成string ,字节码不能为0
  convertUnit8ArrayToString(uint8: Uint8Array) {
    return util.TextDecoder.create().decodeWithStream(uint8)
  }

  // 将密文string转成unit8
  // convertPriStringToUnit8Array(text: string) {
  // return new util.TextEncoder().encodeIntoUint8Array(text,)
  // }
  // 将明文string转成unit8,处理不了汉字和特殊字符
  convertStringToUnit8Array(text: string) {
    // return new util.TextEncoder().encodeInto(text)
    let arr: number[] = new Array(text.length)
    for (let i = 0, j = text.length; i < j; i++) {
      arr[i] = text.charCodeAt(i)
    }
    return new Uint8Array(arr)
  }

  build() {
    Row() {
      Column() {
        Text('带加密数据:')
        TextInput({ text: this.message })
          .onChange((value: string) => {
            this.message = value
          })
        Row()
        {
          Button('公钥加密').onClick(() => {
            console.log("加密 button");
            this.jm(this.message).then(data => {
              this.jmMessage = data
            })
          })
        }
        Row(){

        }.height(5)
        Row()
        {
          Button('私钥解密').onClick(() => {
            this.jiem(this.jieStr).then(data => {
              console.log("解密 button");
              this.jiemMessage = data
            })
          })
        }
        Row(){

        }.height(5)
        Row()
        {
          Button('清空').onClick(() => {
            this.jiemMessage = ''
            this.jmMessage = ''
          })

        }

        Row(){

        }.height(5)

        Row(){
          Button("私钥加密").onClick(()=>{
            this.signMessagePromise(this.keyPair!.priKey, this.message).then((result)=>{
              this.jmBlob = result
              let Base64Helper = new util.Base64Helper()
              this.jmMessage = Base64Helper.encodeToStringSync(result.data)
            })
          })
        }
        Row(){

        }.height(5)
        Row(){
          Button("公钥解密").onClick(()=>{
            this.verifyMessagePromise({data: this.jmBlob.data}, this.keyPair!.pubKey).then((result)=>{
              this.jiemMessage = this.convertUnit8ArrayToString(result!.data)
            })

          })
        }
        Text('加密后的数据:')
          .fontColor(Color.Red)
          .textAlign(TextAlign.Start)

        Text(this.jmMessage)
        Text('解密后的数据:')
        Text(this.jiemMessage)
      }
      .width('100%')
    }
    .height('100%')
  }
}
  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 146.
  • 147.
  • 148.
  • 149.
  • 150.
  • 151.
  • 152.
  • 153.
  • 154.
  • 155.
  • 156.
  • 157.
  • 158.
  • 159.
  • 160.
  • 161.
  • 162.
  • 163.
  • 164.
  • 165.
  • 166.
  • 167.
  • 168.
  • 169.
  • 170.
  • 171.
  • 172.
  • 173.
  • 174.
  • 175.
  • 176.
  • 177.
  • 178.
  • 179.
  • 180.
  • 181.
  • 182.
  • 183.
  • 184.
  • 185.
  • 186.
  • 187.
  • 188.
  • 189.
  • 190.
  • 191.
  • 192.
  • 193.
  • 194.
  • 195.
  • 196.
分享
微博
QQ
微信
回复
2024-12-25 18:07:12


相关问题
HarmonyOS RSA私钥加密解密
640浏览 • 1回复 待解决
HarmonyOS RSA如何用解密
1230浏览 • 0回复 待解决
HarmonyOSRSA如何用解密
418浏览 • 0回复 待解决
HarmonyOS 支持rsa使用解密
845浏览 • 1回复 待解决
HarmonyOS 关于RSA解密问题
670浏览 • 1回复 待解决
rsa 解密初始化报错
791浏览 • 1回复 待解决
HarmonyOS 私钥加密解密问题
480浏览 • 1回复 待解决
如何使用RSA加密明文数据
1029浏览 • 1回复 待解决
如何实现RSAPK加密一段文字
920浏览 • 1回复 待解决
HarmonyOS 证书问题
456浏览 • 1回复 待解决
HarmonyOS 备案怎么获取
220浏览 • 1回复 待解决
HarmonyOS RSA解密问题
802浏览 • 1回复 待解决
HarmonyOS 的格式相关
469浏览 • 1回复 待解决
HarmonyOS RSA解密数据
238浏览 • 1回复 待解决
HarmonyOSRSA解密问题?
263浏览 • 0回复 待解决