场景是系统迁移,我现在的需求是对于同一个密码,同一个salt,产生的结果是一样的
密码:a111111
salt:nff0hJsOZpANVR44VVUN0g==
秘钥长度:32
迭代次数:10000
网上十二进制转二进制方法有很多,我用的是下面的fromHex(
C#加密后base64转换后结果:0jb2Xr1oySQEn4k/CvKYzIOcXAgk/sWWhtbzeDKZ+N8=
java我试了很多代码,可是没有一个是这个。比如下面的代码结果是:NzdkOWNiYjQxYzZiMmZlN2NlNTI1OTAxMjRlMmNkMzI=
请问我哪里有问题吗??还是说java和c#的PBKDF2加密结果是不一样的吗?
package com.kidthief.test;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.PBEKeySpec;
import java.math.BigInteger;
import java.security.NoSuchAlgorithmException;
import java.security.SecureRandom;
import java.security.spec.InvalidKeySpecException;
import java.security.spec.KeySpec;
import java.util.Base64;
public class PBKDF2Util {
public static final String PBKDF2_ALGORITHM = "PBKDF2WithHmacSHA1";
public static final int SALT_BYTE_SIZE = 32 / 2; //盐的长度
public static final int HASH_BIT_SIZE = 32 * 4; //生成密文的长度
public static final int PBKDF2_ITERATIONS = 10000; //迭代次数
/**
* @auther: Ragty
* @describe: 对输入的密码进行验证
* @param: [attemptedPassword(待验证密码), encryptedPassword(密文), salt(盐值)]
* @return: boolean
* @date: 2018/11/2
*/
public boolean authenticate(String attemptedPassword, String encryptedPassword, String salt)
throws NoSuchAlgorithmException, InvalidKeySpecException {
// 用相同的盐值对用户输入的密码进行加密
String encryptedAttemptedPassword = getEncryptedPassword(attemptedPassword, salt);
// 把加密后的密文和原密文进行比较,相同则验证成功,否则失败
return encryptedAttemptedPassword.equals(encryptedPassword);
}
/**
* @auther: Ragty
* @describe: 生成密文
* @param: [password(明文密码), salt(盐值)]
* @return: java.lang.String
* @date: 2018/11/2
*/
public String getEncryptedPassword(String password, String salt) throws NoSuchAlgorithmException,
InvalidKeySpecException {
KeySpec spec = new PBEKeySpec(password.toCharArray(), fromHex(salt), PBKDF2_ITERATIONS, HASH_BIT_SIZE);
SecretKeyFactory f = SecretKeyFactory.getInstance(PBKDF2_ALGORITHM);
return toHex(f.generateSecret(spec).getEncoded());
}
/**
* @auther: Ragty
* @describe: 通过加密的强随机数生成盐(最后转换为16进制)
* @param: []
* @return: java.lang.String
* @date: 2018/11/2
*/
public String generateSalt() throws NoSuchAlgorithmException {
SecureRandom random = SecureRandom.getInstance("SHA1PRNG");
byte[] salt = new byte[SALT_BYTE_SIZE];
random.nextBytes(salt);
return toHex(salt);
}
/**
* @auther: Ragty
* @describe: 十六进制字符串转二进制字符串
* @param: [hex]
* @return: byte[]
* @date: 2018/11/2
*/
private static byte[] fromHex(String hex) {
// byte[] binary = new byte[hex.length() / 2];
// for (int i = 0; i < binary.length; i++) {
// binary[i] = (byte) Integer.parseInt(hex.substring(2 * i, 2 * i + 2), 16);
// }
// return binary;
int len = (hex.length() / 2);
byte[] result = new byte[len];
char[] achar = hex.toCharArray();
for (int i = 0; i < len; i++) {
int pos = i * 2;
result[i] = (byte) (toByte(achar[pos]) << 4 | toByte(achar[pos + 1]));
}
return result;
}
private static byte toByte(char c) {
byte b = (byte) "0123456789abcdef".indexOf(c);
return b;
}
/**
* @auther: Ragty
* @describe: 二进制字符串转十六进制字符串
* @param: [array]
* @return: java.lang.String
* @date: 2018/11/2
*/
private static String toHex(byte[] array) {
BigInteger bi = new BigInteger(1, array);
String hex = bi.toString(16);
int paddingLength = (array.length * 2) - hex.length();
if (paddingLength > 0)
return String.format("%0" + paddingLength + "d", 0) + hex;
else
return hex;
}
public static void main(String[] args) throws InvalidKeySpecException, NoSuchAlgorithmException {
PBKDF2Util pbkdf2Util = new PBKDF2Util();
String password = "a111111";
// String salt = pbkdf2Util.generateSalt();
String salt = "nff0hJsOZpANVR44VVUN0g==";
String pbkdf2 = pbkdf2Util.getEncryptedPassword(password,salt);
String base64String = Base64.getEncoder().encodeToString(pbkdf2.getBytes());
System.out.println("原始密码:"+password);
System.out.println("盐值:"+salt);
System.out.println("PBKDF2加盐后的密码:"+pbkdf2);
System.out.println("BASE64:"+base64String);
System.out.println("Test success");
}
}