前后端接口AES+RSA混合加解密詳解(vue+SpringBoot)
- 前后端接口AES+RSA混合加解密
- 一、AES加密原理和為什么不使用AES加密
- 二、RSA加密原理和為什么不使用rsa加密
- 三、AES和RSA混合加密的原理
- 四、代碼樣例
- 前端
- 1. 請(qǐng)求增加加密標(biāo)識(shí)
- 2. 前端加密工具類
- 3.前端axios請(qǐng)求統(tǒng)一封裝,和返回統(tǒng)一封裝
- 后端
- 1.后端加密工具類
- 2. 請(qǐng)求的返回實(shí)體封裝
- 3. 配置過(guò)濾器對(duì)請(qǐng)求進(jìn)行加解密操作
- 4.過(guò)濾器注冊(cè)
- 5. 獲取RSA公鑰接口
- 總結(jié):
前后端接口AES+RSA混合加解密
為什么需要對(duì)前后端接口加解密?主要是甲方要求。
一、AES加密原理和為什么不使用AES加密
AES是最常見的對(duì)稱加密算法,加密和解密用到的密鑰是相同的,這種加密方式加密速度非常快,適合經(jīng)常發(fā)送數(shù)據(jù)的場(chǎng)合,且加密長(zhǎng)文本比較方便。缺點(diǎn)是密鑰的傳輸比較麻煩,只能將一把公鑰分別在前后端代碼中各存放一份,還有一個(gè)遇到的問(wèn)題下面會(huì)講到,那就是美國(guó)對(duì)AES加密密鑰長(zhǎng)度的限制。優(yōu)點(diǎn)是加密效率高,缺點(diǎn)是安全性低。
二、RSA加密原理和為什么不使用rsa加密
RSA也就是非對(duì)稱加密算法,是使用不同密鑰進(jìn)行加密和解密的算法,也稱為公私鑰加密。公鑰和私鑰是同時(shí)生成的,公鑰用來(lái)加密,私鑰用來(lái)解密,加解密的密鑰是成對(duì)出現(xiàn)。但是不推薦用RSA加密請(qǐng)求報(bào)文,因?yàn)镽SA加密后的報(bào)文會(huì)很長(zhǎng),經(jīng)常會(huì)出現(xiàn)超過(guò)請(qǐng)求體長(zhǎng)度限制。優(yōu)點(diǎn)是安全性高,缺點(diǎn)是RSA的加密效率低。
三、AES和RSA混合加密的原理
我們可以結(jié)合兩者的優(yōu)點(diǎn),AES的加密效率高,那我們可以使用aes來(lái)加密報(bào)文,而RSA的靈活性和安全性來(lái)加密aes的密鑰??偟乃悸肪褪抢肦SA來(lái)加密傳輸AES的密鑰,用 AES的密鑰來(lái)加密請(qǐng)求報(bào)文。
四、代碼樣例
前端
1. 請(qǐng)求增加加密標(biāo)識(shí)
首先這個(gè)功能我們的出發(fā)點(diǎn)是可以靈活配置,所以我們?cè)谛枰用艿恼?qǐng)求頭添加一個(gè)加密標(biāo)識(shí)代碼如下:
import axios from '@common/plugins/Axios'saveStudent: data => {return axios.request({url: `/demo/saveStudent`,method: 'post',headers: {isEncrypt: 1},data})}
2. 前端加密工具類
import JSEncrypt from 'jsencrypt'
import CryptoJS from 'crypto-js'
export function rsaEncrypt(Str, afterPublicKey) {const encryptor = new JSEncrypt()encryptor.setPublicKey(afterPublicKey) return encryptor.encrypt(Str)
}
export function rsaDecrypt(Str, frontPrivateKey) {const encryptor = new JSEncrypt()encryptor.setPrivateKey(frontPrivateKey) return encryptor.decrypt(Str)
}export function aesEncrypt(aeskey, Str) {var key = CryptoJS.enc.Utf8.parse(aeskey)var srcs = CryptoJS.enc.Utf8.parse(Str)var encrypted = CryptoJS.AES.encrypt(srcs, key, {mode: CryptoJS.mode.ECB,padding: CryptoJS.pad.Pkcs7})return encrypted.toString()
}export function aesDecrypt(aeskey, Str) {var key = CryptoJS.enc.Utf8.parse(aeskey)var decrypt = CryptoJS.AES.decrypt(Str, key, {mode: CryptoJS.mode.ECB,padding: CryptoJS.pad.Pkcs7})return CryptoJS.enc.Utf8.stringify(decrypt).toString()
}
export function get16RandomNum() {var chars = [ '0','1','2','3','4','5','6','7','8','9','A','B','C','D','E','F','G','H','I','J','K', 'L','M','N','O','P','Q','R','S','T','U','V','W','X','Y','Z','a','b','c','d','e','f',
'g','h','i','j','k','l','m','n','o','p','q','r','s','t','u','v','w','x','y','z']var nums = ''for (var i = 0; i < 16; i++) {var id = parseInt(Math.random() * 61)nums += chars[id]}return nums
}
export function getRsaKeys() {return new Promise((resolve, reject) => {window.crypto.subtle.generateKey({name: 'RSA-OAEP',modulusLength: 2048, publicExponent: new Uint8Array([0x01, 0x00, 0x01]),hash: { name: 'SHA-512' } },true, ['encrypt', 'decrypt'] ).then(function(key) {window.crypto.subtle.exportKey('pkcs8', key.privateKey).then(function(keydata1) {window.crypto.subtle.exportKey('spki', key.publicKey).then(function(keydata2) {var privateKey = RSA2text(keydata1, 1)var publicKey = RSA2text(keydata2)resolve({ privateKey, publicKey })}).catch(function(err) {reject(err)})}).catch(function(err) {reject(err)})}).catch(function(err) {reject(err)})})
}
function RSA2text(buffer, isPrivate = 0) {var binary = ''var bytes = new Uint8Array(buffer)var len = bytes.byteLengthfor (var i = 0; i < len; i++) {binary += String.fromCharCode(bytes[i])}var base64 = window.btoa(binary)let text = base64.replace(/[^\x00-\xff]/g, '$&\x01').replace(/.{64}\x01?/g, '$&\n')return text
}
3.前端axios請(qǐng)求統(tǒng)一封裝,和返回統(tǒng)一封裝
import Axios from 'axios'
import { getRsaKeys, rsaEncrypt, rsaDecrypt, aesDecrypt, aesEncrypt, get32RandomNum } from '@common/util'
const instance = Axios.create({headers: {x_requested_with: 'XMLHttpRequest'}
})
let frontPrivateKey
instance.interceptors.request.use(async config => {if (sessionStorage.getItem('X-Access-Token')) {config.headers['X-Access-Token'] = sessionStorage.getItem('X-Access-Token')}if (config.headers['isEncrypt']) {config.headers['Content-Type'] = 'application/json;charset=utf-8'if (config.method === 'post' || config.method === 'put') {const { privateKey, publicKey } = await getRsaKeys()let afterPublicKey = sessionStorage.getItem('afterPublicKey')frontPrivateKey = privateKeylet aesKey = get16RandomNum()let aesKeyByRsa = rsaEncrypt(aesKey, afterPublicKey)if (config.data) {let data = aesEncrypt(aesKey, JSON.stringify(config.data))config.data = {data: data,aeskey: aesKeyByRsa,frontPublicKey: publicKey}}if (config.params) {let data = aesEncrypt(aesKey, JSON.stringify(config.params))config.params = {params: data,aeskey: aesKeyByRsa,frontPublicKey: publicKey}}}}config.url ="你的后端接口請(qǐng)求地址" + config.urlreturn config},err => {return Promise.reject(err)}
)
instance.interceptors.response.use(response => {let aesKeyByRsa = response.data.aesKeyByRsaif (aesKeyByRsa) {let aesKey = rsaDecrypt(aesKeyByRsa, frontPrivateKey)response.data.data = JSON.parse(JSON.parse(aesDecrypt(aesKey, response.data.data)))return response.data}else{ return response} }},error => {if (error.response.status === 500) {const { data } = erro