如何从PBE密钥生成器获取哈希值

时间:2012-12-07 18:57:37

标签: java encryption secret-key

我想使用PBE生成其他加密密钥。

public SecretKey generateKey(String Ags) throws Exception {
    // make password
    PBEKeySpec keySpec = new PBEKeySpec(this.password.toCharArray(),this.salt,20,56);

    SecretKeyFactory keyFactory = SecretKeyFactory
            .getInstance("PBE");
    SecretKey key = keyFactory.generateSecret(keySpec);
    System.out.println();

    /*
    KeyGenerator kg = KeyGenerator.getInstance("AES");
    kg.init(k);
    //
    SecretKey FINAL_key = new SecretKeySpec(key.getEncoded(), "AES");
    */
    return null;
}

我的基本想法是先使用PBEKeySpecSecretKeyFactory生成PBE密钥,然后获取前几个字节,比如10个字节,以生成AES密钥。但是,在搜索互联网后,我仍然不知道如何将最终密钥作为byte[]key.getEncoded()只会给我输入密码。如何将最终密钥作为byte[]

获取

1 个答案:

答案 0 :(得分:0)

据我所知,通过阅读documentation,我明白如果你想创建一个AES密钥,你需要用至少128位的密钥提供算法。

SecretKeySpec secretKeySpec = new SecretKeySpec(key, "AES");

所以生成密钥为什么你坚持从PBE密钥中获取128位,而不是你可以使用

byte[] key = (Password+Username).getBytes("UTF-8"); // depends on your implementation
MessageDigest sha = MessageDigest.getInstance("SHA-1");
key = sha.digest(key);
key = Arrays.copyOf(key, 16); // AES uses 16 byte of key as a parameter (?)

您也可以使用PBE密钥为SHA提供并以这种方式获取字节。 Okey让我们转向你的问题,这是我的安全文件夹中的完整工作代码,我记得这对我有用,请随时提出任何问题。在下面的代码中,如果您检查是否会看到密钥是使用 pbeKeySpec 生成的,但是当我查看代码时,我看不出你的错误。

public void testPBEWithSHA1AndAES() throws Exception {
        String password = "test";
        String message = "Hello World!";

        byte[] salt = { (byte) 0xc7, (byte) 0x73, (byte) 0x21, (byte) 0x8c,
                (byte) 0x7e, (byte) 0xc8, (byte) 0xee, (byte) 0x99 };
        byte[] iv = { (byte) 0xc7, (byte) 0x73, (byte) 0x21, (byte) 0x8c,
                (byte) 0x7e, (byte) 0xc8, (byte) 0xee, (byte) 0x99,
                (byte) 0xc7, (byte) 0x73, (byte) 0x21, (byte) 0x8c,
                (byte) 0x7e, (byte) 0xc8, (byte) 0xee, (byte) 0x99 };

        int count = 1024;
        // int keyLength = 256;
        int keyLength = 128;

        String cipherAlgorithm = "AES/CBC/PKCS5Padding";
        String secretKeyAlgorithm = "PBKDF2WithHmacSHA1";
        SecretKeyFactory keyFac = SecretKeyFactory
                .getInstance(secretKeyAlgorithm);
        PBEKeySpec pbeKeySpec = new PBEKeySpec(password.toCharArray(), salt,
                count, keyLength);
        SecretKey tmp = keyFac.generateSecret(pbeKeySpec);
        SecretKey secret = new SecretKeySpec(tmp.getEncoded(), "AES");
        Cipher ecipher = Cipher.getInstance(cipherAlgorithm);
        ecipher.init(Cipher.ENCRYPT_MODE, secret, new IvParameterSpec(iv));

        // decrypt
        keyFac = SecretKeyFactory.getInstance(secretKeyAlgorithm);
        pbeKeySpec = new PBEKeySpec(password.toCharArray(), salt, count,
                keyLength);
        tmp = keyFac.generateSecret(pbeKeySpec);
        secret = new SecretKeySpec(tmp.getEncoded(), "AES");
        // AlgorithmParameters params = ecipher.getParameters();
        // byte[] iv = params.getParameterSpec(IvParameterSpec.class).getIV();
        Cipher dcipher = Cipher.getInstance(cipherAlgorithm);
        dcipher.init(Cipher.DECRYPT_MODE, secret, new IvParameterSpec(iv));

        byte[] encrypted = ecipher.doFinal(message.getBytes());
        byte[] decrypted = dcipher.doFinal(encrypted);
        assertEquals(message, new String(decrypted));

        ByteArrayOutputStream out = new ByteArrayOutputStream();
        CipherOutputStream cipherOut = new CipherOutputStream(out, ecipher);
        cipherOut.write(message.getBytes());
        StreamUtils.closeQuietly(cipherOut);
        byte[] enc = out.toByteArray();

        ByteArrayInputStream in = new ByteArrayInputStream(enc);
        CipherInputStream cipherIn = new CipherInputStream(in, dcipher);
        ByteArrayOutputStream dec = new ByteArrayOutputStream();
        StreamUtils.copy(cipherIn, dec);
        assertEquals(message, new String(dec.toByteArray()));
    }