这是我的基本对称加密程序。现在我正在学习,我想知道这是如何工作的。我有以下例外:
线程“main”中的异常java.security.InvalidKeyException:非法 密码大小或默认参数javax.crypto.Cipher.a(DashoA13 * ..) 在javax.crypto.Cipher.init(DashoA13 * ..)at javax.crypto.Cipher.init(DashoA13 * ..)at sample.MainClass.main(MainClass.java:24)
这是我的计划:
public class MainClass {
public static void main(String[] args) throws Exception {
Security.addProvider(new org.bouncycastle.jce.provider.BouncyCastleProvider());
byte[] input = " www.java2s.com ".getBytes();
byte[] keyBytes = new byte[] { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09,
0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17 };
SecretKeySpec key = new SecretKeySpec(keyBytes, "AES");
Cipher cipher = Cipher.getInstance("AES/ECB/NoPadding", "BC");
System.out.println("input text : " + new String(input));
// encryption pass
byte[] cipherText = new byte[input.length];
cipher.init(Cipher.ENCRYPT_MODE, key);
int ctLength = cipher.update(input, 0, input.length, cipherText, 0);
ctLength += cipher.doFinal(cipherText, ctLength);
System.out.println("cipher text: " + new String(cipherText) + " bytes: " + ctLength);
// decryption pass
byte[] plainText = new byte[ctLength];
cipher.init(Cipher.DECRYPT_MODE, key);
int ptLength = cipher.update(cipherText, 0, ctLength, plainText, 0);
ptLength += cipher.doFinal(plainText, ptLength);
System.out.println("plain text : " + new String(plainText) + " bytes: " + ptLength);
}
}
你能告诉我如何解决这个问题吗?
答案 0 :(得分:1)
这确实看起来像是Java Security: Illegal key size or default parameters?的副本。您可能需要将local_policy.jar和US_export_policy.jar替换为Unlimited Security版本。您可以在此处下载:http://www.oracle.com/technetwork/java/javase/downloads/jce-6-download-429243.html
这些文件应该在你的jre / lib / security /文件夹中。另外,对我来说,我在不同的位置有很多不同的JRE,而我使用的是里面我的jdk文件夹路径。我花了最长的时间来计算这个废话