前端请求参数加密、.NET 后端解密

这篇具有很好参考价值的文章主要介绍了前端请求参数加密、.NET 后端解密。希望对大家有所帮助。如果存在错误或未考虑完全的地方,请大家不吝赐教,您也可以点击"举报违法"按钮提交疑问。

本文详细介绍了前端请求参数加密、.NET 后端解密,文章较长,请各位看官耐心看完。

目录
  • 一、前端使用“CryptoJS”,前端AES加密,.NET后端AES解密
    • 1.1、加密解密效果图
    • 1.2、CryptoJS介绍
    • 1.3、准备工作:安装“CryptoJS”
      • 1.3.1、使用npm进行安装
      • 1.3.2、Visual Studio中安装
        • 1.3.2.1、选择“客户端库”
        • 1.3.2.2、安装下载“CryptoJS”
    • 1.4、H5页面代码中引用“crypto-js”
    • 1.5、前端页面代码
      • 1.5.1、Html代码
      • 1.5.2、javascript代码
    • 1.6、.NET 后端代码
      • 1.6.1、定义公共的密匙字段
      • 1.6.2、封装AES解密方法
      • 1.6.3、编写API接口
  • 二、前端使用“JSEncrypt”,进行非对称RSA加密,.NET后端解密
    • 2.1、加密解密效果图
    • 2.2、非对称加密
    • 2.3、RSA
    • 2.4、准备工作:安装“jsencrypt”
      • 2.4.1、使用npm进行安装
      • 2.4.2、Visual Studio中安装
        • 2.4.2.1、选择“客户端库”
        • 2.4.2.2、安装下载“jsencrypt”
    • 2.5、安装组件“BouncyCastle”
      • 2.5.1、新建帮助类
        • 2.5.1.1、添加C# RAS生成.NET公钥与私钥以及.NET公钥与私钥转Java公钥私钥类“RASKeyConversion”
        • 2.5.1.2、添加RSA秘钥转换帮助类“RsaKeyConvert”
        • 2.5.1.3、添加RSA加密帮助类“RSACrypto”
    • 2.6、.NET 控制器后端代码
      • 2.6.1、视图控制图代码
      • 2.6.2、POST请求接口代码
    • 2.7、前端视图页面代码
      • 2.7.1、Html代码
      • 2.7.2、javascript代码

一、前端使用“CryptoJS”,前端AES加密,.NET后端AES解密

1.1、加密解密效果图

前端请求参数加密、.NET 后端解密

1.2、CryptoJS介绍

CryptoJS是一个JavaScript的加解密的工具包。它支持多种的算法:MD5、SHA1、SHA2、SHA3、RIPEMD-160 哈希散列,进行 AES、DES、Rabbit、RC4、Triple DES 加解密。

1.3、准备工作:安装“CryptoJS”

1.3.1、使用npm进行安装

npm安装命令如下:

npm install crypto-js --save-dev

1.3.2、Visual Studio中安装

1.3.2.1、选择“客户端库”

前端请求参数加密、.NET 后端解密

1.3.2.2、安装下载“CryptoJS”

在“添加客户端库”界面:

  1. 提供程序:选择“unpkg”;
  2. 库:输入“crypto-js@”,进行版本的选择;
  3. 可选择:1、包括所有库文件;2、选择特定文件;

确认无误之后,点击“安装”即可。
前端请求参数加密、.NET 后端解密

1.4、H5页面代码中引用“crypto-js”

1.5、前端页面代码

1.5.1、Html代码

H5代码使用了Layui开原框架

<!DOCTYPE html>

<html>
<head>
    <meta name="viewport" content="width=device-width" />
    <title>sometext</title>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
    <script src="/lib/jquery/dist/jquery.js"></script>
    <script src="/lib/layui/dist/layui.js"></script>
    <script src="/lib/bootstrap/dist/js/bootstrap.js"></script>
	<script src="/lib/crypto-js/crypto-js.js"></script>
    <link href="/lib/layui/dist/css/layui.css" rel="stylesheet" />
    <link href="/lib/bootstrap/dist/css/bootstrap.css" rel="stylesheet" />
    <style type="text/css"></style>
</head>
<body>
    <div class="wrapper">
        <div class="input-group mb-3">
            <div class="input-group-prepend">
                <span class="input-group-text" id="basic-addon1">脱敏/加密前的内容:</span>
            </div>
            <input type="password" class="form-control" id="sourctText" placeholder="脱敏/加密前的内容" aria-label="sourctText" aria-describedby="basic-addon1">
        </div>
        <br />
        <div class="input-group mb-3">
            <div class="input-group-prepend">
                <span class="input-group-text" id="basic-addon1">加密后的内容:</span>
            </div>
            <input type="text" class="form-control" id="encryptText" placeholder="加密后的内容" readonly="readonly" aria-label="encryptText" aria-describedby="basic-addon1">
        </div>
        <br />
        <div class="input-group mb-3">
            <div class="input-group-prepend">
                <span class="input-group-text" id="basic-addon1">脱敏/加密后的内容:</span>
            </div>
            <input type="text" class="form-control" id="resText" placeholder="脱敏/加密后的内容" readonly="readonly" aria-label="resText" aria-describedby="basic-addon1">
        </div>

        <div class="input-group mb-3">
            <button id="submit" type="button" class="btn btn-primary btn-lg btn-block">提交</button>
        </div>
    </div>
</body>
</html>

1.5.2、javascript代码

说明:CBC模式前、后端需要确定偏移量的值,并且保持一致,这样才能确保后端解密成功。

<script type="text/javascript">
    const KEY = CryptoJS.enc.Utf8.parse("lucasnetLUCASNET"); //16位
    const IV = CryptoJS.enc.Utf8.parse("lucasnetLUCASNET");
    layui.use(['form'], function () {
        let form = layui.form;
        $("#submit").on("click", function () {
            let sourctText = $("#sourctText").val();
            if (sourctText != "" && sourctText != null) {
                let encryptText = wordEncrypt(sourctText);
                $("#encryptText").val(encryptText);
                login(encryptText);
            } else {
                layui.layer.alert("密码为空!", { icon: 5, title: "温馨提示", closeBtn: 0 });
            }
        });

        function login(sourctText) {
            var word_Encrypt = $.ajax({
                url: "/Home/word_Encrypt",//请求后端接口的路径
                dataType: "JSON",
                type: "POST",
                data: {
                    "ciphertextpwd": sourctText,
                },
                success: function (res) {
                    let resCode = res.code;
                    let resMsg = res.msg;
                    if ((resCode == "210" || resCode == 210) || (resCode == 220 || resCode == "220") || (resCode == 230 || resCode == "230") || (resCode == 240 || resCode == "240") || (resCode == 260 || resCode == "260")) {
                        //返回数据后关闭loading
                        layer.closeAll();
                        // 在 2 秒钟后取消 AJAX 请求
                        setTimeout(function () {
                            word_Encrypt.abort(); // 删除 AJAX 请求
                        }, 2000);
                        layui.layer.alert(resMsg, { icon: 5, title: "温馨提示", closeBtn: 0 });
                    } else if (resCode == 200 || resCode == "200") {
                        $("#resText").val(resMsg);
                        //返回数据后关闭loading
                        layer.closeAll();
                        // 在 2 秒钟后取消 AJAX 请求
                        setTimeout(function () {
                            word_Encrypt.abort(); // 删除 AJAX 请求
                        }, 2000);
                    }
                },
                error: function (error) {
                    //返回数据后关闭loading
                    layer.closeAll();
                    // 在 2 秒钟后取消 AJAX 请求
                    setTimeout(function () {
                        word_Encrypt.abort(); // 删除 AJAX 请求
                    }, 2000);
                    layui.layer.alert(error, { icon: 5, title: "温馨提示", closeBtn: 0 });
                }
            });
        }

        /**
         * 前端AES使用CBC加密 key,iv长度为16位,可相同 自定义即可
         */
        function wordEncrypt(word) {
            let key = KEY;
            let iv = IV;
            let encrypted = "";
            if (typeof word == "string") {
                let srcs = CryptoJS.enc.Utf8.parse(word);
                encrypted = CryptoJS.AES.encrypt(srcs, key, {
                    iv: iv,
                    mode: CryptoJS.mode.CBC,
                    padding: CryptoJS.pad.Pkcs7
                });
            } else if (typeof word == "object") {
                //对象格式的转成json字符串
                let data = JSON.stringify(word);
                let srcs = CryptoJS.enc.Utf8.parse(data);
                encrypted = CryptoJS.AES.encrypt(srcs, key, {
                    iv: iv,
                    mode: CryptoJS.mode.CBC,
                    padding: CryptoJS.pad.Pkcs7
                });
            }
            return CryptoJS.enc.Base64.stringify(encrypted.ciphertext);
        }
    });
</script>

1.6、.NET 后端代码

1.6.1、定义公共的密匙字段

/// <summary>
/// //AES加密所需16位密匙
/// </summary>
private static readonly String strAesKey = "lucasnetLUCASNET";

/// <summary>
/// AES加密所需16位密匙向量
/// </summary>
private static readonly String strAesIv = "lucasnetLUCASNET";

1.6.2、封装AES解密方法

/// <summary>
///  AES 解密
/// </summary>
/// <param name="str">密文(待解密)</param>
/// <returns></returns>
public string AesDecrypt(string str)
{
    if (string.IsNullOrEmpty(str)) return null;
    Byte[] toEncryptArray = Convert.FromBase64String(str);
    using (RijndaelManaged rm = new RijndaelManaged())
    {
        rm.Key = Encoding.UTF8.GetBytes(strAesKey);
        rm.IV = Encoding.UTF8.GetBytes(strAesIv);
        rm.Mode = CipherMode.CBC;
        rm.Padding = PaddingMode.PKCS7;
        rm.FeedbackSize = 128;
        ICryptoTransform encryptor = rm.CreateDecryptor(rm.Key, rm.IV);
        Byte[] resultArray = encryptor.TransformFinalBlock(toEncryptArray, 0, toEncryptArray.Length);
        return Encoding.UTF8.GetString(resultArray);
    }
}

1.6.3、编写API接口

/// <summary>
/// 解密接口
/// </summary>
/// <param name="ciphertextpwd">密码密文(待解密)</param>
/// <param name="publicKey">公钥</param>
/// <param name="privateKey">私钥</param>
/// <returns></returns>
[HttpPost]
public IActionResult word_Encrypt(string ciphertextpwd)
{
    string resPwd = "";
    try
    {
        resPwd = AesDecrypt(ciphertextpwd);
        return Json(new { code = 200, msg = resPwd });
    }
    catch (Exception ex)
    {
        return Json(new { code = 220, msg = "AES解密时出现错误!!!" });
    }
}

二、前端使用“JSEncrypt”,进行非对称RSA加密,.NET后端解密

2.1、加密解密效果图

前端请求参数加密、.NET 后端解密

2.2、非对称加密

所谓的非对称,即加密和解密用的不是同一个秘钥。比如用公钥加密,就要用私钥解密。非对称加密的安全性是要好于对称加密的,但是性能就比较差了。

2.3、RSA

非对称加密算法中常用的就是 RSA 了。它是由在 MIT 工作的 3 个人于 1977 年提出,RSA 这个名字的由来便是取自他们 3 人的姓氏首字母。我们在访问 github 等远程 git 仓库时,如果是使用 SSH 协议,需要生成一对公私秘钥,就可以使用 RSA 算法。

2.4、准备工作:安装“jsencrypt”

2.4.1、使用npm进行安装

npm安装命令如下:

npm install jsencrypt

2.4.2、Visual Studio中安装

2.4.2.1、选择“客户端库”

前端请求参数加密、.NET 后端解密

2.4.2.2、安装下载“jsencrypt”

在“添加客户端库”界面:

  1. 提供程序:选择“unpkg”;
  2. 库:输入“jsencrypt@”,进行版本的选择;
  3. 可选择:1、包括所有库文件;2、选择特定文件;

确认无误之后,点击“安装”即可。
前端请求参数加密、.NET 后端解密

2.5、安装组件“BouncyCastle”

在菜单栏找到 工具 —> NuGet 包管理器 —> 管理解决方案的NuGet程序包 —> 浏览 —> 搜索 “BouncyCastle” —> 安装。
前端请求参数加密、.NET 后端解密

2.5.1、新建帮助类

2.5.1.1、添加C# RAS生成.NET公钥与私钥以及.NET公钥与私钥转Java公钥私钥类“RASKeyConversion”

可根据自己需求删除生成Java的文章来源地址https://www.toymoban.com/news/detail-712253.html

using Org.BouncyCastle.Asn1.Pkcs;
using Org.BouncyCastle.Asn1.X509;
using Org.BouncyCastle.Crypto;
using Org.BouncyCastle.Crypto.Parameters;
using Org.BouncyCastle.Math;
using Org.BouncyCastle.OpenSsl;
using Org.BouncyCastle.Pkcs;
using Org.BouncyCastle.Security;
using Org.BouncyCastle.X509;
using System;
using System.Security.Cryptography;
using System.Xml;

namespace WebApplication1
{
    /// <summary>
    /// C# RAS生成.NET公钥与私钥以及.NET公钥与私钥转Java公钥私钥类
    /// </summary>
    public class RASKeyConversion
    {
        /// <summary>
        /// 第一个:C# 私钥;第二个:C# 公钥;第三个:JAVA私钥;第四个:JAVA公钥
        /// </summary>
        private static string[] sKeys = new String[4];

        /// <summary>
        /// 生成公钥与私钥方法
        /// </summary>
        /// <returns>第一个:C# 私钥;第二个:C# 公钥;第三个:JAVA私钥;第四个:JAVA公钥</returns>
        public static string[] createPulbicKey(int size = 1024)
        {
            try
            {
                //密钥格式要生成pkcs#1格式的  而不是pkcs#8格式的
                using (RSACryptoServiceProvider rsa = new RSACryptoServiceProvider(size))
                {
                    //C# 私钥
                    sKeys[0] = rsa.ToXmlString(true);
                    //C# 公钥
                    sKeys[1] = rsa.ToXmlString(false);
                    //JAVA私钥
                    sKeys[2] = RSAPrivateKeyDotNet2Java(sKeys[0]);
                    //JAVA公钥
                    sKeys[3] = RSAPublicKeyDotNet2Java(sKeys[1]);
                    return sKeys;
                }
            }
            catch (Exception)
            {
                return null;
            }
        }

        /// <summary>    
        /// RSA私钥格式转换,.net->java    
        /// </summary>    
        /// <param name="privateKey">.net生成的私钥</param>    
        /// <returns></returns>    
        public static string RSAPrivateKeyDotNet2Java(string privateKey)
        {
            XmlDocument doc = new XmlDocument();
            doc.LoadXml(privateKey);
            BigInteger m = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("Modulus")[0].InnerText));
            BigInteger exp = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("Exponent")[0].InnerText));
            BigInteger d = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("D")[0].InnerText));
            BigInteger p = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("P")[0].InnerText));
            BigInteger q = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("Q")[0].InnerText));
            BigInteger dp = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("DP")[0].InnerText));
            BigInteger dq = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("DQ")[0].InnerText));
            BigInteger qinv = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("InverseQ")[0].InnerText));
            RsaPrivateCrtKeyParameters privateKeyParam = new RsaPrivateCrtKeyParameters(m, exp, d, p, q, dp, dq, qinv);

            PrivateKeyInfo privateKeyInfo = PrivateKeyInfoFactory.CreatePrivateKeyInfo(privateKeyParam);
            byte[] serializedPrivateBytes = privateKeyInfo.ToAsn1Object().GetEncoded();
            return Convert.ToBase64String(serializedPrivateBytes);
        }

        /// <summary>    
        /// RSA公钥格式转换,.net->java    
        /// </summary>    
        /// <param name="publicKey">.net生成的公钥</param>    
        /// <returns></returns>    
        public static string RSAPublicKeyDotNet2Java(string publicKey)
        {
            XmlDocument doc = new XmlDocument();
            doc.LoadXml(publicKey);
            BigInteger m = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("Modulus")[0].InnerText));
            BigInteger p = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("Exponent")[0].InnerText));
            RsaKeyParameters pub = new RsaKeyParameters(false, m, p);

            SubjectPublicKeyInfo publicKeyInfo = SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(pub);
            byte[] serializedPublicBytes = publicKeyInfo.ToAsn1Object().GetDerEncoded();
            return Convert.ToBase64String(serializedPublicBytes);
        }
    }
}

2.5.1.2、添加RSA秘钥转换帮助类“RsaKeyConvert”

using Org.BouncyCastle.Crypto.Parameters;
using Org.BouncyCastle.Crypto;
using Org.BouncyCastle.Pkcs;
using Org.BouncyCastle.Security;
using System.Xml.Linq;
using Org.BouncyCastle.OpenSsl;
using Org.BouncyCastle.Math;

namespace WebApplication1 //命名空间依据自己的项目进行修改
{
    /// <summary>
    /// RSA秘钥转换帮助类
    /// </summary>
    public class RsaKeyConvert
    {

        #region 其他格式的RSA秘钥转XML格式秘钥

        /// <summary>
        /// pem格式的RSA公钥字符串转XML格式公钥 Public Key Convert pem->xml
        /// </summary>
        /// <param name="publicKey">公钥字符串</param>
        /// <returns></returns>
        /// <exception cref="Exception"></exception>
        public static string PublicKeyPemToXml(string publicKey)
        {
            publicKey = PublicKeyFormat(publicKey);
            RsaKeyParameters rsaKeyParameters = new PemReader(new StringReader(publicKey)).ReadObject() as RsaKeyParameters;
            if (rsaKeyParameters == null)
            {
                throw new Exception("Public key format is incorrect");
            }

            XElement xElement = new XElement((XName?)"RSAKeyValue");
            XElement content = new XElement((XName?)"Modulus", Convert.ToBase64String(rsaKeyParameters.Modulus.ToByteArrayUnsigned()));
            XElement content2 = new XElement((XName?)"Exponent", Convert.ToBase64String(rsaKeyParameters.Exponent.ToByteArrayUnsigned()));
            xElement.Add(content);
            xElement.Add(content2);
            return xElement.ToString();
        }

        /// <summary>
        /// Pkcs1格式私钥转成Xml Pkcs1->xml
        /// </summary>
        /// <param name="privateKey">Pkcs1格式私钥字符串</param>
        /// <returns></returns>
        /// <exception cref="Exception"></exception>
        public static string PrivateKeyPkcs1ToXml(string privateKey)
        {
            privateKey = Pkcs1PrivateKeyFormat(privateKey);
            RsaPrivateCrtKeyParameters rsaPrivateCrtKeyParameters = (RsaPrivateCrtKeyParameters)PrivateKeyFactory.CreateKey(PrivateKeyInfoFactory.CreatePrivateKeyInfo(((new PemReader(new StringReader(privateKey)).ReadObject() as AsymmetricCipherKeyPair) ?? throw new Exception("Private key format is incorrect")).Private));
            XElement xElement = new XElement((XName?)"RSAKeyValue");
            XElement content = new XElement((XName?)"Modulus", Convert.ToBase64String(rsaPrivateCrtKeyParameters.Modulus.ToByteArrayUnsigned()));
            XElement content2 = new XElement((XName?)"Exponent", Convert.ToBase64String(rsaPrivateCrtKeyParameters.PublicExponent.ToByteArrayUnsigned()));
            XElement content3 = new XElement((XName?)"P", Convert.ToBase64String(rsaPrivateCrtKeyParameters.P.ToByteArrayUnsigned()));
            XElement content4 = new XElement((XName?)"Q", Convert.ToBase64String(rsaPrivateCrtKeyParameters.Q.ToByteArrayUnsigned()));
            XElement content5 = new XElement((XName?)"DP", Convert.ToBase64String(rsaPrivateCrtKeyParameters.DP.ToByteArrayUnsigned()));
            XElement content6 = new XElement((XName?)"DQ", Convert.ToBase64String(rsaPrivateCrtKeyParameters.DQ.ToByteArrayUnsigned()));
            XElement content7 = new XElement((XName?)"InverseQ", Convert.ToBase64String(rsaPrivateCrtKeyParameters.QInv.ToByteArrayUnsigned()));
            XElement content8 = new XElement((XName?)"D", Convert.ToBase64String(rsaPrivateCrtKeyParameters.Exponent.ToByteArrayUnsigned()));
            xElement.Add(content);
            xElement.Add(content2);
            xElement.Add(content3);
            xElement.Add(content4);
            xElement.Add(content5);
            xElement.Add(content6);
            xElement.Add(content7);
            xElement.Add(content8);
            return xElement.ToString();
        }

        /// <summary>
        /// 格式化公钥字符串
        /// </summary>
        /// <param name="str">公钥字符串</param>
        /// <returns></returns>
        public static string PublicKeyFormat(string str)
        {
            if (str.StartsWith("-----BEGIN PUBLIC KEY-----"))
            {
                return str;
            }

            List<string> list = new List<string>();
            list.Add("-----BEGIN PUBLIC KEY-----");
            int num;
            for (int i = 0; i < str.Length; i += num)
            {
                num = ((str.Length - i < 64) ? (str.Length - i) : 64);
                list.Add(str.Substring(i, num));
            }

            list.Add("-----END PUBLIC KEY-----");
            return string.Join(Environment.NewLine, list);
        }

        /// <summary>
        /// 格式化Pkcs1私钥
        /// </summary>
        /// <param name="str">私钥字符串</param>
        /// <returns></returns>
        public static string Pkcs1PrivateKeyFormat(string str)
        {
            if (str.StartsWith("-----BEGIN RSA PRIVATE KEY-----"))
            {
                return str;
            }

            List<string> list = new List<string>();
            list.Add("-----BEGIN RSA PRIVATE KEY-----");
            int num;
            for (int i = 0; i < str.Length; i += num)
            {
                num = ((str.Length - i < 64) ? (str.Length - i) : 64);
                list.Add(str.Substring(i, num));
            }

            list.Add("-----END RSA PRIVATE KEY-----");
            return string.Join(Environment.NewLine, list);
        }

        #endregion

        #region Xml格式的RSA秘钥转格式

        /// <summary>
        /// RSA公钥格式转换:Xml格式的公钥转Pem格式的公钥 xml->pem
        /// </summary>
        /// <param name="publicKey">Xml公钥字符串</param>
        /// <returns></returns>
        public static string PublicKeyXmlToPem(string publicKey)
        {
            XElement xElement = XElement.Parse(publicKey);
            XElement xElement2 = xElement.Element((XName?)"Modulus");
            XElement xElement3 = xElement.Element((XName?)"Exponent");
            RsaKeyParameters obj = new RsaKeyParameters(isPrivate: false, new BigInteger(1, Convert.FromBase64String(xElement2.Value)), new BigInteger(1, Convert.FromBase64String(xElement3.Value)));
            StringWriter stringWriter = new StringWriter();
            PemWriter pemWriter = new PemWriter(stringWriter);
            pemWriter.WriteObject(obj);
            pemWriter.Writer.Close();
            return stringWriter.ToString();
        }

        /// <summary>
        /// RSA私钥格式转换:Xml格式的私钥转Pkcs1格式的私钥 xml->Pkcs1
        /// </summary>
        /// <param name="privateKey">Xml私钥字符串</param>
        /// <returns></returns>
        public static string PrivateKeyXmlToPkcs1(string privateKey)
        {
            XElement xElement = XElement.Parse(privateKey);
            XElement xElement2 = xElement.Element((XName?)"Modulus");
            XElement xElement3 = xElement.Element((XName?)"Exponent");
            XElement xElement4 = xElement.Element((XName?)"P");
            XElement xElement5 = xElement.Element((XName?)"Q");
            XElement xElement6 = xElement.Element((XName?)"DP");
            XElement xElement7 = xElement.Element((XName?)"DQ");
            XElement xElement8 = xElement.Element((XName?)"InverseQ");
            XElement xElement9 = xElement.Element((XName?)"D");
            RsaPrivateCrtKeyParameters obj = new RsaPrivateCrtKeyParameters(new BigInteger(1, Convert.FromBase64String(xElement2.Value)), new BigInteger(1, Convert.FromBase64String(xElement3.Value)), new BigInteger(1, Convert.FromBase64String(xElement9.Value)), new BigInteger(1, Convert.FromBase64String(xElement4.Value)), new BigInteger(1, Convert.FromBase64String(xElement5.Value)), new BigInteger(1, Convert.FromBase64String(xElement6.Value)), new BigInteger(1, Convert.FromBase64String(xElement7.Value)), new BigInteger(1, Convert.FromBase64String(xElement8.Value)));
            StringWriter stringWriter = new StringWriter();
            PemWriter pemWriter = new PemWriter(stringWriter);
            pemWriter.WriteObject(obj);
            pemWriter.Writer.Close();
            return stringWriter.ToString();
        }

        #endregion

    }
}

2.5.1.3、添加RSA加密帮助类“RSACrypto”

using System;
using System.Collections.Generic;
using System.IO;
using System.Linq;
using System.Security.Cryptography;
using System.Security.Cryptography.X509Certificates;
using System.Text;
using System.Threading.Tasks;

namespace WebApplication1 //命名空间依据自己的项目进行修改
{
    /// <summary>
    /// RSA加密帮助类
    /// </summary>
    public class RSACrypto
    {
        /// <summary>
        /// 默认的私钥
        /// </summary>
        private const string defaultprivateKey = @"MIICXAIBAAKBgQCC0hrRIjb3noDWNtbDpANbjt5Iwu2NFeDwU16Ec87ToqeoIm2KI+cOs81JP9aTDk/jkAlU97mN8wZkEMDr5utAZtMVht7GLX33Wx9XjqxUsDfsGkqNL8dXJklWDu9Zh80Ui2Ug+340d5dZtKtd+nv09QZqGjdnSp9PTfFDBY133QIDAQABAoGAJBNTOITaP6LCyKVKyEdnHaKNAz0DS+V9UwjKhyAgfcAxwm3sDdd6FQCEW0TIJA7Np7rFYrGwcR1UOoKxkNxB10ACl6JX4rE7xKS6NLZumdwxON/KgDb+2SQtWEXDgBySZ7Znv/FhEp1RmoBDjZ05E99kILWO3ToorUM0Eq2GHQkCQQCnUMXgZa4HS0tu
INzysgB37d7ene9+CIARyJphs079qao2UWCgXqen43Ob6GJUgulz7We+4JOZFld0TfEi1E5rAkEAyClQAVzafLO3gXgqH7tbRbPPx788+4opxT9QBo2Trzl6/3FlcC1PIZeqbQ/Oc2wT7jmidFnpyTEnM2p7Yq3U1wJBAILTWaX4W3dAnJ5j+9+Y51zfFiEjhRwbMWi2XmB+gAlAHOOUBeXfnWBdLQx/TEOgiUIoI7LQjxhoq8E5II+HSjkCQDlKSdH6B7dFoTJ3eGcYsykiLEiZ3hSJGSeR1Y/qmei/ZQsUI9qVvV56EJeivI6g0puO94ah7Z5eaT/4LFS0OIUCQDgLn586pGgeidLhQsIe/AR3y9YOCAygTFLxzmeBXOKtM90q4516KWlTtK2u99442mNi7hNmjryBVwk62foWo8w=";

        /// <summary>
        /// 默认公钥
        /// </summary>
        private const string defaultpublicKey = @"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCC0hrRIjb3noDWNtbDpANbjt5Iwu2NFeDwU16Ec87ToqeoIm2KI+cOs81JP9aTDk/jkAlU97mN8wZkEMDr5utAZtMVht7GLX33Wx9XjqxUsDfsGkqNL8dXJklWDu9Zh80Ui2Ug+340d5dZtKtd+nv09QZqGjdnSp9PTfFDBY133QIDAQAB";

        private RSACryptoServiceProvider _privateKeyRsaProvider;
        private RSACryptoServiceProvider _publicKeyRsaProvider;

        /// <summary>
        /// RSA加密帮助类构造函数
        /// </summary>
        /// <param name="privateKey">RSA解密密匙</param>
        /// <param name="publicKey">RSA加密密匙</param>
        public RSACrypto(string privateKey = "", string publicKey = "")
        {
            //判断私钥密匙是否为空,为空,使用默认的私钥;
            if (string.IsNullOrEmpty(privateKey))
            {
                privateKey = defaultprivateKey;
            }
            //判断公钥密匙是否为空,为空,使用默认的公钥;
            if (string.IsNullOrEmpty(publicKey))
            {
                publicKey = defaultpublicKey;
            }
            //不为空:使用定义的私钥密匙创建
            if (!string.IsNullOrEmpty(privateKey))
            {
                _privateKeyRsaProvider = CreateRsaProviderFromPrivateKey(privateKey);
            }
            //不为空:使用定义的公钥密匙创建
            if (!string.IsNullOrEmpty(publicKey))
            {
                _publicKeyRsaProvider = CreateRsaProviderFromPublicKey(publicKey);
            }
        }

        public string GetPublicRsaKeyStr(string publicKey)
        {
            string keyStr = "";
            CreateRsaProviderFromPublicKey(publicKey);
            return keyStr;
        }

        /// <summary>
        /// RSA解密
        /// </summary>
        /// <param name="cipherText">解密的密文字符串</param>
        /// <returns></returns>
        /// <exception cref="Exception"></exception>
        public string RSADecrypt(string cipherText)
        {
            if (_privateKeyRsaProvider == null)
            {
                throw new Exception("提供的RSA私钥为空");
            }
            if (string.IsNullOrEmpty(cipherText))
            {
                return "";
            }
            return Encoding.UTF8.GetString(_privateKeyRsaProvider.Decrypt(System.Convert.FromBase64String(cipherText), false));
        }

        /// <summary>
        /// RSA解密
        /// </summary>
        /// <param name="cipherText">需要解密的密文字符串</param>
        /// <param name="publicKeyString">私钥</param>
        /// <param name="keyType">密钥类型XML/PEM</param>
        /// <returns></returns>
        public static string RSADecrypt(string cipherText, string privateKeyString, string keyType, int size = 1024)
        {
            RSACryptoServiceProvider rsa = new RSACryptoServiceProvider(size);
            switch (keyType)
            {
                case "XML":
                    rsa.FromXmlString(privateKeyString);
                    break;
                case "PEM":
                    break;
                default:
                    throw new Exception("不支持的密钥类型");
            }
            int MaxBlockSize = rsa.KeySize / 8;    //解密块最大长度限制
            //正常解密
            if (cipherText.Length <= MaxBlockSize)
            {
                byte[] hashvalueDcy = rsa.Decrypt(System.Convert.FromBase64String(cipherText), false);//解密
                return Encoding.GetEncoding("UTF-8").GetString(hashvalueDcy);
            }
            //分段解密
            else
            {
                using (MemoryStream CrypStream = new MemoryStream(System.Convert.FromBase64String(cipherText)))
                {
                    using (MemoryStream PlaiStream = new MemoryStream())
                    {
                        Byte[] Buffer = new Byte[MaxBlockSize];
                        int BlockSize = CrypStream.Read(Buffer, 0, MaxBlockSize);

                        while (BlockSize > 0)
                        {
                            Byte[] ToDecrypt = new Byte[BlockSize];
                            Array.Copy(Buffer, 0, ToDecrypt, 0, BlockSize);

                            Byte[] Plaintext = rsa.Decrypt(ToDecrypt, false);
                            PlaiStream.Write(Plaintext, 0, Plaintext.Length);
                            BlockSize = CrypStream.Read(Buffer, 0, MaxBlockSize);
                        }
                        string output = Encoding.GetEncoding("UTF-8").GetString(PlaiStream.ToArray());
                        return output;
                    }
                }
            }
        }

        /// <summary>
        /// RSA加密
        /// </summary>
        /// <param name="text">需要进行加密的明文字符串</param>
        /// <returns></returns>
        /// <exception cref="Exception"></exception>
        public string RSAEncrypt(string text)
        {
            if (_publicKeyRsaProvider == null)
            {
                throw new Exception("提供的RSA公钥为空");
            }
            return Convert.ToBase64String(_publicKeyRsaProvider.Encrypt(Encoding.UTF8.GetBytes(text), false));
        }

        /// <summary>
        /// RSA加密
        /// </summary>
        /// <param name="clearText">需要加密的明文字符串</param>
        /// <param name="publicKeyString">公钥</param>
        /// <param name="keyType">密钥类型XML/PEM</param>
        /// <returns></returns>
        public static string RSAEncrypt(string clearText, string publicKeyString, string keyType, int size = 1024)
        {
            byte[] data = Encoding.GetEncoding("UTF-8").GetBytes(clearText);
            RSACryptoServiceProvider rsa = new RSACryptoServiceProvider(size);
            switch (keyType)
            {
                case "XML":
                    rsa.FromXmlString(publicKeyString);
                    break;
                case "PEM":
                    break;
                default:
                    throw new Exception("不支持的密钥类型");
            }
            //加密块最大长度限制,如果加密数据的长度超过 秘钥长度/8-11,会引发长度不正确的异常,所以进行数据的分块加密
            int MaxBlockSize = rsa.KeySize / 8 - 11;
            //正常长度
            if (data.Length <= MaxBlockSize)
            {
                byte[] hashvalueEcy = rsa.Encrypt(data, false); //加密
                return System.Convert.ToBase64String(hashvalueEcy);
            }
            //长度超过正常值
            else
            {
                using (MemoryStream PlaiStream = new MemoryStream(data))
                using (MemoryStream CrypStream = new MemoryStream())
                {
                    Byte[] Buffer = new Byte[MaxBlockSize];
                    int BlockSize = PlaiStream.Read(Buffer, 0, MaxBlockSize);
                    while (BlockSize > 0)
                    {
                        Byte[] ToEncrypt = new Byte[BlockSize];
                        Array.Copy(Buffer, 0, ToEncrypt, 0, BlockSize);

                        Byte[] Cryptograph = rsa.Encrypt(ToEncrypt, false);
                        CrypStream.Write(Cryptograph, 0, Cryptograph.Length);
                        BlockSize = PlaiStream.Read(Buffer, 0, MaxBlockSize);
                    }
                    return System.Convert.ToBase64String(CrypStream.ToArray(), Base64FormattingOptions.None);
                }
            }
        }

        /// <summary>
        /// 通过提供的RSA私钥来创建RSA
        /// </summary>
        /// <param name="privateKey">私钥字符串</param>
        /// <returns></returns>
        /// <exception cref="Exception"></exception>
        private RSACryptoServiceProvider CreateRsaProviderFromPrivateKey(string privateKey)
        {
            byte[] privateKeyBits = System.Convert.FromBase64String(privateKey);
            RSACryptoServiceProvider RSA = new RSACryptoServiceProvider();
            RSAParameters RSAparams = new RSAParameters();
            using (BinaryReader binr = new BinaryReader(new MemoryStream(privateKeyBits)))
            {
                byte bt = 0;
                ushort twobytes = 0;
                twobytes = binr.ReadUInt16();
                if (twobytes == 0x8130)
                {
                    binr.ReadByte();
                }
                else if (twobytes == 0x8230)
                {
                    binr.ReadInt16();
                }
                else
                {
                    throw new Exception("Unexpected value read binr.ReadUInt16()");
                }
                twobytes = binr.ReadUInt16();
                if (twobytes != 0x0102)
                {
                    throw new Exception("Unexpected version");
                }
                bt = binr.ReadByte();
                if (bt != 0x00)
                {
                    throw new Exception("Unexpected value read binr.ReadByte()");
                }
                RSAparams.Modulus = binr.ReadBytes(GetIntegerSize(binr));
                RSAparams.Exponent = binr.ReadBytes(GetIntegerSize(binr));
                RSAparams.D = binr.ReadBytes(GetIntegerSize(binr));
                RSAparams.P = binr.ReadBytes(GetIntegerSize(binr));
                RSAparams.Q = binr.ReadBytes(GetIntegerSize(binr));
                RSAparams.DP = binr.ReadBytes(GetIntegerSize(binr));
                RSAparams.DQ = binr.ReadBytes(GetIntegerSize(binr));
                RSAparams.InverseQ = binr.ReadBytes(GetIntegerSize(binr));
            }
            RSA.ImportParameters(RSAparams);
            return RSA;
        }

        /// <summary>
        /// 获取整数大小
        /// </summary>
        /// <param name="binr"></param>
        /// <returns></returns>
        private int GetIntegerSize(BinaryReader binr)
        {
            byte bt = 0;
            byte lowbyte = 0x00;
            byte highbyte = 0x00;
            int count = 0;
            bt = binr.ReadByte();
            if (bt != 0x02)
                return 0;
            bt = binr.ReadByte();

            if (bt == 0x81)
                count = binr.ReadByte();
            else
                if (bt == 0x82)
            {
                highbyte = binr.ReadByte();
                lowbyte = binr.ReadByte();
                byte[] modint = { lowbyte, highbyte, 0x00, 0x00 };
                count = BitConverter.ToInt32(modint, 0);
            }
            else
            {
                count = bt;
            }

            while (binr.ReadByte() == 0x00)
            {
                count -= 1;
            }
            binr.BaseStream.Seek(-1, SeekOrigin.Current);
            return count;
        }

        /// <summary>
        /// 通过提供的RSA公钥来创建RSA
        /// </summary>
        /// <param name="publicKeyString">公钥字符串</param>
        /// <returns></returns>
        private RSACryptoServiceProvider CreateRsaProviderFromPublicKey(string publicKeyString)
        {
            // encoded OID sequence for  PKCS #1 rsaEncryption szOID_RSA_RSA = "1.2.840.113549.1.1.1"
            byte[] SeqOID = { 0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01, 0x05, 0x00 };
            byte[] x509key;
            byte[] seq = new byte[15];
            int x509size;

            x509key = Convert.FromBase64String(publicKeyString);
            x509size = x509key.Length;

            // ---------  Set up stream to read the asn.1 encoded SubjectPublicKeyInfo blob  ------
            using (MemoryStream mem = new MemoryStream(x509key))
            {
                using (BinaryReader binr = new BinaryReader(mem))  //wrap Memory Stream with BinaryReader for easy reading
                {
                    byte bt = 0;
                    ushort twobytes = 0;

                    twobytes = binr.ReadUInt16();
                    if (twobytes == 0x8130) //data read as little endian order (actual data order for Sequence is 30 81)
                        binr.ReadByte();    //advance 1 byte
                    else if (twobytes == 0x8230)
                        binr.ReadInt16();   //advance 2 bytes
                    else
                        return null;

                    seq = binr.ReadBytes(15);       //read the Sequence OID
                    if (!CompareBytearrays(seq, SeqOID))    //make sure Sequence for OID is correct
                        return null;

                    twobytes = binr.ReadUInt16();
                    if (twobytes == 0x8103) //data read as little endian order (actual data order for Bit String is 03 81)
                        binr.ReadByte();    //advance 1 byte
                    else if (twobytes == 0x8203)
                        binr.ReadInt16();   //advance 2 bytes
                    else
                        return null;

                    bt = binr.ReadByte();
                    if (bt != 0x00)     //expect null byte next
                        return null;

                    twobytes = binr.ReadUInt16();
                    if (twobytes == 0x8130) //data read as little endian order (actual data order for Sequence is 30 81)
                        binr.ReadByte();    //advance 1 byte
                    else if (twobytes == 0x8230)
                        binr.ReadInt16();   //advance 2 bytes
                    else
                        return null;

                    twobytes = binr.ReadUInt16();
                    byte lowbyte = 0x00;
                    byte highbyte = 0x00;

                    if (twobytes == 0x8102) //data read as little endian order (actual data order for Integer is 02 81)
                        lowbyte = binr.ReadByte();  // read next bytes which is bytes in modulus
                    else if (twobytes == 0x8202)
                    {
                        highbyte = binr.ReadByte(); //advance 2 bytes
                        lowbyte = binr.ReadByte();
                    }
                    else
                        return null;
                    byte[] modint = { lowbyte, highbyte, 0x00, 0x00 };   //reverse byte order since asn.1 key uses big endian order
                    int modsize = BitConverter.ToInt32(modint, 0);

                    int firstbyte = binr.PeekChar();
                    if (firstbyte == 0x00)
                    {   //if first byte (highest order) of modulus is zero, don't include it
                        binr.ReadByte();    //skip this null byte
                        modsize -= 1;   //reduce modulus buffer size by 1
                    }

                    byte[] modulus = binr.ReadBytes(modsize);   //读取模量字节

                    if (binr.ReadByte() != 0x02)            //期望指数数据为Integer
                        return null;
                    int expbytes = (int)binr.ReadByte();        // should only need one byte for actual exponent data (for all useful values)
                    byte[] exponent = binr.ReadBytes(expbytes);

                    // ------- create RSACryptoServiceProvider instance and initialize with public key -----
                    RSACryptoServiceProvider RSA = new RSACryptoServiceProvider();
                    RSAParameters RSAKeyInfo = new RSAParameters();
                    RSAKeyInfo.Modulus = modulus;
                    RSAKeyInfo.Exponent = exponent;
                    RSA.ImportParameters(RSAKeyInfo);
                    return RSA;
                }
            }
        }

        /// <summary>
        /// 比较字节数组
        /// </summary>
        /// <param name="a"></param>
        /// <param name="b"></param>
        /// <returns></returns>
        private bool CompareBytearrays(byte[] a, byte[] b)
        {
            if (a.Length != b.Length)
            {
                return false;
            }
            int i = 0;
            foreach (byte c in a)
            {
                if (c != b[i])
                {
                    return false;
                }
                i++;
            }
            return true;
        }

    }
}

2.6、.NET 控制器后端代码

2.6.1、视图控制图代码

public IActionResult worddata()
{
    var dataStr = RASKeyConversion.createPulbicKey();
    publicKey = RsaKeyConvert1.PublicKeyXmlToPem(dataStr[1]);
    privateKey = RsaKeyConvert1.PrivateKeyXmlToPkcs1(dataStr[0]);
    ViewBag.publicKey = publicKey;
    ViewBag.privateKey = privateKey;
    return View();
}

2.6.2、POST请求接口代码

/// <summary>
/// 解密接口
/// </summary>
/// <param name="pwd"></param>
/// <param name="privateKey">私钥</param>
/// <returns></returns>
[HttpPost]
public IActionResult wordEncrypt(string pwd, string privateKey)
{
    string resPwd = "";
    try
    {
        string privateStr= RsaKeyConvert1.PrivateKeyPkcs1ToXml(privateKey);
        resPwd = RSACrypto.RSADecrypt(pwd,privateStr,"XML");
        return Json(new { code = 200, msg = resPwd });
    }
    catch (Exception ex)
    {
        return Json(new { code = 220, msg = "RSA解密时出现错误!!!" });
    }
}

2.7、前端视图页面代码

2.7.1、Html代码

@{
    Layout = null;
}

<!DOCTYPE html>

<html>
<head>
    <meta name="viewport" content="width=device-width" />
    <title>sometext</title>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
    <script src="/lib/jquery/dist/jquery.js"></script>
    <script src="/lib/layui/dist/layui.js"></script>
    <script src="/lib/jsencrypt/bin/jsencrypt.js"></script>
    <script src="/lib/bootstrap/dist/js/bootstrap.js"></script>
    <link href="/lib/layui/dist/css/layui.css" rel="stylesheet" />
    <link href="/lib/bootstrap/dist/css/bootstrap.css" rel="stylesheet" />
    <style type="text/css"></style>
</head>
<body>
    <div class="wrapper">
        <div class="input-group mb-3">
            <div class="input-group-prepend">
                <span class="input-group-text" id="basic-addon1">脱敏/加密前的内容:</span>
            </div>
            <input type="password" class="form-control" id="sourctText" placeholder="脱敏/加密前的内容" aria-label="sourctText" aria-describedby="basic-addon1">
        </div>
        <br />
        <div class="input-group mb-3">
            <div class="input-group-prepend">
                <span class="input-group-text" id="basic-addon1">加密后的内容:</span>
            </div>
            <input type="text" class="form-control" id="encryptText" placeholder="加密后的内容" readonly="readonly" aria-label="encryptText" aria-describedby="basic-addon1">
        </div>
        <input type="hidden" value="@ViewBag.publicKey" id="publicKey" readonly="readonly" />
        <input type="hidden" value="@ViewBag.privateKey" id="privateKey" readonly="readonly" />
        <br />
        <div class="input-group mb-3">
            <div class="input-group-prepend">
                <span class="input-group-text" id="basic-addon1">脱敏/加密后的内容:</span>
            </div>
            <input type="text" class="form-control" id="resText" placeholder="脱敏/加密后的内容" readonly="readonly" aria-label="resText" aria-describedby="basic-addon1">
        </div>

        <div class="input-group mb-3">
            <button id="submit" type="button" class="btn btn-primary btn-lg btn-block">提交</button>
        </div>
    </div>
</body>
</html>

2.7.2、javascript代码

<script type="text/javascript">
    const encryptor = new JSEncrypt()
    layui.use(['form'], function () {
        let form = layui.form;

        $("#submit").on("click", function () {
            let publicKey = $("#publicKey").val();
            let privateKey = $("#privateKey").val();
            let sourctText = $("#sourctText").val();
            if (sourctText != "" && sourctText != null) {
                encryptor.setPublicKey(publicKey) // 设置公钥
                let cipherText = encryptor.encrypt(sourctText);
                $("#encryptText").val(cipherText);
                login(cipherText, publicKey, privateKey);
            } else {
                layui.layer.alert("密码为空!", { icon: 5, title: "温馨提示", closeBtn: 0 });
            }
        });

        function login(sourctText, publicKey, privateKey) {
            var wordEncrypt= $.ajax({
                url: "/Home/wordEncrypt",//请求后端接口的路径
                dataType: "JSON",
                type: "POST",
                data: {
                    "pwd": sourctText,
                    //"publicKey": publicKey,
                    "privateKey": privateKey
                },
                success: function (res) {
                    let resCode = res.code;
                    let resMsg = res.msg;
                    if ((resCode == "210" || resCode == 210) || (resCode == 220 || resCode == "220") || (resCode == 230 || resCode == "230") || (resCode == 240 || resCode == "240") || (resCode == 260 || resCode == "260")) {
                        //返回数据后关闭loading
                        layer.closeAll();
                        // 在 2 秒钟后取消 AJAX 请求
                        setTimeout(function () {
                            wordEncrypt.abort(); // 删除 AJAX 请求
                        }, 2000);
                        layui.layer.alert(resMsg, { icon: 5, title: "温馨提示", closeBtn: 0 });
                    } else if (resCode == 200 || resCode == "200") {
                        $("#resText").val(resMsg);
                        //返回数据后关闭loading
                        layer.closeAll();
                        // 在 2 秒钟后取消 AJAX 请求
                        setTimeout(function () {
                            wordEncrypt.abort(); // 删除 AJAX 请求
                        }, 2000);
                    }
                },
                error: function (error) {
                    //返回数据后关闭loading
                    layer.closeAll();
                    // 在 2 秒钟后取消 AJAX 请求
                    setTimeout(function () {
                        wordEncrypt.abort(); // 删除 AJAX 请求
                    }, 2000);
                    layui.layer.alert(error, { icon: 5, title: "温馨提示", closeBtn: 0 });
                }
            });
        }
    });
</script>

到了这里,关于前端请求参数加密、.NET 后端解密的文章就介绍完了。如果您还想了解更多内容,请在右上角搜索TOY模板网以前的文章或继续浏览下面的相关文章,希望大家以后多多支持TOY模板网!

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处: 如若内容造成侵权/违法违规/事实不符,请点击违法举报进行投诉反馈,一经查实,立即删除!

领支付宝红包 赞助服务器费用

相关文章

  • AES对称加密实战——前端js加密后端python解密

    高级加密标准(AES, Advanced Encryption Standard),是一种最常见的对称加密算法 。其加密流程如下图所示,发送方通过密钥对明文加密后进行网络传输,接收方用同样的密钥将密文解密。在前后端通讯场景中,可利用AES算法对用户密码进行加密后传输,防止被抓包而造成密码泄露。

    2024年02月04日
    浏览(61)
  • 前端AES加密,后端解密,有效防止数据外泄

    在工作中经常遇到密码明文传输这个问题,为了让密码安全些会让加密,现在有个比较方便的AES加密(前端密钥可能存在泄露风险,应该放到配置项中): 一、前端加密 1、首先引入前端需要用到的js:crypto-js,下载地址: CryptoJS-v4.1.1 https://www.aliyundrive.com/s/bXP6M8ZxVAD 点击链接

    2024年02月16日
    浏览(51)
  • vue前端RSA加密java后端解密的方法

    最近安全测试的总是测出安全漏洞来,让开发改。 想了想干脆把请求参数都加密下,前端加密后端解密,这样总差不多了。 看了下AES加密,是对称的,前后端用这个不太行。 于是想到用RSA加密,是非对称的,可以前端加密后端解密。 1.前端是vue项目,使用时,需要先执行:

    2023年04月21日
    浏览(48)
  • 三步实现Java的SM2前端加密后端解密

    秦医如毒,无药可解。 话不多说,先上需要用到的 js文件下载链接   和   jsp前端代码 。 第一步: 下载两个必备的js文件——  crypto-js.js 、 sm2.js   。 它们的下载链接如下↓(该网页不魔法上网的话会很卡,毕竟github,建议卡的话就多重新加载几次,我差不多试了8次才进

    2024年02月04日
    浏览(52)
  • uni-app和springboot完成前端后端对称加密解密流程

    概述 使用对称加密的方式实现。 前端基于crypto-js。 uni-app框架中是在uni.request的基础上,在拦截器中处理的。 springboot在Filter中完成解密工作。 uni-app 项目中引入crypto-js。 加密方法 解密方法 request拦截器 备注 使用encodeURIComponent方法是为了处理 字符“+”,这个对应java解密的

    2024年02月13日
    浏览(54)
  • SpringCloud Gateway 整合RSA对请求参数解密、响应结果加密【SpringCloud系列10】

    本文章实现的是 网关中的 参数解密、响应数据体加密功能。 1 集成 commons-codec commons-codec 是Apache开源组织提供的用于摘要运算、编码解码的包。常见的编码解码工具Base64、MD5、Hex、SHA1、DES等。 本项目中集成RSA 非对称算法,RSAUtils 工具类 然后创建一个测试类,生成一组公钥

    2024年02月06日
    浏览(42)
  • 若依ruoyi前端vue使用jsencrypt.js加密后端java进行RSA解密(前后端交互RSA加解密)

    目录 1、前后端RSA加解密实现思路 2、前端 3、后端 按照约定来说公钥一般用来加密,大家都可以获取得到,私钥用来解密,当然你也可以混着用,以下示例是前端通过加密,后端解密.  -----BEGIN PUBLIC KEY----- MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ81AMIIBCgKCAQEA1+05vAf7m5NcLNLkRtsm gp+QdzcW6MVdayGTGBJG0v

    2024年02月06日
    浏览(76)
  • 前端使用AES密码加密、解密,使用详细(crypto加密解密,前后端分离,AES加密解密)

    1、 首先安装 crypto-js插件,安装命令如下:    -S等同于--save,保存在package.json文件中,是在dependencies 下, --save安装包信息将加入到dependencies(生产环境)中,生产阶段的依赖,也就是项目运行时的依赖,就是程序上线后仍然需要依赖; -D等同于--save-dev,也保存在package.j

    2024年02月11日
    浏览(63)
  • 前端Get Post Put Delect请求 传参数 不传参数给后端

    Get请求不传参、Get请求传不是实体类的参数、Get请求传实体类的参数 Post 请求不传参数、Post请求传不是实体类的参数、Post请求传实体类的参数  总是分不清,其中Delect 请求使用的地方很少就先记录Delete请求吧 前端 前端跳后端 后端 前端 前端跳后端 后端 前端 前端跳后端 后

    2024年02月07日
    浏览(64)
  • Java后端和前端传递的请求参数的三种类型

    在 HTTP 请求中,常见的请求参数类型有三种:`application/x-www-form-urlencoded`、`multipart/form-data` 和 `application/json`(通常用于 `raw` 类型)。这三种类型主要指的是请求体中的数据格式,其中包括参数的传递方式和编码。 1. **`application/x-www-form-urlencoded`:**    - 这是默认的编码类型

    2024年02月02日
    浏览(50)

觉得文章有用就打赏一下文章作者

支付宝扫一扫打赏

博客赞助

微信扫一扫打赏

请作者喝杯咖啡吧~博客赞助

支付宝扫一扫领取红包,优惠每天领

二维码1

领取红包

二维码2

领红包