天天看點

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)

目錄

一、資料加密标準 - Data Encryption Standard(DES)

二、進階加密标準 - Advanced Encryption Standard(AES)

三、消息摘要算法第五版 - Message-Digest Algorithm 5(MD5)

四、安全雜湊演算法 - Secure Hash Algorithm(SHA1)

五、公鑰加密算法(RSA)

六、幹擾項 - 鹽(Salt)

七、RSA密鑰格式Pkcs8

八、源碼下載下傳

資料加密标準 - Data Encryption Standard(DES)

簡介

  DES全稱為Data Encryption Standard,即資料加密标準,是一種使用密鑰加密的塊算法,1976年被美國聯邦政府的國家标準局确定為聯邦資料處理标準(FIPS),随後在國際上廣泛流傳開來。

核心代碼

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
public class DesCryptoUtil : IDesCryptoUtil
    {
        /// <summary>
        /// The key, length is 8, generated on https://www.random.org/strings/
        /// You can also use the GenerateKey method in the DESCryptoServiceProvider to generate the key.
        /// </summary>
        private static readonly byte[] Key = Encoding.ASCII.GetBytes("0e3Nl9Z9");

        /// <summary>
        /// The iv, length is 8, generated on https://www.random.org/strings/
        /// You can also use the GenerateIV method in the DESCryptoServiceProvider to generate the iv.
        /// </summary>
        private static readonly byte[] Iv = Encoding.ASCII.GetBytes("62EcX79F");

        public byte[] Encrypt(byte[] plainBytes)
        {
            using (var provider = new DESCryptoServiceProvider())
            {
                provider.Key = Key;
                provider.IV = Iv;
                using (var memoryStream = new MemoryStream())
                {
                    using (var cryptoStream = new CryptoStream(memoryStream, provider.CreateEncryptor(), CryptoStreamMode.Write))
                    {
                        cryptoStream.Write(plainBytes, 0, plainBytes.Length);
                        cryptoStream.FlushFinalBlock();
                    }
                    return memoryStream.ToArray();
                }
            }
        }

        public byte[] Decrypt(byte[] encryptedBytes)
        {
            using (var provider = new DESCryptoServiceProvider())
            {
                provider.Key = Key;
                provider.IV = Iv;
                using (var memoryStream = new MemoryStream())
                {
                    using (var cryptoStream = new CryptoStream(memoryStream, provider.CreateDecryptor(), CryptoStreamMode.Write))
                    {
                        cryptoStream.Write(encryptedBytes, 0, encryptedBytes.Length);
                        cryptoStream.FlushFinalBlock();
                    }
                    return memoryStream.ToArray();
                }
            }
        }
    }      

View Code

調用示例

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
[TestCase("123456")]
        [TestCase("abcdef")]
        public void Encrypt(string plainText)
        {
            var plainBytes = Encoding.UTF8.GetBytes(plainText);
            var encryptedBytes = _desCryptoUtil.Encrypt(plainBytes);
            var encryptedText = Convert.ToBase64String(encryptedBytes);

            Console.WriteLine("Plain text:{0}, encrypted text:{1}", plainText, encryptedText);
        }

        [TestCase("ecIwYJUsLa0=")]
        [TestCase("iPsXCjS+O0c=")]
        public void Decrypt(string encryptedText)
        {
            var encryptedBytes = Convert.FromBase64String(encryptedText);
            var plainBytes = _desCryptoUtil.Decrypt(encryptedBytes);
            var plainText = Encoding.UTF8.GetString(plainBytes);

            Console.WriteLine("Encrypted text:{0}, plain text:{1}", encryptedText, plainText);
        }      

進階加密标準 - Advanced Encryption Standard(AES)

  進階加密标準(英語:Advanced Encryption Standard,縮寫:AES),在密碼學中又稱Rijndael加密法,是美國聯邦政府采用的一種區塊加密标準。這個标準用來替代原先的DES,已經被多方分析且廣為全世界所使用。經過五年的甄選流程,進階加密标準由美國國家标準與技術研究院(NIST)于2001年11月26日釋出于FIPS PUB 197,并在2002年5月26日成為有效的标準。2006年,進階加密标準已然成為對稱密鑰加密中最流行的算法之一。

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
public class AesCryptoUtil : IAesCryptoUtil
    {
        /// <summary>
        /// A system key and the length should be 16.
        /// You can use tool to generate the string on https://www.random.org/strings/ or other website.
        /// </summary>
        private const string SystemKeyPart = "84ImUeBn432oPkqo";

        /// <summary>
        /// A custom key and the lenth should between 4 and 16. You can use the project name as the custom key.
        /// </summary>
        private const string UserKeyPart = "AecCrypto";

        /// <summary>
        /// The combine key.
        /// </summary>
        private static readonly byte[] Key = Encoding.ASCII.GetBytes(UserKeyPart.PadRight(16, '#') + SystemKeyPart);

        /// <summary>
        /// Please indicate a random string here, and the length must be 16.
        /// You can use tool to generate the string on https://www.random.org/strings/ or other website.
        /// </summary>
        private static readonly byte[] Iv = Encoding.ASCII.GetBytes("bCNtStALc7bRqREq");

        public byte[] Encrypt(byte[] plainBytes)
        {
            return Encrypt(plainBytes, CipherMode.CBC, PaddingMode.PKCS7);
        }

        public byte[] Decrypt(byte[] encryptedBytes)
        {
            return Decrypt(encryptedBytes, CipherMode.CBC, PaddingMode.PKCS7);
        }

        private static byte[] Encrypt(byte[] plainBytes, CipherMode cipher, PaddingMode padding)
        {
            using (var aes = Rijndael.Create())
            {
                aes.Mode = cipher;
                aes.Padding = padding;

                using (var transform = aes.CreateEncryptor(Key, Iv))
                {
                    var encryptedBytes = transform.TransformFinalBlock(plainBytes, 0, plainBytes.Length);
                    return encryptedBytes;
                }
            }
        }

        private static byte[] Decrypt(byte[] encryptedBytes, CipherMode cipher, PaddingMode padding)
        {
            using (var aes = Rijndael.Create())
            {
                aes.Mode = cipher;
                aes.Padding = padding;

                using (var transform = aes.CreateDecryptor(Key, Iv))
                {
                    var plainBytes = transform.TransformFinalBlock(encryptedBytes, 0, encryptedBytes.Length);
                    return plainBytes;
                }
            }
        }
    }      

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
[TestCase("123456")]
        [TestCase("abcdef")]
        public void Encrypt(string plainText)
        {
            var plainBytes = Encoding.UTF8.GetBytes(plainText);
            var encryptedBytes = _aesCryptoUtil.Encrypt(plainBytes);
            var encryptedText = Convert.ToBase64String(encryptedBytes);

            Console.WriteLine("Plain text:{0}, encrypted text:{1}", plainText, encryptedText);
        }

        [TestCase("HDHlYOQuENPmtjFKvLZIEA==")]
        [TestCase("YO3ErLZ5/izaDgD0M0uYDg==")]
        public void Decrypt(string encryptedText)
        {
            var encryptedBytes = Convert.FromBase64String(encryptedText);
            var plainBytes = _aesCryptoUtil.Decrypt(encryptedBytes);
            var plainText = Encoding.UTF8.GetString(plainBytes);

            Console.WriteLine("Encrypted text:{0}, plain text:{1}", encryptedText, plainText);
        }      

消息摘要算法第五版 - Message-Digest Algorithm 5(MD5)

  MD5即Message-Digest Algorithm 5(資訊-摘要算法5),用于確定資訊傳輸完整一緻。是計算機廣泛使用的雜湊算法之一(又譯摘要算法、雜湊演算法),主流程式設計語言普遍已有MD5實作。将資料(如漢字)運算為另一固定長度值,是雜湊算法的基礎原理,MD5的前身有MD2、MD3和MD4。

  MD5算法具有以下特點:

  1、壓縮性:任意長度的資料,算出的MD5值長度都是固定的。

  2、容易計算:從原資料計算出MD5值很容易。

  3、抗修改性:對原資料進行任何改動,哪怕隻修改1個位元組,所得到的MD5值都有很大差別。

  4、強抗碰撞:已知原資料和其MD5值,想找到一個具有相同MD5值的資料(即僞造資料)是非常困難的。

  注:MD5常用于密碼加密。

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
public class Md5CryptoUtil : IMd5CryptoUtil
    {
        public byte[] Encrypt(byte[] plainBytes)
        {
            using (var md5 = MD5.Create())
            {
                var encryptedBytes = md5.ComputeHash(plainBytes);
                return encryptedBytes;
            }
        }
    }      

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
[TestCase("123456")]
        [TestCase("abcdef")]
        public void Encrypt(string plainText)
        {
            var plainBytes = Encoding.UTF8.GetBytes(plainText);
            var encryptedBytes = _md5CryptoUtil.Encrypt(plainBytes);
            var stringBuilder = new StringBuilder();
            foreach (var b in encryptedBytes)
            {
                stringBuilder.AppendFormat("{0:X2}", b);
            }
            var encryptedText = stringBuilder.ToString();

            Console.WriteLine("Plain text:{0}, encrypted text:{1}", plainText, encryptedText);
        }      

安全雜湊演算法 - Secure Hash Algorithm(SHA1)

  安全雜湊演算法(Secure Hash Algorithm)主要适用于數字簽名标準 (Digital Signature Standard DSS)裡面定義的數字簽名算法(Digital Signature Algorithm DSA)。對于長度小于2^64位的消息,SHA1會産生一個160位的消息摘要。當接收到消息的時候,這個消息摘要可以用來驗證資料的完整性。在傳輸的過程中,資料很可能會發生變化,那麼這時候就會産生不同的消息摘要。 SHA1有如下特性:不可以從消息摘要中複原資訊;兩個不同的消息不會産生同樣的消息摘要,(但會有1x10 ^ 48分之一的機率出現相同的消息摘要,一般使用時忽略)。

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
public class Sha1CryptoUtil : ISha1CryptoUtil
    {
        public byte[] Encrypt(byte[] plainBytes)
        {
            using (var sha1 = SHA1.Create())
            {
                var encryptedBytes = sha1.ComputeHash(plainBytes);
                return encryptedBytes;
            }
        }
    }      

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
[TestCase("123456")]
       [TestCase("abcdef")]
       public void Encrypt(string plainText)
       {
           var plainBytes = _bytesUtil.FromString(plainText);
           var encryptedBytes = _sha1CryptoUtil.Encrypt(plainBytes);
           var encryptedText = _bytesUtil.ToHex(encryptedBytes);

           Console.WriteLine("Plain text:{0}, encrypted text:{1}", plainText, encryptedText);
       }      

公鑰加密算法(RSA)

  RSA公鑰加密算法是1977年由羅納德·李維斯特(Ron Rivest)、阿迪·薩莫爾(Adi Shamir)和倫納德·阿德曼(Leonard Adleman)一起提出的。

  RSA是目前最有影響力的公鑰加密算法,它能夠抵抗到目前為止已知的絕大多數密碼攻擊,已被ISO推薦為公鑰資料加密标準。

  RSA算法基于一個十分簡單的數論事實:将兩個大素數相乘十分容易,但是想要對其乘積進行因式分解卻極其困難,是以可以将乘積公開作為加密密鑰。

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
public class RsaCryptoUtil : IRsaCryptoUtil
    {
        public RsaKey GenerateKeys()
        {
            using (var rsa = new RSACryptoServiceProvider())
            {
                var key = new RsaKey
                {
                    Private = rsa.ToXmlString(true),
                    Public = rsa.ToXmlString(false)
                };

                return key;
            }
        }

        public byte[] Sign(byte[] bytes, string privateKey)
        {
            using (var rsa = new RSACryptoServiceProvider())
            {
                rsa.FromXmlString(privateKey);
                var signature = rsa.SignData(bytes, new MD5CryptoServiceProvider());
                return signature;
            }
        }

        public bool Verify(byte[] bytes, byte[] signature, string publicKey)
        {
            using (var rsa = new RSACryptoServiceProvider())
            {
                rsa.FromXmlString(publicKey);
                return rsa.VerifyData(bytes, new MD5CryptoServiceProvider(), signature);
            }
        }

        public byte[] Encrypt(byte[] plainBytes, string publicKey)
        {
            using (var rsa = new RSACryptoServiceProvider())
            {
                rsa.FromXmlString(publicKey);
                var encryptedBytes = rsa.Encrypt(plainBytes, false);
                return encryptedBytes;
            }
        }

        public byte[] Decrypt(byte[] encryptedBytes, string privateKey)
        {
            using (var rsa = new RSACryptoServiceProvider())
            {
                rsa.FromXmlString(privateKey);
                var decryptedBytes = rsa.Decrypt(encryptedBytes, false);
                return decryptedBytes;
            }
        }
    }      

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
[TestCase("123456")]
        [TestCase("abcdef")]
        public void Sign(string text)
        {
            var bytes = _bytesUtil.FromString(text);
            var signatureBytes = _rsaCryptoUtil.Sign(bytes, _key.Private);
            var signature = _bytesUtil.ToBase64(signatureBytes);

            Console.WriteLine("Text:{0}, signature:{1}", text, signature);
        }

        [TestCase("123456", "T5BS2WHA2ZvDexuEIPRSbnB7SlC1blNPi4BGcwiGovE54bmAiLIqf6p9dmsMMS+wgyKX2JPKkiNKtzts+q1yVmosqqjcmrNZbP+YF9YNqbO4Da0CJRjH1rwCa+XC7cJFKIDn85KQqtLpdr7yong0SjtXA+cDMD3dP9RoZLb+k/k=")]
        [TestCase("abcdef", "Gxf9LGx2AFmW114ex7nemDXIiEXkYmBA4bR0SMWp4M/uule171rtPIyZlX17CeNM2kmNKtxYAqsJj0Pfxb1znydtNLo/lFNkZDZkxAMx7uTLdw9Os4g5ZKXKkBbYi3aYBNY0bbICfetGRNGaGU4p8HlKm+KrijbURBKH6wE1DyI=")]
        public void Verify(string text, string signature)
        {
            var bytes = _bytesUtil.FromString(text);
            var signatureBytes = _bytesUtil.FromBase64(signature);
            var isVerified = _rsaCryptoUtil.Verify(bytes, signatureBytes, _key.Public);

            Console.WriteLine("Text:{0}, signature:{1}, is verified:{2}", text, signature, isVerified);
        }

        [TestCase("123456")]
        [TestCase("abcdef")]
        public void Encrypt(string plainText)
        {
            var plainBytes = _bytesUtil.FromString(plainText);
            var encryptedBytes = _rsaCryptoUtil.Encrypt(plainBytes, _key.Public);
            var encryptedText = _bytesUtil.ToBase64(encryptedBytes);

            Console.WriteLine("Plain text:{0}, encrypted text:{1}", plainText, encryptedText);
        }

        [TestCase("ZfT/2r0VqY6LX8eL+rfgufT/q+kMZsvRcDK6NafoHb+zvBN5KNxI5MAIG07Oqe3EiRH3yXrjKnePUiVvPJGW40xHm6S2yRBar61ZB3DONavwjlKQBBPGJNuW1S8aevdxFIGHazFjzv7FMCcJaAFrnNlZlkdsk67z0FbubPylPbY=")]
        [TestCase("m8rS9i1DGE6MqW0L6vcS+lthiBzFTWrfK4XS97TDyC8t0xecNsLteIGEDgrzUMVf9j0ue0HpGHslYiOUAiX1wnFcVM0aX3SAZ1NmsIFEoYhz3av3lPj/tX9Ccirn7YhQw/N5BHwxPYT3ZcRfy+ozVXBo0EFDNGoJMcysfA0u5Uk=")]
        public void Decrypt(string encryptedText)
        {
            var encryptedBytes = _bytesUtil.FromBase64(encryptedText);
            var plainBytes = _rsaCryptoUtil.Decrypt(encryptedBytes, _key.Private);
            var plainText = _bytesUtil.ToString(plainBytes);

            Console.WriteLine("Encrypted text:{0}, plain text:{1}", encryptedText, plainText);
        }      

幹擾項 - 鹽(Salt)

  相同的明文用同樣的加密方法(如MD5)進行加密會得到相同的密文。

  如用MD5的方式加密“123456”,你總會得到密文“E10ADC3949BA59ABBE56E057F20F883E”。

  那麼,當資料庫資訊洩漏時,如果你的密碼設定的比較簡單,對方是很容易猜到你的密碼,或者通過彩虹表來破解你的密碼。

  是以,你需要在明文中添加幹擾項-鹽(Salt)。

  對于加鹽的方式,我認為有兩種。

  1.對于隻加密,但不解密的算法,如MD5,SHA1。我們需要把鹽和密文都存在資料庫中,使用者輸入密碼時,我們把使用者密碼和鹽組成新的明文,進行加密,然後得到密文,最後對比該密文是否與庫中密文比對。

  2.對于可加解密的算法,我們可以定義一些規則,如明文前加長度為3的鹽,在明文後加長度為5的鹽,然後進行加密。解密的時候可以按預先設定的規則把鹽去掉就能得到真正的明文。

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
public class SaltUtil : ISaltUtil
    {
        public byte[] GenerateSalt(int size)
        {
            using (var rng = new RNGCryptoServiceProvider())
            {
                var salt = new byte[size];
                rng.GetBytes(salt);
                return salt;
            }
        }
    }      

MD5

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
[TestCase("123456")]
        [TestCase("abcdef")]
        public void EncryptWithSalt(string plainText)
        {
            var plainBytes = _bytesUtil.FromString(plainText);
            var headSalt = _saltUtil.GenerateSalt(SaltSetting.HeadSize);
            var tailSalt = _saltUtil.GenerateSalt(SaltSetting.TailSize);
            var plainBytesWithSalts = _bytesUtil.Combine(headSalt, plainBytes, tailSalt);
            var encryptedBytes = _md5CryptoUtil.Encrypt(plainBytesWithSalts);
            var encryptedText = _bytesUtil.ToHex(encryptedBytes);

            Console.WriteLine("Plain text:{0}, encrypted text:{1}", plainText, encryptedText);
        }      

AES

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
[TestCase("123456")]
        [TestCase("abcdef")]
        public void EncryptWithSalt(string plainText)
        {
            var plainBytes = _bytesUtil.FromString(plainText);
            var headSalt = _saltUtil.GenerateSalt(SaltSetting.HeadSize);
            var tailSalt = _saltUtil.GenerateSalt(SaltSetting.TailSize);
            var plainBytesWithSalts = _bytesUtil.Combine(headSalt, plainBytes, tailSalt);
            var encryptedBytes = _aesCryptoUtil.Encrypt(plainBytesWithSalts);
            var encryptedText = _bytesUtil.ToBase64(encryptedBytes);

            Console.WriteLine("Plain text:{0}, encrypted text:{1}", plainText, encryptedText);
        }

        [TestCase("Leu9NnY9qA3/9u5uUZoXGQ==")]
        [TestCase("eqcbaEOL9mHlQh3ERnGNeA==")]
        public void DecryptWithSalt(string encryptedText)
        {
            var encryptedBytes = _bytesUtil.FromBase64(encryptedText);
            var plainBytesWithSalts = _aesCryptoUtil.Decrypt(encryptedBytes);
            var plainBytes = plainBytesWithSalts.Skip(SaltSetting.HeadSize).Take(plainBytesWithSalts.Length - SaltSetting.HeadSize - SaltSetting.TailSize).ToArray();
            var plainText = _bytesUtil.ToString(plainBytes);

            Console.WriteLine("Encrypted text:{0}, plain text:{1}", encryptedText, plainText);
        }      

RSA密鑰格式Pkcs8

  對于RSA密鑰的格式,不同的語言是不同的,如C#是xml格式,Java是二進制流,其他語言又可能是另外一種格式。為了解決這個問題,一種統一的密鑰格式Pkcs8應運而生。

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
public class RsaPkcs8CryptoUtil : IRsaCryptoUtil
    {
        public RsaKey GenerateKeys()
        {
            using (var rsa = new RSACryptoServiceProvider())
            {
                var keyPair = DotNetUtilities.GetRsaKeyPair(rsa);

                var key = new RsaKey
                {
                    Private = GeneratePrivateKey(keyPair.Private),
                    Public = GeneratePublicKey(keyPair.Public)
                };

                return key;
            }
        }

        public byte[] Sign(byte[] bytes, string privateKey)
        {
            using (var rsa = new RSACryptoServiceProvider())
            {
                var key = ParsePrivateKey(privateKey);
                rsa.ImportParameters(key);
                var signature = rsa.SignData(bytes, new MD5CryptoServiceProvider());
                return signature;
            }
        }

        public bool Verify(byte[] bytes, byte[] signature, string publicKey)
        {
            using (var rsa = new RSACryptoServiceProvider())
            {
                var key = ParsePublicKey(publicKey);
                rsa.ImportParameters(key);
                return rsa.VerifyData(bytes, new MD5CryptoServiceProvider(), signature);
            }
        }

        public byte[] Encrypt(byte[] plainBytes, string publicKey)
        {
            using (var rsa = new RSACryptoServiceProvider())
            {
                var key = ParsePublicKey(publicKey);
                rsa.ImportParameters(key);
                var encryptedBytes = rsa.Encrypt(plainBytes, false);
                return encryptedBytes;
            }
        }

        public byte[] Decrypt(byte[] encryptedBytes, string privateKey)
        {
            using (var rsa = new RSACryptoServiceProvider())
            {
                var key = ParsePrivateKey(privateKey);
                rsa.ImportParameters(key);
                var decryptedBytes = rsa.Decrypt(encryptedBytes, false);
                return decryptedBytes;
            }
        }

        private static string GeneratePrivateKey(AsymmetricKeyParameter key)
        {
            var builder = new StringBuilder();

            using (var writer = new StringWriter(builder))
            {
                var pkcs8Gen = new Pkcs8Generator(key);
                var pemObj = pkcs8Gen.Generate();

                var pemWriter = new PemWriter(writer);
                pemWriter.WriteObject(pemObj);
            }

            return builder.ToString();
        }

        private static string GeneratePublicKey(AsymmetricKeyParameter key)
        {
            var builder = new StringBuilder();

            using (var writer = new StringWriter(builder))
            {
                var pemWriter = new PemWriter(writer);
                pemWriter.WriteObject(key);
            }

            return builder.ToString();
        }

        private static RSAParameters ParsePrivateKey(string privateKey)
        {
            using (var reader = new StringReader(privateKey))
            {
                var pemReader = new PemReader(reader);
                var key = (RsaPrivateCrtKeyParameters)pemReader.ReadObject();

                var parameter = new RSAParameters
                {
                    Modulus = key.Modulus.ToByteArrayUnsigned(),
                    Exponent = key.PublicExponent.ToByteArrayUnsigned(),
                    D = key.Exponent.ToByteArrayUnsigned(),
                    P = key.P.ToByteArrayUnsigned(),
                    Q = key.Q.ToByteArrayUnsigned(),
                    DP = key.DP.ToByteArrayUnsigned(),
                    DQ = key.DQ.ToByteArrayUnsigned(),
                    InverseQ = key.QInv.ToByteArrayUnsigned()
                };

                return parameter;
            }
        }

        private static RSAParameters ParsePublicKey(string publicKey)
        {
            using (var reader = new StringReader(publicKey))
            {
                var pemReader = new PemReader(reader);
                var key = (RsaKeyParameters)pemReader.ReadObject();

                var parameter = new RSAParameters
                {
                    Modulus = key.Modulus.ToByteArrayUnsigned(),
                    Exponent = key.Exponent.ToByteArrayUnsigned()
                };

                return parameter;
            }
        }
    }      

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)
[TestCase("123456")]
        [TestCase("abcdef")]
        public void Sign(string text)
        {
            var bytes = _bytesUtil.FromString(text);
            var signatureBytes = _rsaCryptoUtil.Sign(bytes, _key.Private);
            var signature = _bytesUtil.ToBase64(signatureBytes);

            Console.WriteLine("Text:{0}, signature:{1}", text, signature);
        }

        [TestCase("123456", "Pj4Z4P1ktNM+MLoqO3WUBZogZjVcjz5cvMVBJ741d2wq1X8UuI2AclZueltRahGHURiJ8djTYCSEGG1oHSc1K0ilk4lz40HFu1mqv65bwglqKrX2ks1wnwnBHusbfiu4HYXNy5HN/fcjB1ah8MxZSofxaGth1xAygY9bKkIBFS0=")]
        [TestCase("abcdef", "UUOTnyWRU/b4CvALxw4VHusKBXjv32RTjuTVyZHeBaQKvlqVuMCwrdey0Z9wrh20GRspA2Je3uUfbFSxYStDnzVsXJLB3wtNvWX+NcE+h1g1LXijnediJKn6uh4UorCpVru0tZX3XrMJPeY5u8+ZBFMUP8zw078t7w1c60XpioQ=")]
        public void Verify(string text, string signature)
        {
            var bytes = _bytesUtil.FromString(text);
            var signatureBytes = _bytesUtil.FromBase64(signature);
            var isVerified = _rsaCryptoUtil.Verify(bytes, signatureBytes, _key.Public);

            Console.WriteLine("Text:{0}, signature:{1}, is verified:{2}", text, signature, isVerified);
        }

        [TestCase("123456")]
        [TestCase("abcdef")]
        public void Encrypt(string plainText)
        {
            var plainBytes = _bytesUtil.FromString(plainText);
            var encryptedBytes = _rsaCryptoUtil.Encrypt(plainBytes, _key.Public);
            var encryptedText = _bytesUtil.ToBase64(encryptedBytes);

            Console.WriteLine("Plain text:{0}, encrypted text:{1}", plainText, encryptedText);
        }

        [TestCase("Ku82IhLYSuthVU1uN5NvUAFImWLwqaHmSuWA8dlTBLjYcJdGJmfY/BMK4JULBUauFDIyYHkFZ2j2oK+lQDw2UuXWbojLrnPZAvAbW+HB/5nuCS1mElVJr7YTq3tHb2mjcwAKx2qSnWgDO9V8akCnMMNVGLg9IN5gnjctlgu44iU=")]
        [TestCase("hBWYekZUiEiPgQTgVtVB+Ax1UOa6tKkVk4UMU2CjwFpYoOndtJu/Frs/woRdvfJBZbD/lmMOpGoK35mlX9Y0RKrZdLRM0RG8/maiQQFWCM3ELgBWqYkdVLc4RQULxfWaVFuQolXWwVk+gCUaWeCaaMEBZ28dXiUP7npaWexEcB8=")]
        public void Decrypt(string encryptedText)
        {
            var encryptedBytes = _bytesUtil.FromBase64(encryptedText);
            var plainBytes = _rsaCryptoUtil.Decrypt(encryptedBytes, _key.Private);
            var plainText = _bytesUtil.ToString(plainBytes);

            Console.WriteLine("Encrypted text:{0}, plain text:{1}", encryptedText, plainText);
        }      

源碼下載下傳

https://github.com/ErikXu/Crypto

密碼學應用(DES,AES, MD5, SHA1, RSA, Salt, Pkcs8)