ios加密方法

/**ios常见的几种加密方法: 普通的加密方法是讲密码进行加密后保存到用户偏好设置( [NSUserDefaults standardUserDefaults])中; 钥匙串加密是以明文形式保存,但是不知道存放的具体位置。 */  

  #pragma mark----钥匙串存储

/* 用原生的 Security.framework 就可以实现钥匙串的访问、读写。但是只能在真机上进行,模拟器会出错。在 Github(https://github.com/ldandersen/scifihifi-iphone/tree/master/security) 上有个封装的非常好的类来实现这个功能,让你既能在模拟器又能在真机上访问钥匙串。 

*/    - (void)initSecurity{             

   //----使用第三方SFHFKeychainUtils--                        //获取应用程序唯一标识--        NSString* bundleld = [NSBundle mainBundle].bundleIdentifier;          

     //引入头文件//#import "SFHFKeychainUtils.h"//        //     

   //删除用户//        [SFHFKeychainUtils deleteItemForUsername:userName andServiceName:ServiceName error:nil];//        //    

    //存储账户密码//        [SFHFKeychainUtils storeUsername:userName andPassword:passwordNew forServiceName:ServiceName updateExisting:YES  error:nil];//        //       

 //根据用户名取出密码//        NSString  *passWord = [SFHFKeychainUtils getPasswordForUsername:userName andServiceName:ServiceName error:nil];    }   

 #pragma mark----指纹识别 

/*1.指纹识别功能实在iPhone5S之后推出的,SDK是iOS8.0推出的  2.目的:简化移动支付环节  --------使用步骤----  1.倒入框架#import2.获得当前系统版本号

3.实例化指纹识别对象,判断当前设备是否支持指纹识别功能(是否带有TouchID)

*/

- (void)initLAthentication{

//获得当前系统版本号

float version = [UIDevice currentDevice].systemVersion.floatValue;

if (version < 8.0) {

NSLog(@"系统版本过低,请升级系统");

return;

}

//-----实例化指纹识别对象,判断当前设备是否支持指纹识别功能(是否带有TouchID)---

//1.实例化指纹识别对象

LAContext* laCon = [[LAContext alloc]init];

//判断当前设备是否支持指纹识别功能

if (![laCon canEvaluatePolicy:LAPolicyDeviceOwnerAuthenticationWithBiometrics error:NULL]) {

//如果设备不支持指纹识别功能

NSLog(@"设备不支持指纹识别功能");

return;

}

//指纹登陆--默认是异步方法

[laCon evaluatePolicy:LAPolicyDeviceOwnerAuthenticationWithBiometrics localizedReason:@"指纹登陆" reply:^(BOOL success, NSError * _Nullable error) {

//如果成功,表示指纹输入正确

if (success) {

NSLog(@"指纹识别成功");

}else{

NSLog(@"指纹识别错误");

}

}];

}

#pragma mark----base64加密

/**

base64编码是现代密码学的基础

Base64加密:Base64加密因其算法和充当秘钥的索引表都是公开的,所以不属于加密算法。其本质是将"二进制"数据转换成字符串,方便使用HTTP协议,用于公开的代码加密、URL加密,防止数据明文传输

特点:编码完成后的结果,只有64个字符

*/

_______________________________________________________________

//Base64加密

- (NSString *)base64Encode:(NSString* )str{

//转化为二进制数据

NSData* data = [str dataUsingEncoding:NSUTF8StringEncoding];

//进行Base64加密

return [data base64EncodedStringWithOptions:0];

}

//Base64解密

- (NSString *)base64Decode:(NSString *)str{

NSData* data = [[NSData alloc]initWithBase64EncodedString:str options:0];

return [[NSString alloc]initWithData:data encoding:NSUTF8StringEncoding];

}


_____________________________________________________________

- (void)initBase64{

//1.将文件进行加密

NSString* path = [[NSBundle mainBundle]pathForResource:@"menu_default" ofType:@"png"];

//获取需要加密的文件的二进制数据

NSData* data = [NSData dataWithContentsOfFile:path];

/*

-------加密解密是只有NSData才能进行,所以要先把需要加密的数据转化为NSData类型

UIImage *img = [UIImage imageNamed:@"menu_default.png"];

// 图片转Data

NSData *data = UIImageJPEGRepresentation(img, 0.7);

-------字符串加密-----

// 字符串转Data

NSString *str = @"encode string";

// 字符串转成Data

NSData *data = [str dataUsingEncoding:NSUTF8StringEncoding];// 13 bytes

// 加密Data

NSData *encodeData = [data base64EncodedDataWithOptions:0];// 20 bytes

// 解密Data

NSData *decodeData = [[NSData alloc] initWithBase64EncodedData:encodeData options:0];// 13 bytes

// Data转字符串

NSString *decodeStr = [[NSString alloc] initWithData:decodeData encoding:NSUTF8StringEncoding];

NSLog(@"%@",decodeStr);// encode string

*/

//base64EncodedStringWithOptions--加密

NSData* base64Data = [data base64EncodedDataWithOptions:0];

//获取要存储的沙河目录的路径

NSArray* pathsArr = NSSearchPathForDirectoriesInDomains(NSDocumentDirectory, NSUserDomainMask, YES);

NSString* docDir = [pathsArr objectAtIndex:0];

NSString* pathSave = [docDir stringByAppendingPathComponent:@"test.txt"];

//存储加密后的文件

[base64Data writeToFile:pathSave atomically:YES];

//获得加密后的二进制数据

NSData* baseSave64Data = [NSData dataWithContentsOfFile:pathSave];

//解密

NSData* baseData = [[NSData alloc]initWithBase64EncodedData:baseSave64Data options:0];

/*

总结:1.将文件menu_default.png进行base64位运算之后存储为test.txt,如果为jpg也是这样

2.将test.txt转化为menu_default.png;(无论起始为menu_default.png或menu_default.jpg)

3.// 将字符串 "hello" 进行 base 64 编码 结果:aGVsbG8=cho "hello" | base64

// 将 base64编码之后的结果 aGVsbG8= 反编码为字符串

echo aGVsbG8= | base64 -D

*/

UIImage* image = [UIImage imageWithData:baseData];

UIImageView* imageV = [[UIImageView alloc]init];

[self.view addSubview:imageV];

imageV.frame = CGRectMake(100, 100, 50, 50);

imageV.image = image;

}

iOS开发-Objective-c的AES加密和解密算法的实现

#import<Foundation/Foundation.h>

@interface Crypt : NSObject

//+(NSData *)AES256EncryptWithKey:(NSString *)key Encrypttext:(NSData *)text;  //加密

+(NSData *)AES256EncrypData:(NSData *)text WithKey:(NSString *)key;  //加密

+(NSData *)AES256DecryptData:(NSData *)text WithKey:(NSString *)key;  //解密

+(NSString *) AES256Encrypt:(NSString *)text WithKey:(NSString *)key;//加密

+(NSString *) AES256Decrypt:(NSString *)text WithKey:(NSString *)key;//解密

@end

--------------------------------------------------------------------

#import "Crypt.h"

#import <CommonCrypto/CommonCryptor.h>

@implementation Crypt

+(NSData *)AES256EncrypData:(NSData *)text WithKey:(NSString *)key //加密

{

char keyPtr[kCCKeySizeAES256+1];

bzero(keyPtr, sizeof(keyPtr));

[key getCString:keyPtr maxLength:sizeof(keyPtr) encoding:NSUTF8StringEncoding];

NSUInteger dataLength = [text length];

size_t bufferSize = dataLength + kCCBlockSizeAES128;

void *buffer = malloc(bufferSize);

size_t numBytesEncrypted = 0;

CCCryptorStatus cryptStatus = CCCrypt(kCCEncrypt, kCCAlgorithmAES128,

kCCOptionPKCS7Padding | kCCOptionECBMode,

keyPtr, kCCBlockSizeAES128,

NULL,

[text bytes], dataLength,

buffer, bufferSize,

&numBytesEncrypted);

if (cryptStatus == kCCSuccess) {

return [NSData dataWithBytesNoCopy:buffer length:numBytesEncrypted];

}

free(buffer);

return nil;

}

+(NSData *)AES256DecryptData:(NSData *)text WithKey:(NSString *)key //解密

{

char keyPtr[kCCKeySizeAES256+1];

bzero(keyPtr, sizeof(keyPtr));

[key getCString:keyPtr maxLength:sizeof(keyPtr) encoding:NSUTF8StringEncoding];

NSUInteger dataLength = [text length];

size_t bufferSize = dataLength + kCCBlockSizeAES128;

void *buffer = malloc(bufferSize);

size_t numBytesDecrypted = 0;

CCCryptorStatus cryptStatus = CCCrypt(kCCDecrypt, kCCAlgorithmAES128,

kCCOptionPKCS7Padding | kCCOptionECBMode,

keyPtr, kCCBlockSizeAES128,

NULL,

[text bytes], dataLength,

buffer, bufferSize,

&numBytesDecrypted);

if (cryptStatus == kCCSuccess) {

return [NSData dataWithBytesNoCopy:buffer length:numBytesDecrypted];

}

free(buffer);

return nil;

}

+(NSString *) AES256Encrypt:(NSString *)text WithKey:(NSString *)key

{

const char *cstr = [text cStringUsingEncoding:NSUTF8StringEncoding];

NSData *data = [NSData dataWithBytes:cstr length:text.length];

//对数据进行加密

NSData *result = [Crypt AES256EncrypData:data WithKey:key];

//转换为2进制字符串

if (result && result.length > 0) {

Byte *datas = (Byte*)[result bytes];

NSMutableString *output = [NSMutableString stringWithCapacity:result.length * 2];

for(int i = 0; i < result.length; i++){

[output appendFormat:@"%02x", datas[i]];

}

return output;

}

return nil;

}

+(NSString *) AES256Decrypt:(NSString *)text WithKey:(NSString *)key{

//转换为2进制Data

NSMutableData *data = [NSMutableData dataWithCapacity:text.length / 2];

unsigned char whole_byte;

char byte_chars[3] = {'\0','\0','\0'};

int i;

for (i=0; i < [text length] / 2; i++) {

byte_chars[0] = [text characterAtIndex:i*2];

byte_chars[1] = [text characterAtIndex:i*2+1];

whole_byte = strtol(byte_chars, NULL, 16);

[data appendBytes:&whole_byte length:1];

}

//对数据进行解密

NSData* result = [Crypt  AES256DecryptData:data WithKey:key];

if (result && result.length > 0) {

return [[NSString alloc] initWithData:result encoding:NSUTF8StringEncoding];

}

return nil;

}

@end

-------------用法------------------------

//      NSString* GHD = [Crypt AES256Encrypt:@"value" WithKey:@"key"];

//    NSString* sdf = [Crypt AES256Decrypt:GHD WithKey:@"key"];

//    NSLog(@"sdf---%@",sdf);

//

//    NSLog(@"%@",GHD);

//

NSData* DATA = [Crypt AES256EncrypData:[@"asd" dataUsingEncoding:NSUTF8StringEncoding] WithKey:@"KEY"];

NSData* XC = [Crypt AES256DecryptData:DATA WithKey:@"KEY"];

NSString* str = [[NSString alloc]initWithData:XC encoding:NSUTF8StringEncoding];

NSLog(@"%@",str);

iOS------MD5加密

/* MD5即Message-Digest Algorithm 5(信息-摘要算法5),用于确保信息传输完整一致。实质:就是把一个任意长度的字节串变换成一定长的十六进制数字串 使用MD5的好处:快速校验 特点:1.输入两个不同的明文不会得到相同的输出值  2.根据输出值,不能得到原始的明文,及其过程不可逆(MD5只能加密,不能解密)  注意事项:1.一定要和后台开发人员约定好,MD5加密的位数是16位还是32位(大多数都是32位的),16位的可以通过32位的转换得到 2.MD5加密区分大小写,使用时要和后台约定好  MD5解密网站:http://www.cmd5.com/ 需要先导入系统头文件#import*/

-------------------------具体实现------------------------

#import <Foundation/Foundation.h>

@interface MD5Crypt : NSObject

/**

*  MD5加密, 32位 小写

*

*  @param str 传入要加密的字符串

*

*  @return 返回加密后的字符串

*/

+(NSString *)MD5ForLower32Bate:(NSString *)str;

/**

*  MD5加密, 32位 大写

*

*  @param str 传入要加密的字符串

*

*  @return 返回加密后的字符串

*/

+(NSString *)MD5ForUpper32Bate:(NSString *)str;

/**

*  MD5加密, 16位 小写

*

*  @param str 传入要加密的字符串

*

*  @return 返回加密后的字符串

*/

+(NSString *)MD5ForLower16Bate:(NSString *)str;

/**

*  MD5加密, 16位 大写

*

*  @param str 传入要加密的字符串

*

*  @return 返回加密后的字符串

*/

+(NSString *)MD5ForUpper16Bate:(NSString *)str;

@end

-------------------------------------------------

#import "MD5Crypt.h"

#import <CommonCrypto/CommonCrypto.h>

@implementation MD5Crypt

#pragma mark - 32位 小写

+(NSString *)MD5ForLower32Bate:(NSString *)str{

//要进行UTF8的转码

const char* input = [str UTF8String];

unsigned char result[CC_MD5_DIGEST_LENGTH];

CC_MD5(input, (CC_LONG)strlen(input), result);

NSMutableString *digest = [NSMutableString stringWithCapacity:CC_MD5_DIGEST_LENGTH * 2];

for (NSInteger i = 0; i < CC_MD5_DIGEST_LENGTH; i++) {

[digest appendFormat:@"%02x", result[i]];

}

return digest;

}

#pragma mark - 32位 大写

+(NSString *)MD5ForUpper32Bate:(NSString *)str{

//要进行UTF8的转码

const char* input = [str UTF8String];

unsigned char result[CC_MD5_DIGEST_LENGTH];

CC_MD5(input, (CC_LONG)strlen(input), result);

NSMutableString *digest = [NSMutableString stringWithCapacity:CC_MD5_DIGEST_LENGTH * 2];

for (NSInteger i = 0; i < CC_MD5_DIGEST_LENGTH; i++) {

[digest appendFormat:@"%02X", result[i]];

}

return digest;

}

#pragma mark - 16位 大写

+(NSString *)MD5ForUpper16Bate:(NSString *)str{

NSString *md5Str = [self MD5ForUpper32Bate:str];

NSString  *string;

for (int i=0; i<24; i++) {

string=[md5Str substringWithRange:NSMakeRange(8, 16)];

}

return string;

}

#pragma mark - 16位 小写

+(NSString *)MD5ForLower16Bate:(NSString *)str{

NSString *md5Str = [self MD5ForLower32Bate:str];

NSString  *string;

for (int i=0; i<24; i++) {

string=[md5Str substringWithRange:NSMakeRange(8, 16)];

}

return string;

}

@end

-----------------用法-------------------------

NSString *str1 = [MD5Crypt MD5ForLower16Bate:@"123456"];

NSLog(@"小写16位:%@", str1);

NSString *str2 = [MD5Crypt MD5ForLower32Bate:@"123456"];

NSLog(@"小写32位:%@", str2);

NSString *str3 = [MD5Crypt MD5ForUpper16Bate:@"123456"];

NSLog(@"大写16位:%@", str3);

NSString *str4 = [MD5Crypt MD5ForUpper32Bate:@"123456"];

NSLog(@"大写32位:%@", str4);

/*

因为MD5生成的简单字符串会被轻易的破解,所以要对她进行改进

1.加盐(Salt):

在明文的固定位置插入随机串,然后在进行MD5

*/

NSString* salt = @"salt";

NSString *str5 = [MD5Crypt MD5ForUpper32Bate:[@"123456" stringByAppendingString:salt]];

NSLog(@"大写32位:%@", str5);

注:加的盐必须足够长,足够保密或者可以计入时间戳


iOS--DES加解密

#import<Foundation/Foundation.h>

@interface DESCrypt : NSObject

/******************************************************************************

函数名称 : + (NSData *)DESEncrypt:(NSData *)data WithKey:(NSString *)key

函数描述 : 文本数据进行DES加密

输入参数 : (NSData *)data

(NSString *)key

输出参数 : N/A

返回参数 : (NSData *)

备注信息 : 此函数不可用于过长文本

******************************************************************************/

+ (NSData *)DESEncrypt:(NSData *)data WithKey:(NSString *)key;//加密

/******************************************************************************

函数名称 : + (NSData *)DESEncrypt:(NSData *)data WithKey:(NSString *)key

函数描述 : 文本数据进行DES解密

输入参数 : (NSData *)data

(NSString *)key

输出参数 : N/A

返回参数 : (NSData *)

备注信息 : 此函数不可用于过长文本

******************************************************************************/

+ (NSData *)DESDecrypt:(NSData *)data WithKey:(NSString *)key;//解密

/******************************************************************************

函数名称 :+ (NSString *)DESEncrypt:(NSString *)str withKey:(NSString *)key

函数描述 : 文本数据进行DES加密

输入参数 : NSString *)str

(NSString *)key

输出参数 : N/A

返回参数 : NSString *)

备注信息 : 此函数不可用于过长文本

******************************************************************************/

+ (NSString *)DESEncrypt:(NSString *)str withKey:(NSString *)key;//加密

/******************************************************************************

函数名称 :+ (NSString *)DESDecrypt:(NSString *)str withKey:(NSString *)key

函数描述 : 文本数据进行DES解密

输入参数 : NSString *)str

(NSString *)key

输出参数 : N/A

返回参数 : NSString *)

备注信息 : 此函数不可用于过长文本

******************************************************************************/

+ (NSString *)DESDecrypt:(NSString *)str withKey:(NSString *)key;//解密

@end

-------------------------------------

#import "DESCrypt.h"

 #import <CommonCrypto/CommonCryptor.h>

@implementation DESCrypt

#pragma mark------加密

+ (NSData *)DESEncrypt:(NSData *)data WithKey:(NSString *)key

{

char keyPtr[kCCKeySizeAES256+1];

bzero(keyPtr, sizeof(keyPtr));

[key getCString:keyPtr maxLength:sizeof(keyPtr) encoding:NSUTF8StringEncoding];

NSUInteger dataLength = [data length];

size_t bufferSize = dataLength + kCCBlockSizeAES128;

void *buffer = malloc(bufferSize);

size_t numBytesEncrypted = 0;

CCCryptorStatus cryptStatus = CCCrypt(kCCEncrypt, kCCAlgorithmDES,

kCCOptionPKCS7Padding | kCCOptionECBMode,

keyPtr, kCCBlockSizeDES,

NULL,

[data bytes], dataLength,

buffer, bufferSize,

&numBytesEncrypted);

if (cryptStatus == kCCSuccess) {

return [NSData dataWithBytesNoCopy:buffer length:numBytesEncrypted];

}

free(buffer);

return nil;

}

#pragma mark---解密

+ (NSData *)DESDecrypt:(NSData *)data WithKey:(NSString *)key

{

char keyPtr[kCCKeySizeAES256+1];

bzero(keyPtr, sizeof(keyPtr));

[key getCString:keyPtr maxLength:sizeof(keyPtr) encoding:NSUTF8StringEncoding];

NSUInteger dataLength = [data length];

size_t bufferSize = dataLength + kCCBlockSizeAES128;

void *buffer = malloc(bufferSize);

size_t numBytesDecrypted = 0;

CCCryptorStatus cryptStatus = CCCrypt(kCCDecrypt, kCCAlgorithmDES,

kCCOptionPKCS7Padding | kCCOptionECBMode,

keyPtr, kCCBlockSizeDES,

NULL,

[data bytes], dataLength,

buffer, bufferSize,

&numBytesDecrypted);

if (cryptStatus == kCCSuccess) {

return [NSData dataWithBytesNoCopy:buffer length:numBytesDecrypted];

}

free(buffer);

return nil;

}

#pragma mark----加密

+ (NSString *)DESEncrypt:(NSString *)str withKey:(NSString *)key{

NSData* data = [DESCrypt DESEncrypt:[str dataUsingEncoding:NSUTF8StringEncoding]  WithKey:key];

return [[NSString alloc]initWithData:data encoding:NSUTF8StringEncoding];

}

#pragma mark---解密

+ (NSString *)DESDecrypt:(NSString *)str withKey:(NSString *)key{

NSData* data = [DESCrypt DESDecrypt:[str dataUsingEncoding:NSUTF8StringEncoding] WithKey:key];

return [[NSString alloc]initWithData:data encoding:NSUTF8StringEncoding];

}

@end

---------------------用法-----

//    NSData* data = [DESCrypt DESEncrypt:[@"123" dataUsingEncoding:NSUTF8StringEncoding] WithKey:@"123"];

//    NSData* data1 = [DESCrypt DESDecrypt:data WithKey:@"123"];

//    NSLog(@"%@",[[NSString alloc]initWithData:data1 encoding:NSUTF8StringEncoding]);


base64和DES的结合

//Base64加密

- (NSString *)base64Encode:(NSString* )str{

//取项目的bundleIdentifier作为KEY

NSString *key = [[NSBundle mainBundle] bundleIdentifier];

//转化为二进制数据

NSData* data = [str dataUsingEncoding:NSUTF8StringEncoding];

data = [DESCrypt DESEncrypt:[@"123" dataUsingEncoding:NSUTF8StringEncoding] WithKey:key];

//进行Base64加密

return [data base64EncodedStringWithOptions:0];

}

//Base64解密

- (NSString *)base64Decode:(NSString *)str{

NSString *key = [[NSBundle mainBundle] bundleIdentifier];

NSData* data = [[NSData alloc]initWithBase64EncodedString:str options:0];

data = [DESCrypt DESDecrypt:data WithKey:key];

return [[NSString alloc]initWithData:data encoding:NSUTF8StringEncoding];

}

------------------用法----------------

NSString* str = [self base64Encode:@"123"];

NSLog(@"%@",str);

NSString* str1 = [self base64Decode:str];

NSLog(@"%@",str1);


iOS------RSA加密

在iOS中使用RSA加密解密,需要用到.der和.p12后缀格式的文件,其中.der格式的文件存放的是公钥(Public key)用于加密,.p12格式的文件存放的是私钥(Private key)用于解密

对于比较敏感的数据,如用户信息(登陆、注册等),客户端发送使用RSA加密,服务器返回使用DES(AES)加密,使用RSA进行数字签名,可以起到防篡改的作用;客户端之所以使用RSA加密,是因为RSA解密需要知道服务器私钥,而服务器私钥一般盗取难度较大

RSA使用公钥加密、私钥解密

一、使用openssl生成所需秘钥文件

生成环境是在mac系统下,使用openssl进行生成,首先打开终端,按下面这些步骤依次来做:

1. 生成模长为1024bit的私钥文件private_key.pem

openssl genrsa -out private_key.pem 1024

2. 生成证书请求文件rsaCertReq.csr

openssl req -new -key private_key.pem -out rsaCerReq.csr

注意:这一步会提示输入国家、省份、mail等信息,可以根据实际情况填写,或者全部不用填写,直接全部敲回车.

3. 生成证书rsaCert.crt,并设置有效时间为1年

openssl x509 -req -days 3650 -in rsaCerReq.csr -signkey private_key.pem -out rsaCert.crt

4. 生成供iOS使用的公钥文件public_key.der

openssl x509 -outform der -in rsaCert.crt -out public_key.der

5. 生成供iOS使用的私钥文件private_key.p12

openssl pkcs12 -export -out private_key.p12 -inkey private_key.pem -in rsaCert.crt

注意:这一步会提示给私钥文件设置密码,直接输入想要设置密码即可,然后敲回车,然后再验证刚才设置的密码,再次输入密码,然后敲回车,完毕!

在解密时,private_key.p12文件需要和这里设置的密码配合使用,因此需要牢记此密码.

6. 生成供Java使用的公钥rsa_public_key.pem

openssl rsa -in private_key.pem -out rsa_public_key.pem -pubout

7. 生成供Java使用的私钥pkcs8_private_key.pem

openssl pkcs8 -topk8 -in private_key.pem -out pkcs8_private_key.pem -nocrypt

全部执行成功后,会生成如下文件,其中public_key.der和private_key.p12就是iOS需要用到的文件,如下图:





二、将文件导入工程使用

1.新建工程, 并导入Security.framework框架, 如下图:



2.导入秘钥文件

导入.der和.p12格式的秘钥文件, 如下图:



3.新建用于加密、解密的类RSAEncryptor, 并实现相关方法


#import <Foundation/Foundation.h>

@interfaceRSAEncryptor:NSObject/**

*  加密方法

*

*  @param str  需要加密的字符串

*  @param path  '.der'格式的公钥文件路径

*/+ (NSString*)encryptString:(NSString*)str publicKeyWithContentsOfFile:(NSString*)path;/**

*  解密方法

*

*  @param str      需要解密的字符串

*  @param path      '.p12'格式的私钥文件路径

*  @param password  私钥文件密码

*/+ (NSString*)decryptString:(NSString*)str privateKeyWithContentsOfFile:(NSString*)path password:(NSString*)password;/**

*  加密方法

*

*  @param str    需要加密的字符串

*  @param pubKey 公钥字符串

*/+ (NSString*)encryptString:(NSString*)str publicKey:(NSString*)pubKey;/**

*  解密方法

*

*  @param str    需要解密的字符串

*  @param privKey 私钥字符串

*/+ (NSString*)decryptString:(NSString*)str privateKey:(NSString*)privacy;

@end

------------------------------------------------------------

#import "RSAEncryptor.h"

#import<Security/Security.h>

@implementation RSAEncryptor

staticNSString*base64_encode_data(NSData*data){   

 data = [data base64EncodedDataWithOptions:0];

NSString*ret = [[NSStringalloc] initWithData:data encoding:NSUTF8StringEncoding];return ret;

}

staticNSData*base64_decode(NSString*str){

NSData*data = [[NSDataalloc] initWithBase64EncodedString:str options:NSDataBase64DecodingIgnoreUnknownCharacters];

return data;

}

#pragma mark - 使用'.der'公钥文件加密

+ (NSString *)encryptString:(NSString *)str publicKeyWithContentsOfFile:(NSString *)path{

if (!str || !path)  return nil;

return [self encryptString:str publicKeyRef:[self getPublicKeyRefWithContentsOfFile:path]];

}

//获取公钥

+ (SecKeyRef)getPublicKeyRefWithContentsOfFile:(NSString*)filePath{

NSData*certData = [NSDatadataWithContentsOfFile:filePath];

if(!certData) {

return nil;   

 }   

 SecCertificateRef cert = SecCertificateCreateWithData(NULL, (CFDataRef)certData);    SecKeyRef key =NULL;  

  SecTrustRef trust =NULL;    

SecPolicyRef policy =NULL;

if(cert !=NULL) {       

 policy = SecPolicyCreateBasicX509();

if(policy) {

if(SecTrustCreateWithCertificates((CFTypeRef)cert, policy, &trust) == noErr) {                SecTrustResultType result;

if(SecTrustEvaluate(trust, &result) == noErr) {          

          key = SecTrustCopyPublicKey(trust);             

   }            }        }    }

if(policy)CFRelease(policy);

if(trust)CFRelease(trust);

if(cert)CFRelease(cert);

return key;}

+ (NSString*)encryptString:(NSString*)str publicKeyRef:(SecKeyRef)publicKeyRef{

if(![str dataUsingEncoding:NSUTF8StringEncoding])

{returnnil;    }

if(!publicKeyRef)

{returnnil;    }

NSData*data = [selfencryptData:[str dataUsingEncoding:NSUTF8StringEncoding] withKeyRef:publicKeyRef];

NSString*ret = base64_encode_data(data);

return ret;}

#pragma mark - 使用'.12'私钥文件解密//解密

+ (NSString*)decryptString:(NSString*)str privateKeyWithContentsOfFile:(NSString*)path password:(NSString*)password{

if(!str || !path)returnnil;if(!password) password =@"";

return[selfdecryptString:str privateKeyRef:[selfgetPrivateKeyRefWithContentsOfFile:path password:password]];

}

//获取私钥

+ (SecKeyRef)getPrivateKeyRefWithContentsOfFile:(NSString*)filePath password:(NSString*)password{

NSData*p12Data = [NSDatadataWithContentsOfFile:filePath];

if(!p12Data) {

return nil;   

 }   

 SecKeyRef privateKeyRef =NULL;

NSMutableDictionary* options = [[NSMutableDictionaryalloc] init];   

 [options setObject: password forKey:(__bridgeid)kSecImportExportPassphrase];

CFArrayRefitems =CFArrayCreate(NULL,0,0,NULL);    

OSStatus securityError = SecPKCS12Import((__bridgeCFDataRef) p12Data, (__bridgeCFDictionaryRef)options, &items);

if(securityError == noErr &&CFArrayGetCount(items) >0) {

CFDictionaryRefidentityDict =CFArrayGetValueAtIndex(items,0);       

 SecIdentityRef identityApp = (SecIdentityRef)CFDictionaryGetValue(identityDict, kSecImportItemIdentity);        

securityError = SecIdentityCopyPrivateKey(identityApp, &privateKeyRef);

if(securityError != noErr) {        

    privateKeyRef =NULL;        }    }

CFRelease(items);

return privateKeyRef;}

+ (NSString*)decryptString:(NSString*)str privateKeyRef:(SecKeyRef)privKeyRef{

NSData*data = [[NSDataalloc] initWithBase64EncodedString:str options:NSDataBase64DecodingIgnoreUnknownCharacters];

if(!privKeyRef) {

return nil;   

 }   

 data = [selfdecryptData:data withKeyRef:privKeyRef];

NSString*ret = [[NSStringalloc] initWithData:data encoding:NSUTF8StringEncoding];returner;}

#pragma mark - 使用公钥字符串加密

/* START: Encryption with RSA public key *///使用公钥字符串加密

+ (NSString*)encryptString:(NSString*)str publicKey:(NSString*)pubKey{

NSData*data = [selfencryptData:[str dataUsingEncoding:NSUTF8StringEncoding] publicKey:pubKey];

NSString*ret = base64_encode_data(data);returner;}

+ (NSData*)encryptData:(NSData*)data publicKey:(NSString*)pubKey{

if(!data || !pubKey){returning;    

}    

SecKeyRef keyRef = [selfaddPublicKey:pubKey];if(!keyRef){

return nil;  

  }

return[selfencryptData:data withKeyRef:keyRef];}

+ (SecKeyRef)addPublicKey:(NSString*)key{

NSRangespos = [key rangeOfString:@"-----BEGIN PUBLIC KEY-----"];

NSRangeepos = [key rangeOfString:@"-----END PUBLIC KEY-----"];

if(spos.location !=NSNotFound&& epos.location !=NSNotFound){NSUIntegers = spos.location + spos.length;

NSUIntegere = epos.location;NSRangerange =NSMakeRange(s, e-s);    

    key = [key substringWithRange:range];    }   

 key = [key stringByReplacingOccurrencesOfString:@"\r"withString:@""];   

 key = [key stringByReplacingOccurrencesOfString:@"\n"withString:@""]; 

   key = [key stringByReplacingOccurrencesOfString:@"\t"withString:@""];    

key = [key stringByReplacingOccurrencesOfString:@" "withString:@""];// This will be base64 encoded, decode it.NSData*data = base64_decode(key);    

data = [selfstripPublicKeyHeader:data];if(!data){return nil;   

 }

//a tag to read/write keychain storage

NSString*tag =@"RSAUtil_PubKey";

NSData*d_tag = [NSDatadataWithBytes:[tag UTF8String] length:[tag length]];

// Delete any old lingering key with the same tag

NSMutableDictionary*publicKey = [[NSMutableDictionaryalloc] init];   

 [publicKey setObject:(__bridgeid) kSecClassKey forKey:(__bridgeid)kSecClass];    [publicKey setObject:(__bridgeid) kSecAttrKeyTypeRSA forKey:(__bridgeid)kSecAttrKeyType]; 

   [publicKey setObject:d_tag forKey:(__bridgeid)kSecAttrApplicationTag];    SecItemDelete((__bridgeCFDictionaryRef)publicKey);

// Add persistent version of the key to system keychain

[publicKey setObject:data forKey:(__bridgeid)kSecValueData];   

 [publicKey setObject:(__bridgeid) kSecAttrKeyClassPublic forKey:(__bridgeid)    kSecAttrKeyClass];   

 [publicKey setObject:[NSNumbernumberWithBool:YES] forKey:(__bridgeid)    kSecReturnPersistentRef];

CFTypeRefpersistKey =nil;   

 OSStatus status = SecItemAdd((__bridgeCFDictionaryRef)publicKey, &persistKey);if(persistKey !=nil){CFRelease(persistKey);    

}

if((status != noErr) && (status != errSecDuplicateItem)) {returnnil;    }   

 [publicKey removeObjectForKey:(__bridgeid)kSecValueData];  

  [publicKey removeObjectForKey:(__bridgeid)kSecReturnPersistentRef];  

  [publicKey setObject:[NSNumbernumberWithBool:YES] forKey:(__bridgeid)kSecReturnRef];    

[publicKey setObject:(__bridgeid) kSecAttrKeyTypeRSA forKey:(__bridgeid)kSecAttrKeyType];

// Now fetch the SecKeyRef version of the keySecKeyRef

 keyRef =nil;   

 status = SecItemCopyMatching((__bridgeCFDictionaryRef)publicKey, (CFTypeRef*)&keyRef);if(status != noErr){returnnil;    }returnkeyRef;}

+ (NSData*)stripPublicKeyHeader:(NSData*)d_key{

// Skip ASN.1 public key header

if(d_key ==nil)return(nil);

unsignedlonglen = [d_key length];if(!len)return(nil);

unsignedchar*c_key = (unsignedchar*)[d_key bytes];unsignedintidx    =0;

if(c_key[idx++] !=0x30)return(nil);

if(c_key[idx] >0x80) idx += c_key[idx] -0x80+1;elseidx++;

// PKCS #1 rsaEncryption szOID_RSA_RSA

staticunsignedcharseqiod[] =    {0x30,0x0d,0x06,0x09,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x01,0x01,0x01,0x05,0x00};

if(memcmp(&c_key[idx], seqiod,15))return(nil);   

 idx +=15;

if(c_key[idx++] !=0x03)return(nil);

if(c_key[idx] >0x80) idx += c_key[idx] -0x80+1;elseidx++;

if(c_key[idx++] !='\0')return(nil);

// Now make a new NSData from this buffer

return([NSDatadataWithBytes:&c_key[idx] length:len - idx]);}

+ (NSData*)encryptData:(NSData*)data withKeyRef:(SecKeyRef) keyRef{

constuint8_t *srcbuf = (constuint8_t *)[data bytes];    

size_t srclen = (size_t)data.length;  

  size_t block_size = SecKeyGetBlockSize(keyRef) *sizeof(uint8_t);

void*outbuf = malloc(block_size);   

 size_t src_block_size = block_size -11;

NSMutableData*ret = [[NSMutableDataalloc] init];for(intidx=0; idx src_block_size){            data_len = src_block_size;        }       

 size_t outlen = block_size;       

 OSStatus status = noErr;       

 status = SecKeyEncrypt(keyRef,                              kSecPaddingPKCS1,                              srcbuf + idx,                              data_len,                              outbuf,                              &outlen                              );if(status !=0) {

NSLog(@"SecKeyEncrypt fail. Error Code: %d", status);        

    ret =nil;break;        }else{          

  [ret appendBytes:outbuf length:outlen];        }    }    free(outbuf);CFRelease(keyRef);returner;}

/* END: Encryption with RSA public key */

#pragma mark - 使用私钥字符串解密

/* START: Decryption with RSA private key *///使用私钥字符串解密

+ (NSString*)decryptString:(NSString*)str privateKey:(NSString*)privacy{

if(!str)return nil;

NSData*data = [[NSDataalloc] initWithBase64EncodedString:str options:NSDataBase64DecodingIgnoreUnknownCharacters];   

 data = [selfdecryptData:data privateKey:privKey];

NSString*ret = [[NSStringalloc] initWithData:data encoding:NSUTF8StringEncoding];returner;}

+ (NSData*)decryptData:(NSData*)data privateKey:(NSString*)privacy{

if(!data || !privKey){returnnil;    }    

SecKeyRef keyRef = [selfaddPrivateKey:privKey];

if(!keyRef){return nil;  

  }

return[selfdecryptData:data withKeyRef:keyRef];}

+ (SecKeyRef)addPrivateKey:(NSString*)key{

NSRangespos = [key rangeOfString:@"-----BEGIN RSA PRIVATE KEY-----"];

NSRangeepos = [key rangeOfString:@"-----END RSA PRIVATE KEY-----"];

if(spos.location !=NSNotFound&& epos.location !=NSNotFound){NSUIntegers = spos.location + spos.length;

NSUIntegere = epos.location;NSRangerange =NSMakeRange(s, e-s);      

  key = [key substringWithRange:range];    }  

  key = [key stringByReplacingOccurrencesOfString:@"\r"withString:@""];    

key = [key stringByReplacingOccurrencesOfString:@"\n"withString:@""];  

  key = [key stringByReplacingOccurrencesOfString:@"\t"withString:@""];   

 key = [key stringByReplacingOccurrencesOfString:@" "withString:@""];

// This will be base64 encoded, decode it.NSData*data = base64_decode(key);  

  data = [selfstripPrivateKeyHeader:data];if(!data){return nil;   

 }

//a tag to read/write keychain storage

NSString*tag =@"RSAUtil_PrivKey";

NSData*d_tag = [NSDatadataWithBytes:[tag UTF8String] length:[tag length]];

// Delete any old lingering key with the same tag

NSMutableDictionary*privateKey = [[NSMutableDictionaryalloc] init];   

 [privateKey setObject:(__bridgeid) kSecClassKey forKey:(__bridgeid)kSecClass];    [privateKey setObject:(__bridgeid) kSecAttrKeyTypeRSA forKey:(__bridgeid)kSecAttrKeyType];    

[privateKey setObject:d_tag forKey:(__bridgeid)kSecAttrApplicationTag];    SecItemDelete((__bridgeCFDictionaryRef)privateKey);

// Add persistent version of the key to system keychain

[privateKey setObject:data forKey:(__bridgeid)kSecValueData];   

 [privateKey setObject:(__bridgeid) kSecAttrKeyClassPrivate forKey:(__bridgeid)    kSecAttrKeyClass];   

 [privateKey setObject:[NSNumbernumberWithBool:YES] forKey:(__bridgeid)    kSecReturnPersistentRef];

CFTypeRefpersistKey =nil; 

   OSStatus status = SecItemAdd((__bridgeCFDictionaryRef)privateKey, &persistKey);

if(persistKey !=nil){CFRelease(persistKey);    }

if((status != noErr) && (status != errSecDuplicateItem)) {return nil;   

 }   

 [privateKey removeObjectForKey:(__bridgeid)kSecValueData];  

  [privateKey removeObjectForKey:(__bridgeid)kSecReturnPersistentRef]; 

   [privateKey setObject:[NSNumbernumberWithBool:YES] forKey:(__bridgeid)kSecReturnRef];   

 [privateKey setObject:(__bridgeid) kSecAttrKeyTypeRSA forKey:(__bridgeid)kSecAttrKeyType];

// Now fetch the SecKeyRef version of the keySecKeyRef 

keyRef =nil;    

status = SecItemCopyMatching((__bridgeCFDictionaryRef)privateKey, (CFTypeRef*)&keyRef);if(status != noErr){return nil;    }

return keyRef;}

+ (NSData*)stripPrivateKeyHeader:(NSData*)d_key{

// Skip ASN.1 private key header

if(d_key ==nil)return(nil);

unsignedlonglen = [d_key length];if(!len)return(nil);

unsignedchar*c_key = (unsignedchar*)[d_key bytes];unsignedintidx    =22;

//magic byte at offset 22

if(0x04!= c_key[idx++])return nil;

//calculate length of the key

unsignedintc_len = c_key[idx++];

intdet = c_len &0x80;

if(!det) {        

c_len = c_len &0x7f;    }

else{

intbyteCount = c_len &0x7f;

if(byteCount + idx > len) 

{

//rsa length field longer than buffer

return nil;       

 }

unsignedintaccum =0;

unsignedchar*ptr = &c_key[idx];     

   idx += byteCount;

while(byteCount) {          

  accum = (accum <<8) + *ptr;        

    ptr++;          

  byteCount--;        }       

 c_len = accum;    }

// Now make a new NSData from this buffer return

[d_key subdataWithRange:NSMakeRange(idx, c_len)];}

+ (NSData*)decryptData:(NSData*)data withKeyRef:(SecKeyRef) keyRef{

constuint8_t *srcbuf = (constuint8_t *)[data bytes];  

  size_t srclen = (size_t)data.length;   

 size_t block_size = SecKeyGetBlockSize(keyRef) *sizeof(uint8_t);

UInt8*outbuf = malloc(block_size);   

 size_t src_block_size = block_size;

NSMutableData*ret = [[NSMutableDataalloc] init];for(intidx=0; idx src_block_size){            data_len = src_block_size;        }      

  size_t outlen = block_size;      

  OSStatus status = noErr;       

 status = SecKeyDecrypt(keyRef,                              kSecPaddingNone,                              srcbuf + idx,                              data_len,                              outbuf,                              &outlen                              );

if(status !=0) {

NSLog(@"SecKeyEncrypt fail. Error Code: %d", status);       

     ret =nil;break;        }

else{

//the actual decrypted data is in the middle, locate it!

int idxFirstZero =-1;

int idxNextZero = (int)outlen;for(inti =0; i < outlen; i++ ) {

if( outbuf[i] ==0) {

if( idxFirstZero <0) {                   

     idxFirstZero = i;              

      }else{                      

  idxNextZero = i;

break;               

     }                }            }           

 [ret appendBytes:&outbuf[idxFirstZero+1] length:idxNextZero-idxFirstZero-1];     

   }    }    

free(outbid);

CFRelease(keyRef);

return ret;}

/* END: Decryption with RSA private key */@end

4. 测试加密、解密

首先先测试使用.der和.p12秘钥文件进行加密、解密, 在ViewController.m中进行测试, 代码如下:

#import"ViewController.h"

#import"RSAEncryptor.h"

@interfaceViewController()

@end

@implementationViewController

- (void)viewDidLoad {   

 [superviewDidLoad];

//原始数据

NSString*originalString =@"这是一段将要使用'.der'文件加密的字符串!";

//使用.der和.p12中的公钥私钥加密解密

NSString*public_key_path = [[NSBundlemainBundle] pathForResource:@"public_key.der"ofType:nil];

NSString*private_key_path = [[NSBundlemainBundle] pathForResource:@"private_key.p12"ofType:nil];

NSString*encryptStr = [RSAEncryptor encryptString:originalString publicKeyWithContentsOfFile:public_key_path];NSLog(@"加密前:%@", originalString);

NSLog(@"加密后:%@", encryptStr);

NSLog(@"解密后:%@", [RSAEncryptor decryptString:encryptStr privateKeyWithContentsOfFile:private_key_path password:@"123456"]);}

- (void)didReceiveMemoryWarning {   

 [superdidReceiveMemoryWarning];

// Dispose of any resources that can be recreated.

}

@end

最后编辑于
©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 203,230评论 5 476
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 85,261评论 2 380
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 150,089评论 0 336
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 54,542评论 1 273
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 63,542评论 5 365
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 48,544评论 1 281
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 37,922评论 3 395
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 36,578评论 0 257
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 40,816评论 1 296
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 35,576评论 2 320
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 37,658评论 1 329
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 33,359评论 4 318
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 38,937评论 3 307
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 29,920评论 0 19
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 31,156评论 1 259
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 42,859评论 2 349
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 42,381评论 2 342

推荐阅读更多精彩内容