密码学

国密SM2双证书申请

2021-08-16  本文已影响0人  jockie911

最近在处理国密SM2双证书申请,网上查了很多资料零零散散,所以自己写下一点总结

1.本次需求是移动端App上申请双证书(加密证书 + 签名证书),加密证书用于数据加密,签名证书用于签名。我们只需要生成请求证书的pkcs10 的 csr,让后端去CA申请双证书

2.前期准备:引入BC库(版本1.6.0)生成公私钥对,公钥是椭圆曲线上的点(x,y)

public static KeyPairgenerateBCKeyaPair()throws NoSuchAlgorithmException, InvalidAlgorithmParameterException {
    KeyPairGenerator keyGen = KeyPairGenerator.getInstance("EC",new BouncyCastleProvider());
    keyGen.initialize(new ECNamedCurveGenParameterSpec(AIG_NAME));
    KeyPair keyPair = keyGen.generateKeyPair();
    return keyPair;
}

3.生成申请pkcs10的CSR事例,先设置DN项

public static String createP10(CertInitBean applyInfo, KeyPair keypair)throws Exception {
    String dnFormat ="CN=%s,C=%s,O=%s";
    String c = applyInfo.getTenantName() +"@" + applyInfo.getCardNo();
    String o = !applyInfo.isPersonal() ? applyInfo.getTenantName() :"";
    String dn = String.format(dnFormat,c,applyInfo.getCountry(),o);

    //1. 创建签名
    ContentSigner signer =new JcaContentSignerBuilder("SM3WITHSM2")
        .setProvider(new BouncyCastleProvider()).build(keypair.getPrivate());
    //2. 创建证书请求
    PKCS10CertificationRequestBuilder pkcs10CertificationRequestBuilder =new JcaPKCS10CertificationRequestBuilder(new X500Name(dn),keypair.getPublic());
    PKCS10CertificationRequest pkcs10CertificationRequest = pkcs10CertificationRequestBuilder.build(signer);
    return Base64Utils.encode(pkcs10CertificationRequest.getEncoded());
}

4.请求CA申请证书事例以及返回数据格式

image image

5.我们需要主要拿到三个数据(加密证书/签名证书/加密证书的私钥),加密证书的私钥是经过签名证书私钥加密的对称密钥加密过的,所以接下来需要解密数字信封 获取加密证书的私钥

处理encPrivateKey_shecaSM2    
public static String decryptECB(CertDBEntity certDBEntity) {
    String enc_envelope = certDBEntity.getEncEnvelope();
    //签名证书私钥
    PrivateKey sign_privateKey = GmUtil.getPrivatekeyFromD(new BigInteger(certDBEntity.getD()));

    byte[] decode = Base64Utils.decode(enc_envelope);
    System.out.println(Arrays.toString(decode));
    System.out.println(decode.length);
    byte[] version = new byte[4];
    byte[] ulSymmAlgID = new byte[4];
    byte[] ulBits = new byte[4];
    byte[] encryptedPriKey = new byte[64];
    byte[] pubKey = new byte[132];
    byte[] pairCipher = new byte[180];

    System.arraycopy(decode, 0, version, 0, version.length);
    System.arraycopy(decode, version.length, ulSymmAlgID, 0, ulSymmAlgID.length);
    System.arraycopy(decode, version.length+ulSymmAlgID.length, ulBits, 0, ulBits.length);
    System.arraycopy(decode, version.length+ulSymmAlgID.length+ulBits.length, encryptedPriKey, 0, encryptedPriKey.length);
    System.arraycopy(decode, version.length+ulSymmAlgID.length+ulBits.length+encryptedPriKey.length, pubKey, 0, pubKey.length);
    System.arraycopy(decode, version.length+ulSymmAlgID.length+ulBits.length+encryptedPriKey.length+pubKey.length, pairCipher, 0, pairCipher.length);
    byte[] priBytes = new byte[32];
    System.arraycopy(encryptedPriKey, 64-priBytes.length, priBytes, 0, priBytes.length);

    //转换公钥密文
    byte[] encDataToDer = encDataToDer(pairCipher);
    //获取公钥加密的对称密钥
    //uu7X9qbPO+UTqmWchIZfxw==
    byte[] sm4Key = GmUtil.sm2Decrypt(encDataToDer, sign_privateKey);

    String decryptECB = SM4.decryptECB(Base64Utils.encode(priBytes), Base64Utils.encode(sm4Key));
    return decryptECB;
}
private static byte[] encDataToDer(byte[] encryptData){
    byte[] XCoordinate = new byte[32];
    System.arraycopy(encryptData, 32, XCoordinate, 0, 32);
    byte[] YCoordinate = new byte[32];
    System.arraycopy(encryptData, 96, YCoordinate, 0, 32);
    byte[] C3_hash = new byte[32];
    System.arraycopy(encryptData, 128, C3_hash, 0, 32);
    byte[] C2_cipher = new byte[encryptData.length - 4 - 32 - 128];
    System.arraycopy(encryptData, 4 + 32 + 128, C2_cipher, 0, C2_cipher.length);
    encryptData = new byte[1 + XCoordinate.length + YCoordinate.length + C3_hash.length + C2_cipher.length];
    System.arraycopy(XCoordinate, 0, encryptData, 1, XCoordinate.length);
    System.arraycopy(YCoordinate, 0, encryptData, 1 + XCoordinate.length, YCoordinate.length);
    System.arraycopy(C3_hash, 0, encryptData, 1 + XCoordinate.length + YCoordinate.length, C3_hash.length);
    System.arraycopy(C2_cipher, 0, encryptData, 1 + XCoordinate.length + YCoordinate.length + C3_hash.length, C2_cipher.length);

    Sm2CipherParser sm2Cipher = new Sm2CipherParser(encryptData);
    return sm2Cipher.decode();
}

6.得到加密证书的私钥就可以用来加解密了

公钥加密

public static byte[] encode(PublicKey publicKey, byte[] encodeData) {
    return changeC1C2C3ToC1C3C2(sm2EncryptOld(encodeData, publicKey));
}

private static byte[] changeC1C2C3ToC1C3C2(byte[] c1c2c3) {
    final int c1Len = (x9ECParameters.getCurve().getFieldSize() + 7) / 8 * 2 + 1; //sm2p256v1的这个固定65。可看GMNamedCurves、ECCurve代码。
    final int c3Len = 32; //new SM3Digest().getDigestSize();
    byte[] result = new byte[c1c2c3.length];
    System.arraycopy(c1c2c3, 0, result, 0, c1Len); //c1
    System.arraycopy(c1c2c3, c1c2c3.length - c3Len, result, c1Len, c3Len); //c3
    System.arraycopy(c1c2c3, c1Len, result, c1Len + c3Len, c1c2c3.length - c1Len - c3Len); //c2
    return result;
}

私钥解密

public static byte[] decode(PrivateKey privateKey, byte[] decodeData) {
    return sm2DecryptOld(changeC1C3C2ToC1C2C3(decodeData), privateKey);
}

private static byte[] changeC1C3C2ToC1C2C3(byte[] c1c3c2) {
    final int c1Len = (x9ECParameters.getCurve().getFieldSize() + 7) / 8 * 2 + 1; //sm2p256v1的这个固定65。可看GMNamedCurves、ECCurve代码。
    final int c3Len = 32; //new SM3Digest().getDigestSize();
    byte[] result = new byte[c1c3c2.length];
    System.arraycopy(c1c3c2, 0, result, 0, c1Len); //c1: 0->65
    System.arraycopy(c1c3c2, c1Len + c3Len, result, c1Len, c1c3c2.length - c1Len - c3Len); //c2
    System.arraycopy(c1c3c2, c1Len, result, c1c3c2.length - c3Len, c3Len); //c3
    return result;
}

7.使用签名证书签名,公钥验签

签名

public static byte[] sign(PrivateKey privateKey, byte[] signData) throws Exception {
    byte[] result = null;
    try {
        Signature signature = Signature.getInstance(GMObjectIdentifiers.sm2sign_with_sm3.toString(),new BouncyCastleProvider());
        signature.initSign(privateKey);
        signature.update(signData);
        result = signature.sign();
    }catch (Exception e) {
        throw new Exception("签名失败:"+e.getMessage());
    }
    return result;
}

验签

public static boolean verify(PublicKey publicKey, byte[] srcData, byte[] signedData) throws Exception {
    Boolean result = null;
    try {
        Signature signature = Signature.getInstance(GMObjectIdentifiers.sm2sign_with_sm3.toString(),new BouncyCastleProvider());
        signature.initVerify(publicKey);
        signature.update(srcData);
        result = signature.verify(signedData);
    }catch (Exception e) {
        throw new Exception("签名失败:"+e.getMessage());
    }
    return result;
}

8.以上是基础用法,可以使用EC SM2进行PDF签名,以及验签,后续再补充

上一篇下一篇

猜你喜欢

热点阅读