Python使用Pycrypto库进行RSA加密的方法详解
密码与通信 在信息传播中,通常有发送者,接受者和窃听者三个角色。假设发送者Master想要写信给接受者Ghost,可是又不想信的内容被别人看到,因此Master需要先对信加密,而Ghost收到信之后又能解密。这样别的人即使窃听盗取了密文也无法解密。其次,如果窃听者并不像破译内容,而是伪造Master发消息给Ghost,那么Master发消息前就得先对机密内容进行签名。 密码技术 Python密码库--Pycrypto 安装 pip install pycrypto RSA 密码算法与签名 对于RSA的解密,即密文的数字的 D 次方求mod N 即可,即密文和自己做 D 次乘法,再对结果除以 N 求余数即可得到明文。D 和 N 的组合就是私钥(private key)。 算法的加密和解密还是很简单的,可是公钥和私钥的生成算法却不是随意的。本文在于使用,对生成秘钥对的算法就暂时忽略。使用 Pycrypto生成秘钥对很简单,我们分别为 Master和Ghost各生成一对属于自己的秘钥对。 from Crypto import Random from Crypto.Hash import SHA from Crypto.Cipher import PKCS1_v1_5 as Cipher_pkcs1_v1_5 from Crypto.Signature import PKCS1_v1_5 as Signature_pkcs1_v1_5 from Crypto.PublicKey import RSA # 伪随机数生成器 random_generator = Random.new().read # rsa算法生成实例 rsa = RSA.generate(1024,random_generator) # master的秘钥对的生成 private_pem = rsa.exportKey() with open('master-private.pem','w') as f: f.write(private_pem) public_pem = rsa.publickey().exportKey() with open('master-public.pem','w') as f: f.write(public_pem) # ghost的秘钥对的生成 private_pem = rsa.exportKey() with open('master-private.pem','w') as f: f.write(public_pem) 所生成的私钥和公钥大概是这样的: -----BEGIN RSA PRIVATE KEY----- MIICXQIBAAKBgQDR4Wq9l44lw/thTPyFmSi2hII92EPh90yGXQNL5e7zJPD16j6Q tr+tIPNSQaVrnmNwrtqyEC2x4Meyp3tdCWPYUF11r2GgDgxKfUByetNG4XqJeUKk kJ6D6C706mTf/2zsm8KFoNYCYPX1GhvpiTOikHcNlHLCnOD7jbMAovJg/QIDAQAB AoGBAIz8V6+0NxC3bg4WoSs9j1PL/5F7zV3lucoogSZi9vjuP89x40Vi/a9XCxye bHi2lSYEz3P92jQ7QuqIBx6gSCi3p2HLjD5LyQeSSMbPe8KSlf52dBUaPthbBceA IJSBDrE8MKGpulTQKAJ7K3zQUOP2ZZgcKxq2jcQgS6iTENIBAkEA5r7emvwuL0Ob Maav4o1Ovb5c6OL7bSm1tuLPSKl05WuNYfE6LkqiwOOn5lPvsqhwyI1dJeywVeQz E+PvcTUR7QJBAOjZ8PxnP5T14fuhbfko4d24Ev+iiTBdq3pMXWvobEFL1ljV6aYE 2JAiMjO/Fzd1WgZhWPa3P+diyTs9mART6VECQQC0LeEXdsn9oDYEbFu1dZBB++8C 75NTJ5m8iJlB7QjZyMUq8Ln0wdUa9+n4ohxvDraa9EADSDJdr4bvBjLH3J/1AkBr 9QfO7kvDU5DXqoujVnoJ4xsj3IbAnt0vEZLKwfLW/0M84si2SU7i3IfsB+/KraT0 ilPF50ZAkEN+LNt7PjBRAkAHBBPME7IbFqxi5Cc/6R12DOMiJbOLDTS12b1J1cwG p8WMIERsvwWdJw+4NdqjbJcjzeGrXhDBi//JU902TAwy -----END RSA PRIVATE KEY----- -----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDR4Wq9l44lw/thTPyFmSi2hII9 2EPh90yGXQNL5e7zJPD16j6Qtr+tIPNSQaVrnmNwrtqyEC2x4Meyp3tdCWPYUF11 r2GgDgxKfUByetNG4XqJeUKkkJ6D6C706mTf/2zsm8KFoNYCYPX1GhvpiTOikHcN lHLCnOD7jbMAovJg/QIDAQAB -----END PUBLIC KEY----- 加密与解密 简而言之,Master给Ghost通信,需要加密内容,那么Ghost会生成一个秘钥对,Ghost的公钥ghost-public.pem和私钥ghost-private.pem 。Ghost 把公钥公开给发送者,任何人都可以用来加密,然后Master使用ghost-public.pem进行加密,然后把内容发给Ghost,Ghost再使用ghost-private.pem进行解密。 1.加密(encrypt) # Master使用Ghost的公钥对内容进行rsa 加密 In [12]: message = 'hello ghost,this is a plian text' In [13]: with open('ghost-public.pem') as f: ....: key = f.read() ....: rsakey = RSA.importKey(key) ....: cipher = Cipher_pkcs1_v1_5.new(rsakey) ....: cipher_text = base64.b64encode(cipher.encrypt(message)) ....: print cipher_text ....: HYQPGB+axWCbPp7PPGNTJEAhVPW0TX5ftvUN2v40ChBLB1pS+PVM3YGT5vfcsvmPZhW8NKVSBp8FwjLUnMn6yXP1O36NaunUzyHwI+cpjlkTwZs3DfCY/32EzeuKuJABin1FHBYUMTOKtHy+eEDOuaJTnZTC7ZBkdha+J88HXSc= cipher_text 即 Master加密后将要发送给Ghost的密文。 2.解密(decrypt) # Ghost使用自己的私钥对内容进行rsa 解密 In [14]: with open('ghost-private.pem') as f: ....: key = f.read() ....: rsakey = RSA.importKey(key) ....: cipher = Cipher_pkcs1_v1_5.new(rsakey) ....: text = cipher.decrypt(base64.b64decode(encrypt_text),random_generator) ....: In [15]: print text hello ghost,this is a plian text In [16]: assert text == message,'decrypt falied' 这样Ghost就能看到Master所发的内容了,当然,如果Ghost想要给Master发消息,就需要Master先把其的公钥给Ghost,后者再使用公钥加密,然后发送给Master,最后Master使用自己的私钥解密。 签名与验签 签名 # Master 使用自己的公钥对内容进行签名 In [17]: with open('master-private.pem') as f: ....: key = f.read() ....: rsakey = RSA.importKey(key) ....: signer = Signature_pkcs1_v1_5.new(rsakey) ....: digest = SHA.new() ....: digest.update(message) ....: sign = signer.sign(digest) ....: signature = base64.b64encode(sign) In [18]: print signature jVUcAYfgF5Pwlpgrct3IlCX7KezWqNI5tD5OIFTrfCOQgfyCrOkN+/gRLsMiSDOHhFPj2LnfY4Cr5u4eG2IiH8+uSF5z4gUX48AqCQlqiOTLk2EGvyp+w+iYo2Bso1MUi424Ebkx7SnuJwLiPqNzIBLfEZLA3ov69aDArh6hQiw= 验签 In [22]: with open('master-public.pem') as f: ....: key = f.read() ....: rsakey = RSA.importKey(key) ....: verifier = Signature_pkcs1_v1_5.new(rsakey) ....: digest = SHA.new() ....: # Assumes the data is base64 encoded to begin with ....: digest.update(message) ....: is_verify = signer.verify(digest,base64.b64decode(signature)) ....: print is_verify ....: True 总结
无论是加密机密还是签名验签都使用同一对秘钥对。 (编辑:李大同) 【声明】本站内容均来自网络,其相关言论仅代表作者个人观点,不代表本站立场。若无意侵犯到您的权利,请及时与联系站长删除相关内容! |