List of usage examples for javax.crypto Cipher getInstance
public static final Cipher getInstance(String transformation) throws NoSuchAlgorithmException, NoSuchPaddingException
From source file:license.rsa.WakeRSA.java
/** * rsa/*from ww w . j a v a 2 s. co m*/ * @param key * @return * @throws Exception */ private static byte[] rsa(byte[] key) throws Exception { PublicKey pubKey = readPublicKeyFromFile(); Cipher cipher = Cipher.getInstance("RSA"); cipher.init(Cipher.DECRYPT_MODE, pubKey); return cipher.doFinal(key); }
From source file:net.mobid.codetraq.utils.PasswordProcessor.java
/** * Encrypts a text using the <code>passPhrase</code> above and an algorithm supported * by your virtual machine implementation. You can change the default algorithm with * another algorithm, but please make sure your virtual machine supports it. * @param valueToEncrypt - text to encrypt * @return an encrypted, Base64 encoded text */// w w w.j a va 2 s. c o m public static String encryptString(String valueToEncrypt) { String output = null; try { KeySpec keySpec = new PBEKeySpec(passPhrase.toCharArray(), salt, iterations); SecretKey secretKey = SecretKeyFactory.getInstance("PBEWithMD5AndDES").generateSecret(keySpec); Cipher cipher = Cipher.getInstance(secretKey.getAlgorithm()); AlgorithmParameterSpec paramSpec = new PBEParameterSpec(salt, iterations); cipher.init(Cipher.ENCRYPT_MODE, secretKey, paramSpec); // begin encrypting... byte[] byteToEncrypt = valueToEncrypt.getBytes("UTF8"); byte[] encrypted = cipher.doFinal(byteToEncrypt); output = new Base64().encodeToString(encrypted); } catch (Exception ex) { Logger.getLogger(PasswordProcessor.class.getName()).log(Level.SEVERE, null, ex); } return output; }
From source file:Main.java
/** * More flexible AES decrypt that doesn't encode * * @param key AES key typically 128, 192 or 256 bit * @param iv Initiation Vector/*from w w w . j a v a2 s. c o m*/ * @param decodedCipherText in bytes (assumed it's already been decoded) * @return Decrypted message cipher text (not encoded) * @throws GeneralSecurityException if something goes wrong during encryption */ public static byte[] decrypt(final SecretKeySpec key, final byte[] iv, final byte[] decodedCipherText) throws GeneralSecurityException { final Cipher cipher = Cipher.getInstance(AES_MODE); IvParameterSpec ivSpec = new IvParameterSpec(iv); cipher.init(Cipher.DECRYPT_MODE, key, ivSpec); byte[] decryptedBytes = cipher.doFinal(decodedCipherText); log("decryptedBytes", decryptedBytes); return decryptedBytes; }
From source file:gsn.http.ac.Protector.java
public static String decrypt(String value) throws Exception { Key key = generateKey();//w w w.ja va 2 s . com String salt = getSalt(); Cipher c = Cipher.getInstance(ALGORITHM); c.init(Cipher.DECRYPT_MODE, key); String dValue = null; String valueToDecrypt = value; for (int i = 0; i < ITERATIONS; i++) { byte[] decordedValue = new sun.misc.BASE64Decoder().decodeBuffer(valueToDecrypt); //byte[] decordedValue = Base64.decodeBase64(valueToDecrypt); byte[] decValue = c.doFinal(decordedValue); dValue = new String(decValue).substring(salt.length()); valueToDecrypt = dValue; } return dValue; }
From source file:in.mtap.iincube.mongoser.codec.crypto.Psyfer.java
public static Psyfer getInstance(String secretKey) throws NoSuchAlgorithmException, UnsupportedEncodingException, NoSuchPaddingException, InvalidKeyException { MessageDigest digest = MessageDigest.getInstance("SHA-1"); byte[] key = digest.digest(secretKey.getBytes("UTF-8")); key = Arrays.copyOf(key, 16); SecretKeySpec secretKeySpec = new SecretKeySpec(key, "AES"); Cipher eCipher = Cipher.getInstance("AES"); Cipher deCipher = Cipher.getInstance("AES"); eCipher.init(Cipher.ENCRYPT_MODE, secretKeySpec); deCipher.init(Cipher.DECRYPT_MODE, secretKeySpec); return new Psyfer(eCipher, deCipher); }
From source file:net.ftb.util.CryptoUtils.java
/** * Method to AES decrypt string if fails, will attempt to use {@link #decryptLegacy(String str, byte[] key)} * @param str string to decrypt/*from www . ja va2 s . c o m*/ * @param key decryption key key * @return decrypted string or "" if legacy fails */ public static String decrypt(String str, byte[] key) { try { Cipher aes = Cipher.getInstance("AES"); aes.init(Cipher.DECRYPT_MODE, new SecretKeySpec(pad(key), "AES")); String s = new String(aes.doFinal(Base64.decodeBase64(str)), "utf8"); if (s.startsWith("FDT:") && s.length() > 4) return s.split(":", 2)[1];//we don't want the decryption test else return decryptLegacy(str, key); } catch (Exception e) { Logger.logError("Error Decrypting information, attempting legacy decryption", e); return decryptLegacy(str, key); } }
From source file:com.thoughtworks.go.server.util.EncryptionHelper.java
public static String decryptUsingRSA(String cipherText, String privateKeyContent) throws NoSuchPaddingException, NoSuchAlgorithmException, IOException, InvalidKeySpecException, BadPaddingException, IllegalBlockSizeException, InvalidKeyException { Cipher decryptCipher = Cipher.getInstance("RSA"); decryptCipher.init(Cipher.DECRYPT_MODE, getRSAPrivateKeyFrom(privateKeyContent)); return new String(decryptCipher.doFinal(Base64.getDecoder().decode(cipherText)), UTF_8); }
From source file:com.os.util.PasswordDecoderEncoder.java
public static String decrypt(String encryptPassword) throws Exception { Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding"); key = convertHexToBytes(keyst);//from w w w.j ava2 s.c o m final SecretKeySpec secretKey = new SecretKeySpec(key, "AES"); cipher.init(Cipher.DECRYPT_MODE, secretKey); String encryptedString = new String(cipher.doFinal(Base64.decodeBase64(encryptPassword.getBytes())), "UTF-8"); System.out.println(encryptedString); String passwordDecrypted = encryptedString.trim(); return passwordDecrypted; }
From source file:cn.lynx.emi.license.GenerateLicense.java
private static final String encrypt(String key, String data) { byte[] corekey = Base64.decodeBase64(key); PKCS8EncodedKeySpec pkspec = new PKCS8EncodedKeySpec(corekey); try {//from w w w. j a va 2 s . c o m KeyFactory keyFactory = KeyFactory.getInstance("RSA"); Key privateKey = keyFactory.generatePrivate(pkspec); Cipher cipher = Cipher.getInstance(keyFactory.getAlgorithm()); cipher.init(Cipher.ENCRYPT_MODE, privateKey); byte[] encData = cipher.doFinal(data.getBytes("UTF-8")); System.out.println("after encrypt, len=" + encData.length); return Base64.encodeBase64String(encData); } catch (Exception e) { e.printStackTrace(); return null; } }
From source file:com.sds.acube.ndisc.mts.xserver.util.XNDiscCipher.java
/** * // www . j a v a 2s . co m * * @param data ? ? * @return ? ? */ public static String decode(String data) { try { Cipher cipher = Cipher.getInstance("DES/ECB/PKCS5Padding"); cipher.init(Cipher.DECRYPT_MODE, key); byte d[] = cipher.doFinal(Base64.decodeBase64(data.getBytes("UTF-8"))); return replaceChar(new String(d)); } catch (NoSuchAlgorithmException e) { System.err.print(XNDiscUtils.printStackTrace(e)); } catch (NoSuchPaddingException e) { System.err.print(XNDiscUtils.printStackTrace(e)); } catch (IOException e) { System.err.print(XNDiscUtils.printStackTrace(e)); } catch (InvalidKeyException e) { System.err.print(XNDiscUtils.printStackTrace(e)); } catch (IllegalBlockSizeException e) { System.err.print(XNDiscUtils.printStackTrace(e)); } catch (BadPaddingException e) { System.err.print(XNDiscUtils.printStackTrace(e)); } return null; }