/src/java/com/timesgroup/sso/constants/StringEncrypter.java

https://github.com/getkksingh/TimesSSO · Java · 114 lines · 77 code · 25 blank · 12 comment · 3 complexity · 7e5f4481f65e985a0895fd0d4aee7a38 MD5 · raw file

  1. package com.timesgroup.sso.constants;
  2. // CIPHER / GENERATORS
  3. import java.io.BufferedInputStream;
  4. import java.io.File;
  5. import java.io.FileInputStream;
  6. import java.io.FileOutputStream;
  7. import java.security.KeyPair;
  8. import java.security.KeyPairGenerator;
  9. import java.security.PrivateKey;
  10. import java.security.PublicKey;
  11. import java.security.SecureRandom;
  12. import java.security.Security;
  13. import java.security.Signature;
  14. import java.security.cert.Certificate;
  15. import java.security.cert.CertificateFactory;
  16. import javax.crypto.Cipher;
  17. import javax.crypto.KeyGenerator;
  18. import javax.crypto.SecretKey;
  19. import javax.crypto.spec.SecretKeySpec;
  20. import org.bouncycastle.util.encoders.Base64;
  21. public class StringEncrypter {
  22. public static final byte[] DATA = "This is a test".getBytes();
  23. public static final File DATA_FILE = new File( "encrypted.data" );
  24. public static final File KEY_FILE = new File( "key.data" );
  25. public static void main(String[] args) throws Exception {
  26. byte[] key = "Secret Key kksin".getBytes() ;//... secret sequence of bytes
  27. byte[] dataToSend = "kksingh_iitk".getBytes() ;
  28. //Encrypt
  29. Cipher c = Cipher.getInstance("AES");
  30. SecretKeySpec k =
  31. new SecretKeySpec(key, "AES");
  32. c.init(Cipher.ENCRYPT_MODE, k);
  33. byte[] encryptedData = c.doFinal(dataToSend);
  34. byte[] encodedBytes = Base64.encode(encryptedData);
  35. System.out.println(new String(encodedBytes));
  36. Cipher c1 = Cipher.getInstance("AES");
  37. c1.init(Cipher.DECRYPT_MODE, k);
  38. byte[] data = c1.doFinal(Base64.decode(encodedBytes));
  39. System.out.println(new String(data));
  40. }
  41. public static void encrypt() throws Exception{
  42. KeyGenerator kgen = KeyGenerator.getInstance("Blowfish");
  43. SecretKey skey = kgen.generateKey();
  44. byte[] raw = skey.getEncoded();
  45. SecretKeySpec skeySpec = new SecretKeySpec(raw, "Blowfish");
  46. // Create the cipher for encrypting
  47. Cipher cipher = Cipher.getInstance("Blowfish");
  48. cipher.init(Cipher.ENCRYPT_MODE, skeySpec);
  49. // Encrypt the data
  50. byte[] encrypted = cipher.doFinal( DATA );
  51. // Save the encrypted data
  52. FileOutputStream fos = new FileOutputStream( DATA_FILE );
  53. fos.write( encrypted );
  54. fos.close();
  55. // Save the cipher settings
  56. byte[] encodedKeySpec = skeySpec.getEncoded();
  57. FileOutputStream eksos = new FileOutputStream( KEY_FILE );
  58. eksos.write( encodedKeySpec );
  59. eksos.close();
  60. }
  61. public static void decrypt() throws Exception{
  62. // Read the encrypted data
  63. FileInputStream fis = new FileInputStream(DATA_FILE);
  64. byte[] temp = new byte[ (int) DATA_FILE.length()];
  65. int bytesRead = fis.read(temp);
  66. byte[] data = new byte[bytesRead];
  67. System.arraycopy(temp, 0, data, 0, bytesRead);
  68. // Read the cipher settings
  69. FileInputStream eksis = new FileInputStream( KEY_FILE );
  70. bytesRead = eksis.read(temp);
  71. byte[] encodedKeySpec = new byte[bytesRead];
  72. System.arraycopy(temp, 0, encodedKeySpec, 0, bytesRead);
  73. // Recreate the secret/symmetric key
  74. SecretKeySpec skeySpec = new SecretKeySpec( encodedKeySpec, "Blowfish");
  75. // Create the cipher for encrypting
  76. Cipher cipher = Cipher.getInstance("Blowfish");
  77. cipher.init(Cipher.DECRYPT_MODE, skeySpec);
  78. // Decrypt the data
  79. byte[] decrypted = cipher.doFinal(data);
  80. // Validate successful decryption
  81. for (int i = 0; i < decrypted.length; i++) {
  82. if ( decrypted[ i ] != DATA[ i ] ) {
  83. System.err.println( "Decrypted data wrong at byte " + i + "!" );
  84. System.exit( 1 );
  85. }
  86. }
  87. System.err.println( "Success!" );
  88. }
  89. }