在Spring Tools Suite4運行下面的代碼進行des加密時會報下面的異常:
java.security.NoSuchAlgorithmException:Cannot find any provider supporting DES/ECB/PKCS5Padding
package com.talkweb.unicom.equity.utils;
import java.security.SecureRandom;
import javax.crypto.Cipher;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.DESKeySpec;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
public class DESCryptography {
public static void main(String[] args) {
String content = "aaaaaaaabbbbbbbbaaaaaaaa";
String key = "01234567";
System.out.println("加密前 "+ byteToHexString(content.getBytes()));
byte[] encrypted = DES_CBC_Encrypt(content.getBytes(), key.getBytes());
System.out.println("加密後:"+byteToHexString(encrypted));
byte[] decrypted=DES_CBC_Decrypt(encrypted, key.getBytes());
System.out.println("解密後:"+byteToHexString(decrypted));
printKey(key.getBytes());
}
/**
* 加密
* @param bytes
* @param bytes2
* @return
*/
private static byte[] DES_CBC_Encrypt(byte[] content, byte[] keyBytes) {
try {
DESKeySpec keySpec = new DESKeySpec(keyBytes);
String algorithm = "DES";//指定使什麼樣的算法
SecretKeyFactory keyFactory = SecretKeyFactory.getInstance(algorithm);
SecretKey key = keyFactory.generateSecret(keySpec);
String transformation = "DES/CBC/PKCS5Padding"; //用什麼樣的轉型方式
Cipher cipher = Cipher.getInstance(transformation);
cipher.init(Cipher.ENCRYPT_MODE, key, new IvParameterSpec(keySpec.getKey()));
byte[] result = cipher.doFinal(content);
return result;
} catch (Exception e) {
e.printStackTrace();
}
return null;
}
/**
* 解密
* @param encrypted
* @param bytes
* @return
*/
private static byte[] DES_CBC_Decrypt(byte[] content, byte[] keyBytes) {
try {
DESKeySpec keySpec = new DESKeySpec(keyBytes);
String algorithm = "DES";
SecretKeyFactory keyFactory = SecretKeyFactory.getInstance(algorithm );
SecretKey key = keyFactory.generateSecret(keySpec);
String transformation = "DES/CBC/PKCS5Padding";
Cipher cipher = Cipher.getInstance(transformation );
cipher.init(Cipher.DECRYPT_MODE, key, new IvParameterSpec(keyBytes));
byte[] result = cipher.doFinal(content);
return result;
} catch (Exception e) {
e.printStackTrace();
}
return null;
}
/**
* 二進制轉16進制
* @param bytes
* @return
*/
private static String byteToHexString(byte[] bytes) {
StringBuffer sb = new StringBuffer();
String sTemp;
for (int i = 0; i<bytes.length; i++) {
sTemp = Integer.toHexString(0xFF & bytes[i]);
if (sTemp.length() < 2) {
sb.append(0);
}
sb.append(sTemp.toUpperCase());
}
return sb.toString();
}
/**
*
* 2、 祕鑰的產生。
這個有點噁心, 我研究了一下 KeyGenerator, KeyPairGenerator,KeyFactory,SecretKeyFactory這四個類,是有區別的。
根據 Oracle 的 Standard Algorithm Name Documentation 提供的說明:
KeyGenerator和SecretKeyFactory,都是javax.crypto包的,生成的key主要是提供給AES,DES,3DES,MD5,SHA1等 對稱 和 單向 加密算法。
KeyPairGenerator和KeyFactory,都是java.security包的,生成的key主要是提供給DSA,RSA, EC等 非對稱加密算法。
*
*/
public static void printKey(byte[] keyBytes){
try {
//第一種 Factory
DESKeySpec keySpec = new DESKeySpec(keyBytes);
SecretKeyFactory keyFactory = SecretKeyFactory.getInstance("DES");
SecretKey key1 = keyFactory.generateSecret(keySpec);
//第二種 Grenerator
KeyGenerator keyGenerator = KeyGenerator.getInstance("DES");
keyGenerator.init(56, new SecureRandom(keyBytes));//key爲8個字節,實際用了56位; 後面隨機數用key作爲種子seed生成
SecretKey key2 = keyGenerator.generateKey();
SecretKeySpec key3 = new SecretKeySpec(keyBytes, "DES");
System.out.println("key1: "+byteToHexString(key1.getEncoded()));
System.out.println("key2: "+byteToHexString(key2.getEncoded()));
System.out.println("key3: "+byteToHexString(key3.getEncoded()));
} catch (Exception e) {
}
}
}
解決辦法:
點擊Window -> Preferences。
點擊Java -> Installed JREs ,選中你的jdk,點擊Edit。
點擊 Restore Default ,點擊 Finish 關閉該頁面。
點擊 Apply and Close ,保存設置。