前言

http/https协议提交在被抓包时请求内容是明文的, 直接传输账号密码的风险非常大,故这里我们要对数据加密处理,并生成校验码,防止数据篡改

Http/https传输账户密码等数据时需要加密处理的原因主要有以下几点:

  • 数据保密性:账户密码等敏感信息是用户的私密数据,如果明文传输,可能会被中间人窃取或篡改,导致用户的账户被盗用或信息泄露。通过加密处理,可以保证数据在传输过程中的保密性,使得只有合法的接收方能够解密和使用这些数据。
  • 防止篡改:在传输过程中,数据可能会被恶意篡改,例如中间人攻击、数据包劫持等。通过加密处理,可以在接收方验证数据的完整性,确保数据在传输过程中没有被篡改。
  • 身份验证:加密处理可以用于身份验证,确保数据的发送方和接收方的身份是合法的。例如,使用公钥加密算法对数据进行加密,只有拥有私钥的接收方才能解密,从而验证发送方的身份。

目录

​编辑

前言

具体思路

代码实现

前端信息加密处理(Vue)

安装crypto-js库,用来AES加密

编写AES加密工具类

编写MD5加密类

后端处理(springboot)

自定义AES加密密钥以及盐值长度等配置

定义AES工具类

定义MD5工具类

随机盐值生成工具类(能生成随机字符串即可)

用户注册Controller层

用户注册Service层

用户登录Controller层

用户登录service层

总结

具体思路

1.前端对账户信息进行AES加密(与后端使用同一密钥),密码进行MD5加密,再将加密后面的两个字符串拼接在一起,进行MD5加密作为我们的校验码(校验加密数据在请求过程中是否被更改)

2.后端收到加密后的账户和密码以及校验码,同第一步加密得校验码,比较校验码是否一致,如果一致,进行后续操作

  • 注册时,后端对接受到的MD5加密后的密码进行加盐加密操作,并将盐值一并存入库中,方便后续登录校验
  • 登录时,取得对应用户的盐值,对接收到的密码进行加盐加密,再与原先库中的密码相比较

以下是注册操作的大体流程

代码实现

前端信息加密处理(Vue)

安装crypto-js库,用来AES加密

npm install crypto-js --save-dev

编写AES加密工具类

import CryptoJS from 'crypto-js';//加密export const aesEncrypt = (word : string, keyStr : string) => {keyStr = keyStr " />

编写MD5加密类

// md5加密export function md5(string : string,bit : Number) {function md5_RotateLeft(lValue, iShiftBits) {return (lValue <>> (32 - iShiftBits));}function md5_AddUnsigned(lX, lY) {var lX4, lY4, lX8, lY8, lResult;lX8 = (lX & 0x80000000);lY8 = (lY & 0x80000000);lX4 = (lX & 0x40000000);lY4 = (lY & 0x40000000);lResult = (lX & 0x3FFFFFFF) + (lY & 0x3FFFFFFF);if (lX4 & lY4) {return (lResult ^ 0x80000000 ^ lX8 ^ lY8);}if (lX4 | lY4) {if (lResult & 0x40000000) {return (lResult ^ 0xC0000000 ^ lX8 ^ lY8);} else {return (lResult ^ 0x40000000 ^ lX8 ^ lY8);}} else {return (lResult ^ lX8 ^ lY8);}}function md5_F(x, y, z) {return (x & y) | ((~x) & z);}function md5_G(x, y, z) {return (x & z) | (y & (~z));}function md5_H(x, y, z) {return (x ^ y ^ z);}function md5_I(x, y, z) {return (y ^ (x | (~z)));}function md5_FF(a, b, c, d, x, s, ac) {a = md5_AddUnsigned(a, md5_AddUnsigned(md5_AddUnsigned(md5_F(b, c, d), x), ac));return md5_AddUnsigned(md5_RotateLeft(a, s), b);};function md5_GG(a, b, c, d, x, s, ac) {a = md5_AddUnsigned(a, md5_AddUnsigned(md5_AddUnsigned(md5_G(b, c, d), x), ac));return md5_AddUnsigned(md5_RotateLeft(a, s), b);};function md5_HH(a, b, c, d, x, s, ac) {a = md5_AddUnsigned(a, md5_AddUnsigned(md5_AddUnsigned(md5_H(b, c, d), x), ac));return md5_AddUnsigned(md5_RotateLeft(a, s), b);};function md5_II(a, b, c, d, x, s, ac) {a = md5_AddUnsigned(a, md5_AddUnsigned(md5_AddUnsigned(md5_I(b, c, d), x), ac));return md5_AddUnsigned(md5_RotateLeft(a, s), b);};function md5_ConvertToWordArray(string) {var lWordCount;var lMessageLength = string.length;var lNumberOfWords_temp1 = lMessageLength + 8;var lNumberOfWords_temp2 = (lNumberOfWords_temp1 - (lNumberOfWords_temp1 % 64)) / 64;var lNumberOfWords = (lNumberOfWords_temp2 + 1) * 16;var lWordArray = Array(lNumberOfWords - 1);var lBytePosition = 0;var lByteCount = 0;while (lByteCount < lMessageLength) {lWordCount = (lByteCount - (lByteCount % 4)) / 4;lBytePosition = (lByteCount % 4) * 8;lWordArray[lWordCount] = (lWordArray[lWordCount] | (string.charCodeAt(lByteCount) << lBytePosition));lByteCount++;}lWordCount = (lByteCount - (lByteCount % 4)) / 4;lBytePosition = (lByteCount % 4) * 8;lWordArray[lWordCount] = lWordArray[lWordCount] | (0x80 << lBytePosition);lWordArray[lNumberOfWords - 2] = lMessageLength <>> 29;return lWordArray;};function md5_WordToHex(lValue) {var WordToHexValue = "", WordToHexValue_temp = "", lByte, lCount;for (lCount = 0; lCount >> (lCount * 8)) & 255;WordToHexValue_temp = "0" + lByte.toString(16);WordToHexValue = WordToHexValue + WordToHexValue_temp.substr(WordToHexValue_temp.length - 2, 2);}return WordToHexValue;};function md5_Utf8Encode(string) {string = string.replace(/\r\n/g, "\n");var utftext = "";for (var n = 0; n < string.length; n++) {var c = string.charCodeAt(n);if (c  127) && (c > 6) | 192);utftext += String.fromCharCode((c & 63) | 128);} else {utftext += String.fromCharCode((c >> 12) | 224);utftext += String.fromCharCode(((c >> 6) & 63) | 128);utftext += String.fromCharCode((c & 63) | 128);}}return utftext;};var x = Array();var k, AA, BB, CC, DD, a, b, c, d;var S11 = 7, S12 = 12, S13 = 17, S14 = 22;var S21 = 5, S22 = 9, S23 = 14, S24 = 20;var S31 = 4, S32 = 11, S33 = 16, S34 = 23;var S41 = 6, S42 = 10, S43 = 15, S44 = 21;string = md5_Utf8Encode(string);x = md5_ConvertToWordArray(string);a = 0x67452301; b = 0xEFCDAB89; c = 0x98BADCFE; d = 0x10325476;for (k = 0; k < x.length; k += 16) {AA = a; BB = b; CC = c; DD = d;a = md5_FF(a, b, c, d, x[k + 0], S11, 0xD76AA478);d = md5_FF(d, a, b, c, x[k + 1], S12, 0xE8C7B756);c = md5_FF(c, d, a, b, x[k + 2], S13, 0x242070DB);b = md5_FF(b, c, d, a, x[k + 3], S14, 0xC1BDCEEE);a = md5_FF(a, b, c, d, x[k + 4], S11, 0xF57C0FAF);d = md5_FF(d, a, b, c, x[k + 5], S12, 0x4787C62A);c = md5_FF(c, d, a, b, x[k + 6], S13, 0xA8304613);b = md5_FF(b, c, d, a, x[k + 7], S14, 0xFD469501);a = md5_FF(a, b, c, d, x[k + 8], S11, 0x698098D8);d = md5_FF(d, a, b, c, x[k + 9], S12, 0x8B44F7AF);c = md5_FF(c, d, a, b, x[k + 10], S13, 0xFFFF5BB1);b = md5_FF(b, c, d, a, x[k + 11], S14, 0x895CD7BE);a = md5_FF(a, b, c, d, x[k + 12], S11, 0x6B901122);d = md5_FF(d, a, b, c, x[k + 13], S12, 0xFD987193);c = md5_FF(c, d, a, b, x[k + 14], S13, 0xA679438E);b = md5_FF(b, c, d, a, x[k + 15], S14, 0x49B40821);a = md5_GG(a, b, c, d, x[k + 1], S21, 0xF61E2562);d = md5_GG(d, a, b, c, x[k + 6], S22, 0xC040B340);c = md5_GG(c, d, a, b, x[k + 11], S23, 0x265E5A51);b = md5_GG(b, c, d, a, x[k + 0], S24, 0xE9B6C7AA);a = md5_GG(a, b, c, d, x[k + 5], S21, 0xD62F105D);d = md5_GG(d, a, b, c, x[k + 10], S22, 0x2441453);c = md5_GG(c, d, a, b, x[k + 15], S23, 0xD8A1E681);b = md5_GG(b, c, d, a, x[k + 4], S24, 0xE7D3FBC8);a = md5_GG(a, b, c, d, x[k + 9], S21, 0x21E1CDE6);d = md5_GG(d, a, b, c, x[k + 14], S22, 0xC33707D6);c = md5_GG(c, d, a, b, x[k + 3], S23, 0xF4D50D87);b = md5_GG(b, c, d, a, x[k + 8], S24, 0x455A14ED);a = md5_GG(a, b, c, d, x[k + 13], S21, 0xA9E3E905);d = md5_GG(d, a, b, c, x[k + 2], S22, 0xFCEFA3F8);c = md5_GG(c, d, a, b, x[k + 7], S23, 0x676F02D9);b = md5_GG(b, c, d, a, x[k + 12], S24, 0x8D2A4C8A);a = md5_HH(a, b, c, d, x[k + 5], S31, 0xFFFA3942);d = md5_HH(d, a, b, c, x[k + 8], S32, 0x8771F681);c = md5_HH(c, d, a, b, x[k + 11], S33, 0x6D9D6122);b = md5_HH(b, c, d, a, x[k + 14], S34, 0xFDE5380C);a = md5_HH(a, b, c, d, x[k + 1], S31, 0xA4BEEA44);d = md5_HH(d, a, b, c, x[k + 4], S32, 0x4BDECFA9);c = md5_HH(c, d, a, b, x[k + 7], S33, 0xF6BB4B60);b = md5_HH(b, c, d, a, x[k + 10], S34, 0xBEBFBC70);a = md5_HH(a, b, c, d, x[k + 13], S31, 0x289B7EC6);d = md5_HH(d, a, b, c, x[k + 0], S32, 0xEAA127FA);c = md5_HH(c, d, a, b, x[k + 3], S33, 0xD4EF3085);b = md5_HH(b, c, d, a, x[k + 6], S34, 0x4881D05);a = md5_HH(a, b, c, d, x[k + 9], S31, 0xD9D4D039);d = md5_HH(d, a, b, c, x[k + 12], S32, 0xE6DB99E5);c = md5_HH(c, d, a, b, x[k + 15], S33, 0x1FA27CF8);b = md5_HH(b, c, d, a, x[k + 2], S34, 0xC4AC5665);a = md5_II(a, b, c, d, x[k + 0], S41, 0xF4292244);d = md5_II(d, a, b, c, x[k + 7], S42, 0x432AFF97);c = md5_II(c, d, a, b, x[k + 14], S43, 0xAB9423A7);b = md5_II(b, c, d, a, x[k + 5], S44, 0xFC93A039);a = md5_II(a, b, c, d, x[k + 12], S41, 0x655B59C3);d = md5_II(d, a, b, c, x[k + 3], S42, 0x8F0CCC92);c = md5_II(c, d, a, b, x[k + 10], S43, 0xFFEFF47D);b = md5_II(b, c, d, a, x[k + 1], S44, 0x85845DD1);a = md5_II(a, b, c, d, x[k + 8], S41, 0x6FA87E4F);d = md5_II(d, a, b, c, x[k + 15], S42, 0xFE2CE6E0);c = md5_II(c, d, a, b, x[k + 6], S43, 0xA3014314);b = md5_II(b, c, d, a, x[k + 13], S44, 0x4E0811A1);a = md5_II(a, b, c, d, x[k + 4], S41, 0xF7537E82);d = md5_II(d, a, b, c, x[k + 11], S42, 0xBD3AF235);c = md5_II(c, d, a, b, x[k + 2], S43, 0x2AD7D2BB);b = md5_II(b, c, d, a, x[k + 9], S44, 0xEB86D391);a = md5_AddUnsigned(a, AA);b = md5_AddUnsigned(b, BB);c = md5_AddUnsigned(c, CC);d = md5_AddUnsigned(d, DD);}if(bit==32){return (md5_WordToHex(a) + md5_WordToHex(b) + md5_WordToHex(c) + md5_WordToHex(d)).toLowerCase();}return (md5_WordToHex(b) + md5_WordToHex(c)).toLowerCase();}

后端处理(springboot)

自定义AES加密密钥以及盐值长度等配置

encoding:#key需要为16位的倍数aes-secret-key: "9948+=--jkl;P,fj"salt-length: 6

定义AES工具类

/** * java使用AES加密解密 AES-128-ECB加密 * 与mysql数据库aes加密算法通用 * 数据库aes加密解密 * -- 加密 *SELECT to_base64(AES_ENCRYPT('www.gowhere.so','jkl;POIU1234++==')); *-- 解密 *SELECT AES_DECRYPT(from_base64('Oa1NPBSarXrPH8wqSRhh3g=='),'jkl;POIU1234++=='); * @author 836508 * */public class AESUtil {// 加密public static String Encrypt(String sSrc, String sKey) throws Exception {if (sKey == null) {System.out.print("Key为空null");return null;}// 判断Key是否为16位if (sKey.length() != 16) {System.out.print("Key长度不是16位");return null;}byte[] raw = sKey.getBytes("utf-8");SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");//"算法/模式/补码方式"cipher.init(Cipher.ENCRYPT_MODE, skeySpec);byte[] encrypted = cipher.doFinal(sSrc.getBytes("utf-8"));return new BASE64Encoder().encode(encrypted);//此处使用BASE64做转码功能,同时能起到2次加密的作用。}// 解密public static String Decrypt(String sSrc, String sKey) throws Exception {try {// 判断Key是否正确if (sKey == null) {System.out.print("Key为空null");return null;}// 判断Key是否为16位if (sKey.length() != 16) {System.out.print("Key长度不是16位");return null;}byte[] raw = sKey.getBytes("utf-8");SecretKeySpec skeySpec = new SecretKeySpec(raw, "AES");Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");cipher.init(Cipher.DECRYPT_MODE, skeySpec);byte[] encrypted1 = new BASE64Decoder().decodeBuffer(sSrc);//先用base64解密try {byte[] original = cipher.doFinal(encrypted1);String originalString = new String(original,"utf-8");return originalString;} catch (Exception e) {System.out.println(e.toString());return null;}} catch (Exception ex) {System.out.println(ex.toString());return null;}}public static void main(String[] args) throws Exception {/* * 此处使用AES-128-ECB加密模式,key需要为16位。 */String cKey = "9948+=--jkl;P,fj";// 需要加密的字串String cSrc = "W2hXf6pAeuCP0u2Domsnfg==";System.out.println(cSrc);// // 加密// String enString = AESUtil.Encrypt(cSrc, cKey);// System.out.println("加密后的字串是:" + enString);// 解密String DeString = AESUtil.Decrypt(cSrc, cKey);System.out.println("解密后的字串是:" + DeString);}}

定义MD5工具类

/** * @description MD5加密工具类,支持位数,加盐,无盐,大小写 */public class MD5Util {/** * @Title: md5Lower * @Description:不加盐值32位小写 */public static String md5Lower(String plainText) {String md5 = null;if (null != plainText && !"".equals(plainText)) {try {MessageDigest md = MessageDigest.getInstance("MD5");md.update(plainText.getBytes("UTF-8"));md5 =new BigInteger(1, md.digest()).toString(16);} catch (Exception e) {e.printStackTrace();}}return md5;}/** * @Title: md5Lower * @Description:加盐值32位小写 */public static String md5Lower(String plainText, String saltValue) {String md5 = null;if (null != plainText && !"".equals(plainText) && null != saltValue && !"".equals(saltValue)) {try {MessageDigest md = MessageDigest.getInstance("MD5");md.update(plainText.getBytes("UTF-8"));md.update(saltValue.getBytes("UTF-8"));md5 = new BigInteger(1, md.digest()).toString(16);} catch (Exception e) {e.printStackTrace();}}return md5;}/** * @Title: md5_16Lower * @Description:不加盐值16位小写 */public static String md5_16Lower(String plainText) {String md5 = md5Lower(plainText);return null==md5?md5:md5.substring(8, 24);}/** * @Title: md5_16Lower * @Description:加盐值16位小写 */public static String md5_16Lower(String plainText, String saltValue) {String md5 = md5Lower(plainText, saltValue);return null==md5?md5:md5.substring(8, 24);}/** * @Title: md5_16Upper * @Description:不加盐值16位大写 */public static String md5_16Upper(String plainText) {String md5 = md5_16Lower(plainText);return null==md5?md5:md5.toUpperCase();}/** * @Title: md5_16Upper * @Description:加盐值16位大写 */public static String md5_16Upper(String plainText, String saltValue) {String md5 = md5_16Lower(plainText, saltValue);return null==md5?md5:md5.toUpperCase();}/** * @Title: md5Upper * @Description:不加盐值32位大写 */public static String md5Upper(String plainText) {String md5 = md5Lower(plainText);return null==md5?md5:md5.toUpperCase();}/** * @Title: md5Upper * @Description:加盐值32位大写 */public static String md5Upper(String plainText, String saltValue) {String md5 = md5Lower(plainText, saltValue);return null==md5?md5:md5.toUpperCase();}}

随机盐值生成工具类(能生成随机字符串即可)

public class RandUtils {/** * 生成count长度的验证码 * @param count * @return */public static String getRandomCode(Integer count){Random r = new Random();String includes = "qwertyuiopasdfghjklzxcvbnm1234567890";String code = "";for (int i = 0; i < count; i++) {Integer index = r.nextInt(36);code += includes.charAt(index);}return code;}}

用户注册Controller层

@PostMapping("/register")public R register(@Valid@RequestBody UserRegisterDto registerQo) throws Exception {// 1.数据hash校验String username = registerQo.getUsername();String password = registerQo.getPassword();String hashCode = MD5Util.md5Lower(username + password); //重新生成校验码if(!hashCode.equals(registerQo.getHashCode())){return R.error("数据异常,请重试");}// 2.用户名AES解密还原registerQo.setUsername(AESUtil.Decrypt(username, AES_SECRET));// 3.校验通过,开始注册流程userService.userRegister(registerQo);return R.success("用户注册成功");}

用户注册Service层

@Overridepublic void userRegister(UserRegisterDto registerQo) {// 1.验证码校验String code = redisService.getString(registerQo.getUserEmail());if (!registerQo.getVericode().equals(code)) {throw new CustomException("验证码错误");}// 2.查询信息是否存在LambdaQueryWrapper queryWrapper1 = new LambdaQueryWrapper();queryWrapper1.eq(SystemUser::getUserEmail, registerQo.getUserEmail());SystemUser systemUserOld = getOne(queryWrapper1);if (systemUserOld != null) {throw new CustomException("该邮箱已经被注册");}LambdaQueryWrapper queryWrapper2 = new LambdaQueryWrapper();queryWrapper2.eq(SystemUser::getUsername, registerQo.getUsername());systemUserOld = getOne(queryWrapper2);if (systemUserOld != null) {throw new CustomException("该用户名已经被注册");}// 3.加盐加密操作String salt = RandUtils.getRandomCode(SALT_LENGTH); //生成盐值String passwordMd5WithSalt = MD5Util.md5Lower(registerQo.getPassword(), salt);//加盐MD5加密// 4.添加用户SystemUser systemUser = new SystemUser();systemUser.setUsername(registerQo.getUsername());systemUser.setPassword(passwordMd5WithSalt);systemUser.setUserEmail(registerQo.getUserEmail());systemUser.setHash(salt); //一并保存盐值save(systemUser);// 5.删除验证码缓存redisService.delete(registerQo.getUserEmail());}

用户登录Controller层

@PostMapping("/login")public R login(@Valid@RequestBody UserLoginDto userLoginDto) throws Exception {// 1.数据hash校验String username = userLoginDto.getUsername();String password = userLoginDto.getPassword();String hashCode = MD5Util.md5Lower(username + password); //重新生成校验码if(!hashCode.equals(userLoginDto.getHashCode())){return R.error("数据异常,请重试");}// 2.用户名AES解密还原userLoginDto.setUsername(AESUtil.Decrypt(username, AES_SECRET));// 3.校验通过,开始登录验证LoginSuccessVo loginVo = userService.userLogin(userLoginDto);returnR.success(loginVo);}

用户登录service层

@Overridepublic LoginSuccessVo userLogin(UserLoginDto userLoginDto) {// 1.验证码校验String code = redisService.getString(Constant.ImageCodePreKey + userLoginDto.getCodeUuid());if (code == null) {throw new CustomException("验证码已过期");}if (!code.toUpperCase().equals(userLoginDto.getVericode().toUpperCase())) {throw new CustomException("验证码错误");}// 2.查找用户SystemUser systemUser = seekUser(userLoginDto.getUsername());if (systemUser == null) {throw new CustomException("用户不存在");}// 3.密码校验// 密码盐值处理String password = MD5Util.md5Lower(userLoginDto.getPassword() + systemUser.getHash());if (!systemUser.getPassword().equals(password)) {throw new CustomException("用户密码错误");}// 4.封装token信息UUID token = UUID.randomUUID();/*将token存入缓存中,有效期为三天,这里我们把token当成key,用户id当成value*/redisService.setStringTime(token.toString(), systemUser.getId().toString(), new Long(3), TimeUnit.DAYS);/*删除本次登录验证码的缓存*/redisService.delete(Constant.ImageCodePreKey + userLoginDto.getCodeUuid());/*返回登录成功的信息*/LoginSuccessVo loginVo = new LoginSuccessVo();systemUser.setPassword("");loginVo.setSystemUser(systemUser);loginVo.setToken(token.toString());return loginVo;}

总结

感谢您的阅读~~