在AES-GCM加密中,IV(Initialization Vector)必须是唯一的,并且对于每个密钥而言是不可预测的。如果使用相同的IV值进行多次加密,将导致安全性降低,并且可能导致无法正常工作。以下是一个使用Java的代码示例,用于生成随机的IV值并确保其唯一性:
import javax.crypto.Cipher;
import javax.crypto.SecretKey;
import javax.crypto.spec.GCMParameterSpec;
import javax.crypto.spec.SecretKeySpec;
import java.nio.ByteBuffer;
import java.security.SecureRandom;
public class AESGCMExample {
private static final int GCM_IV_LENGTH = 12;
private static final int GCM_TAG_LENGTH = 16;
public static void main(String[] args) throws Exception {
// 生成随机的IV值
byte[] iv = generateIV();
// 加密
byte[] encryptedData = encrypt("Hello, AES-GCM!", iv);
// 解密
String decryptedData = decrypt(encryptedData, iv);
System.out.println("Decrypted data: " + decryptedData);
}
public static byte[] generateIV() {
byte[] iv = new byte[GCM_IV_LENGTH];
SecureRandom random = new SecureRandom();
random.nextBytes(iv);
return iv;
}
public static byte[] encrypt(String plaintext, byte[] iv) throws Exception {
byte[] keyBytes = "0123456789abcdef".getBytes(); // AES密钥,只用作示例,请使用安全的密钥生成方式
SecretKey key = new SecretKeySpec(keyBytes, "AES");
Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding");
GCMParameterSpec gcmParameterSpec = new GCMParameterSpec(GCM_TAG_LENGTH * 8, iv);
cipher.init(Cipher.ENCRYPT_MODE, key, gcmParameterSpec);
byte[] plaintextBytes = plaintext.getBytes();
byte[] ciphertext = cipher.doFinal(plaintextBytes);
// 将IV和密文合并
byte[] encryptedData = ByteBuffer.allocate(iv.length + ciphertext.length)
.put(iv)
.put(ciphertext)
.array();
return encryptedData;
}
public static String decrypt(byte[] encryptedData, byte[] iv) throws Exception {
byte[] keyBytes = "0123456789abcdef".getBytes(); // AES密钥,只用作示例,请使用安全的密钥生成方式
SecretKey key = new SecretKeySpec(keyBytes, "AES");
Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding");
GCMParameterSpec gcmParameterSpec = new GCMParameterSpec(GCM_TAG_LENGTH * 8, iv);
cipher.init(Cipher.DECRYPT_MODE, key, gcmParameterSpec);
// 将IV和密文分离
byte[] ciphertext = new byte[encryptedData.length - GCM_IV_LENGTH];
System.arraycopy(encryptedData, GCM_IV_LENGTH, ciphertext, 0, ciphertext.length);
byte[] plaintextBytes = cipher.doFinal(ciphertext);
return new String(plaintextBytes);
}
}
在上述代码中,generateIV()
函数使用SecureRandom
生成一个随机的IV值。在加密和解密过程中,IV值被传递给GCMParameterSpec
,以确保加密和解密使用相同的IV值。
请注意,这里的AES密钥是一个硬编码的示例,请使用安全的密钥生成方式来生成真实的密钥。