国产 无码 综合区,色欲AV无码国产永久播放,无码天堂亚洲国产AV,国产日韩欧美女同一区二区

前端請(qǐng)求參數(shù)加密、.NET 后端解密

這篇具有很好參考價(jià)值的文章主要介紹了前端請(qǐng)求參數(shù)加密、.NET 后端解密。希望對(duì)大家有所幫助。如果存在錯(cuò)誤或未考慮完全的地方,請(qǐng)大家不吝賜教,您也可以點(diǎn)擊"舉報(bào)違法"按鈕提交疑問(wèn)。

本文詳細(xì)介紹了前端請(qǐng)求參數(shù)加密、.NET 后端解密,文章較長(zhǎng),請(qǐng)各位看官耐心看完。

目錄
  • 一、前端使用“CryptoJS”,前端AES加密,.NET后端AES解密
    • 1.1、加密解密效果圖
    • 1.2、CryptoJS介紹
    • 1.3、準(zhǔn)備工作:安裝“CryptoJS”
      • 1.3.1、使用npm進(jìn)行安裝
      • 1.3.2、Visual Studio中安裝
        • 1.3.2.1、選擇“客戶端庫(kù)”
        • 1.3.2.2、安裝下載“CryptoJS”
    • 1.4、H5頁(yè)面代碼中引用“crypto-js”
    • 1.5、前端頁(yè)面代碼
      • 1.5.1、Html代碼
      • 1.5.2、javascript代碼
    • 1.6、.NET 后端代碼
      • 1.6.1、定義公共的密匙字段
      • 1.6.2、封裝AES解密方法
      • 1.6.3、編寫(xiě)API接口
  • 二、前端使用“JSEncrypt”,進(jìn)行非對(duì)稱RSA加密,.NET后端解密
    • 2.1、加密解密效果圖
    • 2.2、非對(duì)稱加密
    • 2.3、RSA
    • 2.4、準(zhǔn)備工作:安裝“jsencrypt”
      • 2.4.1、使用npm進(jìn)行安裝
      • 2.4.2、Visual Studio中安裝
        • 2.4.2.1、選擇“客戶端庫(kù)”
        • 2.4.2.2、安裝下載“jsencrypt”
    • 2.5、安裝組件“BouncyCastle”
      • 2.5.1、新建幫助類
        • 2.5.1.1、添加C# RAS生成.NET公鑰與私鑰以及.NET公鑰與私鑰轉(zhuǎn)Java公鑰私鑰類“RASKeyConversion”
        • 2.5.1.2、添加RSA秘鑰轉(zhuǎn)換幫助類“RsaKeyConvert”
        • 2.5.1.3、添加RSA加密幫助類“RSACrypto”
    • 2.6、.NET 控制器后端代碼
      • 2.6.1、視圖控制圖代碼
      • 2.6.2、POST請(qǐng)求接口代碼
    • 2.7、前端視圖頁(yè)面代碼
      • 2.7.1、Html代碼
      • 2.7.2、javascript代碼

一、前端使用“CryptoJS”,前端AES加密,.NET后端AES解密

1.1、加密解密效果圖

前端請(qǐng)求參數(shù)加密、.NET 后端解密

1.2、CryptoJS介紹

CryptoJS是一個(gè)JavaScript的加解密的工具包。它支持多種的算法:MD5、SHA1、SHA2、SHA3、RIPEMD-160 哈希散列,進(jìn)行 AES、DES、Rabbit、RC4、Triple DES 加解密。

1.3、準(zhǔn)備工作:安裝“CryptoJS”

1.3.1、使用npm進(jìn)行安裝

npm安裝命令如下:

npm install crypto-js --save-dev

1.3.2、Visual Studio中安裝

1.3.2.1、選擇“客戶端庫(kù)”

前端請(qǐng)求參數(shù)加密、.NET 后端解密

1.3.2.2、安裝下載“CryptoJS”

在“添加客戶端庫(kù)”界面:

  1. 提供程序:選擇“unpkg”;
  2. 庫(kù):輸入“crypto-js@”,進(jìn)行版本的選擇;
  3. 可選擇:1、包括所有庫(kù)文件;2、選擇特定文件;

確認(rèn)無(wú)誤之后,點(diǎn)擊“安裝”即可。
前端請(qǐng)求參數(shù)加密、.NET 后端解密

1.4、H5頁(yè)面代碼中引用“crypto-js”

1.5、前端頁(yè)面代碼

1.5.1、Html代碼

H5代碼使用了Layui開(kāi)原框架

<!DOCTYPE html>

<html>
<head>
    <meta name="viewport" content="width=device-width" />
    <title>sometext</title>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
    <script src="/lib/jquery/dist/jquery.js"></script>
    <script src="/lib/layui/dist/layui.js"></script>
    <script src="/lib/bootstrap/dist/js/bootstrap.js"></script>
	<script src="/lib/crypto-js/crypto-js.js"></script>
    <link href="/lib/layui/dist/css/layui.css" rel="stylesheet" />
    <link href="/lib/bootstrap/dist/css/bootstrap.css" rel="stylesheet" />
    <style type="text/css"></style>
</head>
<body>
    <div class="wrapper">
        <div class="input-group mb-3">
            <div class="input-group-prepend">
                <span class="input-group-text" id="basic-addon1">脫敏/加密前的內(nèi)容:</span>
            </div>
            <input type="password" class="form-control" id="sourctText" placeholder="脫敏/加密前的內(nèi)容" aria-label="sourctText" aria-describedby="basic-addon1">
        </div>
        <br />
        <div class="input-group mb-3">
            <div class="input-group-prepend">
                <span class="input-group-text" id="basic-addon1">加密后的內(nèi)容:</span>
            </div>
            <input type="text" class="form-control" id="encryptText" placeholder="加密后的內(nèi)容" readonly="readonly" aria-label="encryptText" aria-describedby="basic-addon1">
        </div>
        <br />
        <div class="input-group mb-3">
            <div class="input-group-prepend">
                <span class="input-group-text" id="basic-addon1">脫敏/加密后的內(nèi)容:</span>
            </div>
            <input type="text" class="form-control" id="resText" placeholder="脫敏/加密后的內(nèi)容" readonly="readonly" aria-label="resText" aria-describedby="basic-addon1">
        </div>

        <div class="input-group mb-3">
            <button id="submit" type="button" class="btn btn-primary btn-lg btn-block">提交</button>
        </div>
    </div>
</body>
</html>

1.5.2、javascript代碼

說(shuō)明:CBC模式前、后端需要確定偏移量的值,并且保持一致,這樣才能確保后端解密成功。

<script type="text/javascript">
    const KEY = CryptoJS.enc.Utf8.parse("lucasnetLUCASNET"); //16位
    const IV = CryptoJS.enc.Utf8.parse("lucasnetLUCASNET");
    layui.use(['form'], function () {
        let form = layui.form;
        $("#submit").on("click", function () {
            let sourctText = $("#sourctText").val();
            if (sourctText != "" && sourctText != null) {
                let encryptText = wordEncrypt(sourctText);
                $("#encryptText").val(encryptText);
                login(encryptText);
            } else {
                layui.layer.alert("密碼為空!", { icon: 5, title: "溫馨提示", closeBtn: 0 });
            }
        });

        function login(sourctText) {
            var word_Encrypt = $.ajax({
                url: "/Home/word_Encrypt",//請(qǐng)求后端接口的路徑
                dataType: "JSON",
                type: "POST",
                data: {
                    "ciphertextpwd": sourctText,
                },
                success: function (res) {
                    let resCode = res.code;
                    let resMsg = res.msg;
                    if ((resCode == "210" || resCode == 210) || (resCode == 220 || resCode == "220") || (resCode == 230 || resCode == "230") || (resCode == 240 || resCode == "240") || (resCode == 260 || resCode == "260")) {
                        //返回?cái)?shù)據(jù)后關(guān)閉loading
                        layer.closeAll();
                        // 在 2 秒鐘后取消 AJAX 請(qǐng)求
                        setTimeout(function () {
                            word_Encrypt.abort(); // 刪除 AJAX 請(qǐng)求
                        }, 2000);
                        layui.layer.alert(resMsg, { icon: 5, title: "溫馨提示", closeBtn: 0 });
                    } else if (resCode == 200 || resCode == "200") {
                        $("#resText").val(resMsg);
                        //返回?cái)?shù)據(jù)后關(guān)閉loading
                        layer.closeAll();
                        // 在 2 秒鐘后取消 AJAX 請(qǐng)求
                        setTimeout(function () {
                            word_Encrypt.abort(); // 刪除 AJAX 請(qǐng)求
                        }, 2000);
                    }
                },
                error: function (error) {
                    //返回?cái)?shù)據(jù)后關(guān)閉loading
                    layer.closeAll();
                    // 在 2 秒鐘后取消 AJAX 請(qǐng)求
                    setTimeout(function () {
                        word_Encrypt.abort(); // 刪除 AJAX 請(qǐng)求
                    }, 2000);
                    layui.layer.alert(error, { icon: 5, title: "溫馨提示", closeBtn: 0 });
                }
            });
        }

        /**
         * 前端AES使用CBC加密 key,iv長(zhǎng)度為16位,可相同 自定義即可
         */
        function wordEncrypt(word) {
            let key = KEY;
            let iv = IV;
            let encrypted = "";
            if (typeof word == "string") {
                let srcs = CryptoJS.enc.Utf8.parse(word);
                encrypted = CryptoJS.AES.encrypt(srcs, key, {
                    iv: iv,
                    mode: CryptoJS.mode.CBC,
                    padding: CryptoJS.pad.Pkcs7
                });
            } else if (typeof word == "object") {
                //對(duì)象格式的轉(zhuǎn)成json字符串
                let data = JSON.stringify(word);
                let srcs = CryptoJS.enc.Utf8.parse(data);
                encrypted = CryptoJS.AES.encrypt(srcs, key, {
                    iv: iv,
                    mode: CryptoJS.mode.CBC,
                    padding: CryptoJS.pad.Pkcs7
                });
            }
            return CryptoJS.enc.Base64.stringify(encrypted.ciphertext);
        }
    });
</script>

1.6、.NET 后端代碼

1.6.1、定義公共的密匙字段

/// <summary>
/// //AES加密所需16位密匙
/// </summary>
private static readonly String strAesKey = "lucasnetLUCASNET";

/// <summary>
/// AES加密所需16位密匙向量
/// </summary>
private static readonly String strAesIv = "lucasnetLUCASNET";

1.6.2、封裝AES解密方法

/// <summary>
///  AES 解密
/// </summary>
/// <param name="str">密文(待解密)</param>
/// <returns></returns>
public string AesDecrypt(string str)
{
    if (string.IsNullOrEmpty(str)) return null;
    Byte[] toEncryptArray = Convert.FromBase64String(str);
    using (RijndaelManaged rm = new RijndaelManaged())
    {
        rm.Key = Encoding.UTF8.GetBytes(strAesKey);
        rm.IV = Encoding.UTF8.GetBytes(strAesIv);
        rm.Mode = CipherMode.CBC;
        rm.Padding = PaddingMode.PKCS7;
        rm.FeedbackSize = 128;
        ICryptoTransform encryptor = rm.CreateDecryptor(rm.Key, rm.IV);
        Byte[] resultArray = encryptor.TransformFinalBlock(toEncryptArray, 0, toEncryptArray.Length);
        return Encoding.UTF8.GetString(resultArray);
    }
}

1.6.3、編寫(xiě)API接口

/// <summary>
/// 解密接口
/// </summary>
/// <param name="ciphertextpwd">密碼密文(待解密)</param>
/// <param name="publicKey">公鑰</param>
/// <param name="privateKey">私鑰</param>
/// <returns></returns>
[HttpPost]
public IActionResult word_Encrypt(string ciphertextpwd)
{
    string resPwd = "";
    try
    {
        resPwd = AesDecrypt(ciphertextpwd);
        return Json(new { code = 200, msg = resPwd });
    }
    catch (Exception ex)
    {
        return Json(new { code = 220, msg = "AES解密時(shí)出現(xiàn)錯(cuò)誤?。。? });
    }
}

二、前端使用“JSEncrypt”,進(jìn)行非對(duì)稱RSA加密,.NET后端解密

2.1、加密解密效果圖

前端請(qǐng)求參數(shù)加密、.NET 后端解密

2.2、非對(duì)稱加密

所謂的非對(duì)稱,即加密和解密用的不是同一個(gè)秘鑰。比如用公鑰加密,就要用私鑰解密。非對(duì)稱加密的安全性是要好于對(duì)稱加密的,但是性能就比較差了。

2.3、RSA

非對(duì)稱加密算法中常用的就是 RSA 了。它是由在 MIT 工作的 3 個(gè)人于 1977 年提出,RSA 這個(gè)名字的由來(lái)便是取自他們 3 人的姓氏首字母。我們?cè)谠L問(wèn) github 等遠(yuǎn)程 git 倉(cāng)庫(kù)時(shí),如果是使用 SSH 協(xié)議,需要生成一對(duì)公私秘鑰,就可以使用 RSA 算法。

2.4、準(zhǔn)備工作:安裝“jsencrypt”

2.4.1、使用npm進(jìn)行安裝

npm安裝命令如下:

npm install jsencrypt

2.4.2、Visual Studio中安裝

2.4.2.1、選擇“客戶端庫(kù)”

前端請(qǐng)求參數(shù)加密、.NET 后端解密

2.4.2.2、安裝下載“jsencrypt”

在“添加客戶端庫(kù)”界面:

  1. 提供程序:選擇“unpkg”;
  2. 庫(kù):輸入“jsencrypt@”,進(jìn)行版本的選擇;
  3. 可選擇:1、包括所有庫(kù)文件;2、選擇特定文件;

確認(rèn)無(wú)誤之后,點(diǎn)擊“安裝”即可。
前端請(qǐng)求參數(shù)加密、.NET 后端解密

2.5、安裝組件“BouncyCastle”

在菜單欄找到 工具 —> NuGet 包管理器 —> 管理解決方案的NuGet程序包 —> 瀏覽 —> 搜索 “BouncyCastle” —> 安裝。
前端請(qǐng)求參數(shù)加密、.NET 后端解密

2.5.1、新建幫助類

2.5.1.1、添加C# RAS生成.NET公鑰與私鑰以及.NET公鑰與私鑰轉(zhuǎn)Java公鑰私鑰類“RASKeyConversion”

可根據(jù)自己需求刪除生成Java的文章來(lái)源地址http://www.zghlxwxcb.cn/news/detail-712253.html

using Org.BouncyCastle.Asn1.Pkcs;
using Org.BouncyCastle.Asn1.X509;
using Org.BouncyCastle.Crypto;
using Org.BouncyCastle.Crypto.Parameters;
using Org.BouncyCastle.Math;
using Org.BouncyCastle.OpenSsl;
using Org.BouncyCastle.Pkcs;
using Org.BouncyCastle.Security;
using Org.BouncyCastle.X509;
using System;
using System.Security.Cryptography;
using System.Xml;

namespace WebApplication1
{
    /// <summary>
    /// C# RAS生成.NET公鑰與私鑰以及.NET公鑰與私鑰轉(zhuǎn)Java公鑰私鑰類
    /// </summary>
    public class RASKeyConversion
    {
        /// <summary>
        /// 第一個(gè):C# 私鑰;第二個(gè):C# 公鑰;第三個(gè):JAVA私鑰;第四個(gè):JAVA公鑰
        /// </summary>
        private static string[] sKeys = new String[4];

        /// <summary>
        /// 生成公鑰與私鑰方法
        /// </summary>
        /// <returns>第一個(gè):C# 私鑰;第二個(gè):C# 公鑰;第三個(gè):JAVA私鑰;第四個(gè):JAVA公鑰</returns>
        public static string[] createPulbicKey(int size = 1024)
        {
            try
            {
                //密鑰格式要生成pkcs#1格式的  而不是pkcs#8格式的
                using (RSACryptoServiceProvider rsa = new RSACryptoServiceProvider(size))
                {
                    //C# 私鑰
                    sKeys[0] = rsa.ToXmlString(true);
                    //C# 公鑰
                    sKeys[1] = rsa.ToXmlString(false);
                    //JAVA私鑰
                    sKeys[2] = RSAPrivateKeyDotNet2Java(sKeys[0]);
                    //JAVA公鑰
                    sKeys[3] = RSAPublicKeyDotNet2Java(sKeys[1]);
                    return sKeys;
                }
            }
            catch (Exception)
            {
                return null;
            }
        }

        /// <summary>    
        /// RSA私鑰格式轉(zhuǎn)換,.net->java    
        /// </summary>    
        /// <param name="privateKey">.net生成的私鑰</param>    
        /// <returns></returns>    
        public static string RSAPrivateKeyDotNet2Java(string privateKey)
        {
            XmlDocument doc = new XmlDocument();
            doc.LoadXml(privateKey);
            BigInteger m = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("Modulus")[0].InnerText));
            BigInteger exp = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("Exponent")[0].InnerText));
            BigInteger d = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("D")[0].InnerText));
            BigInteger p = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("P")[0].InnerText));
            BigInteger q = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("Q")[0].InnerText));
            BigInteger dp = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("DP")[0].InnerText));
            BigInteger dq = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("DQ")[0].InnerText));
            BigInteger qinv = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("InverseQ")[0].InnerText));
            RsaPrivateCrtKeyParameters privateKeyParam = new RsaPrivateCrtKeyParameters(m, exp, d, p, q, dp, dq, qinv);

            PrivateKeyInfo privateKeyInfo = PrivateKeyInfoFactory.CreatePrivateKeyInfo(privateKeyParam);
            byte[] serializedPrivateBytes = privateKeyInfo.ToAsn1Object().GetEncoded();
            return Convert.ToBase64String(serializedPrivateBytes);
        }

        /// <summary>    
        /// RSA公鑰格式轉(zhuǎn)換,.net->java    
        /// </summary>    
        /// <param name="publicKey">.net生成的公鑰</param>    
        /// <returns></returns>    
        public static string RSAPublicKeyDotNet2Java(string publicKey)
        {
            XmlDocument doc = new XmlDocument();
            doc.LoadXml(publicKey);
            BigInteger m = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("Modulus")[0].InnerText));
            BigInteger p = new BigInteger(1, Convert.FromBase64String(doc.DocumentElement.GetElementsByTagName("Exponent")[0].InnerText));
            RsaKeyParameters pub = new RsaKeyParameters(false, m, p);

            SubjectPublicKeyInfo publicKeyInfo = SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(pub);
            byte[] serializedPublicBytes = publicKeyInfo.ToAsn1Object().GetDerEncoded();
            return Convert.ToBase64String(serializedPublicBytes);
        }
    }
}

2.5.1.2、添加RSA秘鑰轉(zhuǎn)換幫助類“RsaKeyConvert”

using Org.BouncyCastle.Crypto.Parameters;
using Org.BouncyCastle.Crypto;
using Org.BouncyCastle.Pkcs;
using Org.BouncyCastle.Security;
using System.Xml.Linq;
using Org.BouncyCastle.OpenSsl;
using Org.BouncyCastle.Math;

namespace WebApplication1 //命名空間依據(jù)自己的項(xiàng)目進(jìn)行修改
{
    /// <summary>
    /// RSA秘鑰轉(zhuǎn)換幫助類
    /// </summary>
    public class RsaKeyConvert
    {

        #region 其他格式的RSA秘鑰轉(zhuǎn)XML格式秘鑰

        /// <summary>
        /// pem格式的RSA公鑰字符串轉(zhuǎn)XML格式公鑰 Public Key Convert pem->xml
        /// </summary>
        /// <param name="publicKey">公鑰字符串</param>
        /// <returns></returns>
        /// <exception cref="Exception"></exception>
        public static string PublicKeyPemToXml(string publicKey)
        {
            publicKey = PublicKeyFormat(publicKey);
            RsaKeyParameters rsaKeyParameters = new PemReader(new StringReader(publicKey)).ReadObject() as RsaKeyParameters;
            if (rsaKeyParameters == null)
            {
                throw new Exception("Public key format is incorrect");
            }

            XElement xElement = new XElement((XName?)"RSAKeyValue");
            XElement content = new XElement((XName?)"Modulus", Convert.ToBase64String(rsaKeyParameters.Modulus.ToByteArrayUnsigned()));
            XElement content2 = new XElement((XName?)"Exponent", Convert.ToBase64String(rsaKeyParameters.Exponent.ToByteArrayUnsigned()));
            xElement.Add(content);
            xElement.Add(content2);
            return xElement.ToString();
        }

        /// <summary>
        /// Pkcs1格式私鑰轉(zhuǎn)成Xml Pkcs1->xml
        /// </summary>
        /// <param name="privateKey">Pkcs1格式私鑰字符串</param>
        /// <returns></returns>
        /// <exception cref="Exception"></exception>
        public static string PrivateKeyPkcs1ToXml(string privateKey)
        {
            privateKey = Pkcs1PrivateKeyFormat(privateKey);
            RsaPrivateCrtKeyParameters rsaPrivateCrtKeyParameters = (RsaPrivateCrtKeyParameters)PrivateKeyFactory.CreateKey(PrivateKeyInfoFactory.CreatePrivateKeyInfo(((new PemReader(new StringReader(privateKey)).ReadObject() as AsymmetricCipherKeyPair) ?? throw new Exception("Private key format is incorrect")).Private));
            XElement xElement = new XElement((XName?)"RSAKeyValue");
            XElement content = new XElement((XName?)"Modulus", Convert.ToBase64String(rsaPrivateCrtKeyParameters.Modulus.ToByteArrayUnsigned()));
            XElement content2 = new XElement((XName?)"Exponent", Convert.ToBase64String(rsaPrivateCrtKeyParameters.PublicExponent.ToByteArrayUnsigned()));
            XElement content3 = new XElement((XName?)"P", Convert.ToBase64String(rsaPrivateCrtKeyParameters.P.ToByteArrayUnsigned()));
            XElement content4 = new XElement((XName?)"Q", Convert.ToBase64String(rsaPrivateCrtKeyParameters.Q.ToByteArrayUnsigned()));
            XElement content5 = new XElement((XName?)"DP", Convert.ToBase64String(rsaPrivateCrtKeyParameters.DP.ToByteArrayUnsigned()));
            XElement content6 = new XElement((XName?)"DQ", Convert.ToBase64String(rsaPrivateCrtKeyParameters.DQ.ToByteArrayUnsigned()));
            XElement content7 = new XElement((XName?)"InverseQ", Convert.ToBase64String(rsaPrivateCrtKeyParameters.QInv.ToByteArrayUnsigned()));
            XElement content8 = new XElement((XName?)"D", Convert.ToBase64String(rsaPrivateCrtKeyParameters.Exponent.ToByteArrayUnsigned()));
            xElement.Add(content);
            xElement.Add(content2);
            xElement.Add(content3);
            xElement.Add(content4);
            xElement.Add(content5);
            xElement.Add(content6);
            xElement.Add(content7);
            xElement.Add(content8);
            return xElement.ToString();
        }

        /// <summary>
        /// 格式化公鑰字符串
        /// </summary>
        /// <param name="str">公鑰字符串</param>
        /// <returns></returns>
        public static string PublicKeyFormat(string str)
        {
            if (str.StartsWith("-----BEGIN PUBLIC KEY-----"))
            {
                return str;
            }

            List<string> list = new List<string>();
            list.Add("-----BEGIN PUBLIC KEY-----");
            int num;
            for (int i = 0; i < str.Length; i += num)
            {
                num = ((str.Length - i < 64) ? (str.Length - i) : 64);
                list.Add(str.Substring(i, num));
            }

            list.Add("-----END PUBLIC KEY-----");
            return string.Join(Environment.NewLine, list);
        }

        /// <summary>
        /// 格式化Pkcs1私鑰
        /// </summary>
        /// <param name="str">私鑰字符串</param>
        /// <returns></returns>
        public static string Pkcs1PrivateKeyFormat(string str)
        {
            if (str.StartsWith("-----BEGIN RSA PRIVATE KEY-----"))
            {
                return str;
            }

            List<string> list = new List<string>();
            list.Add("-----BEGIN RSA PRIVATE KEY-----");
            int num;
            for (int i = 0; i < str.Length; i += num)
            {
                num = ((str.Length - i < 64) ? (str.Length - i) : 64);
                list.Add(str.Substring(i, num));
            }

            list.Add("-----END RSA PRIVATE KEY-----");
            return string.Join(Environment.NewLine, list);
        }

        #endregion

        #region Xml格式的RSA秘鑰轉(zhuǎn)格式

        /// <summary>
        /// RSA公鑰格式轉(zhuǎn)換:Xml格式的公鑰轉(zhuǎn)Pem格式的公鑰 xml->pem
        /// </summary>
        /// <param name="publicKey">Xml公鑰字符串</param>
        /// <returns></returns>
        public static string PublicKeyXmlToPem(string publicKey)
        {
            XElement xElement = XElement.Parse(publicKey);
            XElement xElement2 = xElement.Element((XName?)"Modulus");
            XElement xElement3 = xElement.Element((XName?)"Exponent");
            RsaKeyParameters obj = new RsaKeyParameters(isPrivate: false, new BigInteger(1, Convert.FromBase64String(xElement2.Value)), new BigInteger(1, Convert.FromBase64String(xElement3.Value)));
            StringWriter stringWriter = new StringWriter();
            PemWriter pemWriter = new PemWriter(stringWriter);
            pemWriter.WriteObject(obj);
            pemWriter.Writer.Close();
            return stringWriter.ToString();
        }

        /// <summary>
        /// RSA私鑰格式轉(zhuǎn)換:Xml格式的私鑰轉(zhuǎn)Pkcs1格式的私鑰 xml->Pkcs1
        /// </summary>
        /// <param name="privateKey">Xml私鑰字符串</param>
        /// <returns></returns>
        public static string PrivateKeyXmlToPkcs1(string privateKey)
        {
            XElement xElement = XElement.Parse(privateKey);
            XElement xElement2 = xElement.Element((XName?)"Modulus");
            XElement xElement3 = xElement.Element((XName?)"Exponent");
            XElement xElement4 = xElement.Element((XName?)"P");
            XElement xElement5 = xElement.Element((XName?)"Q");
            XElement xElement6 = xElement.Element((XName?)"DP");
            XElement xElement7 = xElement.Element((XName?)"DQ");
            XElement xElement8 = xElement.Element((XName?)"InverseQ");
            XElement xElement9 = xElement.Element((XName?)"D");
            RsaPrivateCrtKeyParameters obj = new RsaPrivateCrtKeyParameters(new BigInteger(1, Convert.FromBase64String(xElement2.Value)), new BigInteger(1, Convert.FromBase64String(xElement3.Value)), new BigInteger(1, Convert.FromBase64String(xElement9.Value)), new BigInteger(1, Convert.FromBase64String(xElement4.Value)), new BigInteger(1, Convert.FromBase64String(xElement5.Value)), new BigInteger(1, Convert.FromBase64String(xElement6.Value)), new BigInteger(1, Convert.FromBase64String(xElement7.Value)), new BigInteger(1, Convert.FromBase64String(xElement8.Value)));
            StringWriter stringWriter = new StringWriter();
            PemWriter pemWriter = new PemWriter(stringWriter);
            pemWriter.WriteObject(obj);
            pemWriter.Writer.Close();
            return stringWriter.ToString();
        }

        #endregion

    }
}

2.5.1.3、添加RSA加密幫助類“RSACrypto”

using System;
using System.Collections.Generic;
using System.IO;
using System.Linq;
using System.Security.Cryptography;
using System.Security.Cryptography.X509Certificates;
using System.Text;
using System.Threading.Tasks;

namespace WebApplication1 //命名空間依據(jù)自己的項(xiàng)目進(jìn)行修改
{
    /// <summary>
    /// RSA加密幫助類
    /// </summary>
    public class RSACrypto
    {
        /// <summary>
        /// 默認(rèn)的私鑰
        /// </summary>
        private const string defaultprivateKey = @"MIICXAIBAAKBgQCC0hrRIjb3noDWNtbDpANbjt5Iwu2NFeDwU16Ec87ToqeoIm2KI+cOs81JP9aTDk/jkAlU97mN8wZkEMDr5utAZtMVht7GLX33Wx9XjqxUsDfsGkqNL8dXJklWDu9Zh80Ui2Ug+340d5dZtKtd+nv09QZqGjdnSp9PTfFDBY133QIDAQABAoGAJBNTOITaP6LCyKVKyEdnHaKNAz0DS+V9UwjKhyAgfcAxwm3sDdd6FQCEW0TIJA7Np7rFYrGwcR1UOoKxkNxB10ACl6JX4rE7xKS6NLZumdwxON/KgDb+2SQtWEXDgBySZ7Znv/FhEp1RmoBDjZ05E99kILWO3ToorUM0Eq2GHQkCQQCnUMXgZa4HS0tu
INzysgB37d7ene9+CIARyJphs079qao2UWCgXqen43Ob6GJUgulz7We+4JOZFld0TfEi1E5rAkEAyClQAVzafLO3gXgqH7tbRbPPx788+4opxT9QBo2Trzl6/3FlcC1PIZeqbQ/Oc2wT7jmidFnpyTEnM2p7Yq3U1wJBAILTWaX4W3dAnJ5j+9+Y51zfFiEjhRwbMWi2XmB+gAlAHOOUBeXfnWBdLQx/TEOgiUIoI7LQjxhoq8E5II+HSjkCQDlKSdH6B7dFoTJ3eGcYsykiLEiZ3hSJGSeR1Y/qmei/ZQsUI9qVvV56EJeivI6g0puO94ah7Z5eaT/4LFS0OIUCQDgLn586pGgeidLhQsIe/AR3y9YOCAygTFLxzmeBXOKtM90q4516KWlTtK2u99442mNi7hNmjryBVwk62foWo8w=";

        /// <summary>
        /// 默認(rèn)公鑰
        /// </summary>
        private const string defaultpublicKey = @"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCC0hrRIjb3noDWNtbDpANbjt5Iwu2NFeDwU16Ec87ToqeoIm2KI+cOs81JP9aTDk/jkAlU97mN8wZkEMDr5utAZtMVht7GLX33Wx9XjqxUsDfsGkqNL8dXJklWDu9Zh80Ui2Ug+340d5dZtKtd+nv09QZqGjdnSp9PTfFDBY133QIDAQAB";

        private RSACryptoServiceProvider _privateKeyRsaProvider;
        private RSACryptoServiceProvider _publicKeyRsaProvider;

        /// <summary>
        /// RSA加密幫助類構(gòu)造函數(shù)
        /// </summary>
        /// <param name="privateKey">RSA解密密匙</param>
        /// <param name="publicKey">RSA加密密匙</param>
        public RSACrypto(string privateKey = "", string publicKey = "")
        {
            //判斷私鑰密匙是否為空,為空,使用默認(rèn)的私鑰;
            if (string.IsNullOrEmpty(privateKey))
            {
                privateKey = defaultprivateKey;
            }
            //判斷公鑰密匙是否為空,為空,使用默認(rèn)的公鑰;
            if (string.IsNullOrEmpty(publicKey))
            {
                publicKey = defaultpublicKey;
            }
            //不為空:使用定義的私鑰密匙創(chuàng)建
            if (!string.IsNullOrEmpty(privateKey))
            {
                _privateKeyRsaProvider = CreateRsaProviderFromPrivateKey(privateKey);
            }
            //不為空:使用定義的公鑰密匙創(chuàng)建
            if (!string.IsNullOrEmpty(publicKey))
            {
                _publicKeyRsaProvider = CreateRsaProviderFromPublicKey(publicKey);
            }
        }

        public string GetPublicRsaKeyStr(string publicKey)
        {
            string keyStr = "";
            CreateRsaProviderFromPublicKey(publicKey);
            return keyStr;
        }

        /// <summary>
        /// RSA解密
        /// </summary>
        /// <param name="cipherText">解密的密文字符串</param>
        /// <returns></returns>
        /// <exception cref="Exception"></exception>
        public string RSADecrypt(string cipherText)
        {
            if (_privateKeyRsaProvider == null)
            {
                throw new Exception("提供的RSA私鑰為空");
            }
            if (string.IsNullOrEmpty(cipherText))
            {
                return "";
            }
            return Encoding.UTF8.GetString(_privateKeyRsaProvider.Decrypt(System.Convert.FromBase64String(cipherText), false));
        }

        /// <summary>
        /// RSA解密
        /// </summary>
        /// <param name="cipherText">需要解密的密文字符串</param>
        /// <param name="publicKeyString">私鑰</param>
        /// <param name="keyType">密鑰類型XML/PEM</param>
        /// <returns></returns>
        public static string RSADecrypt(string cipherText, string privateKeyString, string keyType, int size = 1024)
        {
            RSACryptoServiceProvider rsa = new RSACryptoServiceProvider(size);
            switch (keyType)
            {
                case "XML":
                    rsa.FromXmlString(privateKeyString);
                    break;
                case "PEM":
                    break;
                default:
                    throw new Exception("不支持的密鑰類型");
            }
            int MaxBlockSize = rsa.KeySize / 8;    //解密塊最大長(zhǎng)度限制
            //正常解密
            if (cipherText.Length <= MaxBlockSize)
            {
                byte[] hashvalueDcy = rsa.Decrypt(System.Convert.FromBase64String(cipherText), false);//解密
                return Encoding.GetEncoding("UTF-8").GetString(hashvalueDcy);
            }
            //分段解密
            else
            {
                using (MemoryStream CrypStream = new MemoryStream(System.Convert.FromBase64String(cipherText)))
                {
                    using (MemoryStream PlaiStream = new MemoryStream())
                    {
                        Byte[] Buffer = new Byte[MaxBlockSize];
                        int BlockSize = CrypStream.Read(Buffer, 0, MaxBlockSize);

                        while (BlockSize > 0)
                        {
                            Byte[] ToDecrypt = new Byte[BlockSize];
                            Array.Copy(Buffer, 0, ToDecrypt, 0, BlockSize);

                            Byte[] Plaintext = rsa.Decrypt(ToDecrypt, false);
                            PlaiStream.Write(Plaintext, 0, Plaintext.Length);
                            BlockSize = CrypStream.Read(Buffer, 0, MaxBlockSize);
                        }
                        string output = Encoding.GetEncoding("UTF-8").GetString(PlaiStream.ToArray());
                        return output;
                    }
                }
            }
        }

        /// <summary>
        /// RSA加密
        /// </summary>
        /// <param name="text">需要進(jìn)行加密的明文字符串</param>
        /// <returns></returns>
        /// <exception cref="Exception"></exception>
        public string RSAEncrypt(string text)
        {
            if (_publicKeyRsaProvider == null)
            {
                throw new Exception("提供的RSA公鑰為空");
            }
            return Convert.ToBase64String(_publicKeyRsaProvider.Encrypt(Encoding.UTF8.GetBytes(text), false));
        }

        /// <summary>
        /// RSA加密
        /// </summary>
        /// <param name="clearText">需要加密的明文字符串</param>
        /// <param name="publicKeyString">公鑰</param>
        /// <param name="keyType">密鑰類型XML/PEM</param>
        /// <returns></returns>
        public static string RSAEncrypt(string clearText, string publicKeyString, string keyType, int size = 1024)
        {
            byte[] data = Encoding.GetEncoding("UTF-8").GetBytes(clearText);
            RSACryptoServiceProvider rsa = new RSACryptoServiceProvider(size);
            switch (keyType)
            {
                case "XML":
                    rsa.FromXmlString(publicKeyString);
                    break;
                case "PEM":
                    break;
                default:
                    throw new Exception("不支持的密鑰類型");
            }
            //加密塊最大長(zhǎng)度限制,如果加密數(shù)據(jù)的長(zhǎng)度超過(guò) 秘鑰長(zhǎng)度/8-11,會(huì)引發(fā)長(zhǎng)度不正確的異常,所以進(jìn)行數(shù)據(jù)的分塊加密
            int MaxBlockSize = rsa.KeySize / 8 - 11;
            //正常長(zhǎng)度
            if (data.Length <= MaxBlockSize)
            {
                byte[] hashvalueEcy = rsa.Encrypt(data, false); //加密
                return System.Convert.ToBase64String(hashvalueEcy);
            }
            //長(zhǎng)度超過(guò)正常值
            else
            {
                using (MemoryStream PlaiStream = new MemoryStream(data))
                using (MemoryStream CrypStream = new MemoryStream())
                {
                    Byte[] Buffer = new Byte[MaxBlockSize];
                    int BlockSize = PlaiStream.Read(Buffer, 0, MaxBlockSize);
                    while (BlockSize > 0)
                    {
                        Byte[] ToEncrypt = new Byte[BlockSize];
                        Array.Copy(Buffer, 0, ToEncrypt, 0, BlockSize);

                        Byte[] Cryptograph = rsa.Encrypt(ToEncrypt, false);
                        CrypStream.Write(Cryptograph, 0, Cryptograph.Length);
                        BlockSize = PlaiStream.Read(Buffer, 0, MaxBlockSize);
                    }
                    return System.Convert.ToBase64String(CrypStream.ToArray(), Base64FormattingOptions.None);
                }
            }
        }

        /// <summary>
        /// 通過(guò)提供的RSA私鑰來(lái)創(chuàng)建RSA
        /// </summary>
        /// <param name="privateKey">私鑰字符串</param>
        /// <returns></returns>
        /// <exception cref="Exception"></exception>
        private RSACryptoServiceProvider CreateRsaProviderFromPrivateKey(string privateKey)
        {
            byte[] privateKeyBits = System.Convert.FromBase64String(privateKey);
            RSACryptoServiceProvider RSA = new RSACryptoServiceProvider();
            RSAParameters RSAparams = new RSAParameters();
            using (BinaryReader binr = new BinaryReader(new MemoryStream(privateKeyBits)))
            {
                byte bt = 0;
                ushort twobytes = 0;
                twobytes = binr.ReadUInt16();
                if (twobytes == 0x8130)
                {
                    binr.ReadByte();
                }
                else if (twobytes == 0x8230)
                {
                    binr.ReadInt16();
                }
                else
                {
                    throw new Exception("Unexpected value read binr.ReadUInt16()");
                }
                twobytes = binr.ReadUInt16();
                if (twobytes != 0x0102)
                {
                    throw new Exception("Unexpected version");
                }
                bt = binr.ReadByte();
                if (bt != 0x00)
                {
                    throw new Exception("Unexpected value read binr.ReadByte()");
                }
                RSAparams.Modulus = binr.ReadBytes(GetIntegerSize(binr));
                RSAparams.Exponent = binr.ReadBytes(GetIntegerSize(binr));
                RSAparams.D = binr.ReadBytes(GetIntegerSize(binr));
                RSAparams.P = binr.ReadBytes(GetIntegerSize(binr));
                RSAparams.Q = binr.ReadBytes(GetIntegerSize(binr));
                RSAparams.DP = binr.ReadBytes(GetIntegerSize(binr));
                RSAparams.DQ = binr.ReadBytes(GetIntegerSize(binr));
                RSAparams.InverseQ = binr.ReadBytes(GetIntegerSize(binr));
            }
            RSA.ImportParameters(RSAparams);
            return RSA;
        }

        /// <summary>
        /// 獲取整數(shù)大小
        /// </summary>
        /// <param name="binr"></param>
        /// <returns></returns>
        private int GetIntegerSize(BinaryReader binr)
        {
            byte bt = 0;
            byte lowbyte = 0x00;
            byte highbyte = 0x00;
            int count = 0;
            bt = binr.ReadByte();
            if (bt != 0x02)
                return 0;
            bt = binr.ReadByte();

            if (bt == 0x81)
                count = binr.ReadByte();
            else
                if (bt == 0x82)
            {
                highbyte = binr.ReadByte();
                lowbyte = binr.ReadByte();
                byte[] modint = { lowbyte, highbyte, 0x00, 0x00 };
                count = BitConverter.ToInt32(modint, 0);
            }
            else
            {
                count = bt;
            }

            while (binr.ReadByte() == 0x00)
            {
                count -= 1;
            }
            binr.BaseStream.Seek(-1, SeekOrigin.Current);
            return count;
        }

        /// <summary>
        /// 通過(guò)提供的RSA公鑰來(lái)創(chuàng)建RSA
        /// </summary>
        /// <param name="publicKeyString">公鑰字符串</param>
        /// <returns></returns>
        private RSACryptoServiceProvider CreateRsaProviderFromPublicKey(string publicKeyString)
        {
            // encoded OID sequence for  PKCS #1 rsaEncryption szOID_RSA_RSA = "1.2.840.113549.1.1.1"
            byte[] SeqOID = { 0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01, 0x05, 0x00 };
            byte[] x509key;
            byte[] seq = new byte[15];
            int x509size;

            x509key = Convert.FromBase64String(publicKeyString);
            x509size = x509key.Length;

            // ---------  Set up stream to read the asn.1 encoded SubjectPublicKeyInfo blob  ------
            using (MemoryStream mem = new MemoryStream(x509key))
            {
                using (BinaryReader binr = new BinaryReader(mem))  //wrap Memory Stream with BinaryReader for easy reading
                {
                    byte bt = 0;
                    ushort twobytes = 0;

                    twobytes = binr.ReadUInt16();
                    if (twobytes == 0x8130) //data read as little endian order (actual data order for Sequence is 30 81)
                        binr.ReadByte();    //advance 1 byte
                    else if (twobytes == 0x8230)
                        binr.ReadInt16();   //advance 2 bytes
                    else
                        return null;

                    seq = binr.ReadBytes(15);       //read the Sequence OID
                    if (!CompareBytearrays(seq, SeqOID))    //make sure Sequence for OID is correct
                        return null;

                    twobytes = binr.ReadUInt16();
                    if (twobytes == 0x8103) //data read as little endian order (actual data order for Bit String is 03 81)
                        binr.ReadByte();    //advance 1 byte
                    else if (twobytes == 0x8203)
                        binr.ReadInt16();   //advance 2 bytes
                    else
                        return null;

                    bt = binr.ReadByte();
                    if (bt != 0x00)     //expect null byte next
                        return null;

                    twobytes = binr.ReadUInt16();
                    if (twobytes == 0x8130) //data read as little endian order (actual data order for Sequence is 30 81)
                        binr.ReadByte();    //advance 1 byte
                    else if (twobytes == 0x8230)
                        binr.ReadInt16();   //advance 2 bytes
                    else
                        return null;

                    twobytes = binr.ReadUInt16();
                    byte lowbyte = 0x00;
                    byte highbyte = 0x00;

                    if (twobytes == 0x8102) //data read as little endian order (actual data order for Integer is 02 81)
                        lowbyte = binr.ReadByte();  // read next bytes which is bytes in modulus
                    else if (twobytes == 0x8202)
                    {
                        highbyte = binr.ReadByte(); //advance 2 bytes
                        lowbyte = binr.ReadByte();
                    }
                    else
                        return null;
                    byte[] modint = { lowbyte, highbyte, 0x00, 0x00 };   //reverse byte order since asn.1 key uses big endian order
                    int modsize = BitConverter.ToInt32(modint, 0);

                    int firstbyte = binr.PeekChar();
                    if (firstbyte == 0x00)
                    {   //if first byte (highest order) of modulus is zero, don't include it
                        binr.ReadByte();    //skip this null byte
                        modsize -= 1;   //reduce modulus buffer size by 1
                    }

                    byte[] modulus = binr.ReadBytes(modsize);   //讀取模量字節(jié)

                    if (binr.ReadByte() != 0x02)            //期望指數(shù)數(shù)據(jù)為Integer
                        return null;
                    int expbytes = (int)binr.ReadByte();        // should only need one byte for actual exponent data (for all useful values)
                    byte[] exponent = binr.ReadBytes(expbytes);

                    // ------- create RSACryptoServiceProvider instance and initialize with public key -----
                    RSACryptoServiceProvider RSA = new RSACryptoServiceProvider();
                    RSAParameters RSAKeyInfo = new RSAParameters();
                    RSAKeyInfo.Modulus = modulus;
                    RSAKeyInfo.Exponent = exponent;
                    RSA.ImportParameters(RSAKeyInfo);
                    return RSA;
                }
            }
        }

        /// <summary>
        /// 比較字節(jié)數(shù)組
        /// </summary>
        /// <param name="a"></param>
        /// <param name="b"></param>
        /// <returns></returns>
        private bool CompareBytearrays(byte[] a, byte[] b)
        {
            if (a.Length != b.Length)
            {
                return false;
            }
            int i = 0;
            foreach (byte c in a)
            {
                if (c != b[i])
                {
                    return false;
                }
                i++;
            }
            return true;
        }

    }
}

2.6、.NET 控制器后端代碼

2.6.1、視圖控制圖代碼

public IActionResult worddata()
{
    var dataStr = RASKeyConversion.createPulbicKey();
    publicKey = RsaKeyConvert1.PublicKeyXmlToPem(dataStr[1]);
    privateKey = RsaKeyConvert1.PrivateKeyXmlToPkcs1(dataStr[0]);
    ViewBag.publicKey = publicKey;
    ViewBag.privateKey = privateKey;
    return View();
}

2.6.2、POST請(qǐng)求接口代碼

/// <summary>
/// 解密接口
/// </summary>
/// <param name="pwd"></param>
/// <param name="privateKey">私鑰</param>
/// <returns></returns>
[HttpPost]
public IActionResult wordEncrypt(string pwd, string privateKey)
{
    string resPwd = "";
    try
    {
        string privateStr= RsaKeyConvert1.PrivateKeyPkcs1ToXml(privateKey);
        resPwd = RSACrypto.RSADecrypt(pwd,privateStr,"XML");
        return Json(new { code = 200, msg = resPwd });
    }
    catch (Exception ex)
    {
        return Json(new { code = 220, msg = "RSA解密時(shí)出現(xiàn)錯(cuò)誤?。?!" });
    }
}

2.7、前端視圖頁(yè)面代碼

2.7.1、Html代碼

@{
    Layout = null;
}

<!DOCTYPE html>

<html>
<head>
    <meta name="viewport" content="width=device-width" />
    <title>sometext</title>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
    <script src="/lib/jquery/dist/jquery.js"></script>
    <script src="/lib/layui/dist/layui.js"></script>
    <script src="/lib/jsencrypt/bin/jsencrypt.js"></script>
    <script src="/lib/bootstrap/dist/js/bootstrap.js"></script>
    <link href="/lib/layui/dist/css/layui.css" rel="stylesheet" />
    <link href="/lib/bootstrap/dist/css/bootstrap.css" rel="stylesheet" />
    <style type="text/css"></style>
</head>
<body>
    <div class="wrapper">
        <div class="input-group mb-3">
            <div class="input-group-prepend">
                <span class="input-group-text" id="basic-addon1">脫敏/加密前的內(nèi)容:</span>
            </div>
            <input type="password" class="form-control" id="sourctText" placeholder="脫敏/加密前的內(nèi)容" aria-label="sourctText" aria-describedby="basic-addon1">
        </div>
        <br />
        <div class="input-group mb-3">
            <div class="input-group-prepend">
                <span class="input-group-text" id="basic-addon1">加密后的內(nèi)容:</span>
            </div>
            <input type="text" class="form-control" id="encryptText" placeholder="加密后的內(nèi)容" readonly="readonly" aria-label="encryptText" aria-describedby="basic-addon1">
        </div>
        <input type="hidden" value="@ViewBag.publicKey" id="publicKey" readonly="readonly" />
        <input type="hidden" value="@ViewBag.privateKey" id="privateKey" readonly="readonly" />
        <br />
        <div class="input-group mb-3">
            <div class="input-group-prepend">
                <span class="input-group-text" id="basic-addon1">脫敏/加密后的內(nèi)容:</span>
            </div>
            <input type="text" class="form-control" id="resText" placeholder="脫敏/加密后的內(nèi)容" readonly="readonly" aria-label="resText" aria-describedby="basic-addon1">
        </div>

        <div class="input-group mb-3">
            <button id="submit" type="button" class="btn btn-primary btn-lg btn-block">提交</button>
        </div>
    </div>
</body>
</html>

2.7.2、javascript代碼

<script type="text/javascript">
    const encryptor = new JSEncrypt()
    layui.use(['form'], function () {
        let form = layui.form;

        $("#submit").on("click", function () {
            let publicKey = $("#publicKey").val();
            let privateKey = $("#privateKey").val();
            let sourctText = $("#sourctText").val();
            if (sourctText != "" && sourctText != null) {
                encryptor.setPublicKey(publicKey) // 設(shè)置公鑰
                let cipherText = encryptor.encrypt(sourctText);
                $("#encryptText").val(cipherText);
                login(cipherText, publicKey, privateKey);
            } else {
                layui.layer.alert("密碼為空!", { icon: 5, title: "溫馨提示", closeBtn: 0 });
            }
        });

        function login(sourctText, publicKey, privateKey) {
            var wordEncrypt= $.ajax({
                url: "/Home/wordEncrypt",//請(qǐng)求后端接口的路徑
                dataType: "JSON",
                type: "POST",
                data: {
                    "pwd": sourctText,
                    //"publicKey": publicKey,
                    "privateKey": privateKey
                },
                success: function (res) {
                    let resCode = res.code;
                    let resMsg = res.msg;
                    if ((resCode == "210" || resCode == 210) || (resCode == 220 || resCode == "220") || (resCode == 230 || resCode == "230") || (resCode == 240 || resCode == "240") || (resCode == 260 || resCode == "260")) {
                        //返回?cái)?shù)據(jù)后關(guān)閉loading
                        layer.closeAll();
                        // 在 2 秒鐘后取消 AJAX 請(qǐng)求
                        setTimeout(function () {
                            wordEncrypt.abort(); // 刪除 AJAX 請(qǐng)求
                        }, 2000);
                        layui.layer.alert(resMsg, { icon: 5, title: "溫馨提示", closeBtn: 0 });
                    } else if (resCode == 200 || resCode == "200") {
                        $("#resText").val(resMsg);
                        //返回?cái)?shù)據(jù)后關(guān)閉loading
                        layer.closeAll();
                        // 在 2 秒鐘后取消 AJAX 請(qǐng)求
                        setTimeout(function () {
                            wordEncrypt.abort(); // 刪除 AJAX 請(qǐng)求
                        }, 2000);
                    }
                },
                error: function (error) {
                    //返回?cái)?shù)據(jù)后關(guān)閉loading
                    layer.closeAll();
                    // 在 2 秒鐘后取消 AJAX 請(qǐng)求
                    setTimeout(function () {
                        wordEncrypt.abort(); // 刪除 AJAX 請(qǐng)求
                    }, 2000);
                    layui.layer.alert(error, { icon: 5, title: "溫馨提示", closeBtn: 0 });
                }
            });
        }
    });
</script>

到了這里,關(guān)于前端請(qǐng)求參數(shù)加密、.NET 后端解密的文章就介紹完了。如果您還想了解更多內(nèi)容,請(qǐng)?jiān)谟疑辖撬阉鱐OY模板網(wǎng)以前的文章或繼續(xù)瀏覽下面的相關(guān)文章,希望大家以后多多支持TOY模板網(wǎng)!

本文來(lái)自互聯(lián)網(wǎng)用戶投稿,該文觀點(diǎn)僅代表作者本人,不代表本站立場(chǎng)。本站僅提供信息存儲(chǔ)空間服務(wù),不擁有所有權(quán),不承擔(dān)相關(guān)法律責(zé)任。如若轉(zhuǎn)載,請(qǐng)注明出處: 如若內(nèi)容造成侵權(quán)/違法違規(guī)/事實(shí)不符,請(qǐng)點(diǎn)擊違法舉報(bào)進(jìn)行投訴反饋,一經(jīng)查實(shí),立即刪除!

領(lǐng)支付寶紅包贊助服務(wù)器費(fèi)用

相關(guān)文章

  • AES對(duì)稱加密實(shí)戰(zhàn)——前端js加密后端python解密

    AES對(duì)稱加密實(shí)戰(zhàn)——前端js加密后端python解密

    高級(jí)加密標(biāo)準(zhǔn)(AES, Advanced Encryption Standard),是一種最常見(jiàn)的對(duì)稱加密算法 。其加密流程如下圖所示,發(fā)送方通過(guò)密鑰對(duì)明文加密后進(jìn)行網(wǎng)絡(luò)傳輸,接收方用同樣的密鑰將密文解密。在前后端通訊場(chǎng)景中,可利用AES算法對(duì)用戶密碼進(jìn)行加密后傳輸,防止被抓包而造成密碼泄露。

    2024年02月04日
    瀏覽(25)
  • 前端AES加密,后端解密,有效防止數(shù)據(jù)外泄

    前端AES加密,后端解密,有效防止數(shù)據(jù)外泄

    在工作中經(jīng)常遇到密碼明文傳輸這個(gè)問(wèn)題,為了讓密碼安全些會(huì)讓加密,現(xiàn)在有個(gè)比較方便的AES加密(前端密鑰可能存在泄露風(fēng)險(xiǎn),應(yīng)該放到配置項(xiàng)中): 一、前端加密 1、首先引入前端需要用到的js:crypto-js,下載地址: CryptoJS-v4.1.1 https://www.aliyundrive.com/s/bXP6M8ZxVAD 點(diǎn)擊鏈接

    2024年02月16日
    瀏覽(22)
  • vue前端RSA加密java后端解密的方法

    最近安全測(cè)試的總是測(cè)出安全漏洞來(lái),讓開(kāi)發(fā)改。 想了想干脆把請(qǐng)求參數(shù)都加密下,前端加密后端解密,這樣總差不多了。 看了下AES加密,是對(duì)稱的,前后端用這個(gè)不太行。 于是想到用RSA加密,是非對(duì)稱的,可以前端加密后端解密。 1.前端是vue項(xiàng)目,使用時(shí),需要先執(zhí)行:

    2023年04月21日
    瀏覽(23)
  • 三步實(shí)現(xiàn)Java的SM2前端加密后端解密

    三步實(shí)現(xiàn)Java的SM2前端加密后端解密

    秦醫(yī)如毒,無(wú)藥可解。 話不多說(shuō),先上需要用到的 js文件下載鏈接?? 和?? jsp前端代碼 。 第一步: 下載兩個(gè)必備的js文件——? crypto-js.js 、 sm2.js ? 。 它們的下載鏈接如下↓(該網(wǎng)頁(yè)不魔法上網(wǎng)的話會(huì)很卡,畢竟github,建議卡的話就多重新加載幾次,我差不多試了8次才進(jìn)

    2024年02月04日
    瀏覽(88)
  • uni-app和springboot完成前端后端對(duì)稱加密解密流程

    概述 使用對(duì)稱加密的方式實(shí)現(xiàn)。 前端基于crypto-js。 uni-app框架中是在uni.request的基礎(chǔ)上,在攔截器中處理的。 springboot在Filter中完成解密工作。 uni-app 項(xiàng)目中引入crypto-js。 加密方法 解密方法 request攔截器 備注 使用encodeURIComponent方法是為了處理 字符“+”,這個(gè)對(duì)應(yīng)java解密的

    2024年02月13日
    瀏覽(29)
  • SpringCloud Gateway 整合RSA對(duì)請(qǐng)求參數(shù)解密、響應(yīng)結(jié)果加密【SpringCloud系列10】

    SpringCloud Gateway 整合RSA對(duì)請(qǐng)求參數(shù)解密、響應(yīng)結(jié)果加密【SpringCloud系列10】

    本文章實(shí)現(xiàn)的是 網(wǎng)關(guān)中的 參數(shù)解密、響應(yīng)數(shù)據(jù)體加密功能。 1 集成 commons-codec commons-codec 是Apache開(kāi)源組織提供的用于摘要運(yùn)算、編碼解碼的包。常見(jiàn)的編碼解碼工具Base64、MD5、Hex、SHA1、DES等。 本項(xiàng)目中集成RSA 非對(duì)稱算法,RSAUtils 工具類 然后創(chuàng)建一個(gè)測(cè)試類,生成一組公鑰

    2024年02月06日
    瀏覽(21)
  • 若依ruoyi前端vue使用jsencrypt.js加密后端java進(jìn)行RSA解密(前后端交互RSA加解密)

    目錄 1、前后端RSA加解密實(shí)現(xiàn)思路 2、前端 3、后端 按照約定來(lái)說(shuō)公鑰一般用來(lái)加密,大家都可以獲取得到,私鑰用來(lái)解密,當(dāng)然你也可以混著用,以下示例是前端通過(guò)加密,后端解密. ?-----BEGIN PUBLIC KEY----- MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ81AMIIBCgKCAQEA1+05vAf7m5NcLNLkRtsm gp+QdzcW6MVdayGTGBJG0v

    2024年02月06日
    瀏覽(105)
  • 前端使用AES密碼加密、解密,使用詳細(xì)(crypto加密解密,前后端分離,AES加密解密)

    1、 首先安裝?crypto-js插件,安裝命令如下:? ? -S等同于--save,保存在package.json文件中,是在dependencies 下, --save安裝包信息將加入到dependencies(生產(chǎn)環(huán)境)中,生產(chǎn)階段的依賴,也就是項(xiàng)目運(yùn)行時(shí)的依賴,就是程序上線后仍然需要依賴; -D等同于--save-dev,也保存在package.j

    2024年02月11日
    瀏覽(23)
  • 前端Get Post Put Delect請(qǐng)求 傳參數(shù) 不傳參數(shù)給后端

    Get請(qǐng)求不傳參、Get請(qǐng)求傳不是實(shí)體類的參數(shù)、Get請(qǐng)求傳實(shí)體類的參數(shù) Post 請(qǐng)求不傳參數(shù)、Post請(qǐng)求傳不是實(shí)體類的參數(shù)、Post請(qǐng)求傳實(shí)體類的參數(shù)? 總是分不清,其中Delect 請(qǐng)求使用的地方很少就先記錄Delete請(qǐng)求吧 前端 前端跳后端 后端 前端 前端跳后端 后端 前端 前端跳后端 后

    2024年02月07日
    瀏覽(25)
  • Java后端和前端傳遞的請(qǐng)求參數(shù)的三種類型

    在 HTTP 請(qǐng)求中,常見(jiàn)的請(qǐng)求參數(shù)類型有三種:`application/x-www-form-urlencoded`、`multipart/form-data` 和 `application/json`(通常用于 `raw` 類型)。這三種類型主要指的是請(qǐng)求體中的數(shù)據(jù)格式,其中包括參數(shù)的傳遞方式和編碼。 1. **`application/x-www-form-urlencoded`:** ? ?- 這是默認(rèn)的編碼類型

    2024年02月02日
    瀏覽(28)

覺(jué)得文章有用就打賞一下文章作者

支付寶掃一掃打賞

博客贊助

微信掃一掃打賞

請(qǐng)作者喝杯咖啡吧~博客贊助

支付寶掃一掃領(lǐng)取紅包,優(yōu)惠每天領(lǐng)

二維碼1

領(lǐng)取紅包

二維碼2

領(lǐng)紅包