本章節寫得差很少了,不過還須要再整理一下(TODO)。html
hash.digest([encoding]):計算摘要。encoding能夠是hex
、latin1
或者base64
。若是聲明瞭encoding,那麼返回字符串。不然,返回Buffer實例。注意,調用hash.digest()後,hash對象就做廢了,再次調用就會出錯。node
hash.update(data[, input_encoding]):input_encoding能夠是utf8
、ascii
或者latin1
。若是data是字符串,且沒有指定 input_encoding,則默認是utf8
。注意,hash.update()方法能夠調用屢次。git
var crypto = require('crypto'); var fs = require('fs'); var content = fs.readFileSync('./test.txt', {encoding: 'utf8'}); var hash = crypto.createHash('sha256'); var output; hash.update(content); output = hash.digest('hex'); console.log(output); // 輸出內容爲: // b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9
也能夠這樣:github
var crypto = require('crypto'); var fs = require('fs'); var input = fs.createReadStream('./test.txt', {encoding: 'utf8'}); var hash = crypto.createHash('sha256'); hash.setEncoding('hex'); input.pipe(hash).pipe(process.stdout) // 輸出內容爲: // b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9
hash.digest()後,再次調用digest()或者update()web
var crypto = require('crypto'); var fs = require('fs'); var content = fs.readFileSync('./test.txt', {encoding: 'utf8'}); var hash = crypto.createHash('sha256'); var output; hash.update(content); hash.digest('hex'); // 報錯:Error: Digest already called hash.update(content); // 報錯:Error: Digest already called hash.digest('hex');
也能夠這樣:算法
var crypto = require('crypto'); var fs = require('fs'); var input = fs.createReadStream('./test.txt', {encoding: 'utf8'}); var hash = crypto.createHash('sha256'); hash.setEncoding('hex'); input.pipe(hash).pipe(process.stdout) // 輸出內容爲: // b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9
hash.digest()後,再次調用digest()或者update()安全
var crypto = require('crypto'); var fs = require('fs'); var content = fs.readFileSync('./test.txt', {encoding: 'utf8'}); var hash = crypto.createHash('sha256'); var output; hash.update(content); hash.digest('hex'); // 報錯:Error: Digest already called hash.update(content); // 報錯:Error: Digest already called hash.digest('hex');
hash.digest()後,再次調用digest()或者update()網絡
var crypto = require('crypto'); var fs = require('fs'); var content = fs.readFileSync('./test.txt', {encoding: 'utf8'}); var hash = crypto.createHash('sha256'); var output; hash.update(content); hash.digest('hex'); // 報錯:Error: Digest already called hash.update(content); // 報錯:Error: Digest already called hash.digest('hex');
HMAC的全稱是Hash-based Message Authentication Code,也即在hash的加鹽運算。app
算法細節能夠參考附錄連接,具體到使用的話,跟hash模塊差很少,選定hash算法,指定「鹽」便可。dom
例子1:
var crypto = require('crypto'); var fs = require('fs'); var secret = 'secret'; var hmac = crypto.createHmac('sha256', secret); var input = fs.readFileSync('./test.txt', {encoding: 'utf8'}); hmac.update(input); console.log( hmac.digest('hex') ); // 輸出: // 734cc62f32841568f45715aeb9f4d7891324e6d948e4c6c60c0621cdac48623a
例子2:
var crypto = require('crypto'); var fs = require('fs'); var secret = 'secret'; var hmac = crypto.createHmac('sha256', secret); var input = fs.createReadStream('./test.txt', {encoding: 'utf8'}); hmac.setEncoding('hex'); input.pipe(hmac).pipe(process.stdout) // 輸出: // 734cc62f32841568f45715aeb9f4d7891324e6d948e4c6c60c0621cdac48623a
加解密主要用到下面兩組方法:
加密:
解密:
先來看下 crypto.createCipher(algorithm, password),兩個參數分別是加密算法、密碼
aes192
,具體有哪些可選的算法,依賴於本地openssl
的版本,能夠經過openssl list-cipher-algorithms
命令查看支持哪些算法。備註:這裏nodejs屏蔽了AES的使用/實現細節,關於key、IV,感興趣的同窗能夠自行谷歌下。
var crypto = require('crypto'); var secret = 'secret'; var cipher = crypto.createCipher('aes192', secret); var content = 'hello'; var cryptedContent; cipher.update(content); cryptedContent = cipher.final('hex'); console.log(cryptedContent); // 輸出: // 71d30ec9bc926b5dbbd5150bf9d3e5fb
能夠看做 crypto.createCipher(algorithm, password) 逆向操做,直接看例子
var crypto = require('crypto'); var secret = 'secret'; var cipher = crypto.createCipher('aes192', secret); var content = 'hello'; var cryptedContent; cipher.update(content); cryptedContent = cipher.final('hex'); console.log(cryptedContent); // 輸出: // 71d30ec9bc926b5dbbd5150bf9d3e5fb var decipher = crypto.createDecipher('aes192', secret); var decryptedContent; decipher.update(cryptedContent, 'hex'); decryptedContent = decipher.final('utf8'); console.log(decryptedContent); // 輸出: // hello
相對於 crypto.createCipher() 來講,crypto.createCipheriv() 須要提供key
和iv
,而 crypto.createCipher() 是根據用戶提供的 password 算出來的。
key、iv 能夠是Buffer,也能夠是utf8編碼的字符串,這裏須要關注的是它們的長度:
var crypto = require('crypto'); var key = crypto.randomBytes(192/8); var iv = crypto.randomBytes(128/8); var algorithm = 'aes192'; function encrypt(text){ var cipher = crypto.createCipheriv(algorithm, key, iv); cipher.update(text); return cipher.final('hex'); } function decrypt(encrypted){ var decipher = crypto.createDecipheriv(algorithm, key, iv); decipher.update(encrypted, 'hex'); return decipher.final('utf8'); } var content = 'hello'; var crypted = encrypt('hello'); console.log( crypted ); var decrypted = decrypt( crypted ); console.log( decrypted ); // 輸出:utf8
假設:
一、服務端原始信息爲M,摘要算法爲Hash,Hash(M)得出的摘要是H。 二、公鑰爲Pub,私鑰爲Piv,非對稱加密算法爲Encrypt,非對稱解密算法爲Decrypt。 三、Encrypt(H)獲得的結果是S。 四、客戶端拿到的信息爲M1,利用Hash(M1)得出的結果是H1。
數字簽名的產生、校驗步驟分別以下:
一、數字簽名的產生步驟:利用摘要算法Hash算出M的摘要,即Hash(M) == H,利用非對稱加密算法對摘要進行加密Encrypt( H, Piv ),獲得數字簽名S。 二、數字簽名的校驗步驟:利用解密算法D對數字簽名進行解密,即Decrypt(S) == H,計算M1的摘要 Hash(M1) == H1,對比 H、H1,若是二者相同,則經過校驗。
私鑰如何生成不是這裏的重點,這裏採用網上的服務來生成,點擊[這裏](在線生成非對稱加密公鑰私鑰對、在線生成公私鑰對、RSA Key pair create、生成RSA密鑰對)。
瞭解了數字簽名產生、校驗的原理後,相信下面的代碼很容易理解:
var crypto = require('crypto'); var fs = require('fs'); var privateKey = fs.readFileSync('./private-key.pem'); // 私鑰 var publicKey = fs.readFileSync('./public-key.pem'); // 公鑰 var algorithm = 'RSA-SHA256'; // 加密算法 vs 摘要算法 // 數字簽名 function sign(text){ var sign = crypto.createSign(algorithm); sign.update(text); return sign.sign(privateKey, 'hex'); } // 校驗簽名 function verify(oriContent, signature){ var verifier = crypto.createVerify(algorithm); verifier.update(oriContent); return verifier.verify(publicKey, signature, 'hex'); } // 對內容進行簽名 var content = 'hello world'; var signature = sign(content); console.log(signature); // 校驗簽名,若是經過,返回true var verified = verify(content, signature); console.log(verified);
DiffieHellman:Diffie–Hellman key exchange,縮寫爲D-H,是一種安全協議,讓通訊雙方在預先沒有對方信息的狀況下,經過不安全通訊信道,建立一個密鑰。這個密鑰能夠在後續的通訊中,做爲對稱加密的密鑰加密傳遞的信息。
代碼以下,原理待補充 TODO
const crypto = require('crypto'); const assert = require('assert'); // Generate Alice's keys... const alice = crypto.createDiffieHellman(2048); const alice_key = alice.generateKeys(); // Generate Bob's keys... const bob = crypto.createDiffieHellman(alice.getPrime(), alice.getGenerator()); const bob_key = bob.generateKeys(); // Exchange and generate the secret... const alice_secret = alice.computeSecret(bob_key); const bob_secret = bob.computeSecret(alice_key); // OK assert.equal(alice_secret.toString('hex'), bob_secret.toString('hex'));
DiffieHellman:Diffie–Hellman key exchange,縮寫爲D-H,是一種安全協議,讓通訊雙方在預先沒有對方信息的狀況下,經過不安全通訊信道,建立一個密鑰。這個密鑰能夠在後續的通訊中,做爲對稱加密的密鑰加密傳遞的信息。
代碼以下,原理待補充 TODO
const crypto = require('crypto'); const assert = require('assert'); // Generate Alice's keys... const alice = crypto.createDiffieHellman(2048); const alice_key = alice.generateKeys(); // Generate Bob's keys... const bob = crypto.createDiffieHellman(alice.getPrime(), alice.getGenerator()); const bob_key = bob.generateKeys(); // Exchange and generate the secret... const alice_secret = alice.computeSecret(bob_key); const bob_secret = bob.computeSecret(alice_key); // OK assert.equal(alice_secret.toString('hex'), bob_secret.toString('hex'));
代碼以下,原理待補充 TODO
const crypto = require('crypto'); const assert = require('assert'); // Generate Alice's keys... const alice = crypto.createECDH('secp521r1'); const alice_key = alice.generateKeys(); // Generate Bob's keys... const bob = crypto.createECDH('secp521r1'); const bob_key = bob.generateKeys(); // Exchange and generate the secret... const alice_secret = alice.computeSecret(bob_key); const bob_secret = bob.computeSecret(alice_key); assert(alice_secret, bob_secret); // OK
SPKAC:
SPKAC is an acronym that stands for Signed Public Key and Challenge, also known as Netscape SPKI.
SPKI:Simple public-key infrastructure
md5:固定長度(128bit)、不可逆(重要)、不一樣數據的散列值可能相同(重要)、高度離散型(原文細微的變化,會致使散列值差別巨大)
sha1:固定長度160bit,普遍使用(如TLS,目前安全性受到密碼學家的質疑)
SHA-256/SHA-384/SHA-512:後面表示摘要的長度。
用途:數字簽名、文件完整性校驗
關係:sha1 基於 MD5,MD5 基於 MD4
md5(1991) -> SHA1
sha家族:由美國國家安全局(NSA)所設計,並由美國國家標準與技術研究院(NIST)發佈;是美國的政府標準。
SPKAC:Signed Public Key and Challenge
MD5:Message-Digest Algorithm 5,信息-摘要算法。
SHA:Secure Hash Algorithm,安全散列算法。
HMAC:Hash-based Message Authentication Code,密鑰相關的哈希運算消息認證碼。
SPKAC:
對稱加密:好比AES、DES
非對稱加密:好比RSA、DSA
AES:Advanced Encryption Standard(高級加密標準),密鑰長度能夠是12八、192和256位。
DES:Data Encryption Standard,數據加密標準,對稱密鑰加密算法(如今認爲不安全)。https://en.wikipedia.org/wiki/Data_Encryption_Standard
DiffieHellman:Diffie–Hellman key exchange,縮寫爲D-H,是一種安全協議,讓通訊雙方在預先沒有對方信息的狀況下,經過不安全通訊信道,建立一個密鑰。這個密鑰能夠在後續的通訊中,做爲對稱加密的密鑰加密傳遞的信息。(備註,使是用協議的發明者命名)
字符編碼筆記:ASCII,Unicode和UTF-8 - 阮一峯的網絡日誌http://www.ruanyifeng.com/blog/2007/10/ascii_unicode_and_utf-8.html
Unicode與JavaScript詳解 http://www.ruanyifeng.com/blog/2014/12/unicode.html
Base64筆記 http://www.ruanyifeng.com/blog/2008/06/base64.html
MIME筆記 http://www.ruanyifeng.com/blog/2008/06/mime.html
SHA家族 https://zh.wikipedia.org/wiki/SHA%E5%AE%B6%E6%97%8F
加鹽密碼哈希:如何正確使用 http://blog.jobbole.com/61872/
HMAC-MD5算法原理及實現 http://www.jianshu.com/p/067f9eb6b252
Encrypting using AES-256, can I use 256 bits IV? http://security.stackexchange.com/questions/90848/encrypting-using-aes-256-can-i-use-256-bits-iv
分組對稱加密模式:ECB/CBC/CFB/OFB http://blog.csdn.net/aaaaatiger/article/details/2525561
在線生成非對稱加密公鑰私鑰對、在線生成公私鑰對、RSA Key pair create、生成RSA密鑰對http://web.chacuo.net/netrsakeypair
Diffie–Hellman key exchange https://zh.wikipedia.org/wiki/%E8%BF%AA%E8%8F%B2-%E8%B5%AB%E7%88%BE%E6%9B%BC%E5%AF%86%E9%91%B0%E4%BA%A4%E6%8F%9B
理解 Deffie-Hellman 密鑰交換算法 http://wsfdl.com/algorithm/2016/02/04/%E7%90%86%E8%A7%A3Diffie-Hellman%E5%AF%86%E9%92%A5%E4%BA%A4%E6%8D%A2%E7%AE%97%E6%B3%95.html
What is the difference between DHE and ECDH? http://stackoverflow.com/questions/2701294/how-does-the-elliptic-curve-version-of-diffie-hellman-cryptography-work?rq=1
Example application for working with SPKAC (signed public key & challege) data coming from the element.https://github.com/jas-/node-spkac
Using Padding in Encryption http://www.di-mgt.com.au/cryptopad.html#randompadding
對稱加密和分組加密中的四種模式(ECB、CBC、CFB、OFB)http://www.cnblogs.com/happyhippy/archive/2006/12/23/601353.html
爲何說密文連接模式已經喪失安全性? https://www.zhihu.com/question/26437065
Elliptic Curve Cryptography: a gentle introduction http://andrea.corbellini.name/2015/05/17/elliptic-curve-cryptography-a-gentle-introduction/
Elliptic Curve Cryptography: ECDH and ECDSA http://andrea.corbellini.name/2015/05/30/elliptic-curve-cryptography-ecdh-and-ecdsa/
爲何RSA公鑰每次加密獲得的結果都不同? http://blog.csdn.net/guyongqiangx/article/details/74930951