Java从RSA私钥中提取出 E N P Q D DP DQ QP

本文介绍了一种从PKCS8格式的RSA私钥中提取公钥及其它关键参数的方法,并展示了如何使用Java标准库完成这一过程。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

import java.util.Base64;
import java.math.BigInteger;
import java.security.KeyFactory;
import java.security.PublicKey;
import java.security.interfaces.RSAPrivateCrtKey;
import java.security.interfaces.RSAPrivateKey;
import java.security.spec.PKCS8EncodedKeySpec;
import java.security.spec.RSAPrivateKeySpec;
import java.security.spec.RSAPublicKeySpec;

/**
 * RSA提取组成元素类
 * 
 * @author alderaan
 * @version 创建时间:2022年5月27日 下午12:36:21
 *
 */
public class RSAComponent
{
	// X509 公钥
	private static String publicKeyStr = "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvFyBNSJuXtlpkkDgBChl" + 
			"TwY0WBl9c3DjWf3QQ+UdWfLQ0mR92ZNV2IY+yEZ4KMZvW/nH98hFm40W0K5NY1G7" + 
			"zCbDbPKjjk81sx/Ec5ms8b3htqU81pBNM68SGz2w7IfCWiJc3fMUGg5kQYOFCP+A" + 
			"DHAHf7YEOp8OpErq0LrtYWR4Pzq6RvKvZAYvhkGm7AR/hadEluMdIhWwIkdXoPr/" + 
			"0JNL6Ay50/7GyjGTCuvCpvvVLn9MpgyeLtF8cnGAnENsBSNhxT/iC19rAJ9nzuoR" + 
			"4tufZQxSHb/2mW0Rc19t52N1YRkU6RvD8lxVp/Q4CtQf8sPy5dUtb6gzSQ9cRA5S" + 
			"lQIDAQAB";
	
	// PKCS8 私钥
	private static String privateKeyStr = "MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQC8XIE1Im5e2WmS" + 
			"QOAEKGVPBjRYGX1zcONZ/dBD5R1Z8tDSZH3Zk1XYhj7IRngoxm9b+cf3yEWbjRbQ" + 
			"rk1jUbvMJsNs8qOOTzWzH8RzmazxveG2pTzWkE0zrxIbPbDsh8JaIlzd8xQaDmRB" + 
			"g4UI/4AMcAd/tgQ6nw6kSurQuu1hZHg/OrpG8q9kBi+GQabsBH+Fp0SW4x0iFbAi" + 
			"R1eg+v/Qk0voDLnT/sbKMZMK68Km+9Uuf0ymDJ4u0XxycYCcQ2wFI2HFP+ILX2sA" + 
			"n2fO6hHi259lDFIdv/aZbRFzX23nY3VhGRTpG8PyXFWn9DgK1B/yw/Ll1S1vqDNJ" + 
			"D1xEDlKVAgMBAAECggEAGIxBtogHNEtHS+0yhLgzA8p+NeEUjV/v8UF3y/FnEtrn" + 
			"RhQcpqdh77cHJZixfjbmOmliGzO5hp0rlQSyRzhWrjN7Eo7Iq/o8uFxygNJNTK//" + 
			"Y4tDU3844Hx3cp9mmFzVAmQqEC7mtsKbZEJcqyCJMpXDFGzHPlCOWvD8izlhSGjT" + 
			"N+z3qwBTaQLym9VG2GqohzVbW0wwryFPMhWOHHCiejamhmERNRBGtzwBOoPiMyzx" + 
			"/BbLgsO9T90qL/zNEEU+vrja/Wq/V84akwRysUyoJvFI6uhLED79t3odzg+cvDZV" + 
			"66TEyuKemnjQcusqulVKBuXJDLsZWronrXN9X0tBIQKBgQDrLuSvOz3rFqQWuEhc" + 
			"uZaJcFY2iFwXtHUjBGi5mWJBRVAxJlrC1Erdky79gNCsZiZrz58x/2tS1IHAUdUJ" + 
			"qPsSF1X17dT4ZIcHXd6a8eLmamNFoomR7VtcJ1gOwt+YOe3FSmANKLc63DPnZaJM" + 
			"QrWYSGGz7rp26tVQXtZv86cjHQKBgQDNCKhNKtF/p2GwS4jPfxXm679WwHYOlyPa" + 
			"fs9a64yq6orthsAYNIA2zMORHite76mGtpVNpfaQwJhjV7O445FGejVRCZII5afK" + 
			"np29jgIuRSSj2PRKI5AYaI4+PZmeHN4Uf8mm+paLwFzLyHYE6gSur1W/ryJxhqq1" + 
			"2OSVjGub2QKBgQCuPgjqFt8yDI031AKwyENSwmrtbiuk2GssrXiVgaF9MEhQkdUO" + 
			"odBxxzk6UjTIdcojeCi/FzjBnnYfMcG/rXWOmsFyOmneOkScXZyueWWdRtcT4W9B" + 
			"MXTNmsyv6wtTsh+KWyc8uJzAPCMsXm1XSNlX4NCaSdXWgvfV2t3PBdsftQKBgGJR" + 
			"HnMybxcpajyhW88z/4qlzTCKRZIlg3nIiSHuBZwHr+rKTN7OfhTJB5ZUwzNY9Q+2" + 
			"Cc4cISm0UN6CNZoY9Za4D0z2q+I8TcNpX/Z/XChX24P+CtZqSzSJHnxWCY26BfwK" + 
			"cuXxD7Of4F+Plpgwp2IkjZfHIVsS2lUs1h+oIAmxAoGBAKwPruU4J4ir23kw6joG" + 
			"RJ9wMzEvsis6wErMfZP0YjHGm5gD4l3gPEhv6Z6FQCgsKCPeo1QRr2xOMRdR3qbz" + 
			"OsvtbU4l0cjitkQJT2geiWkIs8n+QlCzxV/XJMe1kKysdu0yJr3GtCqsCaFv9+9i" + 
			"xhcjT63ir4OgV9Bdf/geRMYh";

	public static void main(String[] args) throws Exception
	{
		byte[] decodedprivate = Base64.getDecoder().decode(privateKeyStr);
		RSAPrivateKey priKey = (RSAPrivateKey) KeyFactory.getInstance("RSA")
				.generatePrivate(new PKCS8EncodedKeySpec(decodedprivate));

		// 从私钥中提取公钥
		KeyFactory kf = KeyFactory.getInstance("RSA");
		RSAPrivateKeySpec priv = kf.getKeySpec(priKey, RSAPrivateKeySpec.class);

		RSAPublicKeySpec keySpec = new RSAPublicKeySpec(priv.getModulus(), BigInteger.valueOf(65537));

		PublicKey publicKey = kf.generatePublic(keySpec);
		// 对公钥进行Base64编码
		String publickeystr_new = Base64.getEncoder().encodeToString(publicKey.getEncoded());

		// 提取后的公钥与成对生成的公钥进行比较
		if (0 == publicKeyStr.compareTo(publickeystr_new))
		{
			System.out.println("提取的公钥校验一致!\n公钥Base64字符串为:\n" + publicKeyStr + "\n");
		}

		RSAPrivateCrtKey rsaPrivateKey = (RSAPrivateCrtKey) priKey;

		String p = rsaPrivateKey.getPrimeP().toString(16).toUpperCase();
		String q = rsaPrivateKey.getPrimeQ().toString(16).toUpperCase();
		String d = rsaPrivateKey.getPrivateExponent().toString(16).toUpperCase();
		String dp = rsaPrivateKey.getPrimeExponentP().toString(16).toUpperCase();
		String dq = rsaPrivateKey.getPrimeExponentQ().toString(16).toUpperCase();
		String qp = rsaPrivateKey.getCrtCoefficient().toString(16).toUpperCase();
		String e = rsaPrivateKey.getPublicExponent().toString(16).toUpperCase();
		String n = rsaPrivateKey.getModulus().toString(16).toUpperCase();

		System.out.println("P:\n" + p + "\n");
		System.out.println("Q:\n" + q + "\n");
		System.out.println("D:\n" + d + "\n");
		System.out.println("DP:\n" + dp + "\n");
		System.out.println("DQ:\n" + dq + "\n");
		System.out.println("QP:\n" + qp + "\n");
		System.out.println("E:\n" + e + "\n");
		System.out.println("N:\n" + n + "\n");
	}
}
### 提取RSA私钥组件 为了从RSA证书中提取所需的私钥参数 `n`, `e`, `d`, `p`, `q`, `dp`, `dq` `d_inv`,可以利用 OpenSSL 工具来解析 `.pem` 文件中的私钥信息。具体操作如下: 通过命令行输入特定指令可查看私钥详情并获取所需参数[^1]。 ```bash openssl rsa -in private.pem -text -noout ``` 上述命令会输详细的私钥信息到终端窗口,其中包括了所有必要的组成部分如模数 `n`、指数 `e` 及解密指数 `d` 等重要数值。这些数据通常以十六进制形式展示,在实际应用时可能需要转换成十进制或其他适用格式以便进一步处理。 对于更深入的数据挖掘,特别是想要单独获得各个分量(比如质因数 `p` `q`),则可以通过编程方式读取PEM编码的ASN.1结构化二进制流,并按照PKCS#1标准解析具体的字段值。Python库PyCryptodome提供了方便的方法来进行此类操作[^2]。 下面是一个简单的 Python 脚本例子用于加载私钥文件并打印各部分的具体数值: ```python from Crypto.PublicKey import RSA with open('private.pem', 'r') as f: key = RSA.import_key(f.read()) print("Modulus (n):", hex(key.n)) print("Public exponent (e):", hex(key.e)) print("Private exponent (d):", hex(key.d)) if hasattr(key, "p"): print("Prime factor p:", hex(key.p)) if hasattr(key, "q"): print("Prime factor q:", hex(key.q)) if hasattr(key, "dmp1"): # dp = d mod(p-1) print("Exponent1 (dp):", hex(key.dmp1)) if hasattr(key, "dmq1"): # dq = d mod(q-1) print("Exponent2 (dq):", hex(key.dmq1)) if hasattr(key, "iqmp"): # inverse of q modulo p print("Coefficient (qi):", hex(key.iqmp)) ``` 此脚本能够有效地访问并显示由OpenSSL生成的标准PEM格式下的私钥文档内的全部要素。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值