iOS中使用RSA加密详解

2025-05-29 0 61

在ios中使用rsa加密解密,需要用到.der和.p12后缀格式的文件,其中.der格式的文件存放的是公钥(public key)用于加密,.p12格式的文件存放的是私钥(private key)用于解密. 首先需要先生成这些文件,然后再将文件导入工程使用,不多说,开始做!

一、使用openssl生成所需秘钥文件

生成环境是在mac系统下,使用openssl进行生成,首先打开终端,按下面这些步骤依次来做:

1. 生成模长为1024bit的私钥文件private_key.pem

openssl genrsa -out private_key.pem 1024

2. 生成证书请求文件rsacertreq.csr

openssl req -new -key private_key.pem -out rsacerreq.csr

注意:这一步会提示输入国家、省份、mail等信息,可以根据实际情况填写,或者全部不用填写,直接全部敲回车.

3. 生成证书rsacert.crt,并设置有效时间为1年

openssl x509 -req -days 3650 -in rsacerreq.csr -signkey private_key.pem -out rsacert.crt

4. 生成供ios使用的公钥文件public_key.der

openssl x509 -outform der -in rsacert.crt -out public_key.der

5. 生成供ios使用的私钥文件private_key.p12

openssl pkcs12 -export -out private_key.p12 -inkey private_key.pem -in rsacert.crt

注意:这一步会提示给私钥文件设置密码,直接输入想要设置密码即可,然后敲回车,然后再验证刚才设置的密码,再次输入密码,然后敲回车,完毕!

在解密时,private_key.p12文件需要和这里设置的密码配合使用,因此需要牢记此密码.

6. 生成供java使用的公钥rsa_public_key.pem

openssl rsa -in private_key.pem -out rsa_public_key.pem -pubout

7. 生成供java使用的私钥pkcs8_private_key.pem

openssl pkcs8 -topk8 -in private_key.pem -out pkcs8_private_key.pem -nocrypt

全部执行成功后,会生成如下文件,其中public_key.der和private_key.p12就是ios需要用到的文件,如下图:

iOS中使用RSA加密详解

生成的文件

二、将文件导入工程使用

1.新建工程, 并导入security.framework框架, 如下图:

iOS中使用RSA加密详解

新建工程并添加框架

2.导入秘钥文件

导入.der和.p12格式的秘钥文件, 如下图:

iOS中使用RSA加密详解

导入秘钥文件

3.新建用于加密、解密的类rsaencryptor, 并实现相关方法

新建rsaencryptor类, 如下图:

iOS中使用RSA加密详解

新建用于加密解密的类

下面开始上代码, 可以直接复制过去用:

rsaencryptor.h代码如下:

?

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411
#import <foundation/foundation.h>

@interface rsaencryptor : nsobject

/**

* 加密方法

*

* @param str 需要加密的字符串

* @param path '.der'格式的公钥文件路径

*/

+ (nsstring *)encryptstring:(nsstring *)str publickeywithcontentsoffile:(nsstring *)path;

/**

* 解密方法

*

* @param str 需要解密的字符串

* @param path '.p12'格式的私钥文件路径

* @param password 私钥文件密码

*/

+ (nsstring *)decryptstring:(nsstring *)str privatekeywithcontentsoffile:(nsstring *)path password:(nsstring *)password;

/**

* 加密方法

*

* @param str 需要加密的字符串

* @param pubkey 公钥字符串

*/

+ (nsstring *)encryptstring:(nsstring *)str publickey:(nsstring *)pubkey;

/**

* 解密方法

*

* @param str 需要解密的字符串

* @param privkey 私钥字符串

*/

+ (nsstring *)decryptstring:(nsstring *)str privatekey:(nsstring *)privkey;

@end

rsaencryptor.m代码如下:

#import "rsaencryptor.h"

#import <security/security.h>

@implementation rsaencryptor

static nsstring *base64_encode_data(nsdata *data){

data = [data base64encodeddatawithoptions:0];

nsstring *ret = [[nsstring alloc] initwithdata:data encoding:nsutf8stringencoding];

return ret;

}

static nsdata *base64_decode(nsstring *str){

nsdata *data = [[nsdata alloc] initwithbase64encodedstring:str options:nsdatabase64decodingignoreunknowncharacters];

return data;

}

#pragma mark - 使用'.der'公钥文件加密

//加密

+ (nsstring *)encryptstring:(nsstring *)str publickeywithcontentsoffile:(nsstring *)path{

if (!str || !path) return nil;

return [self encryptstring:str publickeyref:[self getpublickeyrefwithcontentsoffile:path]];

}

//获取公钥

+ (seckeyref)getpublickeyrefwithcontentsoffile:(nsstring *)filepath{

nsdata *certdata = [nsdata datawithcontentsoffile:filepath];

if (!certdata) {

return nil;

}

seccertificateref cert = seccertificatecreatewithdata(null, (cfdataref)certdata);

seckeyref key = null;

sectrustref trust = null;

secpolicyref policy = null;

if (cert != null) {

policy = secpolicycreatebasicx509();

if (policy) {

if (sectrustcreatewithcertificates((cftyperef)cert, policy, &trust) == noerr) {

sectrustresulttype result;

if (sectrustevaluate(trust, &result) == noerr) {

key = sectrustcopypublickey(trust);

}

}

}

}

if (policy) cfrelease(policy);

if (trust) cfrelease(trust);

if (cert) cfrelease(cert);

return key;

}

+ (nsstring *)encryptstring:(nsstring *)str publickeyref:(seckeyref)publickeyref{

if(![str datausingencoding:nsutf8stringencoding]){

return nil;

}

if(!publickeyref){

return nil;

}

nsdata *data = [self encryptdata:[str datausingencoding:nsutf8stringencoding] withkeyref:publickeyref];

nsstring *ret = base64_encode_data(data);

return ret;

}

#pragma mark - 使用'.12'私钥文件解密

//解密

+ (nsstring *)decryptstring:(nsstring *)str privatekeywithcontentsoffile:(nsstring *)path password:(nsstring *)password{

if (!str || !path) return nil;

if (!password) password = @"";

return [self decryptstring:str privatekeyref:[self getprivatekeyrefwithcontentsoffile:path password:password]];

}

//获取私钥

+ (seckeyref)getprivatekeyrefwithcontentsoffile:(nsstring *)filepath password:(nsstring*)password{

nsdata *p12data = [nsdata datawithcontentsoffile:filepath];

if (!p12data) {

return nil;

}

seckeyref privatekeyref = null;

nsmutabledictionary * options = [[nsmutabledictionary alloc] init];

[options setobject: password forkey:(__bridge id)ksecimportexportpassphrase];

cfarrayref items = cfarraycreate(null, 0, 0, null);

osstatus securityerror = secpkcs12import((__bridge cfdataref) p12data, (__bridge cfdictionaryref)options, &items);

if (securityerror == noerr && cfarraygetcount(items) > 0) {

cfdictionaryref identitydict = cfarraygetvalueatindex(items, 0);

secidentityref identityapp = (secidentityref)cfdictionarygetvalue(identitydict, ksecimportitemidentity);

securityerror = secidentitycopyprivatekey(identityapp, &privatekeyref);

if (securityerror != noerr) {

privatekeyref = null;

}

}

cfrelease(items);

return privatekeyref;

}

+ (nsstring *)decryptstring:(nsstring *)str privatekeyref:(seckeyref)privkeyref{

nsdata *data = [[nsdata alloc] initwithbase64encodedstring:str options:nsdatabase64decodingignoreunknowncharacters];

if (!privkeyref) {

return nil;

}

data = [self decryptdata:data withkeyref:privkeyref];

nsstring *ret = [[nsstring alloc] initwithdata:data encoding:nsutf8stringencoding];

return ret;

}

#pragma mark - 使用公钥字符串加密

/* start: encryption with rsa public key */

//使用公钥字符串加密

+ (nsstring *)encryptstring:(nsstring *)str publickey:(nsstring *)pubkey{

nsdata *data = [self encryptdata:[str datausingencoding:nsutf8stringencoding] publickey:pubkey];

nsstring *ret = base64_encode_data(data);

return ret;

}

+ (nsdata *)encryptdata:(nsdata *)data publickey:(nsstring *)pubkey{

if(!data || !pubkey){

return nil;

}

seckeyref keyref = [self addpublickey:pubkey];

if(!keyref){

return nil;

}

return [self encryptdata:data withkeyref:keyref];

}

+ (seckeyref)addpublickey:(nsstring *)key{

nsrange spos = [key rangeofstring:@"-----begin public key-----"];

nsrange epos = [key rangeofstring:@"-----end public key-----"];

if(spos.location != nsnotfound && epos.location != nsnotfound){

nsuinteger s = spos.location + spos.length;

nsuinteger e = epos.location;

nsrange range = nsmakerange(s, e-s);

key = [key substringwithrange:range];

}

key = [key stringbyreplacingoccurrencesofstring:@"\\r" withstring:@""];

key = [key stringbyreplacingoccurrencesofstring:@"\\n" withstring:@""];

key = [key stringbyreplacingoccurrencesofstring:@"\\t" withstring:@""];

key = [key stringbyreplacingoccurrencesofstring:@" " withstring:@""];

// this will be base64 encoded, decode it.

nsdata *data = base64_decode(key);

data = [self strippublickeyheader:data];

if(!data){

return nil;

}

//a tag to read/write keychain storage

nsstring *tag = @"rsautil_pubkey";

nsdata *d_tag = [nsdata datawithbytes:[tag utf8string] length:[tag length]];

// delete any old lingering key with the same tag

nsmutabledictionary *publickey = [[nsmutabledictionary alloc] init];

[publickey setobject:(__bridge id) ksecclasskey forkey:(__bridge id)ksecclass];

[publickey setobject:(__bridge id) ksecattrkeytypersa forkey:(__bridge id)ksecattrkeytype];

[publickey setobject:d_tag forkey:(__bridge id)ksecattrapplicationtag];

secitemdelete((__bridge cfdictionaryref)publickey);

// add persistent version of the key to system keychain

[publickey setobject:data forkey:(__bridge id)ksecvaluedata];

[publickey setobject:(__bridge id) ksecattrkeyclasspublic forkey:(__bridge id)

ksecattrkeyclass];

[publickey setobject:[nsnumber numberwithbool:yes] forkey:(__bridge id)

ksecreturnpersistentref];

cftyperef persistkey = nil;

osstatus status = secitemadd((__bridge cfdictionaryref)publickey, &persistkey);

if (persistkey != nil){

cfrelease(persistkey);

}

if ((status != noerr) && (status != errsecduplicateitem)) {

return nil;

}

[publickey removeobjectforkey:(__bridge id)ksecvaluedata];

[publickey removeobjectforkey:(__bridge id)ksecreturnpersistentref];

[publickey setobject:[nsnumber numberwithbool:yes] forkey:(__bridge id)ksecreturnref];

[publickey setobject:(__bridge id) ksecattrkeytypersa forkey:(__bridge id)ksecattrkeytype];

// now fetch the seckeyref version of the key

seckeyref keyref = nil;

status = secitemcopymatching((__bridge cfdictionaryref)publickey, (cftyperef *)&keyref);

if(status != noerr){

return nil;

}

return keyref;

}

+ (nsdata *)strippublickeyheader:(nsdata *)d_key{

// skip asn.1 public key header

if (d_key == nil) return(nil);

unsigned long len = [d_key length];

if (!len) return(nil);

unsigned char *c_key = (unsigned char *)[d_key bytes];

unsigned int idx = 0;

if (c_key[idx++] != 0x30) return(nil);

if (c_key[idx] > 0x80) idx += c_key[idx] - 0x80 + 1;

else idx++;

// pkcs #1 rsaencryption szoid_rsa_rsa

static unsigned char seqiod[] =

{ 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01,

0x01, 0x05, 0x00 };

if (memcmp(&c_key[idx], seqiod, 15)) return(nil);

idx += 15;

if (c_key[idx++] != 0x03) return(nil);

if (c_key[idx] > 0x80) idx += c_key[idx] - 0x80 + 1;

else idx++;

if (c_key[idx++] != '\\0') return(nil);

// now make a new nsdata from this buffer

return ([nsdata datawithbytes:&c_key[idx] length:len - idx]);

}

+ (nsdata *)encryptdata:(nsdata *)data withkeyref:(seckeyref) keyref{

const uint8_t *srcbuf = (const uint8_t *)[data bytes];

size_t srclen = (size_t)data.length;

size_t block_size = seckeygetblocksize(keyref) * sizeof(uint8_t);

void *outbuf = malloc(block_size);

size_t src_block_size = block_size - 11;

nsmutabledata *ret = [[nsmutabledata alloc] init];

for(int idx=0; idx<srclen; idx+=src_block_size){

//nslog(@"%d/%d block_size: %d", idx, (int)srclen, (int)block_size);

size_t data_len = srclen - idx;

if(data_len > src_block_size){

data_len = src_block_size;

}

size_t outlen = block_size;

osstatus status = noerr;

status = seckeyencrypt(keyref,

ksecpaddingpkcs1,

srcbuf + idx,

data_len,

outbuf,

&outlen

);

if (status != 0) {

nslog(@"seckeyencrypt fail. error code: %d", status);

ret = nil;

break;

}else{

[ret appendbytes:outbuf length:outlen];

}

}

free(outbuf);

cfrelease(keyref);

return ret;

}

/* end: encryption with rsa public key */

#pragma mark - 使用私钥字符串解密

/* start: decryption with rsa private key */

//使用私钥字符串解密

+ (nsstring *)decryptstring:(nsstring *)str privatekey:(nsstring *)privkey{

if (!str) return nil;

nsdata *data = [[nsdata alloc] initwithbase64encodedstring:str options:nsdatabase64decodingignoreunknowncharacters];

data = [self decryptdata:data privatekey:privkey];

nsstring *ret = [[nsstring alloc] initwithdata:data encoding:nsutf8stringencoding];

return ret;

}

+ (nsdata *)decryptdata:(nsdata *)data privatekey:(nsstring *)privkey{

if(!data || !privkey){

return nil;

}

seckeyref keyref = [self addprivatekey:privkey];

if(!keyref){

return nil;

}

return [self decryptdata:data withkeyref:keyref];

}

+ (seckeyref)addprivatekey:(nsstring *)key{

nsrange spos = [key rangeofstring:@"-----begin rsa private key-----"];

nsrange epos = [key rangeofstring:@"-----end rsa private key-----"];

if(spos.location != nsnotfound && epos.location != nsnotfound){

nsuinteger s = spos.location + spos.length;

nsuinteger e = epos.location;

nsrange range = nsmakerange(s, e-s);

key = [key substringwithrange:range];

}

key = [key stringbyreplacingoccurrencesofstring:@"\\r" withstring:@""];

key = [key stringbyreplacingoccurrencesofstring:@"\\n" withstring:@""];

key = [key stringbyreplacingoccurrencesofstring:@"\\t" withstring:@""];

key = [key stringbyreplacingoccurrencesofstring:@" " withstring:@""];

// this will be base64 encoded, decode it.

nsdata *data = base64_decode(key);

data = [self stripprivatekeyheader:data];

if(!data){

return nil;

}

//a tag to read/write keychain storage

nsstring *tag = @"rsautil_privkey";

nsdata *d_tag = [nsdata datawithbytes:[tag utf8string] length:[tag length]];

// delete any old lingering key with the same tag

nsmutabledictionary *privatekey = [[nsmutabledictionary alloc] init];

[privatekey setobject:(__bridge id) ksecclasskey forkey:(__bridge id)ksecclass];

[privatekey setobject:(__bridge id) ksecattrkeytypersa forkey:(__bridge id)ksecattrkeytype];

[privatekey setobject:d_tag forkey:(__bridge id)ksecattrapplicationtag];

secitemdelete((__bridge cfdictionaryref)privatekey);

// add persistent version of the key to system keychain

[privatekey setobject:data forkey:(__bridge id)ksecvaluedata];

[privatekey setobject:(__bridge id) ksecattrkeyclassprivate forkey:(__bridge id)

ksecattrkeyclass];

[privatekey setobject:[nsnumber numberwithbool:yes] forkey:(__bridge id)

ksecreturnpersistentref];

cftyperef persistkey = nil;

osstatus status = secitemadd((__bridge cfdictionaryref)privatekey, &persistkey);

if (persistkey != nil){

cfrelease(persistkey);

}

if ((status != noerr) && (status != errsecduplicateitem)) {

return nil;

}

[privatekey removeobjectforkey:(__bridge id)ksecvaluedata];

[privatekey removeobjectforkey:(__bridge id)ksecreturnpersistentref];

[privatekey setobject:[nsnumber numberwithbool:yes] forkey:(__bridge id)ksecreturnref];

[privatekey setobject:(__bridge id) ksecattrkeytypersa forkey:(__bridge id)ksecattrkeytype];

// now fetch the seckeyref version of the key

seckeyref keyref = nil;

status = secitemcopymatching((__bridge cfdictionaryref)privatekey, (cftyperef *)&keyref);

if(status != noerr){

return nil;

}

return keyref;

}

+ (nsdata *)stripprivatekeyheader:(nsdata *)d_key{

// skip asn.1 private key header

if (d_key == nil) return(nil);

unsigned long len = [d_key length];

if (!len) return(nil);

unsigned char *c_key = (unsigned char *)[d_key bytes];

unsigned int idx = 22; //magic byte at offset 22

if (0x04 != c_key[idx++]) return nil;

//calculate length of the key

unsigned int c_len = c_key[idx++];

int det = c_len & 0x80;

if (!det) {

c_len = c_len & 0x7f;

} else {

int bytecount = c_len & 0x7f;

if (bytecount + idx > len) {

//rsa length field longer than buffer

return nil;

}

unsigned int accum = 0;

unsigned char *ptr = &c_key[idx];

idx += bytecount;

while (bytecount) {

accum = (accum << 8) + *ptr;

ptr++;

bytecount--;

}

c_len = accum;

}

// now make a new nsdata from this buffer

return [d_key subdatawithrange:nsmakerange(idx, c_len)];

}

+ (nsdata *)decryptdata:(nsdata *)data withkeyref:(seckeyref) keyref{

const uint8_t *srcbuf = (const uint8_t *)[data bytes];

size_t srclen = (size_t)data.length;

size_t block_size = seckeygetblocksize(keyref) * sizeof(uint8_t);

uint8 *outbuf = malloc(block_size);

size_t src_block_size = block_size;

nsmutabledata *ret = [[nsmutabledata alloc] init];

for(int idx=0; idx<srclen; idx+=src_block_size){

//nslog(@"%d/%d block_size: %d", idx, (int)srclen, (int)block_size);

size_t data_len = srclen - idx;

if(data_len > src_block_size){

data_len = src_block_size;

}

size_t outlen = block_size;

osstatus status = noerr;

status = seckeydecrypt(keyref,

ksecpaddingnone,

srcbuf + idx,

data_len,

outbuf,

&outlen

);

if (status != 0) {

nslog(@"seckeyencrypt fail. error code: %d", status);

ret = nil;

break;

}else{

//the actual decrypted data is in the middle, locate it!

int idxfirstzero = -1;

int idxnextzero = (int)outlen;

for ( int i = 0; i < outlen; i++ ) {

if ( outbuf[i] == 0 ) {

if ( idxfirstzero < 0 ) {

idxfirstzero = i;

} else {

idxnextzero = i;

break;

}

}

}

[ret appendbytes:&outbuf[idxfirstzero+1] length:idxnextzero-idxfirstzero-1];

}

}

free(outbuf);

cfrelease(keyref);

return ret;

}

/* end: decryption with rsa private key */

@end

4. 测试加密、解密

首先先测试使用.der和.p12秘钥文件进行加密、解密, 在viewcontroller.m中进行测试, 代码如下:

?

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23
#import "viewcontroller.h"

#import "rsaencryptor.h"

@interface viewcontroller ()

@end

@implementation viewcontroller

- (void)viewdidload {

[super viewdidload];

//原始数据

nsstring *originalstring = @"这是一段将要使用'.der'文件加密的字符串!";

//使用.der和.p12中的公钥私钥加密解密

nsstring *public_key_path = [[nsbundle mainbundle] pathforresource:@"public_key.der" oftype:nil];

nsstring *private_key_path = [[nsbundle mainbundle] pathforresource:@"private_key.p12" oftype:nil];

nsstring *encryptstr = [rsaencryptor encryptstring:originalstring publickeywithcontentsoffile:public_key_path];

nslog(@"加密前:%@", originalstring);

nslog(@"加密后:%@", encryptstr);

nslog(@"解密后:%@", [rsaencryptor decryptstring:encryptstr privatekeywithcontentsoffile:private_key_path password:@"123456"]);

}

- (void)didreceivememorywarning {

[super didreceivememorywarning];

// dispose of any resources that can be recreated.

}

@end

运行后, 输出信息如下:

iOS中使用RSA加密详解

输出结果

可以看到已经可以成功加密、解密了.

下面接着测试使用秘钥字符串进行加密、解密, 那么秘钥字符串从哪里来? 可以来这里:http://web.chacuo.net/netrsakeypair, 这是一个在线生成rsa秘钥的网站, 生成公钥和秘钥后, 复制出来用于测试. 然后在viewcontroller.m中使用rsaentryptor.h头文件中对应的加密方法进行加密, viewcontroller.m中代码如下:

?

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22
#import "viewcontroller.h"

#import "rsaencryptor.h"

@interface viewcontroller ()

@end

@implementation viewcontroller

- (void)viewdidload {

[super viewdidload];

//原始数据

nsstring *originalstring = @"这是一段将要使用'秘钥字符串'进行加密的字符串!";

//使用字符串格式的公钥私钥加密解密

nsstring *encryptstr = [rsaencryptor encryptstring:originalstring publickey:@"migfma0gcsqgsib3dqebaquaa4gnadcbiqkbgqdtbz6cnh9pgdf60aqkvelz3ftalyzhqwbp601y77szmghx3f5novuzbdk7umdoclk4fbzitewyd9dwvaerxzo9bfui96baop8wfl1vkzyyhtcznxnjfgsqd/b70/exmgmbpewkaadyuqijidvgh1fqk/4acws39yxwbs+ilhspsqidaqab"];

nslog(@"加密前:%@", originalstring);

nslog(@"加密后:%@", encryptstr);

nslog(@"解密后:%@", [rsaencryptor decryptstring:encryptstr privatekey:@"miiceaibadanbgkqhkig9w0baqefaascamiwggjeageaaogbanntnpw0f0+b0xrrpaq94vpcvnqxlmddbunrtxlvtloyydfcxk2hvrlt0rtqx2gisrguhojn7bgp0na8astdmj0ew4j3pscinzb+xvwrnlidnzofe0kuzjb38hvt8teyawgktcqab3jsoimh1uahuvar/hpzblf1hfbtl4iuew9jagmbaaecgya1tgeqmakqofga8xtwuxewdoads9k0+ekeuoxgxzqot/gyiihuiafjilfhoua1ndf/ycqag973sbtdhtfpmwqfnqq13+jaownsltjwgr7hwf7qplyw92r7cu0v7wffjqm1t/2fku9jkhfahfb7qqesmibo/vmjer9o4tex58uxdqjbao0o4lnwdvjr1gn02cqvxpotty6dgfbqdeaazf8obb6xqvcqgw/avms3bh8nvluwdq2k/xte8thxjw9ftbqtld8cqqdkunco35gaquf9bhsdzrs7no1j3vjlrm0itrepqjqtvevdxzc+1/urkwvaiigwaxjqcvfmqzscdbznhyxpz5fxakeagb3kmrkhl4ynpmkrjhw+ih+aserccsj6sjfbhx4xaakyzmbxxnchg+jb+bznz06ybfc5nlzm7y/n61o1f5/56wjbalw+zvze6ly5l34114ug04w9x0hcfgau7mijphfjgudatd/h9xfge4odmrpud3q9me9llmyk6mikpfm4c2+3dzccqqc8y37npgpnekd9smmwppsejpw41amlfckvp4da3z7g5bglmuicrva9ydaiaaydggck8lxc8k6hpkrfgyrxkrtt"]);

}

- (void)didreceivememorywarning {

[super didreceivememorywarning];

// dispose of any resources that can be recreated.

}

@end

运行后, 输出信息如下:

iOS中使用RSA加密详解

输出结果

可以看到,也成功加密、解密了.

至此, rsa加密演示完毕!

以上就是本文的全部内容,希望本文的内容对大家的学习或者工作能带来一定的帮助,同时也希望多多支持快网idc!

收藏 (0) 打赏

感谢您的支持,我会继续努力的!

打开微信/支付宝扫一扫,即可进行扫码打赏哦,分享从这里开始,精彩与您同在
点赞 (0)

声明:本站所有文章,如无特殊说明或标注,均为本站原创发布。任何个人或组织,在未征得本站同意时,禁止复制、盗用、采集、发布本站内容到任何网站、书籍等各类媒体平台。如若本站内容侵犯了原著者的合法权益,可联系我们进行处理。

快网idc优惠网 建站教程 iOS中使用RSA加密详解 https://www.kuaiidc.com/91181.html

相关文章

发表评论
暂无评论