{"id":821,"date":"2017-01-12T03:47:08","date_gmt":"2017-01-11T18:47:08","guid":{"rendered":"https:\/\/beingtested.jp\/wordpress\/?p=821"},"modified":"2018-06-12T09:15:26","modified_gmt":"2018-06-12T00:15:26","slug":"uwp%e2%86%92java%e9%96%93%e3%81%aersaaes%e6%9a%97%e5%8f%b7%e5%8c%96%e5%be%a9%e5%8f%b7%e5%8c%96%e8%a6%9a%e3%81%88%e6%9b%b8%e3%81%8d","status":"publish","type":"post","link":"https:\/\/beingtested.jp\/wordpress\/?p=821","title":{"rendered":"UWP(C++\/CX)\u2192Java\u9593\u306eRSA+AES\u6697\u53f7\u5316\/\u5fa9\u53f7\u5316\u899a\u3048\u66f8\u304d"},"content":{"rendered":"<p>\u3053\u3053\u4f55\u65e5\u304b\u60aa\u6226\u82e6\u95d8\u3057\u305f\u306e\u3067\u899a\u3048\u66f8\u304d\u3002\u6211\u306a\u304c\u3089\u8fc2\u9060\u304b\u3064\u30c8\u30ea\u30c3\u30ad\u30fc\u306a\u51e6\u7406\u3057\u3066\u308b\u306e\u3067\u3001\u4f55\u3092\u3084\u3063\u3066\u308b\u306e\u304b\u5fd8\u308c\u3066\u3057\u307e\u3046\u53ef\u80fd\u6027\u304c\u9ad8\u3044\u3057\u3002<br \/>\n\u306a\u304a\u3001\u3053\u3053\u306b\u8a18\u3059\u51e6\u7406\u306e\u8af8\u3005\u306f\u672c\u756a\u74b0\u5883\u3067\u306f\u305d\u306e\u307e\u307e\u4f7f\u3046\u6c17\u306f(\u5f53\u7136)\u7121\u3044\u3067\u3059\u3002\u6697\u53f7\u306b\u3064\u3044\u3066\u306f(\u3082)\u3069\u7d20\u4eba\u306a\u306e\u3067\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e0a\u306e\u7a74\u304c\u3042\u308b\u53ef\u80fd\u6027\u304c\u5927\u3067\u3042\u308b\u3053\u3068\u306f\u6700\u521d\u306b\u8ff0\u3079\u3066\u304a\u304d\u307e\u3059\u3002<\/p>\n<p>\u307e\u305a\u306fRSA\u9375\u751f\u6210\u3002\u6700\u521d\u306fJava\u3067\u751f\u6210\u3059\u308b<a href=\"https:\/\/gist.github.com\/seraphy\/3053875\" target=\"_blank\">\u4f8b<\/a>\u3092\u898b\u3064\u3051\u3066\u305d\u306e\u901a\u308a\u3084\u308d\u3046\u3068\u3057\u3066\u3001\u9375\u30c7\u30fc\u30bf\u306e\u4fdd\u5b58\/\u547c\u3073\u51fa\u3057\u65b9\u6cd5\u3067\u56db\u82e6\u516b\u82e6\u3002<br \/>\n\u3067\u3082\u3088\u304f\u8003\u3048\u305f\u3089\u3053\u306e\u90e8\u5206\u306f\u666e\u901a\u306bOpenSSL\u4f7f\u3048\u3070\u3044\u3044\u3093\u3058\u3083\u306a\u3044\u304b\uff1f\u60c5\u5831\u3082\u591a\u3044\u3057\u3002<a href=\"http:\/\/krmkw.blogspot.jp\/2010\/09\/java-rsa.html\" target=\"_blank\">\u53c2\u8003<\/a><br \/>\n[code language=&#8221;bash&#8221;]<br \/>\nopenssl genrsa -out private_key.pem<br \/>\nopenssl rsa -pubout -in private_key.pem -out public_key.pem<br \/>\nopenssl rsa -inform pem -outform der -pubin -in public_key.pem  -out public_key.der<br \/>\nopenssl pkcs8 -topk8 -in private_key.pem -inform pem -nocrypt -out private_key.der -outform der<br \/>\n[\/code]<br \/>\n\u307e\u305a\u666e\u901a\u306bpem\u5f62\u5f0f\u3067\u51fa\u529b\u3001\u305d\u306e\u3042\u3068Java\u3067\u6271\u3048\u308b\u3088\u3046der\u5f62\u5f0f\u30d5\u30a1\u30a4\u30eb\u3082\u51fa\u529b\u3002\u4e0a\u306e\u30b3\u30de\u30f3\u30c9\u306f\u30b5\u30fc\u30d0\u4e0a\u3067\u8d70\u3089\u305b\u305f\u3082\u306e\u3002Windows\u30de\u30b7\u30f3\u3067\u3084\u308b\u5834\u5408\u306f\u30aa\u30d7\u30b7\u30e7\u30f3\u6307\u5b9a\u304c\u5fae\u5999\u306b\u9055\u3046\u3089\u3057\u3044\u306e\u3067\u6ce8\u610f\u3002\u8a73\u3057\u304f\u306f\u2191\u306e\u53c2\u8003\u30b5\u30a4\u30c8\u3092\u3002<\/p>\n<p>\u6b21\u306bRSA\u516c\u958b\u9375\u3092UWP(C++\/CX)\u3067\u6271\u3048\u308b\u5f62\u306b\u3059\u308b\u3002\u3053\u3053\u3067\u304b\u306a\u308a\u306e\u8a66\u884c\u932f\u8aa4\u3002\u3067\u3082\u307e\u3055\u306b\u6b32\u3057\u304b\u3063\u305f\u60c5\u5831\u3092\u66f8\u3044\u3066\u304f\u3060\u3055\u3063\u3066\u3044\u308b<a href=\"http:\/\/www.cat-ears.net\/?p=403\" target=\"_blank\">\u30d6\u30ed\u30b0<\/a>\u3092\u767a\u898b\u3002\u300cBase64\u30a8\u30f3\u30b3\u30fc\u30c9\u3057\u305fmodulus\u3068publicExponent\u300d\u3064\u307e\u308a\u6587\u5b57\u5217\u3092\u4e8c\u3064\u516c\u958b\u9375\u304b\u3089\u751f\u6210\u3059\u308c\u3070\u826f\u3055\u305d\u3046\u3060\u3068\u7406\u89e3\u3002\u4ee5\u4e0b\u306eJava\u30b3\u30fc\u30c9\u3092\u66f8\u304f\u3002<br \/>\n[code language=&#8221;java&#8221;]<br \/>\n\/\/\u5b9a\u6570<br \/>\nprivate static final String CIPHER_ALGORITHM = &quot;RSA&quot;;<br \/>\nprivate static final String CIPHER_MODE = CIPHER_ALGORITHM + &quot;\/ECB\/PKCS1PADDING&quot;;<br \/>\n\/\/\u307e\u305a\u30ad\u30fc\u30d5\u30a1\u30a4\u30eb\u8aad\u307f\u8fbc\u307f<br \/>\nprivate static byte[] readKeyFile(String path) throws IOException{<br \/>\n\t\tbyte[] data = null;<br \/>\n\t\tFileInputStream in = new FileInputStream(path);<br \/>\n\t\tdata = new byte[in.available()];<br \/>\n\t\tin.read(data);<br \/>\n\t\tin.close();<br \/>\n\t\treturn data;<br \/>\n\t}<br \/>\n\/\/\u30d5\u30a1\u30a4\u30eb\u304b\u3089\u516c\u958b\u9375\u751f\u6210<br \/>\nprivate static RSAPublicKey gen_publicKey_RSA(String publicKeyPath_RSA) throws IOException, InvalidKeySpecException, NoSuchAlgorithmException, NoSuchPaddingException, IllegalBlockSizeException, BadPaddingException, InvalidKeyException{<br \/>\n\t\tbyte[] keyData = readKeyFile(publicKeyPath_RSA);<br \/>\n\t\tKeySpec keySpec = new X509EncodedKeySpec(keyData);<br \/>\n\t\tKeyFactory keyFactory = KeyFactory.getInstance(CIPHER_ALGORITHM);<br \/>\n\t\tKey publicKey = keyFactory.generatePublic(keySpec);<br \/>\n\t\treturn (RSAPublicKey)publicKey;<br \/>\n\t}<br \/>\n\/\/\u2191\u306e\u30d6\u30ed\u30b0\u3092\u53c2\u8003\u306b\u5148\u982d\u306e\u7b26\u53f7\u30d3\u30c3\u30c8\u3092\u524a\u308b\u51e6\u7406<br \/>\npublic static byte[] stripLeadingZeros(byte[] values) {<br \/>\n\t\tif((values.length &gt; 1) &amp;&amp; (0x00 == values[0])){<br \/>\n\t\t\tbyte[] r = new byte[values.length &#8211; 1];<br \/>\n\t\t\tSystem.arraycopy(values, 1, r, 0, values.length &#8211; 1);<br \/>\n                        return r;<br \/>\n\t\t}else{<br \/>\n                        return values;<br \/>\n                }<br \/>\n}<br \/>\n\/\/\u6700\u5f8c\u306b\u6587\u5b57\u5217\u5410\u304d\u51fa\u3059\u51e6\u7406\u3002<br \/>\nprivate static void gen_modulus_and_pe(RSAPublicKey publickey){<br \/>\n\tbyte[] modulesBytes = Utils.stripLeadingZeros(publickey.getModulus().toByteArray());<br \/>\n\tString modules = Base64.encodeBase64String(modulesBytes);<br \/>\n\tString pe = Base64.encodeBase64String(publickey.getPublicExponent().toByteArray());<br \/>\n\tSystem.out.println(&quot;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&quot;);<br \/>\n\tSystem.out.println(modules);<br \/>\n\tSystem.out.println(pe);<br \/>\n\tSystem.out.println(&quot;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&quot;);<br \/>\n}<br \/>\n[\/code]<\/p>\n<p>\u3053\u3053\u3067\u3044\u3061\u3044\u3061\u30d5\u30a1\u30a4\u30eb\u30a2\u30af\u30bb\u30b9\u3059\u308b\u306e\u3082\u3069\u3046\u306a\u306e\u3068\u601d\u3063\u305f\u306e\u3067\u3001Java\u5074\u3067\u3082\u79d8\u5bc6\u9375\/\u516c\u958b\u9375\u3068\u3082\u306b\u6587\u5b57\u5217\u30c7\u30fc\u30bf\u3068\u3057\u3066\u6271\u3048\u306a\u3044\u304b\u3068\u8a66\u884c\u932f\u8aa4\u958b\u59cb\u3002<br \/>\nstackoverflow\u3092\u5f98\u5f8a\u3057\u3066\u308b\u3068\u300c\u79d8\u5bc6\u9375\u306e\u6587\u5b57\u5217\u5316\u306a\u3093\u3066\u30c0\u30e1!\u7d76\u5bfe!!\u300d\u7684\u306a\u30ec\u30b9\u304c\u305f\u304f\u3055\u3093\u898b\u3089\u308c\u308b\u306e\u3060\u3051\u3069\u3001\u30a4\u30de\u30a4\u30c1\u610f\u5473\u304c\u5206\u304b\u3089\u306a\u3044\u3002\u3060\u3063\u3066pem\u30d5\u30a1\u30a4\u30eb\u3082\u5e73\u6587\u306e\u30d5\u30a1\u30a4\u30eb\u3067\u3057\u3087\u3002\u300c\u79d8\u5bc6\u9375\u30c7\u30fc\u30bf\u306bprivate_key.pem\u306a\u3093\u3066\u308f\u304b\u308a\u3084\u3059\u3044\u30d5\u30a1\u30a4\u30eb\u540d\u3064\u3051\u3066\u3001\u4e2d\u8eab\u306f\u5e73\u6587\u3067\u4fdd\u6301\u300d\u3068\u300c\u79d8\u5bc6\u9375\u30c7\u30fc\u30bf\u3092jar\u30d5\u30a1\u30a4\u30eb\u306e\u4e2d\u306b\u6587\u5b57\u5217\u5b9a\u6570\u3068\u3057\u3066(\u4eca\u56de\u306f\u7d50\u5c4016\u9032\u6587\u5b57\u5217\u306b\u3057\u305f)\u4fdd\u6301\u300d\u306e\u4e8c\u3064\u306e\u3084\u308a\u65b9\u306b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a4\u4e0a\u306e\u512a\u52a3\u304c\u3042\u308b\u306e\u3060\u308d\u3046\u304b\u3002<br \/>\n\u305d\u3046\u601d\u3063\u3066\u6587\u5b57\u5217\u5316\u51e6\u7406\u5b9f\u88c5\u3002<a href=\"http:\/\/www.magata.net\/memo\/index.php?RSA%B8%F8%B3%AB%B8%B0%2F%C8%EB%CC%A9%B8%B0%A4%CB%A4%E8%A4%EB%B0%C5%B9%E6%B2%BD%2F%C9%FC%B9%E6%B2%BD\" target=\"_blank\">\u53c2\u8003<\/a><br \/>\n[code language=&#8221;java&#8221;]<br \/>\n\/\/\u6587\u5b57\u5217\u5316<br \/>\nprivate static String KeyData_toHexString(String path) throws IOException{<br \/>\n\t\tbyte[] keyData = readKeyFile(path);<br \/>\n\t\treturn toHexString(keyData);<\/p>\n<p>\t}<br \/>\nprivate static String toHexString(byte[] data) {<br \/>\n        StringBuilder buf = new StringBuilder();<br \/>\n        for (byte d : data) {<br \/>\n            buf.append(String.format(&quot;%02X&quot;, d));<br \/>\n        }<br \/>\n        return buf.toString();<br \/>\n    }<br \/>\n\/\/\u6587\u5b57\u5217\u304b\u3089\u30ad\u30fc\u751f\u6210\u3002<br \/>\nprivate static RSAPrivateKey gen_privateKey_RSA_from_hexString(String hexString) throws InvalidKeySpecException, NoSuchAlgorithmException{<br \/>\n\t\tbyte[] keyData = hexToByte(hexString);<br \/>\n\t\tKeySpec keySpec = new PKCS8EncodedKeySpec(keyData);<br \/>\n\t\tKeyFactory keyFactory = KeyFactory.getInstance(CIPHER_ALGORITHM);<br \/>\n\t\treturn (RSAPrivateKey)keyFactory.generatePrivate(keySpec);<br \/>\n\t}<br \/>\n\tprivate static RSAPublicKey gen_publicKey_RSA_from_hexString(String hexString) throws IOException, InvalidKeySpecException, NoSuchAlgorithmException, NoSuchPaddingException, IllegalBlockSizeException, BadPaddingException, InvalidKeyException{<br \/>\n\t\tbyte[] keyData = hexToByte(hexString);<br \/>\n\t\tKeySpec keySpec = new X509EncodedKeySpec(keyData);<br \/>\n\t\tKeyFactory keyFactory = KeyFactory.getInstance(CIPHER_ALGORITHM);<br \/>\n\t\tKey publicKey = keyFactory.generatePublic(keySpec);<br \/>\n\t\treturn (RSAPublicKey)publicKey;<br \/>\n\t}<br \/>\nprivate static byte[] hexToByte(String hexString){<br \/>\n\t\tint size = hexString.length() \/ 2;<br \/>\n\t\tbyte[] bytes = new byte[size];<br \/>\n\t\tfor(int i = 0;i&lt;size;i++){<br \/>\n\t\t\tString tmp = hexString.substring(i * 2,i * 2 + 2);<br \/>\n\t\t\tbytes[i] = (byte) Integer.parseInt(tmp,16);<br \/>\n\t\t}<br \/>\n\t\treturn bytes;<br \/>\n\t}<br \/>\n[\/code]<br \/>\n\u4ee5\u964d\u306fJava\u5074\u3067\u306f\u3053\u308c\u3067\u751f\u6210\u3057\u305f\u79d8\u5bc6\u9375\u30c7\u30fc\u30bf\u3068\u516c\u958b\u9375\u30c7\u30fc\u30bf\u306e16\u9032\u6587\u5b57\u5217\u3092\u5b9a\u6570\u3068\u3057\u3066\u57cb\u3081\u8fbc\u307f\u5229\u7528\u3059\u308b\u3002\u6b63\u76f4\u3001pem\u30d5\u30a1\u30a4\u30eb\u3067\u3082der\u30d5\u30a1\u30a4\u30eb\u3067\u3082\u4f55\u3067\u3082\u826f\u304b\u3063\u305f\u3093\u3060\u3051\u3069\u3001\u4eca\u5f8c\u8272\u3093\u306a\u74b0\u5883\u3067\u30c6\u30b9\u30c8\u3057\u3066\u3044\u304f\u4e2d\u3067\u6bce\u56de\u30d5\u30a1\u30a4\u30eb\u306e\u30d1\u30b9\u6307\u5b9a\u3092\u9593\u9055\u3048\u3066\u8e93\u304d\u305d\u3046\u3060\u3063\u305f\u306e\u3067\u3053\u3046\u3057\u307e\u3057\u305f\u3002\u6697\u53f7\u5316\/\u5fa9\u53f7\u5316\u51e6\u7406\u306b\u5fc5\u9808\u306e\u51e6\u7406\u3067\u306f\u306a\u3044\u3067\u3059\u3002<\/p>\n<p>\u6b21\u306fUWP(C++\/CX)\u5074\u306e\u51e6\u7406\u3002\u3053\u3053\u304b\u3089\u60c5\u5831\u304c\u5c11\u306a\u3059\u304e\u3066\u5927\u5909\u3060\u3063\u305f\u3002\u554f\u984c\u306f\u6697\u53f7\u5316\u51e6\u7406\u306e\u30b5\u30f3\u30d7\u30eb\u30b3\u30fc\u30c9\u3067\u983b\u51fa\u3059\u308b\u300cSystem.Security.Cryptography\u300d\u540d\u524d\u7a7a\u9593\u304cUWP\u3067\u306f\u4f7f\u3048\u306a\u3044\u3053\u3068\u3002\u300cWindows::Security::Cryptography\u300d\u4f7f\u3048\u3068\u306e\u3053\u3068\u3002\u7d50\u679cweb\u7a7a\u9593\u4e0a\u306b\u5c71\u307b\u3069\u3042\u308b\u30b5\u30f3\u30d7\u30eb\u30b3\u30fc\u30c9\u304c\u53c2\u8003\u306b\u306a\u3089\u306a\u304f\u306a\u308b\u3002\u3068\u308a\u3042\u3048\u305a\u2191\u306e\u53c2\u8003\u30d6\u30ed\u30b0\u3067\u4f7f\u3063\u3066\u305fRSACryptoServiceProvider\u306fWindows::Security::Cryptography\u306b\u306f\u306a\u3044\u306e\u3067\u3001\u3067\u306f\u4f55\u3092\u4f7f\u3046\u306e\u304b\uff1f\u3068\u30b0\u30b0\u3063\u305f\u308a\u30b3\u30fc\u30c9\u30a2\u30b7\u30b9\u30c8\u3067\u8272\u3005\u8a66\u3057\u305f\u308a\u3002\u7d50\u679cCryptographicBuffer.DecodeFromBase64String\u3042\u305f\u308a\u3092\u4f7f\u3048\u3070\u884c\u3051\u305d\u3046\u3068\u306e\u611f\u89e6\u3092\u5f97\u3066API\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u307f\u308b\u3082\u3001\u30d1\u30e9\u30e1\u30fc\u30bf\u306f\u300cBase64 encoded input string.\u300d\u4e00\u3064\u3060\u3051\u3002\u3048\u3001modulus\u3068publicExponent\u306e\u4e8c\u3064\u3058\u3083\u306a\u3044\u306e\uff1f\u3055\u3089\u306b\u30b0\u30b0\u308a\u307e\u304f\u3063\u305f\u7d50\u679c\u3001<a href=\"http:\/\/stackoverflow.com\/questions\/17210175\/winrt-rsa-encryption-from-public-key-exponent-modulus\" target=\"_blank\">\u56de\u7b54<\/a>\u767a\u898b\u3002\u8981\u3059\u308b\u306b\u300cmodulus\u3068publicExponent\u304b\u3089cspBlobString\u751f\u6210\u3057\u308d\u3002\u305d\u306e\u51e6\u7406\u306fUWP(C++\/CX)\u4f7f\u308f\u306a\u304f\u3066\u3082\u69cb\u308f\u3093\u3002\u3064\u307e\u308aSystem.Security.Cryptography\u540d\u524d\u7a7a\u9593\u4f7f\u3063\u3066\u826f\u3057\u300d\u3068\u306e\u3053\u3068\u3002\u3088\u3063\u3066\u6b21\u306e\u51e6\u7406\u90e8\u5206\u3060\u3051C#\u3067\u3084\u3063\u3066\u307f\u308b\u3002\u521d\u3081\u3066\u306eC#\u3002<br \/>\n[code language=&#8221;csharp&#8221;]<br \/>\n static String gen_cspBlobString()<br \/>\n        {<br \/>\n            String MODULUS = &quot;Java\u3067\u751f\u6210\u3057\u305f\u6587\u5b57\u5217&quot;;<br \/>\n            String PE = &quot;Java\u3067\u751f\u6210\u3057\u305f\u6587\u5b57\u5217&quot;;<\/p>\n<p>            RSAParameters parameters = new RSAParameters();<br \/>\n            parameters.Modulus = System.Convert.FromBase64String(MODULUS);<br \/>\n            parameters.Exponent = System.Convert.FromBase64String(PE);<\/p>\n<p>            System.Security.Cryptography.RSACryptoServiceProvider rsa = new System.Security.Cryptography.RSACryptoServiceProvider();<br \/>\n            rsa.ImportParameters(parameters);<br \/>\n            String cspBlobString = Convert.ToBase64String(rsa.ExportCspBlob(false));<\/p>\n<p>            return cspBlobString;<br \/>\n        }<br \/>\n[\/code]<br \/>\n\u3053\u308c\u3067\u3067\u304d\u305f\u6587\u5b57\u5217\u3092\u4f7f\u3044\u3001\u4ee5\u964d\u306fUWP(C++\/CX)\u3067RSA\u6697\u53f7\u5316\u51e6\u7406\u3002<br \/>\n[code language=&#8221;cpp&#8221;]<br \/>\nusing namespace Windows::Storage::Streams;<br \/>\nusing namespace Windows::Security::Cryptography;<br \/>\nString^ TEST_RSA_AES::MainPage::encryption_RSA(String^ target)<br \/>\n{<br \/>\n\tString^ result = &quot;&quot;;<br \/>\n\tString^ cspBlobString = &quot;\u2191\u306eC#\u30b9\u30af\u30ea\u30d7\u30c8\u3067\u5410\u304d\u51fa\u3057\u305f\u6587\u5b57\u5217&quot;;<br \/>\n\tIBuffer^ keyBlob = CryptographicBuffer::DecodeFromBase64String(cspBlobString);<br \/>\n\tCore::AsymmetricKeyAlgorithmProvider^ rsa = Core::AsymmetricKeyAlgorithmProvider::OpenAlgorithm(Core::AsymmetricAlgorithmNames::RsaPkcs1);<br \/>\n\tCore::CryptographicKey^ key = rsa-&gt;ImportPublicKey(keyBlob, Core::CryptographicPublicKeyBlobType::Capi1PublicKey);<br \/>\n\tIBuffer^ plainBuffer = CryptographicBuffer::ConvertStringToBinary(target, BinaryStringEncoding::Utf8);<br \/>\n\tIBuffer^ encryptedBuffer = Core::CryptographicEngine::Encrypt(key, plainBuffer, nullptr);<\/p>\n<p>\tresult = CryptographicBuffer::EncodeToBase64String(encryptedBuffer);<\/p>\n<p>\treturn result;<br \/>\n}<br \/>\n[\/code]<br \/>\nJava\u5074\u3067\u5fa9\u53f7\u3002web\u4e0a\u306e\u60c5\u5831\u3082\u591a\u304f\u3066\u3059\u3050\u51e6\u7406\u304c\u7d44\u3081\u308bw<br \/>\n[code language=&#8221;java&#8221;]<br \/>\nprivate static String decryptRSA(String encrypted_base64) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeySpecException, InvalidKeyException, IllegalBlockSizeException, BadPaddingException, UnsupportedEncodingException{<br \/>\n\t\tbyte[] src = Base64.decodeBase64(encrypted_base64);<br \/>\n\t\tCipher cipher = Cipher.getInstance(&quot;RSA&quot;);<br \/>\n\t\tbyte[] keyData = Utils.hexToByte(privarteKeyText_RSA);<br \/>\n\t\tKeySpec keySpec = new PKCS8EncodedKeySpec(keyData);<br \/>\n\t\tKeyFactory keyFactory = KeyFactory.getInstance(&quot;RSA&quot;);<br \/>\n\t\tKey privateKey = keyFactory.generatePrivate(keySpec);<br \/>\n\t\tcipher.init(Cipher.DECRYPT_MODE, privateKey);<br \/>\n\t\tbyte[] resultBytes = cipher.doFinal(src);<br \/>\n\t\tString result = new String(resultBytes,&quot;UTF-8&quot;);<br \/>\n\t\treturn result;<br \/>\n\t}<br \/>\n[\/code]<br \/>\n\u6697\u53f7\u5316\u306e\u5b9a\u77f3\u3001\u300c\u5e73\u6587\u306e\u6697\u53f7\u5316\u306fAES\u5171\u901a\u9375\u65b9\u5f0f\u3067\u884c\u3044\u3001\u6dfb\u4ed8\u3059\u308b\u5171\u901a\u9375\u3092RSA\u65b9\u5f0f\u3067\u6697\u53f7\u5316\u3059\u308b\u300d\u51e6\u7406\u3092\u5b9f\u88c5\u3002\u8a66\u3057\u306b\u9577\u3081\u306e\u5e73\u6587\u3092RSA\u6697\u53f7\u5316\u51e6\u7406\u3055\u305b\u3066\u307f\u305f\u3089\u3001\u958b\u767a\u306b\u4f7f\u3063\u3066\u308bi7\u642d\u8f09\u6a5f\u3067\u3082\u5f15\u3063\u304b\u304b\u308b\u3002<br \/>\n\u4f55\u3088\u308a\u4eca\u56de\u306e\u6697\u53f7\u5316\u51e6\u7406\u306f\u6700\u7d42\u7684\u306b\u306fwebAPI\u5b9f\u88c5\u306e\u4e00\u90e8\u3060\u304b\u3089\u3001POST\u30a2\u30af\u30bb\u30b9\u306a\u3089\u6587\u5b57\u6570\u5236\u9650\u306a\u3044\u3051\u308c\u3069\u3082\u3042\u307e\u308a\u306b\u9577\u3044\u30af\u30a8\u30ea\u306b\u306a\u308b\u306e\u306f\u56f0\u308b\u3002\u4ee5\u4e0bUWP(C++\/CX)\u3067AES\u6697\u53f7\u5316\u51e6\u7406<br \/>\n[code language=&#8221;cpp&#8221;]<br \/>\nPlatform::Collections::Vector&lt;Platform::String^&gt;^ TEST_RSA_AES::MainPage::encryption_AES(Platform::String ^ target)<br \/>\n{<\/p>\n<p>\tString^  algoName = Core::SymmetricAlgorithmNames::AesCbcPkcs7;<br \/>\n\tString^ pass = &quot;\u30d1\u30b9\u30ef\u30fc\u30c9&quot;;<\/p>\n<p>\tCore::SymmetricKeyAlgorithmProvider^ algo = Core::SymmetricKeyAlgorithmProvider::OpenAlgorithm(algoName);<\/p>\n<p>\tIBuffer^ salt = CryptographicBuffer::GenerateRandom(32);<br \/>\n\tIBuffer^ textBuffer = CryptographicBuffer::ConvertStringToBinary(target, BinaryStringEncoding::Utf8);<br \/>\n\tIBuffer^ digestBuffer = gen_digest(algo, pass, salt);<br \/>\n\tIBuffer^ ivBuffer = CryptographicBuffer::GenerateRandom(algo-&gt;BlockLength);<\/p>\n<p>\tIBuffer^ encryptedBuffer = Core::CryptographicEngine::Encrypt(algo-&gt;CreateSymmetricKey(digestBuffer), textBuffer, ivBuffer);<\/p>\n<p>\tPlatform::Collections::Vector&lt;String^&gt;^ result = ref new Platform::Collections::Vector&lt;String^&gt;;<br \/>\n\tString^ encrypted = CryptographicBuffer::EncodeToBase64String(encryptedBuffer);<br \/>\n\tresult-&gt;Append(encrypted);<br \/>\n\tOutputDebugString((&quot;encrypted: &quot; + encrypted + L&quot;\\r\\n&quot;)-&gt;Data());<br \/>\n\tString^ iv = CryptographicBuffer::EncodeToBase64String(ivBuffer);<br \/>\n\tresult-&gt;Append(iv);<br \/>\n\tOutputDebugString((&quot;iv: &quot; + iv + L&quot;\\r\\n&quot;)-&gt;Data());<br \/>\n\tString^ digest = encryption_RSA(CryptographicBuffer::EncodeToBase64String(digestBuffer));<br \/>\n\tresult-&gt;Append(digest);<br \/>\n\tOutputDebugString((&quot;digest: &quot; + digest + L&quot;\\r\\n&quot;)-&gt;Data());<br \/>\n\treturn result;<br \/>\n}<\/p>\n<p>Windows::Storage::Streams::IBuffer ^ TEST_RSA_AES::MainPage::gen_digest(Windows::Security::Cryptography::Core::SymmetricKeyAlgorithmProvider^ algo, Platform::String ^ pass, Windows::Storage::Streams::IBuffer ^ salt)<br \/>\n{<br \/>\n\tuint32 SALT_ITERATION_COUNT = 10000;<br \/>\n\tCore::KeyDerivationAlgorithmProvider^ pbkdf2 = Core::KeyDerivationAlgorithmProvider::OpenAlgorithm(Core::KeyDerivationAlgorithmNames::Pbkdf2Sha256);<br \/>\n\tIBuffer^ passBuffer = CryptographicBuffer::ConvertStringToBinary(pass, BinaryStringEncoding::Utf8);<br \/>\n\tCore::CryptographicKey^ key = pbkdf2-&gt;CreateKey(passBuffer);<br \/>\n\tCore::KeyDerivationParameters^ parameters = Core::KeyDerivationParameters::BuildForPbkdf2(salt, SALT_ITERATION_COUNT);<br \/>\n\treturn Core::CryptographicEngine::DeriveKeyMaterial(key, parameters, 32);<\/p>\n<p>}<\/p>\n<p>[\/code]<br \/>\n\u7d50\u679c\u3001\u6697\u53f7\u5316\u30c7\u30fc\u30bf\u306ebase64\u6587\u5b57\u5217\u3001iv\u306ebase64\u6587\u5b57\u5217\u3001digest\u306ebase64\u6587\u5b57\u5217\u3092RSA\u6697\u53f7\u5316\u3057\u305f\u6587\u5b57\u5217\u304c\u751f\u6210\u3055\u308c\u308b\u3002<br \/>\n\u305d\u308c\u3092Java\u5074\u3067\u5fa9\u53f7\u3002<br \/>\n[code language=&#8221;java&#8221;]<br \/>\nprivate static String decryptAES(String encrypted_base64,String iv_base64,String digest_base64) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, InvalidAlgorithmParameterException, IOException, IllegalBlockSizeException, BadPaddingException{<br \/>\n\t\tbyte[] digest = Base64.decodeBase64(digest_base64);<br \/>\n\t\tbyte[] iv = Base64.decodeBase64(iv_base64);<br \/>\n\t\tbyte[] encryptedAES = Base64.decodeBase64(encrypted_base64);<br \/>\n\t\tSecretKey secretKey = new SecretKeySpec(digest, &quot;AES&quot;);<br \/>\n\t\tCipher cipher = Cipher.getInstance(&quot;AES\/CBC\/PKCS5Padding&quot;);<br \/>\n\t\tcipher.init(Cipher.DECRYPT_MODE, secretKey,new IvParameterSpec(iv));<\/p>\n<p>\t\tByteArrayOutputStream bos = new ByteArrayOutputStream();<br \/>\n\t\tbos.write(cipher.update(encryptedAES));<br \/>\n\t\tbos.write(cipher.doFinal());<br \/>\n\t\tbyte[] bytes = bos.toByteArray();<br \/>\n\t\treturn new String(bytes,0,bytes.length,&quot;UTF-8&quot;);<br \/>\n\t}<br \/>\n\/\/\u3053\u3093\u306a\u611f\u3058\u3067\u4f7f\u3046<br \/>\nString dec = decryptAES(ENCRYPTED_TEXT_AES64, IV_64, decryptRSA(DIGEST_RSA64));<br \/>\nSystem.out.println(dec);<br \/>\n[\/code]<br \/>\n\u304a\u305d\u3089\u304f\u521d\u56de\u306f\u3053\u306eAES\u5fa9\u53f7\u51e6\u7406\u306fInvalidKeyException\u3067\u843d\u3061\u308b\u3002Java\u306b\u306fAES\u9375\u9577\u306e\u5236\u9650\u304c\u3042\u308b\u3089\u3057\u3044\u3002<a href=\"http:\/\/d.hatena.ne.jp\/nakamiri\/20111121\/1321902479\" target=\"_blank\">\u53c2\u8003<\/a><br \/>\n\u4ee5\u4e0a\u3001\u4eca\u56de\u5b9f\u88c5\u3057\u305f\u51e6\u7406\u306e\u3059\u3079\u3066\u3002\u3053\u306e\u30a8\u30f3\u30c8\u30ea\u66f8\u304f\u306e\u306b2\u6642\u9593\u304b\u304b\u3063\u305fw\u3000\u30ea\u30f3\u30af\u3057\u305f\u53c2\u8003\u5148\u30b5\u30a4\u30c8\u306e\u3059\u3079\u3066\u306e\u7686\u3055\u3093\u306b\u611f\u8b1d\u3002\u3053\u3093\u306a\u30b3\u30d4\u30da\u30d7\u30ed\u30b0\u30e9\u30de\u306e\u3084\u3063\u3064\u3051\u3067\u66f8\u3044\u3066\u308b\u30b3\u30fc\u30c9\u3067\u306a\u3044\u3001\u7406\u8ad6\u306b\u88cf\u4ed8\u3051\u3055\u308c\u305f\u7f8e\u3057\u3044\u30b3\u30fc\u30c9\u304c\u4e26\u3093\u3067\u307e\u3059\u3002\u6697\u53f7\u5316\u306b\u3064\u3044\u3066\u8abf\u3079\u3066\u3044\u3066\u3053\u306e\u30a8\u30f3\u30c8\u30ea\u306b\u305f\u3069\u308a\u7740\u3044\u305f\u4eba\u304c\u3082\u3057\u3044\u305f\u3089\u3001\u662f\u975e\u30ea\u30f3\u30af\u5148\u3078\u884c\u3063\u3066\u307f\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u3053\u3053\u4f55\u65e5\u304b\u60aa\u6226\u82e6\u95d8\u3057\u305f\u306e\u3067\u899a\u3048\u66f8\u304d\u3002\u6211\u306a\u304c\u3089\u8fc2\u9060\u304b\u3064\u30c8\u30ea\u30c3\u30ad\u30fc\u306a\u51e6\u7406\u3057\u3066\u308b\u306e\u3067\u3001\u4f55\u3092\u3084\u3063\u3066\u308b\u306e\u304b\u5fd8\u308c\u3066\u3057\u307e\u3046\u53ef\u80fd\u6027\u304c\u9ad8\u3044\u3057\u3002 \u306a\u304a\u3001\u3053\u3053\u306b\u8a18\u3059\u51e6\u7406\u306e\u8af8\u3005\u306f\u672c\u756a\u74b0\u5883\u3067\u306f\u305d\u306e\u307e\u307e\u4f7f\u3046\u6c17\u306f(\u5f53\u7136)\u7121\u3044\u3067\u3059\u3002\u6697\u53f7\u306b\u3064\u3044\u3066\u306f(\u3082) [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[41,47],"class_list":["post-821","post","type-post","status-publish","format-standard","hentry","category-script","tag-java","tag-uwp"],"_links":{"self":[{"href":"https:\/\/beingtested.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beingtested.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beingtested.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beingtested.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/beingtested.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=821"}],"version-history":[{"count":15,"href":"https:\/\/beingtested.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/821\/revisions"}],"predecessor-version":[{"id":838,"href":"https:\/\/beingtested.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/821\/revisions\/838"}],"wp:attachment":[{"href":"https:\/\/beingtested.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beingtested.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beingtested.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}