在前后端通信过程中,一些敏感信息,特别是用户的账号密码,需要加密进行传输,如何选择加密方式也是一门学问,这里倒也不过多偏题了。通常来说b/s架构中用的比较多的传输数据加密是rsa加密,核心思想就是公钥加密,私钥解密。公钥,可以理解为可以公开的钥匙,服务器将公钥发给客户端,客户端用公钥对数据进行加密传输,服务器收到客户端传来的密文,再用自己的配对的私钥进行解密,即可获得原始的数据。
大致流程如下图所示:
示例1、生成公私钥对nodejs中有一个核心模块——crypto提供各种加密、解密相关api。以下示例是基于node@12.15.0版本进行编写。
const crypto = require('crypto');/** * 生成rsa公私钥对 * @return {*} publickey: 公钥;privatekey: 私钥 */function genrsakeypaire() { const { publickey, privatekey } = crypto.generatekeypairsync('rsa', { moduluslength: 4096, publickeyencoding: { type: 'pkcs1', format: 'pem', }, privatekeyencoding: { type: 'pkcs1', format: 'pem', }, }); return { publickey, privatekey };}// 打印生成的公私钥对console.log(genrsakeypaire());
输出示例如下:
(示例公私钥已被删除了一部分,请勿用于实验)
{ publickey: '-----begin rsa public key-----\n' + 'miiccgkcageasitohtu9jf2h+npv4tnffhprlbstzxnm8wsecskwtpwi6azfgqc7\n' + '/a7m1hn8zk8wgizjy05ahinwpvxo70owj8tminiajb2wh0ndqm+iqqn7r20uzejm\n' + 'gbf1kusgemcheifwiad1h/ob9z9lc8zmyr/g+xabffcv8mxami9mgms8t5+xeym6\n' + 'emicqkqjfqperhw3oesj8hrdjdozbik3l0tgylyjzrqu6phzfkmd9we3by1qcxo1\n' + '2btnkvqoh9qdjitsb3s9v2mogl1rbitkldrqycdgy4iyxvifagnwhravzhqh/ter\n' + 'x+homlowu+npkz+oedmnuq1ugy181pbginwhvodxx+df5ckj/bgixfg2nsine3do\n' + 'wlxv3+w8af0006oe+fro1d7xt5sk5aipcpylkkydyup3mj5dppu7gmicwj20ndnu\n' + 'cdjj2hh9kzakz6/r62s7allufsecuzr0dqc6srjs43zbtps/hsi33r01ste6zel8\n' + 'urzkw/4fhug8gw1kcm+mp1mazufourcdc1iec0si71tteg52btpfb8cq9z1h0xwr\n' + 'fdbmlmlujkii5og2+flaqlgknik0axxpnlivsow5q+eloh0djqxxu2scaweaaq==\n' + '-----end rsa public key-----\n', privatekey: '-----begin rsa private key-----\n' + 'miijkqibaakcageasitohtu9jf2h+npv4tnffhprlbstzxnm8wsecskwtpwi6azf\n' + 'gqc7/a7m1hn8zk8wgizjy05ahinwpvxo70owj8tminiajb2wh0ndqm+iqqn7r20u\n' + 'zejmgbf1kusgemcheifwiad1h/ob9z9lc8zmyr/g+xabffcv8mxami9mgms8t5+x\n' + 'eym6emicqkqjfqperhw3oesj8hrdjdozbik3l0tgylyjzrqu6phzfkmd9we3by1q\n' + 'cxo12btnkvqoh9qdjitsb3s9v2mogl1rbitkldrqycdgy4iyxvifagnwhravzhqh\n' + '/terx+homlowu+npkz+oedmnuq1ugy181pbginwhvodxx+df5ckj/bgixfg2nsin\n' + 'e3dowlxv3+w8af0006oe+fro1d7xt5sk5aipcpylkkydyup3mj5dppu7gmicwj20\n' + 'ndnucdjj2hh9kzakz6/r62s7allufsecuzr0dqc6srjs43zbtps/hsi33r01ste6\n' + 'zel8urzkw/4fhug8gw1kcm+mp1mazufourcdc1iec0si71tteg52btpfb8cq9z1h\n' + '0xwrd+u6s+op8/hl5bdtszht1ztk8q/bf99+qot0q4kggu9am8koumk2bi3qin7k\n' + '0zaqfdbmlmlujkii5og2+flaqlgknik0axxpnlivsow5q+eloh0djqxxu2scawea\n' + 'aqkcaga9hxajmqaxrodwznbgzggol6jjggmjmxyzvi4hfcnkzhaicxphqkdavduw\n' + 'kfobuqqjpe6oftvvlu0pyqyx09divrr+iu/1cytldqytdwcy3cwsylord2ycxaom\n' + 'vpneh5caglwqrvhbks5wm8lmyeqsh7uu3q/73ekivwczxfg6jd+l6df4cl/gm92f\n' + '1lgnpe+jzqyjcpezqmosdg4/wm10j6z0uzar7+5jwxmxv0tdqnvjxxrdk9j8udfn\n' + '7lgw7b5juhwx4tbfq0yphmncmj4iom/d1ljshrq7b2i5y30qdhodezn1rjvayzec\n' + '2srll5sv5p27pk2zt3ebe2jogdfa7croykv7zknzrnfrc1wvacxq5+waainxtjrb\n' + '/cbtw5uboxc/kwru0l5baxg6mnoemzcg4wmp8cxnvyxrodon31qvcc1hsv5rx3dm\n' + 'r9+gizcwoxdm314oy3mxmbmkq/it6pf2kmglbmeyxffdtsr/zwy5+zaao6ggm59o\n' + 'anh0fht0xbeye11pivck6jmyl7ecp+yeophjxsafllh8sjnjwluakrgwqzxerb/i\n' + 'u5mgr+2zk4844kqdg7zuadaffyeixgwpu21xoev+5odswecpvfsrwip3lxfkfair\n' + 'vbgueswdfi98ehdi8eoc+11hif9axtnmmnqnl/ek0d44wakzaqkcaqea6wbz9agb\n' + 'vmhckt09wlgqfyiwhh9pnper+npu2frgkah5acrwg8ped3qaixfz1cmgksgxa6mz\n' + 'skm04zmygyc5zv3kpwxwcpcvskycozo0edkfrt7pc7n2zznfcdrmtaix1ckax1ry\n' + 'iihws2vl5gahgluswjgpssfjfl68ipgz1i2f7yossp+8tzo88supudbahhx/qekv\n' + '1p5ul43rf4agjcbwv5x3bappyosn//aupeet0jne2iq81c92sya8m0fbdxkxmhfn\n' + 'fuxlvmud3xsemgfxvs1ziop8f1sg8hza0p5lnugyzuyieupouckohkl/tzmqyl07\n' + '7yi7a2onyrsoeqkcaqeaw3eagvp1wdeghenacdoa5ls1afuqx5ewt8njcwxfhowc\n' + 'b33mweioc6/phf+emqkjl/+r2mv3jk2i3wqgkaaqs8h68gnjsz0vkebrsmxhpiqm\n' + 'jsl99lviko8gj2igjccn5buzrwes4fxr4/tvm2llnjhrmeqahpembcylwrso+btz\n' + 'p4cgja5gxtsudkagnvxhgyfzi5of5xyyhljdmn5i4v/hvhlmlvmwreaqy/fz1ifc\n' + 'jyrubsmobo6fe5hi8no481c4m1e96cj1bgwwe+mncnxfpj3cdlrxjy848+pypt8j\n' + '8epfc2+hphufffbgxwpzbprhig97usqhwr3aq/u9uwkcaqearpjjwgje9skqztu6\n' + 'pu+krkewnlydeg51lq4okh8qfey7gbfv+z16v6tywxbrlrlmwijosx0lclipvk0c\n' + 'q/h/85ikkodopvozi/f4dwiwvhoz4ejpw9ex4yh1agti9l+73g8sc6vpa/uaiwf4\n' + 'trie+5wmfcy4yjow9g2vfddaw9nampwblx4ma83btd1x28tsv+fxspwexzxr/y20\n' + 'fjp8tnohr3hnrt182uujvij3didiy/hjxkkhlrxs7aqcpkhj1qgjwxleuvbpxpgg\n' + 'gdw7py8vju08mizs6yx8q4cg406jymq5ktukogscvozxe+qkq1ynkfntikc01q1u\n' + 'fojdcqkcaqafjub7mizjmcu+pnkjfrtfopfmlmem5box1mrfivqa+ui552zvztey\n' + 'zpafvpsga/psiqz0bhhlctgicpn5czuf0g35gibkegoc/3gi9zf8nze83qdf8/ph\n' + '8i983zpo3basae9wrbd1apd/bu2ht+pwqcoeaehp5/ue0ifxb7uw9ugqw+uvdwxn\n' + '2gcvk25nzsm01spqk5zo9wmnalh3ltl9c13s7qmhjwxcxnjkjx79jnt/rd7gfzik\n' + 'oxfgwn83qczbos64msdk1aiymjzkf3ge3zzwam8geoytgjufqm4ob1/cfk7pyorb\n' + 'rxmwv9nbitmvftfc52czzm7guxkib0a5aoibaqcffc5rdhdgpiwjoft0pynk/ctk\n' + '3qza2+t1ni0hyqhpok5osgaozwkzitgdgxdrvxe4+q/ttllu6khvavrvoe+vzmpl\n' + 'wkp0rmbt999js2xaipbgutqxrfsev0rnam0afreuzdpnvrwlprqawtl0ic2t4h6b\n' + 'rybgqu6rporfdvpwmkbjj9q2p540lmn0nvhq6axv+g4ti2xdxlw8t7vqbjgkvfuj\n' + 'g7j4+f7j+kpn5rhudiepivok8v7ap8dxp+lwehzjk1mvcje+sxwtkrrcy/tx\n' + '-----end rsa private key-----\n'}
2、公钥加密
在有了公私钥对的基础上,使用公钥进行加密,示例代码如下:
const crypto = require('crypto');/** * 生成公私钥对 * @return {*} publickey: 公钥;privatekey: 私钥 */function genrsakeypaire() { const { publickey, privatekey } = crypto.generatekeypairsync('rsa', { moduluslength: 4096, publickeyencoding: { type: 'pkcs1', format: 'pem', }, privatekeyencoding: { type: 'pkcs1', format: 'pem', }, }); return { publickey, privatekey };}const { publickey } = genrsakeypaire();/** * 使用公钥进行加密 * @param {string} data * @param {string} publickey * @return {string} 加密后的密文 */function publickeyencrypt(data, publickey) { return crypto.publicencrypt(publickey, buffer.from(data)).tostring('base64')}const entry = { name: 'zhangsan', password: '123456'};// 将数据转为字符串格式,并进行公钥加密后打印console.log(publickeyencrypt(json.stringify(entry), publickey));
输出内容为如下格式:
(数据已做删改)
ri0p8qfmnye8xo36dextk242o9pcdl0qfdo6guxhzjwqd30uflqjl57na445bebsp1vt1z94emjgrme7xtdzv1tshtmvntarqcuczzmf4uyatzcqljhcx3708g7lofksiuvi6mlxcvvoiu2vyfsis/6deewynirpk6zebw1e2v2jwol+63+ignyhtkfji1ecgymmxuwcmicumge/jihjd7yxpkb9+wab7wglj5udbdd4falup7qio8twjzjklug5ymbe7kemnwk050xi1kiet3s8iaqorb1qgghtme/tw+m/jiblssy3urle1aysofuzh9wv/h+ud+undacvlvfmdv8htijjlny9r/gbuai5n0tkax/dk47iuuorzabpoinenm8lyxckpvgvjufmfsx5wlxgx60nt4cpz3t2iuto97sdocvbhsislpflpik88xd4=
3、私钥解密
有了公钥加密后的密文,再用私钥进行解密,代码如下:
const crypto = require('crypto');/** * 生成公私钥对 * @return {*} publickey: 公钥;privatekey: 私钥 */function genrsakeypaire() { const { publickey, privatekey } = crypto.generatekeypairsync('rsa', { moduluslength: 4096, publickeyencoding: { type: 'pkcs1', format: 'pem', }, privatekeyencoding: { type: 'pkcs1', format: 'pem', }, }); return { publickey, privatekey };}const { publickey, privatekey } = genrsakeypaire();/** * 使用公钥进行加密 * @param {string} data * @param {string} publickey * @return {string} 加密后的密文 */function publickeyencrypt(data, publickey) { return crypto.publicencrypt(publickey, buffer.from(data)).tostring('base64')}const entry = { name: 'zhangsan', password: '123456'};const encrypteddata = publickeyencrypt(json.stringify(entry), publickey);/** * 使用私钥进行解密 * @param {string} encrypteddata * @param {string} privatekey * @return {string} 解密后的明文 */function privatekeydecrypt(encrypteddata, privatekey) { return crypto.privatedecrypt(privatekey, buffer.from(encrypteddata, 'base64')).tostring();}const origindata = privatekeydecrypt(encrypteddata, privatekey);// 打印用私钥解密后的数据console.log(origindata);
输出结果:
{name:zhangsan,password:123456}
和我们上面定义的entry数据内容一致,说明解密成功,但是解密后是一个字符串,如果原始数据是一个对象的话,别忘记了将其反序列化为对象。
总结在日常开发中,涉及到前后端通信,特别是重要的信息,为了防止被第三方获取从而加以利用,一般都会做一下通信传输加密,最基本的就是使用https协议,但是光有https协议还不够(容易被中间人劫持攻击)。因此要对数据在应用层进行加密以防止数据被他人劫持利用,使用非对称加密可以保证发送的密文只有拥有私钥的服务器才能解开,从而避免密文被其余无关人员解密并加以利用。互联网领域没有绝对的安全,只有不断提高自己的安全意识,增强自己的安全技能,才是长久之计。
本文完。
更多node相关知识,请访问:nodejs 教程!
以上就是聊聊node如何实现前后端数据传输加密解密的详细内容。
