在网络安全核心技术深化阶段,掌握基础加密技术是构建安全系统的基石。

Base64是一种基于64个可打印字符来表示二进制数据的编码方法,主要用于在文本环境中安全传输二进制数据。它将每3个字节(24位)的二进制数据转换为4个Base64字符,每个字符对应6位数据。
import base64defbase64_encode(data):"""Base64编码"""ifisinstance(data, str): data = data.encode('utf-8') encoded_data = base64.b64encode(data)return encoded_data.decode('utf-8')defbase64_decode(encoded_data):"""Base64解码"""ifisinstance(encoded_data, str): encoded_data = encoded_data.encode('utf-8') decoded_data = base64.b64decode(encoded_data)return decoded_data.decode('utf-8')# 示例使用original_text = "Hello, Base64 Encoding!"encoded = base64_encode(original_text)decoded = base64_decode(encoded)print(f"原始文本: {original_text}")print(f"Base64编码: {encoded}")print(f"Base64解码: {decoded}")import base64import stringdefmanual_base64_encode(data):"""手动实现Base64编码"""ifisinstance(data, str): data = data.encode('utf-8')# Base64字符集 base64_chars = string.ascii_uppercase + string.ascii_lowercase + string.digits + '+/' result = [] padding = 0# 处理每3个字节for i inrange(0, len(data), 3): chunk = data[i:i+3]# 计算填充字节数iflen(chunk) < 3: padding = 3 - len(chunk) chunk += b'\x00' * padding# 将3字节转换为24位整数 n = int.from_bytes(chunk, 'big')# 分割为4个6位组 six_bits = [ (n >> 18) & 0x3F, (n >> 12) & 0x3F, (n >> 6) & 0x3F, n & 0x3F ]# 转换为Base64字符for j inrange(4): result.append(base64_chars[six_bits[j]])# 处理填充if padding > 0: result[-padding:] = ['='] * paddingreturn''.join(result)# 测试手动实现original_text = "Python Base64"encoded_manual = manual_base64_encode(original_text)encoded_std = base64_encode(original_text)print(f"原始文本: {original_text}")print(f"手动Base64编码: {encoded_manual}")print(f"标准库Base64编码: {encoded_std}")AES(Advanced Encryption Standard)是一种对称加密算法,使用相同的密钥进行加密和解密。它支持128、192和256位密钥长度,分组大小为128位。
from Crypto.Cipher import AESfrom Crypto.Util.Padding import pad, unpadfrom Crypto.Random import get_random_bytesimport base64classAESCipher:def__init__(self, key=None):"""初始化AES加密器"""if key isNone:# 生成随机密钥(16, 24或32字节对应AES-128, AES-192, AES-256)self.key = get_random_bytes(32) # AES-256else:self.key = keydefencrypt(self, plaintext):"""AES加密"""# 生成随机IV(初始化向量) iv = get_random_bytes(AES.block_size)# 创建加密器 cipher = AES.new(self.key, AES.MODE_CBC, iv)# 填充数据并加密 padded_data = pad(plaintext.encode('utf-8'), AES.block_size) ciphertext = cipher.encrypt(padded_data)# 返回IV和密文的Base64编码(IV+ciphertext)return base64.b64encode(iv + ciphertext).decode('utf-8')defdecrypt(self, ciphertext_b64):"""AES解密"""# 解码Base64 ciphertext = base64.b64decode(ciphertext_b64)# 提取IV iv = ciphertext[:AES.block_size] ciphertext = ciphertext[AES.block_size:]# 创建解密器 cipher = AES.new(self.key, AES.MODE_CBC, iv)# 解密并去除填充 decrypted_data = unpad(cipher.decrypt(ciphertext), AES.block_size)return decrypted_data.decode('utf-8')# 示例使用aes = AESCipher()plaintext = "这是需要加密的敏感数据"# 加密encrypted = aes.encrypt(plaintext)print(f"原始文本: {plaintext}")print(f"AES加密结果: {encrypted}")# 解密decrypted = aes.decrypt(encrypted)print(f"AES解密结果: {decrypted}")# 使用固定密钥示例fixed_key = b'ThisIsASecretKey1234567890123456'# 32字节aes_fixed = AESCipher(fixed_key)encrypted_fixed = aes_fixed.encrypt("固定密钥测试")decrypted_fixed = aes_fixed.decrypt(encrypted_fixed)print(f"\n固定密钥加密: {encrypted_fixed}")print(f"固定密钥解密: {decrypted_fixed}")AES支持多种加密模式,常见的有:
# GCM模式示例(提供认证加密)from Crypto.Cipher import AESfrom Crypto.Random import get_random_bytesclassAESGCMCipher:def__init__(self, key=None):if key isNone:self.key = get_random_bytes(32)else:self.key = keydefencrypt(self, plaintext): cipher = AES.new(self.key, AES.MODE_GCM) ciphertext, tag = cipher.encrypt_and_digest(plaintext.encode('utf-8'))return {'nonce': cipher.nonce.hex(),'ciphertext': ciphertext.hex(),'tag': tag.hex() }defdecrypt(self, encrypted_data): cipher = AES.new(self.key, AES.MODE_GCM, nonce=bytes.fromhex(encrypted_data['nonce']) ) ciphertext = bytes.fromhex(encrypted_data['ciphertext']) tag = bytes.fromhex(encrypted_data['tag'])try: decrypted_data = cipher.decrypt_and_verify(ciphertext, tag)return decrypted_data.decode('utf-8')except ValueError as e:print("解密失败,可能数据被篡改:", e)returnNone# GCM模式示例aes_gcm = AESGCMCipher()msg = "使用GCM模式的安全通信"encrypted_gcm = aes_gcm.encrypt(msg)print(f"\nGCM加密结果: {encrypted_gcm}")decrypted_gcm = aes_gcm.decrypt(encrypted_gcm)print(f"GCM解密结果: {decrypted_gcm}")RSA是一种非对称加密算法,使用公钥加密、私钥解密。它基于大数分解的数学难题,安全性依赖于密钥长度。
from Crypto.PublicKey import RSAfrom Crypto.Cipher import PKCS1_OAEPimport base64classRSACipher:def__init__(self, key_size=2048):"""初始化RSA密钥对"""self.key_size = key_sizeself.key_pair = RSA.generate(key_size)defget_public_key(self):"""获取公钥(PEM格式)"""returnself.key_pair.publickey().export_key().decode('utf-8')defget_private_key(self):"""获取私钥(PEM格式)"""returnself.key_pair.export_key().decode('utf-8')defencrypt(self, plaintext, public_key=None):"""RSA加密"""if public_key isNone:# 使用自己的公钥加密(实际应用中应使用接收方的公钥) public_key = self.get_public_key() recipient_key = RSA.import_key(public_key.encode('utf-8')) cipher_rsa = PKCS1_OAEP.new(recipient_key)# RSA加密有长度限制,需要分段处理长文本 max_length = self.key_size // 8 - 42# PKCS1_OAEP的填充开销 chunks = []for i inrange(0, len(plaintext), max_length): chunk = plaintext[i:i+max_length] encrypted_chunk = cipher_rsa.encrypt(chunk.encode('utf-8')) chunks.append(base64.b64encode(encrypted_chunk).decode('utf-8'))return''.join(chunks)defdecrypt(self, ciphertext, private_key=None):"""RSA解密"""if private_key isNone: private_key = self.get_private_key() self_key = RSA.import_key(private_key.encode('utf-8')) cipher_rsa = PKCS1_OAEP.new(self_key)# 处理分段加密的数据 max_length = self.key_size // 8# 解密后的最大长度 decrypted_chunks = []# 这里简化处理,实际应用中需要知道如何分割密文块# 假设ciphertext是单个块的Base64编码try: encrypted_chunk = base64.b64decode(ciphertext) decrypted_chunk = cipher_rsa.decrypt(encrypted_chunk) decrypted_chunks.append(decrypted_chunk.decode('utf-8'))except:# 更健壮的实现需要处理分段print("解密错误,可能是多块加密数据")returnNonereturn''.join(decrypted_chunks)# 示例使用rsa = RSACipher()# 获取密钥public_key = rsa.get_public_key()private_key = rsa.get_private_key()print("\nRSA公钥:")print(public_key)print("\nRSA私钥:")print(private_key)# 加密解密测试message = "这是使用RSA加密的秘密消息"print(f"\n原始消息: {message}")# 加密(实际应用中应使用接收方的公钥)encrypted_rsa = rsa.encrypt(message)print(f"RSA加密结果: {encrypted_rsa[:100]}...") # 只显示前100字符# 解密(使用自己的私钥)decrypted_rsa = rsa.decrypt(encrypted_rsa)print(f"RSA解密结果: {decrypted_rsa}")from Crypto.PublicKey import RSAfrom Crypto.Cipher import PKCS1_OAEPimport base64classAdvancedRSACipher:def__init__(self, key_size=2048):self.key_size = key_sizeself.key_pair = RSA.generate(key_size)defencrypt_long_text(self, plaintext, public_key=None):"""加密长文本"""if public_key isNone: public_key = self.get_public_key() recipient_key = RSA.import_key(public_key.encode('utf-8')) cipher_rsa = PKCS1_OAEP.new(recipient_key)# 生成随机对称密钥from Crypto.Cipher import AESfrom Crypto.Random import get_random_bytes session_key = get_random_bytes(32) # AES-256密钥# 用AES加密数据 iv = get_random_bytes(AES.block_size) cipher_aes = AES.new(session_key, AES.MODE_CBC, iv) padded_data = pad(plaintext.encode('utf-8'), AES.block_size) ciphertext_aes = cipher_aes.encrypt(padded_data)# 用RSA加密会话密钥 encrypted_session_key = cipher_rsa.encrypt(session_key)# 组合结果: RSA加密的会话密钥 + IV + AES加密的数据 result = {'encrypted_key': base64.b64encode(encrypted_session_key).decode('utf-8'),'iv': base64.b64encode(iv).decode('utf-8'),'ciphertext': base64.b64encode(ciphertext_aes).decode('utf-8') }return resultdefdecrypt_long_text(self, encrypted_data, private_key=None):"""解密长文本"""if private_key isNone: private_key = self.get_private_key() self_key = RSA.import_key(private_key.encode('utf-8')) cipher_rsa = PKCS1_OAEP.new(self_key)# 解码各部分 encrypted_session_key = base64.b64decode(encrypted_data['encrypted_key']) iv = base64.b64decode(encrypted_data['iv']) ciphertext_aes = base64.b64decode(encrypted_data['ciphertext'])# 解密会话密钥 session_key = cipher_rsa.decrypt(encrypted_session_key)# 用AES解密数据from Crypto.Cipher import AESfrom Crypto.Util.Padding import unpad cipher_aes = AES.new(session_key, AES.MODE_CBC, iv) decrypted_data = unpad(cipher_aes.decrypt(ciphertext_aes), AES.block_size)return decrypted_data.decode('utf-8')defget_public_key(self):returnself.key_pair.publickey().export_key().decode('utf-8')defget_private_key(self):returnself.key_pair.export_key().decode('utf-8')# 混合加密示例advanced_rsa = AdvancedRSACipher()long_message = """这是需要加密的长文本。在实际应用中,RSA直接加密长文本效率低下且有限制,因此通常采用混合加密方案:使用RSA加密对称密钥,然后用对称密钥加密实际数据。这种方法结合了非对称加密的安全性和对称加密的效率。"""print(f"\n原始长消息({len(long_message)}字符):")print(long_message[:100] + "...") # 只显示前100字符# 加密encrypted_hybrid = advanced_rsa.encrypt_long_text(long_message)print("\n混合加密结果结构:")print(f"加密的会话密钥长度: {len(encrypted_hybrid['encrypted_key'])}")print(f"IV长度: {len(encrypted_hybrid['iv'])}")print(f"密文长度: {len(encrypted_hybrid['ciphertext'])}")# 解密decrypted_hybrid = advanced_rsa.decrypt_long_text(encrypted_hybrid)print(f"\n解密后的消息({len(decrypted_hybrid)}字符):")print(decrypted_hybrid[:100] + "...") # 只显示前100字符import jsonimport osfrom Crypto.Cipher import AESfrom Crypto.Random import get_random_bytesfrom Crypto.PublicKey import RSAfrom Crypto.Cipher import PKCS1_OAEPimport base64classSecureFileTransfer:def__init__(self):# 生成RSA密钥对用于密钥交换self.rsa_key = RSA.generate(2048)self.public_key = self.rsa_key.publickey().export_key().decode('utf-8')self.private_key = self.rsa_key.export_key().decode('utf-8')# 存储会话密钥(实际应用中不应长期存储)self.session_key = Nonedefgenerate_session_key(self):"""生成随机会话密钥"""return get_random_bytes(32) # AES-256defencrypt_file(self, file_path, recipient_public_key):"""加密文件(混合加密方案)"""try:withopen(file_path, 'rb') as f: file_data = f.read()# 生成会话密钥 session_key = self.generate_session_key()# 用AES加密文件数据 iv = get_random_bytes(AES.block_size) cipher_aes = AES.new(session_key, AES.MODE_CBC, iv) padded_data = pad(file_data, AES.block_size) ciphertext_aes = cipher_aes.encrypt(padded_data)# 用接收方的RSA公钥加密会话密钥 recipient_rsa = RSA.import_key(recipient_public_key.encode('utf-8')) cipher_rsa = PKCS1_OAEP.new(recipient_rsa) encrypted_session_key = cipher_rsa.encrypt(session_key)# 准备传输的数据结构 transfer_data = {'encrypted_key': base64.b64encode(encrypted_session_key).decode('utf-8'),'iv': base64.b64encode(iv).decode('utf-8'),'ciphertext': base64.b64encode(ciphertext_aes).decode('utf-8') }# 保存加密后的文件(实际应用中可能直接传输) encrypted_file_path = file_path + '.encrypted'withopen(encrypted_file_path, 'w') as f: json.dump(transfer_data, f)print(f"文件加密成功,保存为: {encrypted_file_path}")return encrypted_file_pathexcept Exception as e:print(f"文件加密失败: {e}")returnNonedefdecrypt_file(self, encrypted_file_path, output_path=None):"""解密文件"""try:withopen(encrypted_file_path, 'r') as f: transfer_data = json.load(f)# 解码各部分 encrypted_session_key = base64.b64decode(transfer_data['encrypted_key']) iv = base64.b64decode(transfer_data['iv']) ciphertext_aes = base64.b64decode(transfer_data['ciphertext'])# 用自己的RSA私钥解密会话密钥 self_rsa = RSA.import_key(self.private_key.encode('utf-8')) cipher_rsa = PKCS1_OAEP.new(self_rsa) session_key = cipher_rsa.decrypt(encrypted_session_key)# 用AES解密文件数据 cipher_aes = AES.new(session_key, AES.MODE_CBC, iv) decrypted_data = unpad(cipher_aes.decrypt(ciphertext_aes), AES.block_size)# 确定输出路径if output_path isNone:if encrypted_file_path.endswith('.encrypted'): output_path = encrypted_file_path[:-9]else: output_path = os.path.splitext(encrypted_file_path)[0] + '.decrypted'# 保存解密后的文件withopen(output_path, 'wb') as f: f.write(decrypted_data)print(f"文件解密成功,保存为: {output_path}")return output_pathexcept Exception as e:print(f"文件解密失败: {e}")returnNone# 模拟安全文件传输if __name__ == "__main__":# 创建发送方和接收方(实际应用中是不同的实体) sender = SecureFileTransfer() receiver = SecureFileTransfer() # 模拟接收方有自己的密钥对# 创建测试文件 test_file = "secure_data.txt"withopen(test_file, 'w') as f: f.write("这是需要安全传输的敏感文件内容。\n包含多行文本数据。")print(f"创建测试文件: {test_file}")# 发送方加密文件(使用接收方的公钥)# 在实际应用中,接收方会将自己的公钥安全地发送给发送方 encrypted_file = sender.encrypt_file(test_file, receiver.public_key)if encrypted_file:# 接收方解密文件(使用自己的私钥) decrypted_file = receiver.decrypt_file(encrypted_file)# 验证解密后的文件内容withopen(decrypted_file, 'r') as f: decrypted_content = f.read()print("\n验证解密内容:")print(decrypted_content)# 清理测试文件 os.remove(test_file) os.remove(encrypted_file) os.remove(decrypted_file)本文通过完整的Python实现,深入探讨了Base64编码、AES对称加密和RSA非对称加密的核心技术:
这些技术是构建安全系统的基础,理解它们的原理和实现对于网络安全攻防至关重要。在实际应用中,应考虑使用经过充分验证的加密库(如PyCryptodome、cryptography等),并遵循最佳安全实践。