PBKDF2WithHmacSHA1算法

     主要用于明文密码加密字符串存入数据库。由棱镜门思考。目前大部分企业中都是明文密码。一旦被攻破。危害非常大。现在主流加密技术是MD5加密。不过MD5的存在小概率碰撞(根据密码学的定义,如果内容不同的明文,通过散列算法得出的结果(密码学称为信息摘要)相同,就称为发生了“碰撞”。).如何生成md5碰撞的算法论文http://www.infosec.sdu.edu.cn/paper/md5-attack.pdf。一些黑客破获密码的方法是一种被称为“跑字典”的方法。有两种方法得到字典,一种是日常搜集的用做密码的字符串表,另一种是用排列组合方法生成的,先用MD5程序计算出这些字典项的MD5值,然后再用目标的MD5值在这个字典中检索。即使假设密码的最大长度为8,同时密码只能是字母和数字,共26+26+10=62个字符,排列组合出的字典的项数则是P(62,1)+P (62,2)….+P(62,8),那也已经是一个很天文的数字了,存储这个字典就需要TB级的磁盘组,而且这种方法还有一个前提,就是能获得目标账户的 密码MD5值的情况下才可以。当如果用户的密码是弱密码的就很危险了。

  PBKDF2WithHmacSHA1算法比MD5算法更安全。它可以同样密码在不同时间生成不同加密Hash。跑字典将无效。下面是算法Demo。

  1 package hashpassword;
  2 import java.security.SecureRandom;
  3 import javax.crypto.spec.PBEKeySpec;
  4 import javax.crypto.SecretKeyFactory;
  5 import java.math.BigInteger;
  6 import java.security.NoSuchAlgorithmException;
  7 import java.security.spec.InvalidKeySpecException;
  8 
  9 /*
 10  * PBKDF2 salted password hashing.
 11  * Author: havoc AT defuse.ca
 12  * www: http://crackstation.net/hashing-security.htm
 13  */
 14 public class PasswordHash
 15 {
 16     public static final String PBKDF2_ALGORITHM = "PBKDF2WithHmacSHA1";
 17 
 18     // The following constants may be changed without breaking existing hashes.
 19     public static final int SALT_BYTE_SIZE = 24;
 20     public static final int HASH_BYTE_SIZE = 24;
 21     public static final int PBKDF2_ITERATIONS = 10;
 22 
 23     public static final int ITERATION_INDEX = 0;
 24     public static final int SALT_INDEX = 1;
 25     public static final int PBKDF2_INDEX = 2;
 26 
 27     public static String createHash(String password)
 28         throws NoSuchAlgorithmException, InvalidKeySpecException
 29     {
 30         return createHash(password.toCharArray());
 31     }
 32 
 33     /**
 34      * Returns a salted PBKDF2 hash of the password.
 35      * 返回一个加盐后的PBKDF2哈希密码
 36      * @param   password    the password to hash
 37      * @return              a salted PBKDF2 hash of the password
 38      */
 39     public static String createHash(char[] password)
 40         throws NoSuchAlgorithmException, InvalidKeySpecException
 41     {
 42         // Generate a random salt 随即盐序列
 43         SecureRandom random = new SecureRandom();
 44         byte[] salt = new byte[SALT_BYTE_SIZE];
 45         random.nextBytes(salt);
 46 
 47         // Hash the password  生成哈希密码
 48         byte[] hash = pbkdf2(password, salt, PBKDF2_ITERATIONS, HASH_BYTE_SIZE);
 49         // format iterations:salt:hash 格式化 迭代次数:盐:哈希
 50         return PBKDF2_ITERATIONS + ":" + toHex(salt) + ":" +  toHex(hash);
 51     }
 52 
 53     /**
 54      * Validates a password using a hash.
 55      *
 56      * @param   password        the password to check
 57      * @param   correctHash     the hash of the valid password
 58      * @return                  true if the password is correct, false if not
 59      */
 60     public static boolean validatePassword(String password, String correctHash)
 61         throws NoSuchAlgorithmException, InvalidKeySpecException
 62     {
 63         return validatePassword(password.toCharArray(), correctHash);
 64     }
 65 
 66     /**
 67      * Validates a password using a hash.
 68      *
 69      * @param   password        the password to check
 70      * @param   correctHash     the hash of the valid password
 71      * @return                  true if the password is correct, false if not
 72      */
 73     public static boolean validatePassword(char[] password, String correctHash)
 74         throws NoSuchAlgorithmException, InvalidKeySpecException
 75     {
 76         // Decode the hash into its parameters
 77         String[] params = correctHash.split(":");
 78         int iterations = Integer.parseInt(params[ITERATION_INDEX]);
 79         byte[] salt = fromHex(params[SALT_INDEX]);
 80         byte[] hash = fromHex(params[PBKDF2_INDEX]);
 81         // Compute the hash of the provided password, using the same salt, 
 82         // iteration count, and hash length
 83         byte[] testHash = pbkdf2(password, salt, iterations, hash.length);
 84         // Compare the hashes in constant time. The password is correct if
 85         // both hashes match.
 86         return slowEquals(hash, testHash);
 87     }
 88 
 89     /**
 90      * Compares two byte arrays in length-constant time. This comparison method
 91      * is used so that password hashes cannot be extracted from an on-line 
 92      * system using a timing attack and then attacked off-line.
 93      * 
 94      * @param   a       the first byte array
 95      * @param   b       the second byte array 
 96      * @return          true if both byte arrays are the same, false if not
 97      */
 98     private static boolean slowEquals(byte[] a, byte[] b)
 99     {
100         int diff = a.length ^ b.length;
101         for(int i = 0; i < a.length && i < b.length; i++)
102             diff |= a[i] ^ b[i];
103         return diff == 0;
104     }
105 
106     /**
107      *  Computes the PBKDF2 hash of a password.
108      *  计算PBKDF2哈希密码
109      * @param   password    the password to hash.   需要加密的明文密码
110      * @param   salt        the salt                盐增加调味 增加密码破解难度
111      * @param   iterations  the iteration count (slowness factor)  迭代次数
112      * @param   bytes       the length of the hash to compute in bytes  计算密码后的 哈希长度
113      * @return              the PBDKF2 hash of the password
114      */
115     private static byte[] pbkdf2(char[] password, byte[] salt, int iterations, int bytes)
116         throws NoSuchAlgorithmException, InvalidKeySpecException
117     {
118         PBEKeySpec spec = new PBEKeySpec(password, salt, iterations, bytes * 8);
119         SecretKeyFactory skf = SecretKeyFactory.getInstance(PBKDF2_ALGORITHM);
120         return skf.generateSecret(spec).getEncoded();
121     }
122 
123     /**
124      * Converts a string of hexadecimal characters into a byte array.
125      *
126      * @param   hex         the hex string
127      * @return              the hex string decoded into a byte array
128      */
129     private static byte[] fromHex(String hex)
130     {
131         byte[] binary = new byte[hex.length() / 2];
132         for(int i = 0; i < binary.length; i++)
133         {
134             binary[i] = (byte)Integer.parseInt(hex.substring(2*i, 2*i+2), 16);
135         }
136         return binary;
137     }
138 
139     /**
140      * Converts a byte array into a hexadecimal string.
141      *
142      * @param   array       the byte array to convert
143      * @return              a length*2 character string encoding the byte array
144      */
145     private static String toHex(byte[] array)
146     {
147         BigInteger bi = new BigInteger(1, array);
148         String hex = bi.toString(16);
149         int paddingLength = (array.length * 2) - hex.length();
150         if(paddingLength > 0) 
151             return String.format("%0" + paddingLength + "d", 0) + hex;
152         else
153             return hex;
154     }
155 
156     /**
157      * Tests the basic functionality of the PasswordHash class
158      *
159      * @param   args        ignored
160      */
161     public static void main(String[] args)
162     {
163         try
164         {
165             // Print out 10 hashes
166             for(int i = 0; i < 10; i++)
167                 System.out.println(PasswordHash.createHash("p
assw0Rd!"));
168 
169             // Test password validation
170             boolean failure = false;
171             System.out.println("Running tests...");
172             for(int i = 0; i < 100; i++)
173             {
174                 String password = ""+i;
175                 String hash = createHash(password);
176                 String secondHash = createHash(password);
177                 if(hash.equals(secondHash)) {
178                     System.out.println("FAILURE: TWO HASHES ARE EQUAL!");
179                     failure = true;
180                 }
181                 String wrongPassword = ""+(i+1);
182                 if(validatePassword(wrongPassword, hash)) {
183                     System.out.println("FAILURE: WRONG PASSWORD ACCEPTED!");
184                     failure = true;
185                 }
186                 if(!validatePassword(password, hash)) {
187                     System.out.println("FAILURE: GOOD PASSWORD NOT ACCEPTED!");
188                     failure = true;
189                 }
190             }
191             if(failure)
192                 System.out.println("TESTS FAILED!");
193             else
194                 System.out.println("TESTS PASSED!");
195         }
196         catch(Exception ex)
197         {
198             System.out.println("ERROR: " + ex);
199         }
200     }
201 
202 }

 https://crackstation.net/hashing-security.htm

Stay Hungry,Stay Foolish!
原文地址:https://www.cnblogs.com/stay-9527/p/3665668.html