嘿,加密巫师!准备好用 go 的加密包来看看现实世界的魔法了吗?我们已经学习了所有这些很酷的加密咒语,现在让我们将它们用于一些实际的魔法中!我们将创建两个强大的神器:安全文件加密咒语和公钥基础设施 (pki) 召唤仪式。
让我们创建一个神奇的卷轴,可以使用强大的 aes-gcm(伽罗瓦/计数器模式)魔法安全地加密和解密文件。此咒语提供保密性和完整性保护!
package main
import (
"crypto/aes"
"crypto/cipher"
"crypto/rand"
"errors"
"fmt"
"io"
"os"
)
// our encryption spell
func encrypt(plaintext []byte, key []byte) ([]byte, error) {
block, err := aes.newcipher(key)
if err != nil {
return nil, err
}
gcm, err := cipher.newgcm(block)
if err != nil {
return nil, err
}
nonce := make([]byte, gcm.noncesize())
if _, err := io.readfull(rand.reader, nonce); err != nil {
return nil, err
}
return gcm.seal(nonce, nonce, plaintext, nil), nil
}
// our decryption counter-spell
func decrypt(ciphertext []byte, key []byte) ([]byte, error) {
block, err := aes.newcipher(key)
if err != nil {
return nil, err
}
gcm, err := cipher.newgcm(block)
if err != nil {
return nil, err
}
if len(ciphertext) < gcm.noncesize() {
return nil, errors.new("ciphertext too short")
}
nonce, ciphertext := ciphertext[:gcm.noncesize()], ciphertext[gcm.noncesize():]
return gcm.open(nil, nonce, ciphertext, nil)
}
// enchant a file with our encryption spell
func encryptfile(inputfile, outputfile string, key []byte) error {
plaintext, err := os.readfile(inputfile)
if err != nil {
return err
}
ciphertext, err := encrypt(plaintext, key)
if err != nil {
return err
}
return os.writefile(outputfile, ciphertext, 0644)
}
// remove the encryption enchantment from a file
func decryptfile(inputfile, outputfile string, key []byte) error {
ciphertext, err := os.readfile(inputfile)
if err != nil {
return err
}
plaintext, err := decrypt(ciphertext, key)
if err != nil {
return err
}
return os.writefile(outputfile, plaintext, 0644)
}
func main() {
// summon a magical key
key := make([]byte, 32) // aes-256
if _, err := rand.read(key); err != nil {
panic("our magical key summoning failed!")
}
// cast our encryption spell
err := encryptfile("secret_scroll.txt", "encrypted_scroll.bin", key)
if err != nil {
panic("our encryption spell fizzled!")
}
fmt.println("scroll successfully enchanted with secrecy!")
// remove the encryption enchantment
err = decryptfile("encrypted_scroll.bin", "decrypted_scroll.txt", key)
if err != nil {
panic("our decryption counter-spell backfired!")
}
fmt.println("scroll successfully disenchanted!")
}
这个神奇的卷轴演示了使用 aes-gcm 的安全文件加密。它包括防止魔法事故(错误处理)、安全调用随机数的随机数以及适当的魔法密钥管理实践。
现在,让我们执行一个更复杂的仪式来调用基本的公钥基础设施 (pki) 系统。该系统可以生成神奇的证书,用证书颁发机构(ca)对其进行签名,并验证这些神秘的文件。
package main
import (
"crypto/ecdsa"
"crypto/elliptic"
"crypto/rand"
"crypto/x509"
"crypto/x509/pkix"
"encoding/pem"
"fmt"
"math/big"
"os"
"time"
)
// Summon a magical key pair
func generateKey() (*ecdsa.PrivateKey, error) {
return ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
}
// Create a mystical certificate
func createCertificate(template, parent *x509.Certificate, pub interface{}, priv interface{}) (*x509.Certificate, []byte, error) {
certDER, err := x509.CreateCertificate(rand.Reader, template, parent, pub, priv)
if err != nil {
return nil, nil, err
}
cert, err := x509.ParseCertificate(certDER)
if err != nil {
return nil, nil, err
}
return cert, certDER, nil
}
// Summon a Certificate Authority
func generateCA() (*x509.Certificate, *ecdsa.PrivateKey, error) {
caPrivKey, err := generateKey()
if err != nil {
return nil, nil, err
}
template := x509.Certificate{
SerialNumber: big.NewInt(1),
Subject: pkix.Name{
Organization: []string{"Wizards' Council"},
},
NotBefore: time.Now(),
NotAfter: time.Now().AddDate(10, 0, 0),
KeyUsage: x509.KeyUsageCertSign | x509.KeyUsageCRLSign,
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
BasicConstraintsValid: true,
IsCA: true,
}
caCert, _, err := createCertificate(&template, &template, &caPrivKey.PublicKey, caPrivKey)
if err != nil {
return nil, nil, err
}
return caCert, caPrivKey, nil
}
// Generate a certificate for a magical domain
func generateCertificate(caCert *x509.Certificate, caPrivKey *ecdsa.PrivateKey, domain string) (*x509.Certificate, *ecdsa.PrivateKey, error) {
certPrivKey, err := generateKey()
if err != nil {
return nil, nil, err
}
template := x509.Certificate{
SerialNumber: big.NewInt(2),
Subject: pkix.Name{
Organization: []string{"Wizards' Guild"},
CommonName: domain,
},
NotBefore: time.Now(),
NotAfter: time.Now().AddDate(1, 0, 0),
KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageKeyEncipherment,
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
DNSNames: []string{domain},
}
cert, _, err := createCertificate(&template, caCert, &certPrivKey.PublicKey, caPrivKey)
if err != nil {
return nil, nil, err
}
return cert, certPrivKey, nil
}
// Inscribe a certificate onto a magical parchment (PEM)
func saveCertificateToPEM(cert *x509.Certificate, filename string) error {
certPEM := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: cert.Raw})
return os.WriteFile(filename, certPEM, 0644)
}
// Inscribe a private key onto a magical parchment (PEM)
func savePrivateKeyToPEM(privKey *ecdsa.PrivateKey, filename string) error {
privKeyBytes, err := x509.MarshalECPrivateKey(privKey)
if err != nil {
return err
}
privKeyPEM := pem.EncodeToMemory(&pem.Block{Type: "EC PRIVATE KEY", Bytes: privKeyBytes})
return os.WriteFile(filename, privKeyPEM, 0600)
}
func main() {
// Summon the Certificate Authority
caCert, caPrivKey, err := generateCA()
if err != nil {
panic("The CA summoning ritual failed!")
}
// Inscribe the CA certificate and private key
err = saveCertificateToPEM(caCert, "ca_cert.pem")
if err != nil {
panic("Failed to inscribe the CA certificate!")
}
err = savePrivateKeyToPEM(caPrivKey, "ca_key.pem")
if err != nil {
panic("Failed to inscribe the CA private key!")
}
// Generate a certificate for a magical domain
domain := "hogwarts.edu"
cert, privKey, err := generateCertificate(caCert, caPrivKey, domain)
if err != nil {
panic("The domain certificate summoning failed!")
}
// Inscribe the domain certificate and private key
err = saveCertificateToPEM(cert, "domain_cert.pem")
if err != nil {
panic("Failed to inscribe the domain certificate!")
}
err = savePrivateKeyToPEM(privKey, "domain_key.pem")
if err != nil {
panic("Failed to inscribe the domain private key!")
}
fmt.Println("The PKI summoning ritual was successful! CA and domain certificates have been manifested.")
}
这个神秘的仪式演示了一个简单的 pki 系统的创建,包括:
这些示例展示了 go 加密包的实际应用,演示了安全文件加密和基本的 pki 系统。它们融合了我们讨论过的许多最佳实践和概念,例如正确的密钥管理、安全随机数生成以及现代加密算法的使用。
请记住,年轻的巫师,在现实世界中实施这些加密系统时,请始终确保您的咒语经过其他大师巫师的彻底审查和测试。对于最关键的魔法组件,请尽可能考虑使用已建立的魔法书(库)。
现在就出去负责任地施展你的加密咒语吧!愿您的秘密始终保密,您的身份始终得到验证!
以上就是现实世界的加密魔法:让 Go 的加密包发挥作用,Go Crypto 13的详细内容,更多请关注php中文网其它相关文章!
每个人都需要一台速度更快、更稳定的 PC。随着时间的推移,垃圾文件、旧注册表数据和不必要的后台进程会占用资源并降低性能。幸运的是,许多工具可以让 Windows 保持平稳运行。
Copyright 2014-2025 https://www.php.cn/ All Rights Reserved | php.cn | 湘ICP备2023035733号