Java 从其他客户端解密RSA时出现BadPaddingException

Java 从其他客户端解密RSA时出现BadPaddingException,java,android,encryption,cryptography,rsa,Java,Android,Encryption,Cryptography,Rsa,我正在编写一个Android应用程序,它向网络广播其RSA公钥,并允许其他客户端通过TCP连接到它。我有自己的自定义协议和数据包结构,然后对其进行加密并发送到客户机(数据包->AES->带有客户机公钥的RSA->客户机) 当客户端向自己发送数据时,此代码起作用。但是,当将其发送到另一个客户端时,它不起作用,这给了我以下错误:javax.crypto.BadPaddingException:错误:0407106B:rsa例程:rsa_padding_check_PKCS1_type_2:块类型不是

我正在编写一个Android应用程序,它向网络广播其RSA公钥,并允许其他客户端通过TCP连接到它。我有自己的自定义协议和数据包结构,然后对其进行加密并发送到客户机(数据包->AES->带有客户机公钥的RSA->客户机)

当客户端向自己发送数据时,此代码起作用。但是,当将其发送到另一个客户端时,它不起作用,这给了我以下错误:
javax.crypto.BadPaddingException:错误:0407106B:rsa例程:rsa_padding_check_PKCS1_type_2:块类型不是02

在decryptPacket调用时引发此异常,
packet=c.doFinal(rsaTempArray)

我试图通过调试验证公钥的值是否正确,并且似乎没有任何问题

更新

这是更新后的代码

private byte[] encryptPacket(Packet packet, String pubKey)
{
    PublicKey clientPub = KeyFunctions.stringToKey(pubKey);
    byte[] aesEncryptedData = null;
    byte[] rsaEncryptedData = null;
    byte[] temp = null;

    Log.d("START", "==========ENCRYPT==========");
    try
    {
        // AES
        Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
        final SecretKeySpec secretKey = new SecretKeySpec(Constants.KEY.getBytes(), "AES");
        cipher.init(Cipher.ENCRYPT_MODE, secretKey);
        byte aesTempArray[] = cipher.doFinal(packet.getBytes());
        Log.d("ENC AES TEMP", new String(aesTempArray, "UTF-8"));
        aesEncryptedData = Base64.encode(aesTempArray, Base64.NO_PADDING | Base64.NO_WRAP);   //base64 the aes
        Log.d("ENC AES ENCR", new String(aesEncryptedData, "UTF-8"));

        // RSA
        Cipher c = Cipher.getInstance("RSA/ECB/PKCS1Padding");
        c.init(Cipher.ENCRYPT_MODE, clientPub);
        rsaEncryptedData = c.doFinal(aesEncryptedData);
        Log.d("ENC RSA ENCR", new String(rsaEncryptedData, "UTF-8"));
        temp = Base64.encode(rsaEncryptedData, Base64.NO_PADDING | Base64.NO_WRAP);  // base 64 the rsa
        Log.d("ENC RSA TEMP", new String(temp, "UTF-8"));
    } catch (Exception e)
    {
        e.printStackTrace();
    }
    return temp;
}

public Packet decryptPacket(byte[] encryptedData, Context context)
{
    // get the keys
    PrivateKey pri = KeyFunctions.getPrivateKey(context);
    Packet p = null;
    byte[] aesDecryptedData = null;
    byte[] rsaDecryptedData = null;


    Log.d("START", "==========DECRYPT==========");
    try
    {
        //RSA
        Log.d("DEC INIT", new String(encryptedData, "UTF-8"));
        Cipher c = Cipher.getInstance("RSA/ECB/PKCS1Padding");
        c.init(Cipher.DECRYPT_MODE, pri);
        byte[] rsaTempArray = Base64.decode(encryptedData, Base64.NO_PADDING | Base64.NO_WRAP);
        Log.d("DEC RSA TEMP", new String(rsaTempArray, "UTF-8"));
        rsaDecryptedData = c.doFinal(rsaTempArray);
        Log.d("DEC RSA ENCR", new String(rsaDecryptedData, "UTF-8"));

        // AES
        Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
        final SecretKeySpec secretKey = new SecretKeySpec(Constants.KEY.getBytes(), "AES");
        cipher.init(Cipher.DECRYPT_MODE, secretKey);
        byte[] aesTempArray = Base64.decode(rsaDecryptedData, Base64.NO_PADDING | Base64.NO_WRAP);
        Log.d("DEC AES TEMP", new String(aesTempArray, "UTF-8"));
        aesDecryptedData = cipher.doFinal(aesTempArray);
        Log.d("DEC AES DEC", new String(aesDecryptedData, "UTF-8"));
        p = new Packet(aesDecryptedData);
    } catch (Exception e)
    {
        e.printStackTrace();
    }
    return p;
}

代码不再使用任何字符串,但仍然出现相同的异常。现在,我已经确保接收器接收到的数据与客户端发送的数据完全相同。当客户机将数据发送到同一设备上的服务器时,该程序工作正常,但当我尝试发送到另一个设备服务器时,出现了上述异常。两个设备都有自己的私钥/公钥对。每个设备都有各自的公钥。

加密/解密代码很好,我使用了错误的IP地址来计算公钥。谢谢你的帮助

我想您可能会在这里找到答案,或者在这里使用
String。getBytes()
是传递二进制数据的一种非常常见且非常糟糕的方法。我已经更新了代码,使用字节数组而不是字符串。仍然有同样的问题。“我有自己的自定义协议和数据包结构…”-你可能也对谷歌的感兴趣。你可能想为每条消息生成一个新的AES密钥。然后应该使用该密钥加密数据,然后使用RSA公钥加密密钥。
private byte[] encryptPacket(Packet packet, String pubKey)
{
    PublicKey clientPub = KeyFunctions.stringToKey(pubKey);
    byte[] aesEncryptedData = null;
    byte[] rsaEncryptedData = null;
    byte[] temp = null;

    Log.d("START", "==========ENCRYPT==========");
    try
    {
        // AES
        Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
        final SecretKeySpec secretKey = new SecretKeySpec(Constants.KEY.getBytes(), "AES");
        cipher.init(Cipher.ENCRYPT_MODE, secretKey);
        byte aesTempArray[] = cipher.doFinal(packet.getBytes());
        Log.d("ENC AES TEMP", new String(aesTempArray, "UTF-8"));
        aesEncryptedData = Base64.encode(aesTempArray, Base64.NO_PADDING | Base64.NO_WRAP);   //base64 the aes
        Log.d("ENC AES ENCR", new String(aesEncryptedData, "UTF-8"));

        // RSA
        Cipher c = Cipher.getInstance("RSA/ECB/PKCS1Padding");
        c.init(Cipher.ENCRYPT_MODE, clientPub);
        rsaEncryptedData = c.doFinal(aesEncryptedData);
        Log.d("ENC RSA ENCR", new String(rsaEncryptedData, "UTF-8"));
        temp = Base64.encode(rsaEncryptedData, Base64.NO_PADDING | Base64.NO_WRAP);  // base 64 the rsa
        Log.d("ENC RSA TEMP", new String(temp, "UTF-8"));
    } catch (Exception e)
    {
        e.printStackTrace();
    }
    return temp;
}

public Packet decryptPacket(byte[] encryptedData, Context context)
{
    // get the keys
    PrivateKey pri = KeyFunctions.getPrivateKey(context);
    Packet p = null;
    byte[] aesDecryptedData = null;
    byte[] rsaDecryptedData = null;


    Log.d("START", "==========DECRYPT==========");
    try
    {
        //RSA
        Log.d("DEC INIT", new String(encryptedData, "UTF-8"));
        Cipher c = Cipher.getInstance("RSA/ECB/PKCS1Padding");
        c.init(Cipher.DECRYPT_MODE, pri);
        byte[] rsaTempArray = Base64.decode(encryptedData, Base64.NO_PADDING | Base64.NO_WRAP);
        Log.d("DEC RSA TEMP", new String(rsaTempArray, "UTF-8"));
        rsaDecryptedData = c.doFinal(rsaTempArray);
        Log.d("DEC RSA ENCR", new String(rsaDecryptedData, "UTF-8"));

        // AES
        Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
        final SecretKeySpec secretKey = new SecretKeySpec(Constants.KEY.getBytes(), "AES");
        cipher.init(Cipher.DECRYPT_MODE, secretKey);
        byte[] aesTempArray = Base64.decode(rsaDecryptedData, Base64.NO_PADDING | Base64.NO_WRAP);
        Log.d("DEC AES TEMP", new String(aesTempArray, "UTF-8"));
        aesDecryptedData = cipher.doFinal(aesTempArray);
        Log.d("DEC AES DEC", new String(aesDecryptedData, "UTF-8"));
        p = new Packet(aesDecryptedData);
    } catch (Exception e)
    {
        e.printStackTrace();
    }
    return p;
}