{"id":170,"date":"2021-02-26T13:52:15","date_gmt":"2021-02-26T05:52:15","guid":{"rendered":"https:\/\/fugary.com\/?p=170"},"modified":"2021-02-26T13:52:15","modified_gmt":"2021-02-26T05:52:15","slug":"java%e4%b8%ad%e7%9a%84aes%e5%8a%a0%e5%af%86%e8%a7%a3%e5%af%86","status":"publish","type":"post","link":"https:\/\/fugary.com\/?p=170","title":{"rendered":"Java\u4e2d\u7684AES\u52a0\u5bc6\u89e3\u5bc6"},"content":{"rendered":"<h1>Java\u4e2d\u7684AES\u52a0\u5bc6\u89e3\u5bc6<\/h1>\n<h2>AES\u4ecb\u7ecd<\/h2>\n<h3>\u4ec0\u4e48\u662fAES<\/h3>\n<p><strong>\u9ad8\u7ea7\u52a0\u5bc6\u6807\u51c6<\/strong>\uff08\u82f1\u8bed\uff1a<strong>A<\/strong>dvanced <strong>E<\/strong>ncryption <strong>S<\/strong>tandard\uff0c\u7f29\u5199\uff1aAES\uff09\uff0c\u5728<a href=\"https:\/\/baike.sogou.com\/lemma\/ShowInnerLink.htm?lemmaId=256659&amp;ss_c=ssc.citiao.link\">\u5bc6\u7801\u5b66<\/a>\u4e2d\u53c8\u79f0<strong>Rijndael\u52a0\u5bc6\u6cd5<\/strong>\uff0c\u662f<a href=\"https:\/\/baike.sogou.com\/lemma\/ShowInnerLink.htm?lemmaId=716827&amp;ss_c=ssc.citiao.link\">\u7f8e\u56fd\u8054\u90a6\u653f\u5e9c<\/a>\u91c7\u7528\u7684\u4e00\u79cd\u533a\u5757\u52a0\u5bc6\u6807\u51c6\u3002\u8fd9\u4e2a\u6807\u51c6\u7528\u6765\u66ff\u4ee3\u539f\u5148\u7684DES\uff0c\u5df2\u7ecf\u88ab\u591a\u65b9\u5206\u6790\u4e14\u5e7f\u4e3a\u5168\u4e16\u754c\u6240\u4f7f\u7528\u3002\u7ecf\u8fc7\u4e94\u5e74\u7684\u7504\u9009\u6d41\u7a0b\uff0c\u9ad8\u7ea7\u52a0\u5bc6\u6807\u51c6\u7531<a href=\"https:\/\/baike.sogou.com\/lemma\/ShowInnerLink.htm?lemmaId=66283243&amp;ss_c=ssc.citiao.link\">\u7f8e\u56fd\u56fd\u5bb6\u6807\u51c6\u4e0e\u6280\u672f\u7814\u7a76\u9662<\/a>\uff08NIST\uff09\u4e8e2001\u5e7411\u670826\u65e5\u53d1\u5e03\u4e8eFIPS PUB 197\uff0c\u5e76\u57282002\u5e745\u670826\u65e5\u6210\u4e3a\u6709\u6548\u7684\u6807\u51c6\u30022006\u5e74\uff0c\u9ad8\u7ea7\u52a0\u5bc6\u6807\u51c6\u5df2\u7136\u6210\u4e3a<a href=\"https:\/\/baike.sogou.com\/lemma\/ShowInnerLink.htm?lemmaId=72260379&amp;ss_c=ssc.citiao.link\">\u5bf9\u79f0\u5bc6\u94a5<\/a>\u52a0\u5bc6\u4e2d\u6700\u6d41\u884c\u7684\u7b97\u6cd5\u4e4b\u4e00\u3002<\/p>\n<p>\u8be5\u7b97\u6cd5\u4e3a\u6bd4\u5229\u65f6\u5bc6\u7801\u5b66\u5bb6Joan Daemen\u548cVincent Rijmen\u6240\u8bbe\u8ba1\uff0c\u7ed3\u5408\u4e24\u4f4d\u4f5c\u8005\u7684\u540d\u5b57\uff0c\u4ee5Rijndael\u4e3a\u540d\u6295\u7a3f\u9ad8\u7ea7\u52a0\u5bc6\u6807\u51c6\u7684\u7504\u9009\u6d41\u7a0b\u3002\uff08Rijndael\u7684\u53d1\u97f3\u8fd1\u4e8e&quot;Rhine doll&quot;\uff09<\/p>\n<p>AES\u4e00\u822c\u6709\u4e94\u79cd\u5de5\u4f5c\u4f53\u5236\uff1a1.\u7535\u7801\u672c\u6a21\u5f0f\uff08Electronic Codebook Book (ECB)\uff09\uff1b2.\u5bc6\u7801\u5206\u7ec4\u94fe\u63a5\u6a21\u5f0f\uff08Cipher Block Chaining (CBC)\uff09\uff1b3.\u8ba1\u7b97\u5668\u6a21\u5f0f\uff08Counter (CTR)\uff09\uff1b4.\u5bc6\u7801\u53cd\u9988\u6a21\u5f0f\uff08Cipher FeedBack (CFB)\uff09\uff1b5.\u8f93\u51fa\u53cd\u9988\u6a21\u5f0f\uff08Output FeedBack (OFB)\uff09\u3002<\/p>\n<h3>AES\u52a0\u5bc6\u4f4d\u6570<\/h3>\n<p>AES\u901a\u5e38\u6709128\u3001192\u3001256\u4f4d\uff08bit\u4f4d\uff09\u52a0\u5bc6\uff0c\u4e3b\u8981\u533a\u522b\u5728\u4e8e\u79d8\u94a5\u7684\u957f\u5ea6\uff0c\u5206\u522b\u5bf9\u5e9416bytes\u300124bytes\u300132bytes\u3002<\/p>\n<p>\u5728\u7ebf\u52a0\u5bc6\u548c\u89e3\u5bc6\u5de5\u5177\uff1a<a href=\"https:\/\/encode-decode.com\/encryption-functions\/\">https:\/\/encode-decode.com\/encryption-functions\/<\/a><\/p>\n<h2>Java\u4e2d\u7684AES<\/h2>\n<p>Java\u4e2d\u4e00\u822c\u628a\u5bc6\u7801\u901a\u8fc7KeyGenerator\u4ee5\u53caSecureRandom\uff08\u4e00\u822c\u7528hash\u3001SHA256\u7b49\uff09\u628a\u5bc6\u7801\u957f\u5ea6\u6309\u7167\u6307\u5b9a\u7684\u52a0\u5bc6\u4f4d\u6570\u636e\u6539\u9020\u6210\u5bf9\u5e94\u7684\u5b57\u8282\u957f\u5ea6\uff0c\u5e76\u4e0d\u662f\u76f4\u63a5\u7528\u7ed9\u5b9a\u7684\u5bc6\u7801\u52a0\u5bc6\u6216\u8005\u89e3\u5bc6\uff0c\u8fd9\u6837\u6539\u9020\u540e\u7684\u5bc6\u7801\u662f\u4ee5\u521d\u59cb\u7684\u5bc6\u7801\u4e3a\u79cd\u5b50\u8ba1\u7b97\u800c\u6765\uff0c\u89e3\u5bc6\u7684\u65f6\u5019\u4e5f\u9700\u8981\u5148\u8fdb\u884c\u76f8\u5e94\u5904\u7406\u3002<\/p>\n<p>\u8fd9\u6837\u505a\u7684\u597d\u5904\u5c31\u662f\u5bc6\u7801\u957f\u5ea6\u6ca1\u6709\u4ec0\u4e48\u9650\u5236\uff0c\u5b9e\u9645\u5bc6\u7801\u662f\u6839\u636e\u7ed9\u5b9a\u7684keySize\u4f4d\u6570\u8ba1\u7b97\uff0c\u76f4\u63a5\u5f97\u5230\u5bf9\u5e94\u7684\u4f4d\u6570\u7684\u79d8\u94a5\u3002<\/p>\n<p><strong>\u6ce8\u610f\uff1a\u7531\u4e8eJava\u4f7f\u7528\u4e86hash\u6539\u9020\u5bc6\u7801\uff0c\u56e0\u6b64\u8981\u548c\u5176\u4ed6\u5e73\u53f0\u517c\u5bb9\u7684\u65f6\u5019\u4e0d\u80fd\u4f7f\u7528KeyGenerator\u8fd9\u4e2a\u64cd\u4f5c\uff0c\u53ea\u80fd\u76f4\u63a5\u4f7f\u7528\u5bf9\u5e94\u957f\u5ea6\u7684\u79d8\u94a5<\/strong><\/p>\n<p>JDK\u9ed8\u8ba4\u5e76\u4e0d\u652f\u6301AES 256\uff0c\u53e6\u5916\u8fd8\u6709\u4e9b\u52a0\u5bc6\u6a21\u5f0f\u4e5f\u4e0d\u652f\u6301\uff08\u5982\uff1aAES\/ECB\/PKCS7Padding\uff09\uff0c\u5efa\u8bae\u5f15\u5165bouncycastle\u52a0\u5bc6\u5e93\uff08\u6709\u4e9b\u9879\u76ee\u53ef\u80fd\u5df2\u7ecf\u901a\u8fc7\u7b2c\u4e09\u65b9\u5e93\u95f4\u63a5\u5f15\u5165\u4e86\uff09<\/p>\n<pre><code class=\"language-xml\"> &lt;dependency&gt;\n      &lt;groupId&gt;org.bouncycastle&lt;\/groupId&gt;\n      &lt;artifactId&gt;bcprov-jdk15on&lt;\/artifactId&gt;\n      &lt;version&gt;1.60&lt;\/version&gt;\n &lt;\/dependency&gt;<\/code><\/pre>\n<h3>Java\u7684AES\u52a0\u5bc6\u89e3\u5bc6\u5de5\u5177<\/h3>\n<p>AES\u7684ECB\u548cCBC\u6a21\u5f0f\u90fd\u6709\uff0c\u53c2\u8003\u4ee3\u7801\u5982\u4e0b\uff1a<\/p>\n<pre><code class=\"language-java\">public class SimpleAESUtils {\n    private static final Logger logger = LoggerFactory.getLogger(SimpleAESUtils.class);\n    private static final String AES = &quot;AES&quot;;\n    private static final String AES_MODE = &quot;AES\/ECB\/PKCS7Padding&quot;; \/\/ AES\u7535\u5b50\u5bc6\u7801\u672c\n    private static final String AES_MODE_CBC = &quot;AES\/CBC\/PKCS7Padding&quot;; \/\/ CBC\u6a21\u5f0f\n    static {\n        if (Security.getProvider(BouncyCastleProvider.PROVIDER_NAME) == null) {\n            Security.addProvider(new BouncyCastleProvider());\n        }\n    }\n    \/**\n     * \u52a0\u5bc6\n     *\n     * @param content  \u5185\u5bb9\n     * @param password \u52a0\u5bc6\u5bc6\u7801\uff0c\u957f\u5ea6\u5bf9\u5e94\u4f4d\u6570\uff0c16-128\u300124-192\u300132-256\uff0c\u957f\u5ea6\u4f4d\u6570\u4e0d\u5bf9\u5c06\u52a0\u5bc6\u5931\u8d25\n     * @return\n     *\/\n    public static byte[] encrypt(String content, byte[] password) {\n        try {\n            SecretKeySpec key = new SecretKeySpec(password, AES);\n            Cipher cipher = Cipher.getInstance(AES_MODE);\/\/ \u521b\u5efa\u5bc6\u7801\u5668\n            byte[] byteContent = content.getBytes(StandardCharsets.UTF_8);\n            cipher.init(Cipher.ENCRYPT_MODE, key);\/\/ \u521d\u59cb\u5316\n            return cipher.doFinal(byteContent); \/\/ \u52a0\u5bc6\n        } catch (Exception e) {\n            logger.error(&quot;AES\u52a0\u5bc6\u5931\u8d25&quot;, e);\n        }\n        return new byte[0];\n    }\n    \/**\n     * \u89e3\u5bc6\n     *\n     * @param encryptContent \u5df2\u52a0\u5bc6\u5185\u5bb9\u6839\u636e\u5b9e\u9645\u7684\u5185\u5bb9\u683c\u5f0f\u8f6c\u6362\u6210\u5bf9\u5e94\u7684byte\u6570\u7ec4\n     * @param password       \u52a0\u5bc6\u5bc6\u7801\uff0c\u957f\u5ea6\u5bf9\u5e94\u4f4d\u6570\uff0c16-128\u300124-192\u300132-256\uff0c\u957f\u5ea6\u4f4d\u6570\u4e0d\u5bf9\u5c06\u89e3\u5bc6\u5931\u8d25\n     * @return\n     *\/\n    public static byte[] decrypt(byte[] encryptContent, byte[] password) {\n        try {\n            SecretKeySpec key = new SecretKeySpec(password, AES);\n            Cipher cipher = Cipher.getInstance(AES_MODE);\/\/ \u521b\u5efa\u5bc6\u7801\u5668\n            cipher.init(Cipher.DECRYPT_MODE, key);\/\/ \u521d\u59cb\u5316\n            return cipher.doFinal(encryptContent); \/\/ \u52a0\u5bc6\n        } catch (Exception e) {\n            logger.error(&quot;AES\u89e3\u5bc6\u5931\u8d25&quot;, e);\n        }\n        return new byte[0];\n    }\n    \/**\n     * \u52a0\u5bc6\n     *\n     * @param content  \u5185\u5bb9\n     * @param password \u5bc6\u7801\n     * @param keySize  \u4f4d\u6570\n     * @return\n     *\/\n    public static byte[] encrypt(String content, String password, int keySize) {\n        try {\n            byte[] encodedPassword = generatePassword(password, keySize);\n            return encrypt(content, encodedPassword);\n        } catch (Exception e) {\n            logger.error(&quot;AES\u52a0\u5bc6\u5931\u8d25&quot;, e);\n        }\n        return new byte[0];\n    }\n    \/**\n     * \u89e3\u5bc6\n     *\n     * @param encryptContent \u5f85\u89e3\u5bc6\u5185\u5bb9\n     * @param password       \u5bc6\u7801\n     * @param keySize        \u79d8\u94a5\u4f4d\u6570\n     * @return\n     *\/\n    public static byte[] decrypt(byte[] encryptContent, String password, int keySize) {\n        try {\n            byte[] encodedPassword = generatePassword(password, keySize);\n            return decrypt(encryptContent, encodedPassword);\n        } catch (Exception e) {\n            logger.error(&quot;AES\u89e3\u5bc6\u5931\u8d25&quot;, e);\n        }\n        return new byte[0];\n    }\n    \/**\n     * \u5bc6\u7801\u957f\u5ea6\u901a\u8fc7hash\u6539\u9020\u6210\u5bf9\u5e94\u7684\u5b57\u8282\u957f\u5ea6\n     *\n     * @param password\n     * @return\n     * @throws NoSuchAlgorithmException\n     *\/\n    public static byte[] generatePassword(String password, int keySize) throws NoSuchAlgorithmException {\n        KeyGenerator kgen = KeyGenerator.getInstance(&quot;AES&quot;); \/\/ \u79d8\u94a5\u751f\u6210\u5668\n        SecureRandom secureRandom = SecureRandom.getInstance(&quot;SHA1PRNG&quot;); \/\/ hash\u7b97\u6cd5\n        secureRandom.setSeed(password.getBytes());\n        kgen.init(keySize, secureRandom);\n        SecretKey secretKey = kgen.generateKey();\n        return secretKey.getEncoded();\n    }\n    \/**\n     * \u52a0\u5bc6\n     *\n     * @param content  \u5185\u5bb9\n     * @param password \u52a0\u5bc6\u5bc6\u7801\uff0c\u957f\u5ea6\u5bf9\u5e94\u4f4d\u6570\uff0c16-128\u300124-192\u300132-256\uff0c\u957f\u5ea6\u4f4d\u6570\u4e0d\u5bf9\u5c06\u52a0\u5bc6\u5931\u8d25\n     * @param iv       \u5411\u91cf\u503c\n     * @return\n     *\/\n    public static byte[] encryptCBC(String content, byte[] password, byte[] iv) {\n        try {\n            SecretKeySpec key = new SecretKeySpec(password, AES);\n            Cipher cipher = Cipher.getInstance(AES_MODE_CBC);\/\/ \u521b\u5efa\u5bc6\u7801\u5668\n            byte[] byteContent = content.getBytes(StandardCharsets.UTF_8);\n            cipher.init(Cipher.ENCRYPT_MODE, key, new IvParameterSpec(iv));\/\/ \u521d\u59cb\u5316\n            return cipher.doFinal(byteContent); \/\/ \u52a0\u5bc6\n        } catch (Exception e) {\n            logger.error(&quot;AES\u52a0\u5bc6\u5931\u8d25&quot;, e);\n        }\n        return new byte[0];\n    }\n    \/**\n     * \u89e3\u5bc6\n     *\n     * @param encryptContent \u5df2\u52a0\u5bc6\u5185\u5bb9\u6839\u636e\u5b9e\u9645\u7684\u5185\u5bb9\u683c\u5f0f\u8f6c\u6362\u6210\u5bf9\u5e94\u7684byte\u6570\u7ec4\n     * @param password       \u52a0\u5bc6\u5bc6\u7801\uff0c\u957f\u5ea6\u5bf9\u5e94\u4f4d\u6570\uff0c16-128\u300124-192\u300132-256\uff0c\u957f\u5ea6\u4f4d\u6570\u4e0d\u5bf9\u5c06\u89e3\u5bc6\u5931\u8d25\n     * @param iv             iv \u5411\u91cf\u503c\n     * @return\n     *\/\n    public static byte[] decryptCBC(byte[] encryptContent, byte[] password, byte[] iv) {\n        try {\n            SecretKeySpec key = new SecretKeySpec(password, AES);\n            Cipher cipher = Cipher.getInstance(AES_MODE_CBC);\/\/ \u521b\u5efa\u5bc6\u7801\u5668\n            cipher.init(Cipher.DECRYPT_MODE, key, new IvParameterSpec(iv));\/\/ \u521d\u59cb\u5316\n            return cipher.doFinal(encryptContent); \/\/ \u52a0\u5bc6\n        } catch (Exception e) {\n            logger.error(&quot;AES\u89e3\u5bc6\u5931\u8d25&quot;, e);\n        }\n        return new byte[0];\n    }\n}<\/code><\/pre>\n<h3>ECB\u6a21\u5f0f\u6d4b\u8bd5<\/h3>\n<pre><code class=\"language-java\">public static void main(String... args) throws Exception {\n    String content = &quot;123&quot;;\n    String password = &quot;123456&quot;;\n    int keySize = 256;\n    \/\/ \u6307\u5b9akeySize\u6765\u52a0\u5bc6\u89e3\u5bc6\uff0c\u5bc6\u7801\u4f4d\u6570\u6ca1\u6709\u4ec0\u4e48\u9650\u5236\n    byte[] encrypt = encrypt(content, password, keySize);\n    byte[] decrypt = decrypt(encrypt, password, keySize);\n    System.out.println(new String(decrypt, StandardCharsets.UTF_8).equals(content));\n    \/\/ \u8fd9\u91cc\u4f7f\u7528\u7684\u662fBase64\u683c\u5f0f\u7684\u5bc6\u7801\uff0cdecode\u4e4b\u540e\u6570\u7ec4\u7684\u957f\u5ea6\u5bf9\u5e94\u54cd\u5e94\u7684\u52a0\u5bc6\u4f4d\u6570\n    String password256Base64 = &quot;a7SDfrdDKRBe5FaN2n3GftLKKtkfZS5GsdEjfdjsyBE=&quot;;\n    byte[] encrypt1 = encrypt(content, Base64.getDecoder().decode(password256Base64));\n    byte[] decrypt1 = decrypt(encrypt1, Base64.getDecoder().decode(password256Base64));\n    System.out.println(new String(decrypt1, StandardCharsets.UTF_8).equals(content));\n}<\/code><\/pre>\n<h3>CBC\u6a21\u5f0f\u6d4b\u8bd5<\/h3>\n<p>CBC\u6a21\u5f0f\u9664\u4e86\u5bc6\u7801\u4e4b\u5916\u8fd8\u9700\u8981\u4e00\u4e2a\u5411\u91cfIV\u503c\uff0cIV\u7684\u957f\u5ea6\u662f16\u5b57\u8282\uff1a<\/p>\n<pre><code class=\"language-java\">public static void main(String... args) throws Exception {\n    String cbcContent = &quot;123&quot;;\n    String cbcPassword = &quot;a7SDfrdDKRBe5FaN2n3GftLKKtkfZS5GsdEjfdjsyBE=&quot;;\n    String cbcIv = &quot;1234567812345678&quot;;\n    byte[] encrypt2 = encryptCBC(cbcContent, Base64.getDecoder().decode(cbcPassword), cbcIv.getBytes());\n    byte[] decrypt2 = decryptCBC(encrypt2, Base64.getDecoder().decode(cbcPassword), cbcIv.getBytes());\n    System.out.println(new String(decrypt2, StandardCharsets.UTF_8).equals(cbcContent));\n}<\/code><\/pre>\n<h3>\u5e38\u89c1\u9519\u8bef<\/h3>\n<p>AES\u8981\u6c42\u52a0\u5bc6\u79d8\u94a5\u7684\u4f4d\u6570\u662f128\/192\/256\uff08\u5bf9\u5e94bytes\u957f\u5ea6\uff1a16\/24\/32\uff09\uff0c\u5982\u679c\u79d8\u94a5\u957f\u5ea6\u4e0d\u662f\u8fd9\u51e0\u4e2a\u503c\u5c31\u4f1a\u62a5\u9519\u3002<\/p>\n<pre><code class=\"language-java\">org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher$InvalidKeyOrParametersException: Key length not 128\/192\/256 bits.\n    at org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineInit(Unknown Source)\n    at org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineInit(Unknown Source)\n    at java.base\/javax.crypto.Cipher.implInit(Cipher.java:839)\n    at java.base\/javax.crypto.Cipher.chooseProvider(Cipher.java:901)\n    at java.base\/javax.crypto.Cipher.init(Cipher.java:1286)\n    at java.base\/javax.crypto.Cipher.init(Cipher.java:1223)\n    at com.citsgbt.mobile.gateway.config.security.SimpleAESUtils.encrypt(SimpleAESUtils.java:93)\n    at com.citsgbt.mobile.gateway.config.security.SimpleAESUtils.main(SimpleAESUtils.java:182)\nCaused by: java.lang.IllegalArgumentException: Key length not 128\/192\/256 bits.\n    at org.bouncycastle.crypto.engines.AESEngine.generateWorkingKey(Unknown Source)\n    at org.bouncycastle.crypto.engines.AESEngine.init(Unknown Source)\n    at org.bouncycastle.crypto.paddings.PaddedBufferedBlockCipher.init(Unknown Source)\n    at org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher$BufferedGenericBlockCipher.init(Unknown Source)\n    ... 8 common frames omitted<\/code><\/pre>\n<p>JDK\u4e2d\u5982\u679c\u6ca1\u6709\u76f8\u5173\u7684AES\u7b97\u6cd5\u6a21\u5f0f\uff0c\u4f1a\u6709\u5982\u4e0b\u9519\u8bef\uff1a<\/p>\n<pre><code class=\"language-java\">java.security.NoSuchAlgorithmException: Cannot find any provider supporting AES\/ECB\/PKCS7Padding\n    at java.base\/javax.crypto.Cipher.getInstance(Cipher.java:565)\n    at com.citsgbt.mobile.gateway.config.security.SimpleAESUtils.encrypt(SimpleAESUtils.java:91)\n    at com.citsgbt.mobile.gateway.config.security.SimpleAESUtils.encrypt(SimpleAESUtils.java:131)\n    at com.citsgbt.mobile.gateway.config.security.SimpleAESUtils.main(SimpleAESUtils.java:177)<\/code><\/pre>\n<p>\u9700\u8981\u5f15\u5165\u7b2c\u4e09\u65b9\u7684\u52a0\u5bc6\u5e93\uff0c\u5e76\u5728\u4ee3\u7801\u4e2d\u6dfb\u52a0\u8fdb\u53bb\uff1a<\/p>\n<pre><code class=\"language-java\">if (Security.getProvider(BouncyCastleProvider.PROVIDER_NAME) == null) {\n    Security.addProvider(new BouncyCastleProvider());\n}<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Java\u4e2d\u7684AES\u52a0\u5bc6\u89e3\u5bc6 AES\u4ecb\u7ecd \u4ec0\u4e48\u662fAES \u9ad8\u7ea7\u52a0\u5bc6\u6807\u51c6\uff08\u82f1\u8bed\uff1aAdvanced Encryptio [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/fugary.com\/index.php?rest_route=\/wp\/v2\/posts\/170"}],"collection":[{"href":"https:\/\/fugary.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fugary.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fugary.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fugary.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=170"}],"version-history":[{"count":1,"href":"https:\/\/fugary.com\/index.php?rest_route=\/wp\/v2\/posts\/170\/revisions"}],"predecessor-version":[{"id":171,"href":"https:\/\/fugary.com\/index.php?rest_route=\/wp\/v2\/posts\/170\/revisions\/171"}],"wp:attachment":[{"href":"https:\/\/fugary.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fugary.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fugary.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}