最近帮人写了一个python3对文件加密解密的脚本,项目https://github.com/Gupern/python3_crypto/ 放在github上,先记录下。

    # -*- coding: utf-8 -*-
    '''
        author:         Gupern
        createdDate:    2018-3-28
        lastModified:   2018-3-28 
    '''
    import argparse
    from pyDes import *
    import sys 
    from Cryptodome.Cipher import AES, ARC4
    from binascii import b2a_hex, a2b_hex, hexlify
    import sys,os,hashlib,time,base64
    import rc4
    import random, base64
    from hashlib import sha1
    from Crypto.Cipher import ARC4 as rc4cipher
    import rsa
    import sys,os,hashlib,time,base64

    class aes_prpcrypt():
        def __init__(self, key):

            # self.key = key
            self.key = bytes(key, encoding='utf-8')
            self.mode = AES.MODE_CBC

        #加密函数,如果text不是16的倍数【加密文本text必须为16的倍数!】,那就补足为16的倍数
        def encrypt(self, text):
            print(type(text))
            cryptor = AES.new(self.key, self.mode, self.key)
            print(type(text))

            #这里密钥key 长度必须为16(AES-128)、24(AES-192)、或32(AES-256)Bytes 长度.目前AES-128足够用
            length = 16
            count = len(text)
            add = length - (count % length)
            text = text + (bytes('\0',encoding="utf-8") * add)
            self.ciphertext = cryptor.encrypt(text)
            #因为AES加密时候得到的字符串不一定是ascii字符集的,输出到终端或者保存时候可能存在问题
            #所以这里统一把加密后的字符串转化为16进制字符串
            return b2a_hex(self.ciphertext)

        #解密后,去掉补足的空格用strip() 去掉
        def decrypt(self, text):
            cryptor = AES.new(self.key, self.mode, self.key)
            plain_text = cryptor.decrypt(a2b_hex(text))
            return plain_text.rstrip(bytes('\0', encoding="utf-8"))

    #rsa加密  
    def rsaEncrypt(data, pubkey):  

        #明文编码格式  
        content = data
        #公钥加密  
        crypto = rsa.encrypt(content,pubkey)  
        return crypto

    #rsa解密  
    def rsaDecrypt(data,pk):  
        #私钥解密  
        content = rsa.decrypt(data,pk)  
        con=content 
        return con  

    def des_algorithm(encrypt_or_decrypt, data, key1, key2):
        '''des de/encrypt algorithm'''
        k = des(key1, CBC, key2, pad=None, padmode=PAD_PKCS5)

        if encrypt_or_decrypt=="encrypt":
            res = k.encrypt(data)
            return True, res
        elif encrypt_or_decrypt=="decrypt":
            res = k.decrypt(data)
            return True, res
        else:
            print("methods is wrong")
            return False, ''

    def aes_algorithm(encrypt_or_decrypt, data, key1, key2):
        '''des de/encrypt algorithm'''
        k = aes_prpcrypt(key1)

        if encrypt_or_decrypt=="encrypt":
            res = k.encrypt(data)
            return True, res
        elif encrypt_or_decrypt=="decrypt":
            res = k.decrypt(data)
            return True, res
        else:
            print("methods is wrong")
            return False, ''

    def rc4_algorithm(encrypt_or_decrypt, data, key1, key2):
        '''des de/encrypt algorithm'''
        if encrypt_or_decrypt=="encrypt":
            key = bytes(key1, encoding='utf-8')
            enc = rc4cipher.new(key)
            res = enc.encrypt(data)
            return True, res
        elif encrypt_or_decrypt=="decrypt":
            key = bytes(key1, encoding='utf-8')
            enc = rc4cipher.new(key)
            res = enc.decrypt(data)
            return True, res
        else:
            print("methods is wrong")
            return False, ''

    def rsa_algorithm(encrypt_or_decrypt, data, key1, key2):
        '''rsa de/encrypt algorithm'''
        if encrypt_or_decrypt=="encrypt":
            #生成公钥、私钥  1024位
            (pubkey, privkey) = rsa.newkeys(1024)  
            # print("public key is: ", pubkey)
            # print("private key is: ", privkey)
            with open('./public.pem','w+') as f:
                f.write(pubkey.save_pkcs1().decode())
            with open('./private.pem','w+') as f:
                f.write(privkey.save_pkcs1().decode())

            res = b''
            dataLen = len(data) # 分块加密
            while dataLen>0:
                # print(dataLen)
                dataLen -= 117
                crypto = rsaEncrypt(data[:117], pubkey)
                data = data[117:]
                res += crypto
                print(len(res))
            return True, res
        elif encrypt_or_decrypt=="decrypt":
            dataLen = len(data)
            res = b''
            with open('./private.pem','r') as f:
                privkey = rsa.PrivateKey.load_pkcs1(f.read().encode())
            key2 = privkey
            # 分组解密,公钥为1024时,加密时117位一组,解密时128位一组
            while dataLen>0:
                print(dataLen)
                dataLen -= 128
                crypto = rsaDecrypt(data[:128], key2)
                data = data[128:]
                res += crypto
            return True, res
        else:
            print("methods is wrong")
            return False, ''


    if __name__ == '__main__':
        parser = argparse.ArgumentParser()
        parser.add_argument("input_file_location", help="Input the file location you want to process")
        parser.add_argument("encrypt_or_decrypt", help="you want to encrypt or decrypt?")
        parser.add_argument("key1", help="key1, for des")
        parser.add_argument("key2", help="key2, can be none")
        parser.add_argument("output_file_location", help="the location you want to output")
        parser.add_argument("methods", help="input the algorithm you wanna, des/aes/rc4/rsa")


        args = parser.parse_args()

        input_file_location = sys.argv[1]
        encrypt_or_decrypt = sys.argv[2]
        key1 = sys.argv[3]
        key2 = sys.argv[4]
        output_file_location = sys.argv[5]
        methods = sys.argv[6]
        data = open(input_file_location, 'rb').read()

        print(type(data))
        # print('data:', data, '\n')

        if methods=='des':
            success, res = des_algorithm(encrypt_or_decrypt, data, key1, key2)
        elif methods=='aes':
            success, res = aes_algorithm(encrypt_or_decrypt, data, key1, key2)
        elif methods=='rc4':
            success, res = rc4_algorithm(encrypt_or_decrypt, data, key1, key2)
        elif methods=='rsa':
            success, res = rsa_algorithm(encrypt_or_decrypt, data, key1, key2)


        # print('res:', res, '\n', type(res))
        # 加密时
        if encrypt_or_decrypt=='encrypt':
            with open(output_file_location, 'wb') as f:
                f.write(res)

        # 解密时
        elif encrypt_or_decrypt=='decrypt':
            with open(output_file_location, 'wb') as f:
                f.write(res)

安装模块

pip3 install pyDes
pip3 install pycryptodome | pip3 install pycrypt
pip3 install rc4-python3
pip3 install rsa

命令demo

python cryptography.py <inputfile> <encrypt/decrypt> <key1> <key2> <outputfile> <des/aes/rc4/rsa>

des的key1需要8个字符,key2也要8个字符

python3 crytography.py ./1.jpg encrypt 12345678 12345678 ./endes.txt des
python3 crytography.py ./endes.txt decrypt 12345678 12345678 ./dedes.jpg des

aes的key1需要16个字符, 不需要key2,但是程序入口需要加,所以默认12345678即可

python3 crytography.py ./1.jpg encrypt 1234567890123456 12345678 ./enaes.txt aes
python3 crytography.py ./enaes.txt decrypt 1234567890123456 12345678 ./deaes.jpg aes

rc4 key1为密钥至少5位,key2无用,但需要输入

python3 crytography.py ./1.jpg encrypt 12345678 12345678 ./enrc4.txt rc4
python3 crytography.py ./enrc4.txt decrypt 12345678 12345678 ./derc4.jpg rc4

rsa 命令,key1和key2无用,将公密钥public.pem/private.pem放在当前目录下即可

python3 crytography.py ./1.jpg encrypt 12345678 12345678 ./enrsa.txt rsa
python3 crytography.py ./enrsa.txt decrypt 12345678 12345678 ./dersa.jpg rsa