How to implement simple encryption technology in PHP
本篇文章主要介绍PHP实现简单加密技术的方法,感兴趣的朋友参考下,希望对大家有所帮助。
一、MD5加密
直接干,这里以一个登录页面为例:
<?php require_once 'config/database.config.php'; $act=$_REQUEST['act']; $username=$_POST['username']; $password=md5($_POST['password']); if ($act=='reg') { $sql="INSERT INTO user(username,password) VALUES('{$username}','{$password}')"; $result=mysqli_query($link, $sql); if ($result) { echo "Success"; echo "<meta http-equiv='refresh' content='1;url=login.html'/>"; }else { echo "Failure!"; echo "<meta http-equiv='refresh' content='1;url=reg.html'/>"; } }elseif ($act=='login') { $sql="SELECT * FROM user WHERE username='{$username}' AND password='{$password}'"; $result=mysqli_query($link, $sql); $validate=mysqli_fetch_array($result); //var_dump($validate); if ($validate) { echo "success"; echo "<meta http-equiv='refresh' content='1;url=http://www.baidu.com'/>"; }else { echo "failure"; echo "<meta http-equiv='refresh' content='1;url=login.html'/>"; } }
主要就是记得比对的时候也使用MD5,所以存在数据库中的时候就是密码保存的了
mysql> SELECT * FROM user; +----+----------+----------------------------------+ | id | username | password | +----+----------+----------------------------------+ | 1 | 123 | d41d8cd98f00b204e9800998ecf8427e | | 2 | 123 | 5e12a8f9c9e959060fdcaea165393039 | | 3 | | d41d8cd98f00b204e9800998ecf8427e | | 4 | root | 202cb962ac59075b964b07152d234b70 | | 5 | root | 0c51f0ba4316a5c844397f69effe2d01 | +----+----------+----------------------------------+
二、Crypt加密算法
同样是一个单向加密算法,无法由密文直接得到明文密码(和MD5一样);
语法:string crypt(string $str[,string $salt]),$str为加密明文,$salt为干扰项,可以理解为椒盐噪声;
/** * Crypt */ echo crypt('shit'); echo "<hr/>"; echo crypt('shit','im'); echo "<hr/>"; if (CRYPT_EXT_DES) { echo crypt('shit','this is a test'); } echo "<hr/>"; if (CRYPT_MD5) { echo crypt('shit','$1$this is a test$'); }
基本没什么要说的,就一点,crypt的加密有不同的加密算法,默认的是MD5加密,但是若是不给定“盐值”,每次刷新,都是不一样的结果;
然后可以指定盐值,具体参见手册,每个算法的盐值长度是不一样的,比如上述的DES和MD5,结果如下
1223b8c30a347321299611f873b449ad $1$ed0.Ph..$fPbfhSOMLyNdtZn9krT8X/ im37cLeO/JPaQ th12A1V7QCns. $1$this is $Bu9FE8Y8oGnIbftjDA4ez0
DES只能取两位,而MD5取了8位;
用法上也差不多,记得输入盐值才好。
三、Sha1
同样是单向加密,不可破解(但网上的办法都是类似数据库一样的“伪暴力”破解);
与MD5的区别在于返回更长的(40位)16进制的数串(MD5是32位);
/** * Sha1 */ echo "<hr/>"; echo sha1('shit'); echo "<hr/>"; echo sha1('shit',true); echo "<hr/>"; echo sha1('admin');
所以,一般加密保存,不要单独使用这些密码,不如这样子混合使用:
echo "<hr/>"; echo sha1(sha1('admin',true)); echo "<hr/>"; echo sha1(md5('admin'));
等于是加密外面又自行进行了简单的加密!!
四、URL编码加密
对地址栏信息进行加密;
双向,urlencode和urldecode;
/** * URL编码加密 */ $str="this is a test"; $result=urlencode($str); echo $result; echo "<hr/>"; echo urldecode($result); echo "<hr/>"; $str="login.php?username=shit&action=act%3 hape#123\\"; echo urlencode($str); echo "<hr/>"; echo "<a href='index.php?username=shit&gender=male'>Shit Login</a>"; print_r($_GET); echo "<hr/>"; //所以地址栏进行一下编码,一方面是保密,一方面是处理特殊情况 //比如username&shit是一个整体,不编码的话,浏览器是看不出的 echo "<a href='index.php?username=username&shit&gender=male'>Shit Login2</a>"; print_r($_GET); echo "<hr/>"; $str="username&shit"; $str2="username=".urlencode($str)."&gender=".urlencode("male"); echo "<a href='index.php?".$str2."'>Shit Login3</a>"; print_r($_GET); echo "<hr/>"; //baidu example //https://www.baidu.com/s?ie=utf8&wd=url%E7%BC%96%E7%A0%81%E5%8A%A0%E5%AF%86&tn=87048150_dg //search url编码
结果如下
this+is+a+test this is a test login.php%3Fusername%3Dshit%26action%3Dact%253+hape%23123%5C Shit LoginArray ( [username] => username&shit [gender] => male ) Shit Login2Array ( [username] => username&shit [gender] => male ) Shit Login3Array ( [username] => username&shit [gender] => male )
所以功能就是:地址栏更加安全,不再明文传输,另一个解决特殊情况的传递
五、Base64编码加密
其实base64不是加密技术,只不过他会对data进行base64的编码,也可以看做是一种加密技术;
/** * Base64 */ $data="I am king"; echo base64_encode($data); echo "<hr/>"; echo base64_decode(base64_encode($data)); echo "<hr/>"; echo base64_encode("中文测试"); echo "<hr/>"; // echo base64_decode("R0lGODlhAQABAIAAAP///wAAACH5BAAAAAAALAAAAAABAAEAAAICRAEAOw=="); $data=file_get_contents("0.jpg"); echo base64_encode($data);
等于说是对内容进行加密;
总结
单项散列加密:得到固定长度的输出,是单向的;
对称散列加密:使用同一把密钥进行加密解密,可以相互推算;(算法简单,效率高,开销小,适合对大量数据进行加密)DES等
非对称加密技术:密钥不一样,公钥和私钥之分
以上就是本篇文的全部内容,希望能对大家的学习有所帮助。
相关推荐:
php运行报错Call to undefined function curl_init()的最新解决方法
php each 返回数组中当前的键值对并将数组指针向前移动一步
The above is the detailed content of How to implement simple encryption technology in PHP. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

If you are an experienced PHP developer, you might have the feeling that you’ve been there and done that already.You have developed a significant number of applications, debugged millions of lines of code, and tweaked a bunch of scripts to achieve op

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

A string is a sequence of characters, including letters, numbers, and symbols. This tutorial will learn how to calculate the number of vowels in a given string in PHP using different methods. The vowels in English are a, e, i, o, u, and they can be uppercase or lowercase. What is a vowel? Vowels are alphabetic characters that represent a specific pronunciation. There are five vowels in English, including uppercase and lowercase: a, e, i, o, u Example 1 Input: String = "Tutorialspoint" Output: 6 explain The vowels in the string "Tutorialspoint" are u, o, i, a, o, i. There are 6 yuan in total

This tutorial demonstrates how to efficiently process XML documents using PHP. XML (eXtensible Markup Language) is a versatile text-based markup language designed for both human readability and machine parsing. It's commonly used for data storage an

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

What are the magic methods of PHP? PHP's magic methods include: 1.\_\_construct, used to initialize objects; 2.\_\_destruct, used to clean up resources; 3.\_\_call, handle non-existent method calls; 4.\_\_get, implement dynamic attribute access; 5.\_\_set, implement dynamic attribute settings. These methods are automatically called in certain situations, improving code flexibility and efficiency.
