


How to use 32-digit php to encrypt and decrypt IDs (code attached)
I recently encountered a problem in the project. The current user shares an invitation code with a friend. After the friend registers as a new user based on the invitation code, he becomes the current user's subordinate. Under certain conditions, the subordinate user's information can be obtained. A range of rebates. What is implemented here is to generate an encrypted string based on the current user's id, which can be reversely decrypted. After constant testing and adjustments, the final result was finally obtained. For example:
id = 12 code = 85U43DM
First implementation
First enter the code, as follows:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 |
|
Introduction to the idea:
Set a salt value, $salt, and concatenate it with the id to form a new string. The salt value can be used to securely calibrate the invitation code later. test. Perform md4 encryption on the string (considering that md4 is faster and less secure than md5), get $encodestr, split the string into two parts, the first part $startLen , 13 strings; the second part $endLen, 8 strings. Mix $string, here the passed in id, and $uidlen into the previous part of the string. Therefore, it currently only supports a maximum length of id of 9, so the length of $uidlen is 1, so in the end we get a string of length 22.
During the encryption process, we actually mix the value of the id and the length of the id into the encrypted string. During encryption, we find the corresponding position based on the stored information to get the id.
Here, we do not have high requirements for security. In order to make the program run faster, there is no verification during decryption.
Test, encrypt the id:
1 |
|
Output result:
23471DC2352712F34D6780
Test, decrypt the invitation code
1 |
|
Output result :
12
The results obtained do not seem to have any problems, but in the actual test, such a problem was found. This may exist for ordinary users. A friend sent a message to his WeChat mobile phone. Invitation code, and then he wants to use a computer to register, but he doesn’t know how to transfer the invitation code from the mobile phone to the computer or finds it troublesome. At this time, he has to enter the invitation code manually on the computer. Oh my God, It's 22 digits, and it's still a mix of capital letters and numbers. He probably has to give up on registration.
Therefore, we have made adjustments and changed to a 7-digit invitation code.
Explore again
Is the method encapsulated before writing the article, or is it better to directly add the code first
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 |
|
Introduction to ideas
This method was adopted under the guidance of a master who has worked for many years. Convert the id into a fixed-length 32-digit string and add your own algorithm. Why is base 32 used here instead of other bases? The 32-digit system can contain enough English characters, and the generated encrypted string will look more standardized. On the other hand, some English characters that are not easily recognized (ILOU is excluded here) are excluded, so the 32-digit system is used instead of 36 base.
Encryption process, method idToString(), considering that when the id is relatively small at the beginning, there will be more 0s when converting to 32 hexadecimal, which seems very irregular, so an initial value INIT_NUM is set. , this can be customized. According to the passed id, after adding the initial value, a value with a length of 10 digits is obtained. The interval bit of this value is split into $num1 with a length of 4 digits and $num2 with a length of 6 digits. The two values are converted separately. It is hexadecimal. After conversion, $num1 will get a string with a length of 3. Use U to make up for the shortage. $num2 will get a string with a length of 4. Use L to make up for the shortage.
Decryption is a reverse operation, just reverse the operation.
Test: Generate
1 2 |
|
Result:
85U43DM
Decryption:
1 2 |
|
Result:
12
Recommended related articles:
Summary of four security filtering functions in php (with code)
php implements extraction of numbers from strings Summary of methods (code)
Simple analysis of PHP system program execution functions (system, passthru, exec) (with code)
The above is the detailed content of How to use 32-digit php to encrypt and decrypt IDs (code attached). For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

A string is a sequence of characters, including letters, numbers, and symbols. This tutorial will learn how to calculate the number of vowels in a given string in PHP using different methods. The vowels in English are a, e, i, o, u, and they can be uppercase or lowercase. What is a vowel? Vowels are alphabetic characters that represent a specific pronunciation. There are five vowels in English, including uppercase and lowercase: a, e, i, o, u Example 1 Input: String = "Tutorialspoint" Output: 6 explain The vowels in the string "Tutorialspoint" are u, o, i, a, o, i. There are 6 yuan in total

This tutorial demonstrates how to efficiently process XML documents using PHP. XML (eXtensible Markup Language) is a versatile text-based markup language designed for both human readability and machine parsing. It's commonly used for data storage an

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

What are the magic methods of PHP? PHP's magic methods include: 1.\_\_construct, used to initialize objects; 2.\_\_destruct, used to clean up resources; 3.\_\_call, handle non-existent method calls; 4.\_\_get, implement dynamic attribute access; 5.\_\_set, implement dynamic attribute settings. These methods are automatically called in certain situations, improving code flexibility and efficiency.

PHP and Python each have their own advantages, and choose according to project requirements. 1.PHP is suitable for web development, especially for rapid development and maintenance of websites. 2. Python is suitable for data science, machine learning and artificial intelligence, with concise syntax and suitable for beginners.
