今天接触了MD5加密方式,记录一下使用方法,又去搜了搜关于MD5的详细内容

MD5在vue中使用方法
  1. 1、下载MD5模块
  2. cnpm install md5 -S
  3. 2、引入模块
  4. const md5 = require("md5")
  5. 3、加密
  6. const str = "12345";
  7. console.log(md5(str));

1.MD5介绍

MD5是MD5消息摘要算法的简称(英语:MD5 Message-Digest Algorithm),是一种广泛使用的密码散列函数,可以产生出一个128位(16字节)的散列值(即哈希值),用于确保信息传输的完整性。MD5由罗纳德·李维斯特设计,于1992年公开,用以取代MD4算法。这套算法的程序在RFC 1321 中被加以规范。将数据(如一段文字)运算变为另一固定长度值,是散列算法的基础原理。MD5已经被证实可以被碰撞破解。对于需要高度安全性的数据,专家一般建议改用其他算法,如SHA-2。

2.js加密的好处

(1)用js对私密信息加密可避免在网络中传输明文信息,被人截取数据包而造成数据泄露。

(2)避免缓存中自动缓存密码。比如在使用谷歌浏览器登陆时,输入的用户名和密码会自动缓存,下次登陆时无需输入密码就可以实现登陆,这样就给别人留下漏洞,当别人用你电脑登陆或把input的type改为test 那么你的密码就泄露了.使用js加密时,缓存的加密后的密文,用密文做密码登陆是不成功的,即使泄露也是泄露的密文,对密码不会造成威胁,缺点是每次登陆时都要手动输入密码,较麻烦。

(3)使用js加密,减少了服务器加密时的资源消耗,从理论上提高了服务器的性能。为了安全,很有必要再做服务器端的加密.无论从理论还是实际,两道门比一道门要安全些.至少给攻击者造成了一个障碍。

md5还有jQuery的使用方法

jquery.md5.js插件代码:

  1. /**
  2. * jQuery MD5 hash algorithm function
  3. *
  4. * <code>
  5. * Calculate the md5 hash of a String
  6. * String $.md5 ( String str )
  7. * </code>
  8. *
  9. * Calculates the MD5 hash of str using the » RSA Data Security, Inc. MD5 Message-Digest Algorithm, and returns that hash.
  10. * MD5 (Message-Digest algorithm 5) is a widely-used cryptographic hash function with a 128-bit hash value. MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of data. The generated hash is also non-reversable. Data cannot be retrieved from the message digest, the digest uniquely identifies the data.
  11. * MD5 was developed by Professor Ronald L. Rivest in 1994. Its 128 bit (16 byte) message digest makes it a faster implementation than SHA-1.
  12. * This script is used to process a variable length message into a fixed-length output of 128 bits using the MD5 algorithm. It is fully compatible with UTF-8 encoding. It is very useful when u want to transfer encrypted passwords over the internet. If you plan using UTF-8 encoding in your project don't forget to set the page encoding to UTF-8 (Content-Type meta tag).
  13. * This function orginally get from the WebToolkit and rewrite for using as the jQuery plugin.
  14. *
  15. * Example
  16. * Code
  17. * <code>
  18. * $.md5("I'm Persian.");
  19. * </code>
  20. * Result
  21. * <code>
  22. * "b8c901d0f02223f9761016cfff9d68df"
  23. * </code>
  24. *
  25. * @alias Muhammad Hussein Fattahizadeh < muhammad [AT] semnanweb [DOT] com >
  26. * @link http://www.semnanweb.com/jquery-plugin/md5.html
  27. * @see http://www.webtoolkit.info/
  28. * @license http://www.gnu.org/licenses/gpl.html [GNU General Public License]
  29. * @param {jQuery} {md5:function(string))
  30. * @return string
  31. */
  32. (function($){
  33. var rotateLeft = function(lValue, iShiftBits) {
  34. return (lValue << iShiftBits) | (lValue >>> (32 - iShiftBits));
  35. }
  36. var addUnsigned = function(lX, lY) {
  37. var lX4, lY4, lX8, lY8, lResult;
  38. lX8 = (lX & 0x80000000);
  39. lY8 = (lY & 0x80000000);
  40. lX4 = (lX & 0x40000000);
  41. lY4 = (lY & 0x40000000);
  42. lResult = (lX & 0x3FFFFFFF) + (lY & 0x3FFFFFFF);
  43. if (lX4 & lY4) return (lResult ^ 0x80000000 ^ lX8 ^ lY8);
  44. if (lX4 | lY4) {
  45. if (lResult & 0x40000000) return (lResult ^ 0xC0000000 ^ lX8 ^ lY8);
  46. else return (lResult ^ 0x40000000 ^ lX8 ^ lY8);
  47. } else {
  48. return (lResult ^ lX8 ^ lY8);
  49. }
  50. }
  51. var F = function(x, y, z) {
  52. return (x & y) | ((~ x) & z);
  53. }
  54. var G = function(x, y, z) {
  55. return (x & z) | (y & (~ z));
  56. }
  57. var H = function(x, y, z) {
  58. return (x ^ y ^ z);
  59. }
  60. var I = function(x, y, z) {
  61. return (y ^ (x | (~ z)));
  62. }
  63. var FF = function(a, b, c, d, x, s, ac) {
  64. a = addUnsigned(a, addUnsigned(addUnsigned(F(b, c, d), x), ac));
  65. return addUnsigned(rotateLeft(a, s), b);
  66. };
  67. var GG = function(a, b, c, d, x, s, ac) {
  68. a = addUnsigned(a, addUnsigned(addUnsigned(G(b, c, d), x), ac));
  69. return addUnsigned(rotateLeft(a, s), b);
  70. };
  71. var HH = function(a, b, c, d, x, s, ac) {
  72. a = addUnsigned(a, addUnsigned(addUnsigned(H(b, c, d), x), ac));
  73. return addUnsigned(rotateLeft(a, s), b);
  74. };
  75. var II = function(a, b, c, d, x, s, ac) {
  76. a = addUnsigned(a, addUnsigned(addUnsigned(I(b, c, d), x), ac));
  77. return addUnsigned(rotateLeft(a, s), b);
  78. };
  79. var convertToWordArray = function(string) {
  80. var lWordCount;
  81. var lMessageLength = string.length;
  82. var lNumberOfWordsTempOne = lMessageLength + 8;
  83. var lNumberOfWordsTempTwo = (lNumberOfWordsTempOne - (lNumberOfWordsTempOne % 64)) / 64;
  84. var lNumberOfWords = (lNumberOfWordsTempTwo + 1) * 16;
  85. var lWordArray = Array(lNumberOfWords - 1);
  86. var lBytePosition = 0;
  87. var lByteCount = 0;
  88. while (lByteCount < lMessageLength) {
  89. lWordCount = (lByteCount - (lByteCount % 4)) / 4;
  90. lBytePosition = (lByteCount % 4) * 8;
  91. lWordArray[lWordCount] = (lWordArray[lWordCount] | (string.charCodeAt(lByteCount) << lBytePosition));
  92. lByteCount++;
  93. }
  94. lWordCount = (lByteCount - (lByteCount % 4)) / 4;
  95. lBytePosition = (lByteCount % 4) * 8;
  96. lWordArray[lWordCount] = lWordArray[lWordCount] | (0x80 << lBytePosition);
  97. lWordArray[lNumberOfWords - 2] = lMessageLength << 3;
  98. lWordArray[lNumberOfWords - 1] = lMessageLength >>> 29;
  99. return lWordArray;
  100. };
  101. var wordToHex = function(lValue) {
  102. var WordToHexValue = "", WordToHexValueTemp = "", lByte, lCount;
  103. for (lCount = 0; lCount <= 3; lCount++) {
  104. lByte = (lValue >>> (lCount * 8)) & 255;
  105. WordToHexValueTemp = "0" + lByte.toString(16);
  106. WordToHexValue = WordToHexValue + WordToHexValueTemp.substr(WordToHexValueTemp.length - 2, 2);
  107. }
  108. return WordToHexValue;
  109. };
  110. var uTF8Encode = function(string) {
  111. string = string.replace(/\x0d\x0a/g, "\x0a");
  112. var output = "";
  113. for (var n = 0; n < string.length; n++) {
  114. var c = string.charCodeAt(n);
  115. if (c < 128) {
  116. output += String.fromCharCode(c);
  117. } else if ((c > 127) && (c < 2048)) {
  118. output += String.fromCharCode((c >> 6) | 192);
  119. output += String.fromCharCode((c & 63) | 128);
  120. } else {
  121. output += String.fromCharCode((c >> 12) | 224);
  122. output += String.fromCharCode(((c >> 6) & 63) | 128);
  123. output += String.fromCharCode((c & 63) | 128);
  124. }
  125. }
  126. return output;
  127. };
  128. $.extend({
  129. md5: function(string) {
  130. var x = Array();
  131. var k, AA, BB, CC, DD, a, b, c, d;
  132. var S11=7, S12=12, S13=17, S14=22;
  133. var S21=5, S22=9 , S23=14, S24=20;
  134. var S31=4, S32=11, S33=16, S34=23;
  135. var S41=6, S42=10, S43=15, S44=21;
  136. string = uTF8Encode(string);
  137. x = convertToWordArray(string);
  138. a = 0x67452301; b = 0xEFCDAB89; c = 0x98BADCFE; d = 0x10325476;
  139. for (k = 0; k < x.length; k += 16) {
  140. AA = a; BB = b; CC = c; DD = d;
  141. a = FF(a, b, c, d, x[k+0], S11, 0xD76AA478);
  142. d = FF(d, a, b, c, x[k+1], S12, 0xE8C7B756);
  143. c = FF(c, d, a, b, x[k+2], S13, 0x242070DB);
  144. b = FF(b, c, d, a, x[k+3], S14, 0xC1BDCEEE);
  145. a = FF(a, b, c, d, x[k+4], S11, 0xF57C0FAF);
  146. d = FF(d, a, b, c, x[k+5], S12, 0x4787C62A);
  147. c = FF(c, d, a, b, x[k+6], S13, 0xA8304613);
  148. b = FF(b, c, d, a, x[k+7], S14, 0xFD469501);
  149. a = FF(a, b, c, d, x[k+8], S11, 0x698098D8);
  150. d = FF(d, a, b, c, x[k+9], S12, 0x8B44F7AF);
  151. c = FF(c, d, a, b, x[k+10], S13, 0xFFFF5BB1);
  152. b = FF(b, c, d, a, x[k+11], S14, 0x895CD7BE);
  153. a = FF(a, b, c, d, x[k+12], S11, 0x6B901122);
  154. d = FF(d, a, b, c, x[k+13], S12, 0xFD987193);
  155. c = FF(c, d, a, b, x[k+14], S13, 0xA679438E);
  156. b = FF(b, c, d, a, x[k+15], S14, 0x49B40821);
  157. a = GG(a, b, c, d, x[k+1], S21, 0xF61E2562);
  158. d = GG(d, a, b, c, x[k+6], S22, 0xC040B340);
  159. c = GG(c, d, a, b, x[k+11], S23, 0x265E5A51);
  160. b = GG(b, c, d, a, x[k+0], S24, 0xE9B6C7AA);
  161. a = GG(a, b, c, d, x[k+5], S21, 0xD62F105D);
  162. d = GG(d, a, b, c, x[k+10], S22, 0x2441453);
  163. c = GG(c, d, a, b, x[k+15], S23, 0xD8A1E681);
  164. b = GG(b, c, d, a, x[k+4], S24, 0xE7D3FBC8);
  165. a = GG(a, b, c, d, x[k+9], S21, 0x21E1CDE6);
  166. d = GG(d, a, b, c, x[k+14], S22, 0xC33707D6);
  167. c = GG(c, d, a, b, x[k+3], S23, 0xF4D50D87);
  168. b = GG(b, c, d, a, x[k+8], S24, 0x455A14ED);
  169. a = GG(a, b, c, d, x[k+13], S21, 0xA9E3E905);
  170. d = GG(d, a, b, c, x[k+2], S22, 0xFCEFA3F8);
  171. c = GG(c, d, a, b, x[k+7], S23, 0x676F02D9);
  172. b = GG(b, c, d, a, x[k+12], S24, 0x8D2A4C8A);
  173. a = HH(a, b, c, d, x[k+5], S31, 0xFFFA3942);
  174. d = HH(d, a, b, c, x[k+8], S32, 0x8771F681);
  175. c = HH(c, d, a, b, x[k+11], S33, 0x6D9D6122);
  176. b = HH(b, c, d, a, x[k+14], S34, 0xFDE5380C);
  177. a = HH(a, b, c, d, x[k+1], S31, 0xA4BEEA44);
  178. d = HH(d, a, b, c, x[k+4], S32, 0x4BDECFA9);
  179. c = HH(c, d, a, b, x[k+7], S33, 0xF6BB4B60);
  180. b = HH(b, c, d, a, x[k+10], S34, 0xBEBFBC70);
  181. a = HH(a, b, c, d, x[k+13], S31, 0x289B7EC6);
  182. d = HH(d, a, b, c, x[k+0], S32, 0xEAA127FA);
  183. c = HH(c, d, a, b, x[k+3], S33, 0xD4EF3085);
  184. b = HH(b, c, d, a, x[k+6], S34, 0x4881D05);
  185. a = HH(a, b, c, d, x[k+9], S31, 0xD9D4D039);
  186. d = HH(d, a, b, c, x[k+12], S32, 0xE6DB99E5);
  187. c = HH(c, d, a, b, x[k+15], S33, 0x1FA27CF8);
  188. b = HH(b, c, d, a, x[k+2], S34, 0xC4AC5665);
  189. a = II(a, b, c, d, x[k+0], S41, 0xF4292244);
  190. d = II(d, a, b, c, x[k+7], S42, 0x432AFF97);
  191. c = II(c, d, a, b, x[k+14], S43, 0xAB9423A7);
  192. b = II(b, c, d, a, x[k+5], S44, 0xFC93A039);
  193. a = II(a, b, c, d, x[k+12], S41, 0x655B59C3);
  194. d = II(d, a, b, c, x[k+3], S42, 0x8F0CCC92);
  195. c = II(c, d, a, b, x[k+10], S43, 0xFFEFF47D);
  196. b = II(b, c, d, a, x[k+1], S44, 0x85845DD1);
  197. a = II(a, b, c, d, x[k+8], S41, 0x6FA87E4F);
  198. d = II(d, a, b, c, x[k+15], S42, 0xFE2CE6E0);
  199. c = II(c, d, a, b, x[k+6], S43, 0xA3014314);
  200. b = II(b, c, d, a, x[k+13], S44, 0x4E0811A1);
  201. a = II(a, b, c, d, x[k+4], S41, 0xF7537E82);
  202. d = II(d, a, b, c, x[k+11], S42, 0xBD3AF235);
  203. c = II(c, d, a, b, x[k+2], S43, 0x2AD7D2BB);
  204. b = II(b, c, d, a, x[k+9], S44, 0xEB86D391);
  205. a = addUnsigned(a, AA);
  206. b = addUnsigned(b, BB);
  207. c = addUnsigned(c, CC);
  208. d = addUnsigned(d, DD);
  209. }
  210. var tempValue = wordToHex(a) + wordToHex(b) + wordToHex(c) + wordToHex(d);
  211. return tempValue.toLowerCase();
  212. }
  213. });
  214. })(jQuery);

使用方法

  1. $.(md5("你想要加密的字符串"));

附上MD5 破解网站:https://www.cmd5.com/ (简单的可以破解,复杂的不能破解)

后来又搜到前端加密方式有很多,可以看看这位博主的文章 https://blog.csdn.net/doulinxu/article/details/60766242 , 写的很详细!

前端加密MD5的更多相关文章

  1. RSA前端加密

    昨天做了登陆模块,接触了md5&RSA加密.有点意思,talk is cheap,show me the code! 前端加密 为什么要加密 前端加密的方式 后台如何解密 1 为什么要加密? ...

  2. 再解决不了前端加密我就吃shi

    参考文章 快速定位前端加密方法 渗透测试-前端加密测试 前言 最近学习挖洞以来,碰到数据做了加密基本上也就放弃了.但是发现越来越多的网站都开始做前端加密了,不论是金融行业还是其他.所以趁此机会来捣鼓一 ...

  3. RSA非对称性前端加密后端解密

    前端加密代码 <!DOCTYPE html> <html xmlns="http://www.w3.org/1999/xhtml"> <head> ...

  4. iOS开发 - 网络数据安全加密(MD5)

    提交用户的隐私数据 一定要使用POST请求提交用户的隐私数据GET请求的所有参数都直接暴露在URL中请求的URL一般会记录在服务器的访问日志中服务器的访问日志是黑客攻击的重点对象之一 用户的隐私数据登 ...

  5. Java 前端加密传输后端解密以及验证码功能

    目录(?)[-] 加密解密 1 前端js加密概述 2 前后端加密解密 21 引用的js加密库 22 js加密解密 23 Java端加密解密PKCS5Padding与js的Pkcs7一致 验证码 1 概 ...

  6. 转发:RSA实现JS前端加密,PHP后端解密

    web前端,用户注册与登录,不能直接以明文形式提交用户密码,容易被截获,这时就引入RSA. 前端加密 需引入4个JS扩展文件,jsbn.js.prng4.js.rng.js和rsa.js. <h ...

  7. RSA实现JS前端加密,PHP后端解密

    web前端,用户注册与登录,不能直接以明文形式提交用户密码,容易被截获,这时就引入RSA. 前端加密 需引入4个JS扩展文件,jsbn.js.prng4.js.rng.js和rsa.js. <h ...

  8. 论 Web 前端加密的意义

    论 Web 前端加密的意义 Web前端密码加密是否有意义? https://www.zhihu.com/question/25539382 https://blog.csdn.net/hla19910 ...

  9. Java 自带的加密类MessageDigest类(加密MD5和SHA)

    Java 自带的加密类MessageDigest类(加密MD5和SHA) - X-rapido的专栏 - CSDN博客 https://blog.csdn.net/xiaokui_wingfly/ar ...

随机推荐

  1. @bzoj - 4378@ [POI2015] Pustynia

    目录 @description@ @solution@ @accepted code@ @details@ @description@ 给定一个长度为 n 的正整数序列 a,每个数都在 1 到 10^ ...

  2. 解决 vs 出现Error MC3000 给定编码中的字符无效

    在 xaml 写中文注释,发现编译失败 Error MC3000 给定编码中的字符无效 我的 xaml 写了一句代码 <Grid> <!--林德熙--> </Grid&g ...

  3. H3C 路由器的特点

  4. 请求(RequestInfo)

    请求类型 StringRequestInfo 用在 SuperSocket 命令行协议中. 你也可以根据你的应用程序的需要来定义你自己的请求类型. 例如, 如果所有请求都包含 DeviceID 信息, ...

  5. Python--day67--include包含其他的url和反向解析URL

    1,include包含其他的url: 2,反向解析URL:

  6. dos taskkill 命令

    C:\Users\asn\Desktop>taskkill /? TASKKILL [/S system [/U username [/P [password]]]] { [/FI filter ...

  7. vue样式加scoped后不能覆盖组件的原有样式解决方法

    <style scoped> </style> 为了vue页面样式模块化,不对全局造成污染,建议每个页面的style标签加上scoped,表示他的样式只属于当前的页面,父组件的 ...

  8. VMware 注册码

    VMware 12 Pro 永久许可证激活密钥 5A02H-AU243-TZJ49-GTC7K-3C61NVF5XA-FNDDJ-085GZ-4NXZ9-N20E6UC5MR-8NE16-H81WY- ...

  9. H3C RIP基本配置举例

  10. P1055 连通块问题

    题目描述 给出一个n行m列的地图,'.'代表陆地,'W'代表水.现在需要你计算地图中有多少个水块.八个方向可以连通 比如:4*6的地图 ...WWW ...WW. WW.... .....W 中有3个 ...