MD5算法原理及C#和JS实现的方法是什么

前端开发   发布日期:2023年08月31日   浏览次数:432

本篇内容主要讲解“MD5算法原理及C#和JS实现的方法是什么”,感兴趣的朋友不妨来看看。本文介绍的方法操作简单快捷,实用性强。下面就让小编来带大家学习“MD5算法原理及C#和JS实现的方法是什么”吧!

一、简介

MD5 是哈希算法(散列算法)的一种应用。Hash 算法虽然被称为算法,但实际上它更像是一种思想。Hash 算法没有一个固定的公式,只要符合散列思想的算法都可以被称为是 Hash 算法。

算法目的就是,把任意长度的输入(又叫做预映射 pre-image),通过散列算法变换成固定长度的输出,该输出就是散列值。

注意,不同的输入可能会散列成相同的输出,所以不能从散列值来确定唯一的输入值。

散列函数简单的说就是:一种将任意长度的消息压缩到某一固定长度的消息摘要的函数。

Hash 算法是一个广义的算法,也可以认为是一种思想,使用 Hash 算法可以提高存储空间的利用率,可以提高数据的查询效率,因为很难找到其逆向规律,也可以做数字签名来保障数据传递的安全性。所以Hash算法被广泛地应用在互联网应用中。

散列值不同 => 原始值不同

如果两个散列值是不相同的(根据同一函数),那么这两个散列值的原始输入也是不相同的。这个特性是散列函数具有确定性的结果。

散列值相同 ≠> 原始值相同

散列函数的输入和输出不是一一对应的,如果两个散列值相同,两个输入值很可能是相同的,但不绝对肯定二者一定相等(可能出现哈希碰撞)。

关于“撞库”(Credential Stuffing Attack)

其在网络安全中是一个古老的概念,按中文的字面意思解读,就是“碰撞数据库”的意思。“碰撞”意味着碰运气,即不一定能成功;而“数据库”中往往存储着大量敏感数据,比如我们登录一个网站所需要的用户名、密码,再比如手机号、身份证号等个人隐私信息。“撞库”在英文中的表述为 Credential Stuffing(密码嗅探),也非常直白的说明了撞库的主要场景:试图获取正确的账号/密码组合,大白话就是“盗号”。

二、C# 代码实现

根据传入参数,返回分大小写的 16 位或 32 位密文,并且可自定义编码规则。

  1. // 测试
  2. string jiamihou16 = SecurityMD5.MD5Encrypt("TestString", 16, false); // 8828701f97fa4511
  3. string jiamihou32 = SecurityMD5.MD5Encrypt("TestString", 32);// 5B56F40F8828701F97FA4511DDCD25FB
  4. /// <summary>
  5. /// MD5 加密方法
  6. /// </summary>
  7. /// <param name="md5instr">待加密字符串</param>
  8. /// <param name="digit">位数:16/32/64</param>
  9. /// <param name="isupper">输出大小写:true 大写;false 小写(返回为 64 位时不区分大小写)</param>
  10. /// <param name="encoding">字符编码规则,为空默认:UTF8</param>
  11. /// <returns></returns>
  12. public static string MD5Encrypt(string md5instr, int digit, bool isupper = true, Encoding encoding = null)
  13. {
  14. string md5outstr = string.Empty;
  15. if (encoding == null)
  16. encoding = Encoding.UTF8;
  17. switch (digit)
  18. {
  19. case 16:
  20. // SecurityMD5.MD5Encrypt(md5instr, 16, true); // 16位大写
  21. // SecurityMD5.MD5Encrypt(md5instr, 16, false); // 16位小写
  22. var md5provider = new MD5CryptoServiceProvider();
  23. var hashinstr16 = md5provider.ComputeHash(encoding.GetBytes(md5instr));
  24. md5outstr = BitConverter.ToString(hashinstr16, 4, 8);
  25. md5outstr = md5outstr.Replace("-", "");
  26. if (!isupper)
  27. md5outstr = md5outstr.ToLower();
  28. return md5outstr;
  29. case 32:
  30. // SecurityMD5.MD5Encrypt(md5instr, 32, true); // 32位大写
  31. // SecurityMD5.MD5Encrypt(md5instr, 32, false); // 32位小写
  32. MD5 md532 = MD5.Create();
  33. byte[] hashinstr32 = md532.ComputeHash(encoding.GetBytes(md5instr));
  34. string upperorlowerflag = isupper ? "X2" : "x2";
  35. for (int i = 0; i < hashinstr32.Length; i++)
  36. {
  37. md5outstr = md5outstr + hashinstr32[i].ToString(upperorlowerflag);
  38. }
  39. return md5outstr;
  40. case 64:
  41. // SecurityMD5.MD5Encrypt(md5instr, 64); // 64位加密,加密后为24位的值,例如:9GnLVZEzFmZLMj963TqUEQ==
  42. MD5 md564 = MD5.Create();
  43. byte[] hashinstr64 = md564.ComputeHash(encoding.GetBytes(md5instr));
  44. return Convert.ToBase64String(hashinstr64);
  45. default:
  46. return "";
  47. }
  48. }

三、js 代码实现

根据传入参数,返回分大小写的 16 位或 32 位密文。

  1. // 测试
  2. md5_function("TestString",16,false)
  3. >'8828701f97fa4511'
  4. md5_function("TestString",32,true)
  5. >'5B56F40F8828701F97FA4511DDCD25FB'
  6. // MD5 加密(入参分别是:待加密内容、返回位数、是否为大写)
  7. function md5_function(md5instr, digit, isupper){
  8. function md5_RotateLeft(lValue, iShiftBits) {
  9. return (lValue << iShiftBits) | (lValue >>> (32 - iShiftBits));
  10. }
  11. function md5_AddUnsigned(lX, lY) {
  12. var lX4, lY4, lX8, lY8, lResult;
  13. lX8 = (lX & 0x80000000);
  14. lY8 = (lY & 0x80000000);
  15. lX4 = (lX & 0x40000000);
  16. lY4 = (lY & 0x40000000);
  17. lResult = (lX & 0x3FFFFFFF) + (lY & 0x3FFFFFFF);
  18. if (lX4 & lY4) {
  19. return (lResult ^ 0x80000000 ^ lX8 ^ lY8);
  20. }
  21. if (lX4 | lY4) {
  22. if (lResult & 0x40000000) {
  23. return (lResult ^ 0xC0000000 ^ lX8 ^ lY8);
  24. } else {
  25. return (lResult ^ 0x40000000 ^ lX8 ^ lY8);
  26. }
  27. } else {
  28. return (lResult ^ lX8 ^ lY8);
  29. }
  30. }
  31. function md5_F(x, y, z) {
  32. return (x & y) | ((~x) & z);
  33. }
  34. function md5_G(x, y, z) {
  35. return (x & z) | (y & (~z));
  36. }
  37. function md5_H(x, y, z) {
  38. return (x ^ y ^ z);
  39. }
  40. function md5_I(x, y, z) {
  41. return (y ^ (x | (~z)));
  42. }
  43. function md5_FF(a, b, c, d, x, s, ac) {
  44. a = md5_AddUnsigned(a, md5_AddUnsigned(md5_AddUnsigned(md5_F(b, c, d), x), ac));
  45. return md5_AddUnsigned(md5_RotateLeft(a, s), b);
  46. };
  47. function md5_GG(a, b, c, d, x, s, ac) {
  48. a = md5_AddUnsigned(a, md5_AddUnsigned(md5_AddUnsigned(md5_G(b, c, d), x), ac));
  49. return md5_AddUnsigned(md5_RotateLeft(a, s), b);
  50. };
  51. function md5_HH(a, b, c, d, x, s, ac) {
  52. a = md5_AddUnsigned(a, md5_AddUnsigned(md5_AddUnsigned(md5_H(b, c, d), x), ac));
  53. return md5_AddUnsigned(md5_RotateLeft(a, s), b);
  54. };
  55. function md5_II(a, b, c, d, x, s, ac) {
  56. a = md5_AddUnsigned(a, md5_AddUnsigned(md5_AddUnsigned(md5_I(b, c, d), x), ac));
  57. return md5_AddUnsigned(md5_RotateLeft(a, s), b);
  58. };
  59. function md5_ConvertToWordArray(md5instr) {
  60. var lWordCount;
  61. var lMessageLength = md5instr.length;
  62. var lNumberOfWords_temp1 = lMessageLength + 8;
  63. var lNumberOfWords_temp2 = (lNumberOfWords_temp1 - (lNumberOfWords_temp1 % 64)) / 64;
  64. var lNumberOfWords = (lNumberOfWords_temp2 + 1) * 16;
  65. var lWordArray = Array(lNumberOfWords - 1);
  66. var lBytePosition = 0;
  67. var lByteCount = 0;
  68. while (lByteCount < lMessageLength) {
  69. lWordCount = (lByteCount - (lByteCount % 4)) / 4;
  70. lBytePosition = (lByteCount % 4) * 8;
  71. lWordArray[lWordCount] = (lWordArray[lWordCount] | (md5instr.charCodeAt(lByteCount) << lBytePosition));
  72. lByteCount++;
  73. }
  74. lWordCount = (lByteCount - (lByteCount % 4)) / 4;
  75. lBytePosition = (lByteCount % 4) * 8;
  76. lWordArray[lWordCount] = lWordArray[lWordCount] | (0x80 << lBytePosition);
  77. lWordArray[lNumberOfWords - 2] = lMessageLength << 3;
  78. lWordArray[lNumberOfWords - 1] = lMessageLength >>> 29;
  79. return lWordArray;
  80. };
  81. function md5_WordToHex(lValue) {
  82. var WordToHexValue = "", WordToHexValue_temp = "", lByte, lCount;
  83. for (lCount = 0; lCount <= 3; lCount++) {
  84. lByte = (lValue >>> (lCount * 8)) & 255;
  85. WordToHexValue_temp = "0" + lByte.toString(16);
  86. WordToHexValue = WordToHexValue + WordToHexValue_temp.substr(WordToHexValue_temp.length - 2, 2);
  87. }
  88. return WordToHexValue;
  89. };
  90. function md5_Utf8Encode(md5instr) {
  91. md5instr = md5instr?.replace(/
  92. /g, "
  93. ");
  94. var utftext = "";
  95. for (var n = 0; n < md5instr.length; n++) {
  96. var c = md5instr.charCodeAt(n);
  97. if (c < 128) {
  98. utftext += String.fromCharCode(c);
  99. } else if ((c > 127) && (c < 2048)) {
  100. utftext += String.fromCharCode((c >> 6) | 192);
  101. utftext += String.fromCharCode((c & 63) | 128);
  102. } else {
  103. utftext += String.fromCharCode((c >> 12) | 224);
  104. utftext += String.fromCharCode(((c >> 6) & 63) | 128);
  105. utftext += String.fromCharCode((c & 63) | 128);
  106. }
  107. }
  108. return utftext;
  109. };
  110. var x = Array();
  111. var k, AA, BB, CC, DD, a, b, c, d;
  112. var S11 = 7, S12 = 12, S13 = 17, S14 = 22;
  113. var S21 = 5, S22 = 9, S23 = 14, S24 = 20;
  114. var S31 = 4, S32 = 11, S33 = 16, S34 = 23;
  115. var S41 = 6, S42 = 10, S43 = 15, S44 = 21;
  116. md5instr = md5_Utf8Encode(md5instr);
  117. x = md5_ConvertToWordArray(md5instr);
  118. a = 0x67452301; b = 0xEFCDAB89; c = 0x98BADCFE; d = 0x10325476;
  119. for (k = 0; k < x.length; k += 16) {
  120. AA = a; BB = b; CC = c; DD = d;
  121. a = md5_FF(a, b, c, d, x[k + 0], S11, 0xD76AA478);
  122. d = md5_FF(d, a, b, c, x[k + 1], S12, 0xE8C7B756);
  123. c = md5_FF(c, d, a, b, x[k + 2], S13, 0x242070DB);
  124. b = md5_FF(b, c, d, a, x[k + 3], S14, 0xC1BDCEEE);
  125. a = md5_FF(a, b, c, d, x[k + 4], S11, 0xF57C0FAF);
  126. d = md5_FF(d, a, b, c, x[k + 5], S12, 0x4787C62A);
  127. c = md5_FF(c, d, a, b, x[k + 6], S13, 0xA8304613);
  128. b = md5_FF(b, c, d, a, x[k + 7], S14, 0xFD469501);
  129. a = md5_FF(a, b, c, d, x[k + 8], S11, 0x698098D8);
  130. d = md5_FF(d, a, b, c, x[k + 9], S12, 0x8B44F7AF);
  131. c = md5_FF(c, d, a, b, x[k + 10], S13, 0xFFFF5BB1);
  132. b = md5_FF(b, c, d, a, x[k + 11], S14, 0x895CD7BE);
  133. a = md5_FF(a, b, c, d, x[k + 12], S11, 0x6B901122);
  134. d = md5_FF(d, a, b, c, x[k + 13], S12, 0xFD987193);
  135. c = md5_FF(c, d, a, b, x[k + 14], S13, 0xA679438E);
  136. b = md5_FF(b, c, d, a, x[k + 15], S14, 0x49B40821);
  137. a = md5_GG(a, b, c, d, x[k + 1], S21, 0xF61E2562);
  138. d = md5_GG(d, a, b, c, x[k + 6], S22, 0xC040B340);
  139. c = md5_GG(c, d, a, b, x[k + 11], S23, 0x265E5A51);
  140. b = md5_GG(b, c, d, a, x[k + 0], S24, 0xE9B6C7AA);
  141. a = md5_GG(a, b, c, d, x[k + 5], S21, 0xD62F105D);
  142. d = md5_GG(d, a, b, c, x[k + 10], S22, 0x2441453);
  143. c = md5_GG(c, d, a, b, x[k + 15], S23, 0xD8A1E681);
  144. b = md5_GG(b, c, d, a, x[k + 4], S24, 0xE7D3FBC8);
  145. a = md5_GG(a, b, c, d, x[k + 9], S21, 0x21E1CDE6);
  146. d = md5_GG(d, a, b, c, x[k + 14], S22, 0xC33707D6);
  147. c = md5_GG(c, d, a, b, x[k + 3], S23, 0xF4D50D87);
  148. b = md5_GG(b, c, d, a, x[k + 8], S24, 0x455A14ED);
  149. a = md5_GG(a, b, c, d, x[k + 13], S21, 0xA9E3E905);
  150. d = md5_GG(d, a, b, c, x[k + 2], S22, 0xFCEFA3F8);
  151. c = md5_GG(c, d, a, b, x[k + 7], S23, 0x676F02D9);
  152. b = md5_GG(b, c, d, a, x[k + 12], S24, 0x8D2A4C8A);
  153. a = md5_HH(a, b, c, d, x[k + 5], S31, 0xFFFA3942);
  154. d = md5_HH(d, a, b, c, x[k + 8], S32, 0x8771F681);
  155. c = md5_HH(c, d, a, b, x[k + 11], S33, 0x6D9D6122);
  156. b = md5_HH(b, c, d, a, x[k + 14], S34, 0xFDE5380C);
  157. a = md5_HH(a, b, c, d, x[k + 1], S31, 0xA4BEEA44);
  158. d = md5_HH(d, a, b, c, x[k + 4], S32, 0x4BDECFA9);
  159. c = md5_HH(c, d, a, b, x[k + 7], S33, 0xF6BB4B60);
  160. b = md5_HH(b, c, d, a, x[k + 10], S34, 0xBEBFBC70);
  161. a = md5_HH(a, b, c, d, x[k + 13], S31, 0x289B7EC6);
  162. d = md5_HH(d, a, b, c, x[k + 0], S32, 0xEAA127FA);
  163. c = md5_HH(c, d, a, b, x[k + 3], S33, 0xD4EF3085);
  164. b = md5_HH(b, c, d, a, x[k + 6], S34, 0x4881D05);
  165. a = md5_HH(a, b, c, d, x[k + 9], S31, 0xD9D4D039);
  166. d = md5_HH(d, a, b, c, x[k + 12], S32, 0xE6DB99E5);
  167. c = md5_HH(c, d, a, b, x[k + 15], S33, 0x1FA27CF8);
  168. b = md5_HH(b, c, d, a, x[k + 2], S34, 0xC4AC5665);
  169. a = md5_II(a, b, c, d, x[k + 0], S41, 0xF4292244);
  170. d = md5_II(d, a, b, c, x[k + 7], S42, 0x432AFF97);
  171. c = md5_II(c, d, a, b, x[k + 14], S43, 0xAB9423A7);
  172. b = md5_II(b, c, d, a, x[k + 5], S44, 0xFC93A039);
  173. a = md5_II(a, b, c, d, x[k + 12], S41, 0x655B59C3);
  174. d = md5_II(d, a, b, c, x[k + 3], S42, 0x8F0CCC92);
  175. c = md5_II(c, d, a, b, x[k + 10], S43, 0xFFEFF47D);
  176. b = md5_II(b, c, d, a, x[k + 1], S44, 0x85845DD1);
  177. a = md5_II(a, b, c, d, x[k + 8], S41, 0x6FA87E4F);
  178. d = md5_II(d, a, b, c, x[k + 15], S42, 0xFE2CE6E0);
  179. c = md5_II(c, d, a, b, x[k + 6], S43, 0xA3014314);
  180. b = md5_II(b, c, d, a, x[k + 13], S44, 0x4E0811A1);
  181. a = md5_II(a, b, c, d, x[k + 4], S41, 0xF7537E82);
  182. d = md5_II(d, a, b, c, x[k + 11], S42, 0xBD3AF235);
  183. c = md5_II(c, d, a, b, x[k + 2], S43, 0x2AD7D2BB);
  184. b = md5_II(b, c, d, a, x[k + 9], S44, 0xEB86D391);
  185. a = md5_AddUnsigned(a, AA);
  186. b = md5_AddUnsigned(b, BB);
  187. c = md5_AddUnsigned(c, CC);
  188. d = md5_AddUnsigned(d, DD);
  189. }
  190. if(digit == 16){
  191. if(isupper)
  192. return (md5_WordToHex(b) + md5_WordToHex(c)).toUpperCase();
  193. else
  194. return (md5_WordToHex(b) + md5_WordToHex(c)).toLowerCase();
  195. }
  196. else if (digit == 32){
  197. if(isupper)
  198. return (md5_WordToHex(a) + md5_WordToHex(b) + md5_WordToHex(c) + md5_WordToHex(d)).toUpperCase();
  199. else
  200. return (md5_WordToHex(a) + md5_WordToHex(b) + md5_WordToHex(c) + md5_WordToHex(d)).toLowerCase();
  201. }
  202. return "";
  203. }

以上就是MD5算法原理及C#和JS实现的方法是什么的详细内容,更多关于MD5算法原理及C#和JS实现的方法是什么的资料请关注九品源码其它相关文章!