侯体宗的博客
  • 首页
  • 人生(杂谈)
  • 技术
  • 关于我
  • 更多分类
    • 文件下载
    • 文字修仙
    • 中国象棋ai
    • 群聊
    • 九宫格抽奖
    • 拼图
    • 消消乐
    • 相册

php实现的rc4加密解密类定义与用法示例

php  /  管理员 发布于 7年前   161

本文实例讲述了php实现的rc4加密解密类。分享给大家供大家参考,具体如下:

class.rc4crypt.php文件:

mode = MCRYPT_ARCFOUR;      break;     case defined('MCRYPT_RC4');      $this->mode = MCRYPT_RC4;    }  } } /**  * Sets the key.  *  * Keys can be between 1 and 256 bytes long. If they are longer then 256 bytes, the first 256 bytes will  * be used. If no key is explicitly set, it'll be assumed to be a single null byte.  *  * @access public  * @param String $key  */ function setKey($key) {  $this->key = $key;  if ( CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT ) {   return;  }  $keyLength = strlen($key);  $keyStream = array();  for ($i = 0; $i < 256; $i++) {   $keyStream[$i] = $i;  }  $j = 0;  for ($i = 0; $i < 256; $i++) {   $j = ($j + $keyStream[$i] + ord($key[$i % $keyLength])) & 255;   $temp = $keyStream[$i];   $keyStream[$i] = $keyStream[$j];   $keyStream[$j] = $temp;  }  $this->encryptIndex = $this->decryptIndex = array(0, 0);  $this->encryptStream = $this->decryptStream = $keyStream; } /**  * Dummy function.  *  * Some protocols, such as WEP, prepend an "initialization vector" to the key, effectively creating a new key [1].  * If you need to use an initialization vector in this manner, feel free to prepend it to the key, yourself, before  * calling setKey().  *  * [1] WEP's initialization vectors (IV's) are used in a somewhat insecure way. Since, in that protocol,  * the IV's are relatively easy to predict, an attack described by  * {@link http://www.drizzle.com/~aboba/IEEE/rc4_ksaproc.pdf Scott Fluhrer, Itsik Mantin, and Adi Shamir}  * can be used to quickly guess at the rest of the key. The following links elaborate:  *  * {@link http://www.rsa.com/rsalabs/node.asp?id=2009 http://www.rsa.com/rsalabs/node.asp?id=2009}  * {@link http://en.wikipedia.org/wiki/Related_key_attack http://en.wikipedia.org/wiki/Related_key_attack}  *  * @param String $iv  * @see Crypt_RC4::setKey()  * @access public  */ function setIV($iv) { } /**  * Sets MCrypt parameters. (optional)  *  * If MCrypt is being used, empty strings will be used, unless otherwise specified.  *  * @link http://php.net/function.mcrypt-module-open#function.mcrypt-module-open  * @access public  * @param optional Integer $algorithm_directory  * @param optional Integer $mode_directory  */ function setMCrypt($algorithm_directory = '', $mode_directory = '') {  if ( CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT ) {   $this->mcrypt = array($algorithm_directory, $mode_directory);   $this->_closeMCrypt();  } } /**  * Encrypts a message.  *  * @see Crypt_RC4::_crypt()  * @access public  * @param String $plaintext  */ function encrypt($plaintext) {  return self::toHex($this->_crypt($plaintext, CRYPT_RC4_ENCRYPT)); } /**  * Decrypts a message.  *  * $this->decrypt($this->encrypt($plaintext)) == $this->encrypt($this->encrypt($plaintext)).  * Atleast if the continuous buffer is disabled.  *  * @see Crypt_RC4::_crypt()  * @access public  * @param String $ciphertext  */ function decrypt($ciphertext) {  $ciphertext = self::fromHex($ciphertext);  return $this->_crypt($ciphertext, CRYPT_RC4_DECRYPT); } /**  * Encrypts or decrypts a message.  *  * @see Crypt_RC4::encrypt()  * @see Crypt_RC4::decrypt()  * @access private  * @param String $text  * @param Integer $mode  */ function _crypt($text, $mode) {  if ( CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT ) {   $keyStream = $mode == CRYPT_RC4_ENCRYPT ? 'encryptStream' : 'decryptStream';   if ($this->$keyStream === false) {    $this->$keyStream = mcrypt_module_open($this->mode, $this->mcrypt[0], MCRYPT_MODE_STREAM, $this->mcrypt[1]);    mcrypt_generic_init($this->$keyStream, $this->key, '');   } else if (!$this->continuousBuffer) {    mcrypt_generic_init($this->$keyStream, $this->key, '');   }   $newText = mcrypt_generic($this->$keyStream, $text);   if (!$this->continuousBuffer) {    mcrypt_generic_deinit($this->$keyStream);   }   return $newText;  }  if ($this->encryptStream === false) {   $this->setKey($this->key);  }  switch ($mode) {   case CRYPT_RC4_ENCRYPT:    $keyStream = $this->encryptStream;    list($i, $j) = $this->encryptIndex;    break;   case CRYPT_RC4_DECRYPT:    $keyStream = $this->decryptStream;    list($i, $j) = $this->decryptIndex;  }  $newText = '';  for ($k = 0; $k < strlen($text); $k++) {   $i = ($i + 1) & 255;   $j = ($j + $keyStream[$i]) & 255;   $temp = $keyStream[$i];   $keyStream[$i] = $keyStream[$j];   $keyStream[$j] = $temp;   $temp = $keyStream[($keyStream[$i] + $keyStream[$j]) & 255];   $newText.= chr(ord($text[$k]) ^ $temp);  }  if ($this->continuousBuffer) {   switch ($mode) {    case CRYPT_RC4_ENCRYPT:     $this->encryptStream = $keyStream;     $this->encryptIndex = array($i, $j);     break;    case CRYPT_RC4_DECRYPT:     $this->decryptStream = $keyStream;     $this->decryptIndex = array($i, $j);   }  }  return $newText; } /**  * Treat consecutive "packets" as if they are a continuous buffer.  *  * Say you have a 16-byte plaintext $plaintext. Using the default behavior, the two following code snippets  * will yield different outputs:  *  *   * echo $rc4->encrypt(substr($plaintext, 0, 8));  * echo $rc4->encrypt(substr($plaintext, 8, 8));  *   *   * echo $rc4->encrypt($plaintext);  *   *  * The solution is to enable the continuous buffer. Although this will resolve the above discrepancy, it creates  * another, as demonstrated with the following:  *  *   * $rc4->encrypt(substr($plaintext, 0, 8));  * echo $rc4->decrypt($des->encrypt(substr($plaintext, 8, 8)));  *   *   * echo $rc4->decrypt($des->encrypt(substr($plaintext, 8, 8)));  *   *  * With the continuous buffer disabled, these would yield the same output. With it enabled, they yield different  * outputs. The reason is due to the fact that the initialization vector's change after every encryption /  * decryption round when the continuous buffer is enabled. When it's disabled, they remain constant.  *  * Put another way, when the continuous buffer is enabled, the state of the Crypt_DES() object changes after each  * encryption / decryption round, whereas otherwise, it'd remain constant. For this reason, it's recommended that  * continuous buffers not be used. They do offer better security and are, in fact, sometimes required (SSH uses them),  * however, they are also less intuitive and more likely to cause you problems.  *  * @see Crypt_RC4::disableContinuousBuffer()  * @access public  */ function enableContinuousBuffer() {  $this->continuousBuffer = true; } /**  * Treat consecutive packets as if they are a discontinuous buffer.  *  * The default behavior.  *  * @see Crypt_RC4::enableContinuousBuffer()  * @access public  */ function disableContinuousBuffer() {  if ( CRYPT_RC4_MODE == CRYPT_RC4_MODE_INTERNAL ) {   $this->encryptIndex = $this->decryptIndex = array(0, 0);   $this->setKey($this->key);  }  $this->continuousBuffer = false; } /**  * Dummy function.  *  * Since RC4 is a stream cipher and not a block cipher, no padding is necessary. The only reason this function is  * included is so that you can switch between a block cipher and a stream cipher transparently.  *  * @see Crypt_RC4::disablePadding()  * @access public  */ function enablePadding() { } /**  * Dummy function.  *  * @see Crypt_RC4::enablePadding()  * @access public  */ function disablePadding() { } /**  * Class destructor.  *  * Will be called, automatically, if you're using PHP5. If you're using PHP4, call it yourself. Only really  * needs to be called if mcrypt is being used.  *  * @access public  */ function __destruct() {  if ( CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT ) {   $this->_closeMCrypt();  } } /**  * Properly close the MCrypt objects.  *  * @access prviate  */ function _closeMCrypt() {  if ( $this->encryptStream !== false ) {   if ( $this->continuousBuffer ) {    mcrypt_generic_deinit($this->encryptStream);   }   mcrypt_module_close($this->encryptStream);   $this->encryptStream = false;  }  if ( $this->decryptStream !== false ) {   if ( $this->continuousBuffer ) {    mcrypt_generic_deinit($this->decryptStream);   }   mcrypt_module_close($this->decryptStream);   $this->decryptStream = false;  } } // @function fromHex 把十六进制数转换成字符串 function toHex($sa , $len = 0){  $buf = "";  if( $len == 0 )   $len = strlen($sa) ;  for ($i = 0; $i < $len; $i++)  {   $val = dechex(ord($sa{$i}));     if(strlen($val)< 2)     $val = "0".$val;   $buf .= $val;  }  return $buf; } // @function fromHex 把十六进制数转换成字符串  function fromHex($sa){  $buf = "";  $len = strlen($sa) ;  for($i = 0; $i < $len; $i += 2){   $val = chr(hexdec(substr($sa, $i, 2)));   $buf .= $val;  }  return $buf; }}

使用方法:

include('class.rc4crypt.php');$rc4 = new Crypt_RC4();$rc4 -> setKey('21sd54a1w5q');$text = '';echo $x = $rc4->encrypt($text);//加密echo '
';echo $rc4->decrypt( $x) ;//解密

运行结果:

7907bb7c6694f179e9642ebd

PS:关于加密解密感兴趣的朋友还可以参考本站在线工具:

在线RC4加密/解密工具:
http://tools..net.cn/password/rc4_encode

文字在线加密解密工具(包含AES、DES、RC4等):
http://tools..net.cn/password/txt_encode

在线散列/哈希算法加密工具:
http://tools..net.cn/password/hash_encrypt

在线MD5/hash/SHA-1/SHA-2/SHA-256/SHA-512/SHA-3/RIPEMD-160加密工具:
http://tools..net.cn/password/hash_md5_sha

在线sha1/sha224/sha256/sha384/sha512加密工具:
http://tools..net.cn/password/sha_encode

更多关于PHP相关内容感兴趣的读者可查看本站专题:《php加密方法总结》、《PHP编码与转码操作技巧汇总》、《PHP数学运算技巧总结》、《PHP数组(Array)操作技巧大全》、《php字符串(string)用法总结》、《PHP数据结构与算法教程》、《php程序设计算法总结》及《php正则表达式用法总结》

希望本文所述对大家PHP程序设计有所帮助。

您可能感兴趣的文章:

  • php实现rc4加密算法代码
  • PHP实现的DES加密解密类定义与用法示例
  • 基于php实现的php代码加密解密类完整实例
  • PHP加密解密类实例代码
  • PHP实现加强版加密解密类实例
  • PHP加密解密类实例分析
  • php写的AES加密解密类分享
  • 一个PHP针对数字的加密解密类
  • 支持中文的php加密解密类代码
  • PHP实现的AES加密、解密封装类与用法示例


  • 上一条:
    PHP实现类似题库抽题效果
    下一条:
    php使用curl_init()和curl_multi_init()多线程的速度比较详解
  • 昵称:

    邮箱:

    0条评论 (评论内容有缓存机制,请悉知!)
    最新最热
    • 分类目录
    • 人生(杂谈)
    • 技术
    • linux
    • Java
    • php
    • 框架(架构)
    • 前端
    • ThinkPHP
    • 数据库
    • 微信(小程序)
    • Laravel
    • Redis
    • Docker
    • Go
    • swoole
    • Windows
    • Python
    • 苹果(mac/ios)
    • 相关文章
    • Laravel从Accel获得5700万美元A轮融资(0个评论)
    • PHP 8.4 Alpha 1现已发布!(0个评论)
    • 用Time Warden监控PHP中的代码处理时间(0个评论)
    • 在PHP中使用array_pop + yield实现读取超大型目录功能示例(0个评论)
    • Property Hooks RFC在PHP 8.4中越来越接近现实(0个评论)
    • 近期文章
    • 在windows10中升级go版本至1.24后LiteIDE的Ctrl+左击无法跳转问题解决方案(0个评论)
    • 智能合约Solidity学习CryptoZombie第四课:僵尸作战系统(0个评论)
    • 智能合约Solidity学习CryptoZombie第三课:组建僵尸军队(高级Solidity理论)(0个评论)
    • 智能合约Solidity学习CryptoZombie第二课:让你的僵尸猎食(0个评论)
    • 智能合约Solidity学习CryptoZombie第一课:生成一只你的僵尸(0个评论)
    • 在go中实现一个常用的先进先出的缓存淘汰算法示例代码(0个评论)
    • 在go+gin中使用"github.com/skip2/go-qrcode"实现url转二维码功能(0个评论)
    • 在go语言中使用api.geonames.org接口实现根据国际邮政编码获取地址信息功能(1个评论)
    • 在go语言中使用github.com/signintech/gopdf实现生成pdf分页文件功能(95个评论)
    • gmail发邮件报错:534 5.7.9 Application-specific password required...解决方案(0个评论)
    • 近期评论
    • 122 在

      学历:一种延缓就业设计,生活需求下的权衡之选中评论 工作几年后,报名考研了,到现在还没认真学习备考,迷茫中。作为一名北漂互联网打工人..
    • 123 在

      Clash for Windows作者删库跑路了,github已404中评论 按理说只要你在国内,所有的流量进出都在监控范围内,不管你怎么隐藏也没用,想搞你分..
    • 原梓番博客 在

      在Laravel框架中使用模型Model分表最简单的方法中评论 好久好久都没看友情链接申请了,今天刚看,已经添加。..
    • 博主 在

      佛跳墙vpn软件不会用?上不了网?佛跳墙vpn常见问题以及解决办法中评论 @1111老铁这个不行了,可以看看近期评论的其他文章..
    • 1111 在

      佛跳墙vpn软件不会用?上不了网?佛跳墙vpn常见问题以及解决办法中评论 网站不能打开,博主百忙中能否发个APP下载链接,佛跳墙或极光..
    • 2016-10
    • 2016-11
    • 2017-06
    • 2017-07
    • 2017-08
    • 2017-09
    • 2017-11
    • 2017-12
    • 2018-01
    • 2018-02
    • 2018-03
    • 2020-03
    • 2020-04
    • 2020-05
    • 2020-06
    • 2020-07
    • 2020-09
    • 2021-02
    • 2021-03
    • 2021-04
    • 2021-05
    • 2021-06
    • 2021-07
    • 2021-08
    • 2021-09
    • 2021-10
    • 2021-11
    • 2021-12
    • 2022-01
    • 2022-02
    • 2022-05
    • 2022-06
    • 2022-07
    • 2022-08
    • 2022-09
    • 2022-10
    • 2022-11
    • 2022-12
    • 2023-01
    • 2023-02
    • 2023-03
    • 2023-04
    • 2023-05
    • 2023-06
    • 2023-07
    • 2023-08
    • 2023-09
    • 2023-10
    • 2023-11
    • 2023-12
    • 2024-01
    • 2024-02
    • 2024-03
    • 2024-04
    • 2024-05
    • 2024-06
    • 2024-07
    • 2024-09
    Top

    Copyright·© 2019 侯体宗版权所有· 粤ICP备20027696号 PHP交流群

    侯体宗的博客