Table of Contents
XOR string encryption method after base64 encryption
Home Backend Development PHP Tutorial Share a newly written PHP encryption and decryption function

Share a newly written PHP encryption and decryption function

Feb 09, 2017 am 09:43 AM
laravel linux mysql nginx php

XOR string encryption method after base64 encryption

Encryption

function encode($str,$key)
{
    $res = base64_encode($str);
    $code = $res^$key;
    return $code;
}
Copy after login
Copy after login

Decryption

function decode($str,$key)
{
    return base64_decode($str^$key);
}
Copy after login
Copy after login

Full code example:

$str = '111021';
$key = 'APPYJJ-PHONE-LAZY';
function encode($str,$key)
{
    $res = base64_encode($str);
    $code = $res^$key;
    return $code;
}
$str = encode($str,$key);
print_r($str);
echo "<hr>";
function decode($str,$key)
{
    return base64_decode($str^$key);
}
print_r(decode($str,$key));
Copy after login
Copy after login
  • The whole program is very simple~ According to logical thinking, it should be difficult to crack, if others don’t know your secret key;

  • If you still feel unsafe. So I’m just going to throw some light here; I suggest you continue to use shift operations in the encryption and decryption process

//加密的时候;
$a = $str >> 4;
//解密的时候则相反
$a = $str << 4;
Copy after login
Copy after login

ok!~ At this point, the blogger continues to work! ~~

XOR string encryption method after base64 encryption

Encryption

function encode($str,$key)
{
    $res = base64_encode($str);
    $code = $res^$key;
    return $code;
}
Copy after login
Copy after login

Decryption

function decode($str,$key)
{
    return base64_decode($str^$key);
}
Copy after login
Copy after login

Complete code example:

$str = '111021';
$key = 'APPYJJ-PHONE-LAZY';
function encode($str,$key)
{
    $res = base64_encode($str);
    $code = $res^$key;
    return $code;
}
$str = encode($str,$key);
print_r($str);
echo "<hr>";
function decode($str,$key)
{
    return base64_decode($str^$key);
}
print_r(decode($str,$key));
Copy after login
Copy after login
  • The whole program is very simple ~ according to logical thinking, it should be difficult to crack, in others Without knowing your secret key;

  • If you still feel unsafe. So I’m going to throw some light here; I suggest you continue to use shift operations in the encryption and decryption process

//加密的时候;
$a = $str >> 4;
//解密的时候则相反
$a = $str << 4;
Copy after login
Copy after login

For more related articles about sharing a newly written PHP encryption and decryption function, please pay attention to PHP Chinese website!


Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Roblox: Bubble Gum Simulator Infinity - How To Get And Use Royal Keys
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Mandragora: Whispers Of The Witch Tree - How To Unlock The Grappling Hook
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Nordhold: Fusion System, Explained
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Hot Topics

Java Tutorial
1668
14
PHP Tutorial
1273
29
C# Tutorial
1256
24
What is the significance of the session_start() function? What is the significance of the session_start() function? May 03, 2025 am 12:18 AM

session_start()iscrucialinPHPformanagingusersessions.1)Itinitiatesanewsessionifnoneexists,2)resumesanexistingsession,and3)setsasessioncookieforcontinuityacrossrequests,enablingapplicationslikeuserauthenticationandpersonalizedcontent.

Composer: The Package Manager for PHP Developers Composer: The Package Manager for PHP Developers May 02, 2025 am 12:23 AM

Composer is a dependency management tool for PHP, and manages project dependencies through composer.json file. 1) parse composer.json to obtain dependency information; 2) parse dependencies to form a dependency tree; 3) download and install dependencies from Packagist to the vendor directory; 4) generate composer.lock file to lock the dependency version to ensure team consistency and project maintainability.

What are the advantages of using MySQL over other relational databases? What are the advantages of using MySQL over other relational databases? May 01, 2025 am 12:18 AM

The reasons why MySQL is widely used in various projects include: 1. High performance and scalability, supporting multiple storage engines; 2. Easy to use and maintain, simple configuration and rich tools; 3. Rich ecosystem, attracting a large number of community and third-party tool support; 4. Cross-platform support, suitable for multiple operating systems.

Integrating JavaScript Frameworks (React, Vue, Angular) with a Laravel Backend Integrating JavaScript Frameworks (React, Vue, Angular) with a Laravel Backend May 03, 2025 am 12:20 AM

React,Vue,andAngularcanbeintegratedwithLaravelbyfollowingspecificsetupsteps.1)ForReact:InstallReactusingLaravelUI,setupcomponentsinapp.js.2)ForVue:UseLaravel'sbuilt-inVuesupport,configureinapp.js.3)ForAngular:SetupAngularseparately,servethroughLarave

What are the typical use cases for Linux versus Windows? What are the typical use cases for Linux versus Windows? May 03, 2025 am 12:01 AM

Linuxisidealforcustomization,development,andservermanagement,whileWindowsexcelsineaseofuse,softwarecompatibility,andgaming.Linuxoffershighconfigurabilityfordevelopersandserversetups,whereasWindowsprovidesauser-friendlyinterfaceandbroadsoftwaresupport

Linux Operations: Understanding the Core Functionality Linux Operations: Understanding the Core Functionality May 03, 2025 am 12:09 AM

Linux is a Unix-based multi-user, multi-tasking operating system that emphasizes simplicity, modularity and openness. Its core functions include: file system: organized in a tree structure, supports multiple file systems such as ext4, XFS, Btrfs, and use df-T to view file system types. Process management: View the process through the ps command, manage the process using PID, involving priority settings and signal processing. Network configuration: Flexible setting of IP addresses and managing network services, and use sudoipaddradd to configure IP. These features are applied in real-life operations through basic commands and advanced script automation, improving efficiency and reducing errors.

How to set the rotation effect of HTML elements How to set the rotation effect of HTML elements Apr 30, 2025 pm 02:42 PM

How to set the rotation effect of an element in HTML? It can be achieved using CSS and JavaScript. 1. The transform property of CSS is used for static rotation, such as rotate(45deg). 2. JavaScript can dynamically control rotation, which is implemented by changing the transform attribute.

NGINX vs. Apache: Comparing Web Server Technologies NGINX vs. Apache: Comparing Web Server Technologies May 02, 2025 am 12:08 AM

NGINX is suitable for handling high concurrency and static content, while Apache is suitable for dynamic content and complex URL rewrites. 1.NGINX adopts an event-driven model, suitable for high concurrency. 2. Apache uses process or thread model, which is suitable for dynamic content. 3. NGINX configuration is simple, Apache configuration is complex but more flexible.

See all articles