An in-depth analysis of PHP data encryption methods

WBOY
Release: 2016-07-25 08:58:36
Original
1254 people have browsed it
  1. mysql>CREATE TABLE members (
  2. ->username CHAR(14) NOT NULL,
  3. ->password CHAR(32) NOT NULL,
  4. ->PRIMARY KEY(username)
  5. ->);
Copy code

Then, we assume that the following data is already stored in the table:

  1. $enteredPassword.
  2. $salt = substr($enteredPassword, 0, 2);
  3. $userPswd = crypt($enteredPassword, $salt);
  4. // $userPswd is then stored in MySQL together with the username In
Copy Code

I will be using Apache's password-response authentication configuration to prompt the user for their username and password. A little known fact about PHP is that it can pass the Apache password-response system input to the user. The name and password are identified as $PHP_AUTH_USER and $PHP_AUTH_PW, which I will use in the authentication script. Take some time to read the script below carefully and pay more attention to the explanations to better understand the following code: Application of crypt() and Apache's password-response verification system

  1. $host = "localhost";
  2. $user = "zorro";
  3. $pswd = "hell odolly";
  4. $db = "users";
  5. // Set authorization to False
  6. $authorization = 0 ;
  7. // Verify that user has entered username and password
  8. if (isset($PHP_AUTH_USER) &&isset($PHP_AUTH_PW)) :
  9. mysql_pconnect($host, $user, $pswd) or die("Can't connect to MySQL
  10. server!");
  11. mysql_select_db($db) or die("Can't select database!");
  12. // Perform the encryption
  13. $salt = substr($PHP_AUTH_PW, 0, 2);
  14. $encrypted_pswd = crypt( $PHP_AUTH_PW, $salt);
  15. // Build the query
  16. $query = "SELECT username FROM members WHERE
  17. username = '$PHP_AUTH_USER' AND
  18. password = '$encrypted_pswd'";
  19. // Execute the query
  20. if (mysql_numrows (mysql_query($query)) == 1) :
  21. $authorization = 1;
  22. endif;
  23. endif;
  24. // confirm authorization
  25. if (! $authorization) :
  26. header('WWW-Authenticate: Basic realm="Private "');
  27. header('HTTP/1.0 401 Unauthorized');
  28. print "You are unauthorized to enter this area.";
  29. exit;
  30. else :
  31. print "This is the secret data!";
  32. endif;
  33. >
Copy code

The above is a simple authentication system to verify user access rights. When using crypt() to protect important confidential information, remember that crypt() used by default is not the most secure and can only be used in systems with lower security requirements. If higher security is required Performance requires the algorithm I introduce later in this article. Next I will introduce another function supported by PHP━━md5(). This function uses the MD5 hash algorithm. It has several interesting uses worth mentioning:

Mixed A hash function transforms a variable-length message into a fixed-length hashed output, also known as a "message digest". This is useful because a fixed-length string can be used to check file integrity and verify digital signatures and user authentication. As it is suitable for PHP, PHP's built-in md5() hash function will convert a variable-length message into a 128-bit (32-character) message digest. An interesting feature of mixed encoding is that the original plain code cannot be obtained by analyzing the mixed information, because the mixed result has no dependence on the original plain code content. Even changing only one character in a string will cause the MD5 hybrid algorithm to calculate two completely different results. Let’s first look at the contents of the following table and its corresponding results: Use md5() to mix strings

  1. $msg = "This is some message that I just wrote";
  2. $enc_msg = md5($msg);
  3. print "hash: $enc_msg ";
  4. >
Copy code

Results: hash: 81ea092649ca32b5ba375e81d8f4972c Note that the result is 32 characters long. Take a look at the following table again, where the value of $msg has changed slightly: Use md5() to shuffle a slightly changed string

  1. //Note that there is one s missing in the message
  2. $msg = "This is some message that I just wrote";
  3. $enc_msg = md5($msg);
  4. print "hash2: $enc_msg
  5. " ;
  6. >
Copy code

Results: hash2: e86cf511bd5490d46d5cd61738c82c0c It can be found that although the length of both results is 32 characters, a small change in the plaintext causes a big change in the result. Therefore, the hashing and md5() functions are a good way to check small changes in the data. Tool of. Although crypt() and md5() have their uses, both are subject to certain limitations in functionality. In the following sections, we will introduce two very useful PHP extensions called Mcrypt and Mhash, which will greatly expand the encryption options for PHP users. Although we have explained the importance of one-way encryption in the above section, sometimes we may need to restore the password data to the original data after encryption. Fortunately, PHP provides this in the form of the Mcrypt extension library possibility. Mcrypt Mcrypt 2.5.7 Unix | Win32 Mcrypt 2.4.7 is a powerful encryption algorithm extension library, which includes 22 algorithms, including the following algorithms: Blowfish RC2 Safer-sk64 xtea Cast-256 RC4 Safer-sk128 DES RC4-iv Serpent Enigma Rijndael-128 Threeway Gost Rijndael-192 TripleDES LOKI97 Rijndael-256 Twofish PanamaSaferplus Wake 1 2 Next Page Last Page



source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template