Home Backend Development C#.Net Tutorial .NET MD5 encryption and decryption code analysis

.NET MD5 encryption and decryption code analysis

Feb 10, 2017 pm 05:27 PM

This article mainly analyzes the .NET MD5 encryption and decryption code in detail, which has certain reference value. Interested friends can refer to

MD5 Introduction:

It allows large-capacity information to be "compressed" into a confidential format (that is, converting a byte string of any length into a large integer of a certain length) before signing the private key with digital signature software. Whether it is MD2, MD4 or MD5, they all need to obtain a random length of information and generate a 128-bit message digest. Although the structures of these algorithms are more or less similar, the design of MD2 is completely different from MD4 and MD5. That is because MD2 is designed and optimized for 8-bit machines, while MD4 and MD5 are designed for 32-bit computers. The descriptions and C language source code of these three algorithms are described in detail in Internet RFCs 1321, which is the most authoritative document submitted to the IETF by Ronald L. Rivest in August 1992.

Code:

string JiaMi = Md5Encrypt(LoginPwd);
    string JieMi = Md5Decrypt(JiaMi);

    #region MD5加密
    /// <summary>   
    /// MD5加密   
    /// </summary>   
    /// <param name="strSource">需要加密的字符串</param>   
    /// <returns>MD5加密后的字符串</returns>   
    public static string Md5Encrypt(string strSource)
    {
      //把字符串放到byte数组中   
      byte[] bytIn = System.Text.Encoding.Default.GetBytes(strSource);
      //建立加密对象的密钥和偏移量       
      byte[] iv = { 102, 16, 93, 156, 78, 4, 218, 32 };//定义偏移量   
      byte[] key = { 55, 103, 246, 79, 36, 99, 167, 3 };//定义密钥   
      //实例DES加密类   
      DESCryptoServiceProvider mobjCryptoService = new DESCryptoServiceProvider();
      mobjCryptoService.Key = iv;
      mobjCryptoService.IV = key;
      ICryptoTransform encrypto = mobjCryptoService.CreateEncryptor();
      //实例MemoryStream流加密密文件   
      System.IO.MemoryStream ms = new System.IO.MemoryStream();
      CryptoStream cs = new CryptoStream(ms, encrypto, CryptoStreamMode.Write);
      cs.Write(bytIn, 0, bytIn.Length);
      cs.FlushFinalBlock();
      return System.Convert.ToBase64String(ms.ToArray());
    }
    #endregion


    #region MD5解密
    /// <summary>   
    /// MD5解密   
    /// </summary>   
    /// <param name="Source">需要解密的字符串</param>   
    /// <returns>MD5解密后的字符串</returns>   
    public static string Md5Decrypt(string Source)
    {
      //将解密字符串转换成字节数组   
      byte[] bytIn = System.Convert.FromBase64String(Source);
      //给出解密的密钥和偏移量,密钥和偏移量必须与加密时的密钥和偏移量相同   
      byte[] iv = { 102, 16, 93, 156, 78, 4, 218, 32 };//定义偏移量   
      byte[] key = { 55, 103, 246, 79, 36, 99, 167, 3 };//定义密钥   
      DESCryptoServiceProvider mobjCryptoService = new DESCryptoServiceProvider();
      mobjCryptoService.Key = iv;
      mobjCryptoService.IV = key;
      //实例流进行解密   
      System.IO.MemoryStream ms = new System.IO.MemoryStream(bytIn, 0, bytIn.Length);
      ICryptoTransform encrypto = mobjCryptoService.CreateDecryptor();
      CryptoStream cs = new CryptoStream(ms, encrypto, CryptoStreamMode.Read);
      StreamReader strd = new StreamReader(cs, Encoding.Default);
      return strd.ReadToEnd();
    }
    #endregion
Copy after login

Another MD5 encryption method:

MD5 encryption simple That is to say, a piece of plain text is used to calculate the cipher text through a certain operation method. For example: the plaintext is: abcdefg Through a series of operations, the ciphertext 7ac66c0f148de9519b8bd264312c4d64

is obtained. It has two characteristics: 1. No collision, 2. Irreversible.

No collision means:

7ac66c0f148de9519b8bd264312c4d64 This ciphertext can only be obtained from the abcdefg plaintext, except for other plaintexts After encryption, its value will never be equal to 7ac66c0f148de9519b8bd264312c4d64, which means that no two plaintexts will get the same ciphertext after encryption.

Irreversible means:

The plaintext is encrypted to obtain the ciphertext, but the plaintext cannot be obtained through the ciphertext. That is to say, when we know that the plain text adcdefg can be encrypted, we can get 7ac66c0f148de9519b8bd264312c4d64, but if we know that a certain text is encrypted, we can get 7ac66c0f148de9519b8bd264312c4d64, but we cannot calculate 7ac66c0f148de9519b8bd264312c4 Who encrypted this text d64?

For example, the password set by the user is abcdefg, and when storing, we store the value 7ac66c0f148de9519b8bd264312c4d64 obtained after abcdefg is encrypted. Then when the user logs in again, he will enter the password abcdefg. How do we compare whether the two are equal?

We cannot convert the encrypted value to the pre-encrypted value, so our usual approach is to re-encrypt the password entered when the user logs in again and compare it with the value stored in the database. If they are equal, The password entered is correct.

Need to quoteusing System.Web.Security;

FormsAuthentication.HashPasswordForStoringInConfigFile(str, "MD5").ToLower();

The above is the entire content of this article. I hope it will be helpful to everyone's learning. I also hope that everyone will support the PHP Chinese website.

For more articles related to .NET MD5 encryption and decryption code analysis, please pay attention to the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to handle special characters in C language How to handle special characters in C language Apr 03, 2025 pm 03:18 PM

In C language, special characters are processed through escape sequences, such as: \n represents line breaks. \t means tab character. Use escape sequences or character constants to represent special characters, such as char c = '\n'. Note that the backslash needs to be escaped twice. Different platforms and compilers may have different escape sequences, please consult the documentation.

What is the role of char in C strings What is the role of char in C strings Apr 03, 2025 pm 03:15 PM

In C, the char type is used in strings: 1. Store a single character; 2. Use an array to represent a string and end with a null terminator; 3. Operate through a string operation function; 4. Read or output a string from the keyboard.

How to use various symbols in C language How to use various symbols in C language Apr 03, 2025 pm 04:48 PM

The usage methods of symbols in C language cover arithmetic, assignment, conditions, logic, bit operators, etc. Arithmetic operators are used for basic mathematical operations, assignment operators are used for assignment and addition, subtraction, multiplication and division assignment, condition operators are used for different operations according to conditions, logical operators are used for logical operations, bit operators are used for bit-level operations, and special constants are used to represent null pointers, end-of-file markers, and non-numeric values.

The difference between multithreading and asynchronous c# The difference between multithreading and asynchronous c# Apr 03, 2025 pm 02:57 PM

The difference between multithreading and asynchronous is that multithreading executes multiple threads at the same time, while asynchronously performs operations without blocking the current thread. Multithreading is used for compute-intensive tasks, while asynchronously is used for user interaction. The advantage of multi-threading is to improve computing performance, while the advantage of asynchronous is to not block UI threads. Choosing multithreading or asynchronous depends on the nature of the task: Computation-intensive tasks use multithreading, tasks that interact with external resources and need to keep UI responsiveness use asynchronous.

The difference between char and wchar_t in C language The difference between char and wchar_t in C language Apr 03, 2025 pm 03:09 PM

In C language, the main difference between char and wchar_t is character encoding: char uses ASCII or extends ASCII, wchar_t uses Unicode; char takes up 1-2 bytes, wchar_t takes up 2-4 bytes; char is suitable for English text, wchar_t is suitable for multilingual text; char is widely supported, wchar_t depends on whether the compiler and operating system support Unicode; char is limited in character range, wchar_t has a larger character range, and special functions are used for arithmetic operations.

How to convert char in C language How to convert char in C language Apr 03, 2025 pm 03:21 PM

In C language, char type conversion can be directly converted to another type by: casting: using casting characters. Automatic type conversion: When one type of data can accommodate another type of value, the compiler automatically converts it.

How to use char array in C language How to use char array in C language Apr 03, 2025 pm 03:24 PM

The char array stores character sequences in C language and is declared as char array_name[size]. The access element is passed through the subscript operator, and the element ends with the null terminator '\0', which represents the end point of the string. The C language provides a variety of string manipulation functions, such as strlen(), strcpy(), strcat() and strcmp().

What is the function of C language sum? What is the function of C language sum? Apr 03, 2025 pm 02:21 PM

There is no built-in sum function in C language, so it needs to be written by yourself. Sum can be achieved by traversing the array and accumulating elements: Loop version: Sum is calculated using for loop and array length. Pointer version: Use pointers to point to array elements, and efficient summing is achieved through self-increment pointers. Dynamically allocate array version: Dynamically allocate arrays and manage memory yourself, ensuring that allocated memory is freed to prevent memory leaks.

See all articles