Javascript的MD5函数

ContractedBlock.gif ExpandedBlockStart.gif Code
  1ExpandedBlockStart.gifContractedBlock.gif    function MD5(strPassword) {
  2ExpandedSubBlockStart.gifContractedSubBlock.gif        function RotateLeft(lValue, iShiftBits) return (lValue<<iShiftBits) | (lValue>>>(32-iShiftBits)); }
  3ExpandedSubBlockStart.gifContractedSubBlock.gif        function AddUnsigned(lX,lY) {
  4            var lX4,lY4,lX8,lY8,lResult;
  5            lX8 = (lX & 0x80000000);
  6            lY8 = (lY & 0x80000000);
  7            lX4 = (lX & 0x40000000);
  8            lY4 = (lY & 0x40000000);
  9            lResult = (lX & 0x3FFFFFFF)+(lY & 0x3FFFFFFF);
 10            if (lX4 & lY4) return (lResult ^ 0x80000000 ^ lX8 ^ lY8);
 11ExpandedSubBlockStart.gifContractedSubBlock.gif            if (lX4 | lY4) {
 12                if (lResult & 0x40000000return (lResult ^ 0xC0000000 ^ lX8 ^ lY8);
 13                else return (lResult ^ 0x40000000 ^ lX8 ^ lY8);
 14            }
 else return (lResult ^ lX8 ^ lY8);
 15        }

 16ExpandedSubBlockStart.gifContractedSubBlock.gif        function F(x,y,z) return (x & y) | ((~x) & z); }
 17ExpandedSubBlockStart.gifContractedSubBlock.gif        function G(x,y,z) return (x & z) | (y & (~z)); }
 18ExpandedSubBlockStart.gifContractedSubBlock.gif        function H(x,y,z) return (x ^ y ^ z); }
 19ExpandedSubBlockStart.gifContractedSubBlock.gif        function I(x,y,z) return (y ^ (x | (~z))); }
 20ExpandedSubBlockStart.gifContractedSubBlock.gif        function FF(a,b,c,d,x,s,ac) {
 21            a = AddUnsigned(a, AddUnsigned(AddUnsigned(F(b, c, d), x), ac));
 22            return AddUnsigned(RotateLeft(a, s), b);
 23        }

 24ExpandedSubBlockStart.gifContractedSubBlock.gif        function GG(a,b,c,d,x,s,ac) {
 25            a = AddUnsigned(a, AddUnsigned(AddUnsigned(G(b, c, d), x), ac));
 26            return AddUnsigned(RotateLeft(a, s), b);
 27        }

 28ExpandedSubBlockStart.gifContractedSubBlock.gif        function HH(a,b,c,d,x,s,ac) {
 29            a = AddUnsigned(a, AddUnsigned(AddUnsigned(H(b, c, d), x), ac));
 30            return AddUnsigned(RotateLeft(a, s), b);
 31        }

 32ExpandedSubBlockStart.gifContractedSubBlock.gif        function II(a,b,c,d,x,s,ac) {
 33            a = AddUnsigned(a, AddUnsigned(AddUnsigned(I(b, c, d), x), ac));
 34            return AddUnsigned(RotateLeft(a, s), b);
 35        }

 36ExpandedSubBlockStart.gifContractedSubBlock.gif        function ConvertToWordArray(strPassword) {
 37            var lWordCount;
 38            var lMessageLength = strPassword.length;
 39            var lNumberOfWords_temp1=lMessageLength + 8;
 40            var lNumberOfWords_temp2=(lNumberOfWords_temp1-(lNumberOfWords_temp1 % 64))/64;
 41            var lNumberOfWords = (lNumberOfWords_temp2+1)*16;
 42            var lWordArray=Array(lNumberOfWords-1);
 43            var lBytePosition = 0;
 44            var lByteCount = 0;
 45ExpandedSubBlockStart.gifContractedSubBlock.gif            while ( lByteCount < lMessageLength ) {
 46                lWordCount = (lByteCount-(lByteCount % 4))/4;
 47                lBytePosition = (lByteCount % 4)*8;
 48                lWordArray[lWordCount] = (lWordArray[lWordCount] | (strPassword.charCodeAt(lByteCount)<<lBytePosition));
 49                lByteCount++;
 50            }

 51            lWordCount = (lByteCount-(lByteCount % 4))/4;
 52            lBytePosition = (lByteCount % 4)*8;
 53            lWordArray[lWordCount] = lWordArray[lWordCount] | (0x80<<lBytePosition);
 54            lWordArray[lNumberOfWords-2= lMessageLength<<3;
 55            lWordArray[lNumberOfWords-1= lMessageLength>>>29;
 56            return lWordArray;
 57        }

 58ExpandedSubBlockStart.gifContractedSubBlock.gif        function WordToHex(lValue) {
 59            var WordToHexValue="",WordToHexValue_temp="",lByte,lCount;
 60ExpandedSubBlockStart.gifContractedSubBlock.gif            for (lCount = 0;lCount<=3;lCount++{
 61                lByte = (lValue>>>(lCount*8)) & 255;
 62                WordToHexValue_temp = "0" + lByte.toString(16);
 63                WordToHexValue = WordToHexValue + WordToHexValue_temp.substr(WordToHexValue_temp.length-2,2);
 64            }

 65            return WordToHexValue;
 66        }

 67        var x=Array();
 68        var k,AA,BB,CC,DD,a,b,c,d
 69        var S11=7, S12=12, S13=17, S14=22;
 70        var S21=5, S22=9 , S23=14, S24=20;
 71        var S31=4, S32=11, S33=16, S34=23;
 72        var S41=6, S42=10, S43=15, S44=21;
 73        // Steps 1 and 2. Append padding bits and length and convert to words
 74        x = ConvertToWordArray(strPassword);
 75        // Step 3. Initialise
 76        a = 0x67452301; b = 0xEFCDAB89; c = 0x98BADCFE; d = 0x10325476;
 77        // Step 4. Process the message in 16-word blocks
 78ExpandedSubBlockStart.gifContractedSubBlock.gif        for (k=0;k<x.length;k+=16{
 79            AA=a; BB=b; CC=c; DD=d;
 80            a=FF(a,b,c,d,x[k+0], S11,0xD76AA478);
 81            d=FF(d,a,b,c,x[k+1], S12,0xE8C7B756);
 82            c=FF(c,d,a,b,x[k+2], S13,0x242070DB);
 83            b=FF(b,c,d,a,x[k+3], S14,0xC1BDCEEE);
 84            a=FF(a,b,c,d,x[k+4], S11,0xF57C0FAF);
 85            d=FF(d,a,b,c,x[k+5], S12,0x4787C62A);
 86            c=FF(c,d,a,b,x[k+6], S13,0xA8304613);
 87            b=FF(b,c,d,a,x[k+7], S14,0xFD469501);
 88            a=FF(a,b,c,d,x[k+8], S11,0x698098D8);
 89            d=FF(d,a,b,c,x[k+9], S12,0x8B44F7AF);
 90            c=FF(c,d,a,b,x[k+10],S13,0xFFFF5BB1);
 91            b=FF(b,c,d,a,x[k+11],S14,0x895CD7BE);
 92            a=FF(a,b,c,d,x[k+12],S11,0x6B901122);
 93            d=FF(d,a,b,c,x[k+13],S12,0xFD987193);
 94            c=FF(c,d,a,b,x[k+14],S13,0xA679438E);
 95            b=FF(b,c,d,a,x[k+15],S14,0x49B40821);
 96            a=GG(a,b,c,d,x[k+1], S21,0xF61E2562);
 97            d=GG(d,a,b,c,x[k+6], S22,0xC040B340);
 98            c=GG(c,d,a,b,x[k+11],S23,0x265E5A51);
 99            b=GG(b,c,d,a,x[k+0], S24,0xE9B6C7AA);
100            a=GG(a,b,c,d,x[k+5], S21,0xD62F105D);
101            d=GG(d,a,b,c,x[k+10],S22,0x2441453);
102            c=GG(c,d,a,b,x[k+15],S23,0xD8A1E681);
103            b=GG(b,c,d,a,x[k+4], S24,0xE7D3FBC8);
104            a=GG(a,b,c,d,x[k+9], S21,0x21E1CDE6);
105            d=GG(d,a,b,c,x[k+14],S22,0xC33707D6);
106            c=GG(c,d,a,b,x[k+3], S23,0xF4D50D87);
107            b=GG(b,c,d,a,x[k+8], S24,0x455A14ED);
108            a=GG(a,b,c,d,x[k+13],S21,0xA9E3E905);
109            d=GG(d,a,b,c,x[k+2], S22,0xFCEFA3F8);
110            c=GG(c,d,a,b,x[k+7], S23,0x676F02D9);
111            b=GG(b,c,d,a,x[k+12],S24,0x8D2A4C8A);
112            a=HH(a,b,c,d,x[k+5], S31,0xFFFA3942);
113            d=HH(d,a,b,c,x[k+8], S32,0x8771F681);
114            c=HH(c,d,a,b,x[k+11],S33,0x6D9D6122);
115            b=HH(b,c,d,a,x[k+14],S34,0xFDE5380C);
116            a=HH(a,b,c,d,x[k+1], S31,0xA4BEEA44);
117            d=HH(d,a,b,c,x[k+4], S32,0x4BDECFA9);
118            c=HH(c,d,a,b,x[k+7], S33,0xF6BB4B60);
119            b=HH(b,c,d,a,x[k+10],S34,0xBEBFBC70);
120            a=HH(a,b,c,d,x[k+13],S31,0x289B7EC6);
121            d=HH(d,a,b,c,x[k+0], S32,0xEAA127FA);
122            c=HH(c,d,a,b,x[k+3], S33,0xD4EF3085);
123            b=HH(b,c,d,a,x[k+6], S34,0x4881D05);
124            a=HH(a,b,c,d,x[k+9], S31,0xD9D4D039);
125            d=HH(d,a,b,c,x[k+12],S32,0xE6DB99E5);
126            c=HH(c,d,a,b,x[k+15],S33,0x1FA27CF8);
127            b=HH(b,c,d,a,x[k+2], S34,0xC4AC5665);
128            a=II(a,b,c,d,x[k+0], S41,0xF4292244);
129            d=II(d,a,b,c,x[k+7], S42,0x432AFF97);
130            c=II(c,d,a,b,x[k+14],S43,0xAB9423A7);
131            b=II(b,c,d,a,x[k+5], S44,0xFC93A039);
132            a=II(a,b,c,d,x[k+12],S41,0x655B59C3);
133            d=II(d,a,b,c,x[k+3], S42,0x8F0CCC92);
134            c=II(c,d,a,b,x[k+10],S43,0xFFEFF47D);
135            b=II(b,c,d,a,x[k+1], S44,0x85845DD1);
136            a=II(a,b,c,d,x[k+8], S41,0x6FA87E4F);
137            d=II(d,a,b,c,x[k+15],S42,0xFE2CE6E0);
138            c=II(c,d,a,b,x[k+6], S43,0xA3014314);
139            b=II(b,c,d,a,x[k+13],S44,0x4E0811A1);
140            a=II(a,b,c,d,x[k+4], S41,0xF7537E82);
141            d=II(d,a,b,c,x[k+11],S42,0xBD3AF235);
142            c=II(c,d,a,b,x[k+2], S43,0x2AD7D2BB);
143            b=II(b,c,d,a,x[k+9], S44,0xEB86D391);
144            a=AddUnsigned(a,AA); b=AddUnsigned(b,BB); c=AddUnsigned(c,CC); d=AddUnsigned(d,DD);
145        }

146        // Step 5. Output the 128 bit digest
147        var temp= WordToHex(a)+WordToHex(b)+WordToHex(c)+WordToHex(d);
148        return temp.toLowerCase();
149    }

转载于:https://www.cnblogs.com/smartstone/archive/2009/03/06/1404988.html

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
JavaScript MD5是一种用于对数据进行加密的算法。通过使用MD5算法,可以将数据转化为一个128位的哈希值,以提高数据的安全性。通过引用和中的代码片段,我们可以看到在JavaScript中使用MD5算法的示例。在示例中,使用了一个名为md5.js的外部脚本库,该库提供了MD5算法的实现。然后,通过调用不同的MD5函数,可以对不同的数据进行加密,并得到相应的加密结果。这些加密结果是通过对原始数据进行哈希计算而得到的。 需要注意的是,MD5算法虽然可以增加数据的安全性,但它并不是绝对安全的。由于MD5算法的特性,存在一定的安全风险。因此,在实际使用中,我们应该综合考虑其他加密算法和安全措施,以确保数据的安全性。引用中提到MD5算法用于确保表单数据提交的安全,但是它并不是最理想的解决方案。 总结来说,JavaScript MD5是一种对数据进行加密的算法,通过对数据进行哈希计算,将数据转化为一个128位的哈希值。通过使用MD5算法,可以提高数据的安全性。然而,我们需要认识到MD5算法存在一定的安全风险,并且在实际使用中应该综合考虑其他加密算法和安全措施。<span class="em">1</span><span class="em">2</span><span class="em">3</span> #### 引用[.reference_title] - *1* *3* [JavaScript---MD5加密算法](https://blog.csdn.net/qq_72239654/article/details/131257386)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_2"}}] [.reference_item style="max-width: 50%"] - *2* [JavaScript实现MD5 加密的6中方式](https://blog.csdn.net/jcmj123456/article/details/129993513)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_2"}}] [.reference_item style="max-width: 50%"] [ .reference_list ]
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值