JavaScript 实现的几种加密方式(后续持续更新中。。。)

你的名字 2021-11-17 23:18 292阅读 0赞

文章目录

  • 说明:
  • 1、JavaScript实现md5加密
  • 2、base64

说明:

这个是我js破解时遇到的,然后把代码抠出来了,现在整理一下,日后遇到其他加密,也会更新保留在博客里面。如果有需要可以参考,如果有转载,请标明作者和链接,违者必究。如果觉得不错,可以给我点个赞,如果有更好的加密方法,欢迎评论分享哈,Thanks♪(・ω・)ノ

1、JavaScript实现md5加密

这个我直接上代码吧,可以运行出来,我这个是之前弄的,具体网站忘了,需要的可以直接测试。

  1. function v(n) {
  2. return function(n) {
  3. return h(a(d(n), 8 * n.length))
  4. }(l(n))
  5. }
  6. function h(n) {
  7. var r, t = ""
  8. for (r = 0; r < 32 * n.length; r += 8)
  9. t += String.fromCharCode(n[r >> 5] >>> r % 32 & 255)
  10. return t
  11. }
  12. function l(n) {
  13. return unescape(encodeURIComponent(n))
  14. }
  15. function d(n) {
  16. var r, t = []
  17. for (t[(n.length >> 2) - 1] = void 0,
  18. r = 0; r < t.length; r += 1)
  19. t[r] = 0
  20. for (r = 0; r < 8 * n.length; r += 8)
  21. t[r >> 5] |= (255 & n.charCodeAt(r / 8)) << r % 32
  22. return t
  23. }
  24. function a(n, r) {
  25. n[r >> 5] |= 128 << r % 32,
  26. n[14 + (r + 64 >>> 9 << 4)] = r
  27. var t, u, a, h, d, g = 1732584193, l = -271733879, v = -1732584194, s = 271733878
  28. for (t = 0; t < n.length; t += 16)
  29. u = g,
  30. a = l,
  31. h = v,
  32. d = s,
  33. l = i(l = i(l = i(l = i(l = f(l = f(l = f(l = f(l = c(l = c(l = c(l = c(l = o(l = o(l = o(l = o(l, v = o(v, s = o(s, g = o(g, l, v, s, n[t], 7, -680876936), l, v, n[t + 1], 12, -389564586), g, l, n[t + 2], 17, 606105819), s, g, n[t + 3], 22, -1044525330), v = o(v, s = o(s, g = o(g, l, v, s, n[t + 4], 7, -176418897), l, v, n[t + 5], 12, 1200080426), g, l, n[t + 6], 17, -1473231341), s, g, n[t + 7], 22, -45705983), v = o(v, s = o(s, g = o(g, l, v, s, n[t + 8], 7, 1770035416), l, v, n[t + 9], 12, -1958414417), g, l, n[t + 10], 17, -42063), s, g, n[t + 11], 22, -1990404162), v = o(v, s = o(s, g = o(g, l, v, s, n[t + 12], 7, 1804603682), l, v, n[t + 13], 12, -40341101), g, l, n[t + 14], 17, -1502002290), s, g, n[t + 15], 22, 1236535329), v = c(v, s = c(s, g = c(g, l, v, s, n[t + 1], 5, -165796510), l, v, n[t + 6], 9, -1069501632), g, l, n[t + 11], 14, 643717713), s, g, n[t], 20, -373897302), v = c(v, s = c(s, g = c(g, l, v, s, n[t + 5], 5, -701558691), l, v, n[t + 10], 9, 38016083), g, l, n[t + 15], 14, -660478335), s, g, n[t + 4], 20, -405537848), v = c(v, s = c(s, g = c(g, l, v, s, n[t + 9], 5, 568446438), l, v, n[t + 14], 9, -1019803690), g, l, n[t + 3], 14, -187363961), s, g, n[t + 8], 20, 1163531501), v = c(v, s = c(s, g = c(g, l, v, s, n[t + 13], 5, -1444681467), l, v, n[t + 2], 9, -51403784), g, l, n[t + 7], 14, 1735328473), s, g, n[t + 12], 20, -1926607734), v = f(v, s = f(s, g = f(g, l, v, s, n[t + 5], 4, -378558), l, v, n[t + 8], 11, -2022574463), g, l, n[t + 11], 16, 1839030562), s, g, n[t + 14], 23, -35309556), v = f(v, s = f(s, g = f(g, l, v, s, n[t + 1], 4, -1530992060), l, v, n[t + 4], 11, 1272893353), g, l, n[t + 7], 16, -155497632), s, g, n[t + 10], 23, -1094730640), v = f(v, s = f(s, g = f(g, l, v, s, n[t + 13], 4, 681279174), l, v, n[t], 11, -358537222), g, l, n[t + 3], 16, -722521979), s, g, n[t + 6], 23, 76029189), v = f(v, s = f(s, g = f(g, l, v, s, n[t + 9], 4, -640364487), l, v, n[t + 12], 11, -421815835), g, l, n[t + 15], 16, 530742520), s, g, n[t + 2], 23, -995338651), v = i(v, s = i(s, g = i(g, l, v, s, n[t], 6, -198630844), l, v, n[t + 7], 10, 1126891415), g, l, n[t + 14], 15, -1416354905), s, g, n[t + 5], 21, -57434055), v = i(v, s = i(s, g = i(g, l, v, s, n[t + 12], 6, 1700485571), l, v, n[t + 3], 10, -1894986606), g, l, n[t + 10], 15, -1051523), s, g, n[t + 1], 21, -2054922799), v = i(v, s = i(s, g = i(g, l, v, s, n[t + 8], 6, 1873313359), l, v, n[t + 15], 10, -30611744), g, l, n[t + 6], 15, -1560198380), s, g, n[t + 13], 21, 1309151649), v = i(v, s = i(s, g = i(g, l, v, s, n[t + 4], 6, -145523070), l, v, n[t + 11], 10, -1120210379), g, l, n[t + 2], 15, 718787259), s, g, n[t + 9], 21, -343485551),
  34. g = e(g, u),
  35. l = e(l, a),
  36. v = e(v, h),
  37. s = e(s, d)
  38. return [g, l, v, s]
  39. }
  40. function u(n, r, t, u, o, c) {
  41. return e(function(n, r) {
  42. return n << r | n >>> 32 - r
  43. }(e(e(r, n), e(u, c)), o), t)
  44. }
  45. function o(n, r, t, e, o, c, f) {
  46. return u(r & t | ~r & e, n, r, o, c, f)
  47. }
  48. function e(n, r) {
  49. var t = (65535 & n) + (65535 & r)
  50. return (n >> 16) + (r >> 16) + (t >> 16) << 16 | 65535 & t
  51. }
  52. function c(n, r, t, e, o, c, f) {
  53. return u(r & e | t & ~e, n, r, o, c, f)
  54. }
  55. function f(n, r, t, e, o, c, f) {
  56. return u(r ^ t ^ e, n, r, o, c, f)
  57. }
  58. function i(n, r, t, e, o, c, f) {
  59. return u(t ^ (r | ~e), n, r, o, c, f)
  60. }
  61. // console.log(v("wen字加密"))
  62. // var new_pwd =
  63. function g(n) {
  64. var r, t, e = ""
  65. for (t = 0; t < n.length; t += 1)
  66. r = n.charCodeAt(t),
  67. e += "0123456789abcdef".charAt(r >>> 4 & 15) + "0123456789abcdef".charAt(15 & r)
  68. return e
  69. }
  70. console.log(g(v("wen字加密")))

2、base64

我另一个博客中有相关base64 的。https://blog.csdn.net/weixin_42081389/article/details/93884080

发表评论

表情:
评论列表 (有 0 条评论,292人围观)

还没有评论,来说两句吧...

相关阅读