php实现的rc4加密解密类定义与用法示例

前端之家收集整理的这篇文章主要介绍了php实现的rc4加密解密类定义与用法示例前端之家小编觉得挺不错的,现在分享给大家,也给大家做个参考。

@H_403_0@本文实例讲述了PHP实现的rc4加密解密类。分享给大家供大家参考,具体如下:


@H_403_0@class.rc4crypt.PHP文件


<div class="jb51code">
<pre class="brush:PHP;">
<?php
/*

  • By julying.com
    */
    define('CRYPT_RC4_MODE_INTERNAL',1);
    define('CRYPT_RC4_MODE_MCRYPT',2);
    define('CRYPT_RC4_ENCRYPT',0);
    define('CRYPT_RC4_DECRYPT',1);
    class Crypt_RC4 {
    /**
  • The Key
  • @see Crypt_RC4::setKey()
  • @var String
  • @access private
    */
    var $key = "\0";
    /**
  • The Key Stream for encryption
  • If CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT,this will be equal to the mcrypt object
  • @see Crypt_RC4::setKey()
  • @var Array
  • @access private
    */
    var $encryptStream = false;
    /**
  • The Key Stream for decryption
  • If CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT,this will be equal to the mcrypt object
  • @see Crypt_RC4::setKey()
  • @var Array
  • @access private
    */
    var $decryptStream = false;
    /**
  • The $i and $j indexes for encryption
  • @see Crypt_RC4::_crypt()
  • @var Integer
  • @access private
    */
    var $encryptIndex = 0;
    /**
  • The $i and $j indexes for decryption
  • @see Crypt_RC4::_crypt()
  • @var Integer
  • @access private
    */
    var $decryptIndex = 0;
    /**
  • MCrypt parameters
  • @see Crypt_RC4::setMCrypt()
  • @var Array
  • @access private
    */
    var $mcrypt = array('','');
    /**
  • The Encryption Algorithm
  • Only used if CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT. Only possible values are MCRYPT_RC4 or MCRYPT_ARCFOUR.
  • @see Crypt_RC4::Crypt_RC4()
  • @var Integer
  • @access private
    */
    var $mode;
    /**
  • Default Constructor.
  • Determines whether or not the mcrypt extension should be used.
  • @param optional Integer $mode
  • @return Crypt_RC4
  • @access public
    */
    var $continuousBuffer ;
    function Crypt_RC4()
    {
    if ( !defined('CRYPT_RC4_MODE') ) {
    switch (true) {
    case extension_loaded('mcrypt') && (defined('MCRYPT_ARCFOUR') || defined('MCRYPT_RC4')):
    // i'd check to see if rc4 was supported,by doing in_array('arcfour',mcrypt_list_algorithms('')),// but since that can be changed after the object has been created,there doesn't seem to be
    // a lot of point...
    define('CRYPT_RC4_MODE',CRYPT_RC4_MODE_MCRYPT);
    break;
    default:
    define('CRYPT_RC4_MODE',CRYPT_RC4_MODE_INTERNAL);
    }
    }
    switch ( CRYPT_RC4_MODE ) {
    case CRYPT_RC4_MODE_MCRYPT:
    switch (true) {
    case defined('MCRYPT_ARCFOUR'):
    $this->mode = MCRYPT_ARCFOUR;
    break;
    case defined('MCRYPT_RC4');
    $this->mode = MCRYPT_RC4;
    }
    }
    }
    /**
  • Sets the key.
  • Keys can be between 1 and 256 bytes long. If they are longer then 256 bytes,the first 256 bytes will
  • be used. If no key is explicitly set,it'll be assumed to be a single null byte.
  • @access public
  • @param String $key
    */
    function setKey($key)
    {
    $this->key = $key;
    if ( CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT ) {
    return;
    }
    $keyLength = strlen($key);
    $keyStream = array();
    for ($i = 0; $i < 256; $i++) {
    $keyStream[$i] = $i;
    }
    $j = 0;
    for ($i = 0; $i < 256; $i++) {
    $j = ($j + $keyStream[$i] + ord($key[$i % $keyLength])) & 255;
    $temp = $keyStream[$i];
    $keyStream[$i] = $keyStream[$j];
    $keyStream[$j] = $temp;
    }
    $this->encryptIndex = $this->decryptIndex = array(0,0);
    $this->encryptStream = $this->decryptStream = $keyStream;
    }
    /**
  • Dummy function.
  • Some protocols,such as WEP,prepend an "initialization vector" to the key,effectively creating a new key [1].
  • If you need to use an initialization vector in this manner,feel free to prepend it to the key,yourself,before
  • calling setKey().
  • [1] WEP's initialization vectors (IV's) are used in a somewhat insecure way. Since,in that protocol,* the IV's are relatively easy to predict,an attack described by
  • {@link http://www.drizzle.com/~aboba/IEEE/rc4_ksaproc.pdf Scott Fluhrer,Itsik Mantin,and Adi Shamir}
  • can be used to quickly guess at the rest of the key. The following links elaborate:
  • {@link http://www.rsa.com/rsalabs/node.asp?id=2009 http://www.rsa.com/rsalabs/node.asp?id=2009}
  • {@link http://en.wikipedia.org/wiki/Related_key_attack http://en.wikipedia.org/wiki/Related_key_attack}
  • @param String $iv
  • @see Crypt_RC4::setKey()
  • @access public
    */
    function setIV($iv)
    {
    }
    /**
  • Sets MCrypt parameters. (optional)
  • If MCrypt is being used,empty strings will be used,unless otherwise specified.
  • @link http://PHP.net/function.mcrypt-module-open#function.mcrypt-module-open
  • @access public
  • @param optional Integer $algorithm_directory
  • @param optional Integer $mode_directory
    */
    function setMCrypt($algorithm_directory = '',$mode_directory = '')
    {
    if ( CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT ) {
    $this->mcrypt = array($algorithm_directory,$mode_directory);
    $this->_closeMCrypt();
    }
    }
    /**
  • Encrypts a message.
  • @see Crypt_RC4::_crypt()
  • @access public
  • @param String $plaintext
    */
    function encrypt($plaintext)
    {
    return self::toHex($this->_crypt($plaintext,CRYPT_RC4_ENCRYPT));
    }
    /**
  • Decrypts a message.
  • $this->decrypt($this->encrypt($plaintext)) == $this->encrypt($this->encrypt($plaintext)).
  • Atleast if the continuous buffer is disabled.
  • @see Crypt_RC4::_crypt()
  • @access public
  • @param String $ciphertext
    */
    function decrypt($ciphertext)
    {
    $ciphertext = self::fromHex($ciphertext);
    return $this->_crypt($ciphertext,CRYPT_RC4_DECRYPT);
    }
    /**
  • Encrypts or decrypts a message.
  • @see Crypt_RC4::encrypt()
  • @see Crypt_RC4::decrypt()
  • @access private
  • @param String $text
  • @param Integer $mode
    */
    function _crypt($text,$mode)
    {
    if ( CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT ) {
    $keyStream = $mode == CRYPT_RC4_ENCRYPT ? 'encryptStream' : 'decryptStream';
    if ($this->$keyStream === false) {
    $this->$keyStream = mcrypt_module_open($this->mode,$this->mcrypt[0],MCRYPT_MODE_STREAM,$this->mcrypt[1]);
    mcrypt_generic_init($this->$keyStream,$this->key,'');
    } else if (!$this->continuousBuffer) {
    mcrypt_generic_init($this->$keyStream,'');
    }
    $newText = mcrypt_generic($this->$keyStream,$text);
    if (!$this->continuousBuffer) {
    mcrypt_generic_deinit($this->$keyStream);
    }
    return $newText;
    }
    if ($this->encryptStream === false) {
    $this->setKey($this->key);
    }
    switch ($mode) {
    case CRYPT_RC4_ENCRYPT:
    $keyStream = $this->encryptStream;
    list($i,$j) = $this->encryptIndex;
    break;
    case CRYPT_RC4_DECRYPT:
    $keyStream = $this->decryptStream;
    list($i,$j) = $this->decryptIndex;
    }
    $newText = '';
    for ($k = 0; $k < strlen($text); $k++) {
    $i = ($i + 1) & 255;
    $j = ($j + $keyStream[$i]) & 255;
    $temp = $keyStream[$i];
    $keyStream[$i] = $keyStream[$j];
    $keyStream[$j] = $temp;
    $temp = $keyStream[($keyStream[$i] + $keyStream[$j]) & 255];
    $newText.= chr(ord($text[$k]) ^ $temp);
    }
    if ($this->continuousBuffer) {
    switch ($mode) {
    case CRYPT_RC4_ENCRYPT:
    $this->encryptStream = $keyStream;
    $this->encryptIndex = array($i,$j);
    break;
    case CRYPT_RC4_DECRYPT:
    $this->decryptStream = $keyStream;
    $this->decryptIndex = array($i,$j);
    }
    }
    return $newText;
    }
    /**
  • Treat consecutive "packets" as if they are a continuous buffer.
  • Say you have a 16-byte plaintext $plaintext. Using the default behavior,the two following code snippets
  • will yield different outputs:
  • echo $rc4->encrypt(substr($plaintext,8));
  • echo $rc4->encrypt(substr($plaintext,8,8));
  • echo $rc4->encrypt($plaintext);
  • The solution is to enable the continuous buffer. Although this will resolve the above discrepancy,it creates
  • another,as demonstrated with the following:
  • $rc4->encrypt(substr($plaintext,8));
  • echo $rc4->decrypt($des->encrypt(substr($plaintext,8)));
  • echo $rc4->decrypt($des->encrypt(substr($plaintext,8)));
  • With the continuous buffer disabled,these would yield the same output. With it enabled,they yield different
  • outputs. The reason is due to the fact that the initialization vector's change after every encryption /
  • decryption round when the continuous buffer is enabled. When it's disabled,they remain constant.
  • Put another way,when the continuous buffer is enabled,the state of the Crypt_DES() object changes after each
  • encryption / decryption round,whereas otherwise,it'd remain constant. For this reason,it's recommended that
  • continuous buffers not be used. They do offer better security and are,in fact,sometimes required (SSH uses them),* however,they are also less intuitive and more likely to cause you problems.
  • @see Crypt_RC4::disableContinuousBuffer()
  • @access public
    */
    function enableContinuousBuffer()
    {
    $this->continuousBuffer = true;
    }
    /**
  • Treat consecutive packets as if they are a discontinuous buffer.
  • The default behavior.
  • @see Crypt_RC4::enableContinuousBuffer()
  • @access public
    */
    function disableContinuousBuffer()
    {
    if ( CRYPT_RC4_MODE == CRYPT_RC4_MODE_INTERNAL ) {
    $this->encryptIndex = $this->decryptIndex = array(0,0);
    $this->setKey($this->key);
    }
    $this->continuousBuffer = false;
    }
    /**
  • Dummy function.
  • Since RC4 is a stream cipher and not a block cipher,no padding is necessary. The only reason this function is
  • included is so that you can switch between a block cipher and a stream cipher transparently.
  • @see Crypt_RC4::disablePadding()
  • @access public
    */
    function enablePadding()
    {
    }
    /**
  • Dummy function.
  • @see Crypt_RC4::enablePadding()
  • @access public
    */
    function disablePadding()
    {
    }
    /**
  • Class destructor.
  • Will be called,automatically,if you're using PHP5. If you're using PHP4,call it yourself. Only really
  • needs to be called if mcrypt is being used.
  • @access public
    */
    function __destruct()
    {
    if ( CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT ) {
    $this->_closeMCrypt();
    }
    }
    /**
  • Properly close the MCrypt objects.
  • @access prviate
    */
    function _closeMCrypt()
    {
    if ( $this->encryptStream !== false ) {
    if ( $this->continuousBuffer ) {
    mcrypt_generic_deinit($this->encryptStream);
    }
    mcrypt_module_close($this->encryptStream);
    $this->encryptStream = false;
    }
    if ( $this->decryptStream !== false ) {
    if ( $this->continuousBuffer ) {
    mcrypt_generic_deinit($this->decryptStream);
    }
    mcrypt_module_close($this->decryptStream);
    $this->decryptStream = false;
    }
    }
    // @function fromHex 把十六进制数转换成字符串
    function toHex($sa,$len = 0){
    $buf = "";
    if( $len == 0 )
    $len = strlen($sa) ;
    for ($i = 0; $i < $len; $i++)
    {
    $val = dechex(ord($sa{$i}));
    if(strlen($val)< 2)
    $val = "0".$val;
    $buf .= $val;
    }
    return $buf;
    }
    // @function fromHex 把十六进制数转换成字符串
    function fromHex($sa){
    $buf = "";
    $len = strlen($sa) ;
    for($i = 0; $i < $len; $i += 2){
    $val = chr(hexdec(substr($sa,$i,2)));
    $buf .= $val;
    }
    return $buf;
    }
    }
@H_403_0@使用方法

setKey('21sd54a1w5q'); $text = 'www.jb51.cc'; echo $x = $rc4->encrypt($text);//加密 echo '
'; echo $rc4->decrypt( $x) ;//解密
@H_403_0@运行结果:

@H_403_0@7907bb7c6694f179e9642ebd www.jb51.cc

@H_403_0@PS:关于加密解密感兴趣的朋友还可以参考本站在线工具:

@H_403_0@

文字在线加密解密工具(包含

@H_403_0@在线散列/哈希算法加密工具:

在线MD5/hash/SHA-1/SHA-2/SHA-256/SHA-512/SHA-3/RIPEMD-160加密工具:

@H_403_0@在线sha1/sha224/sha256/sha384/sha512加密工具:

更多关于PHP相关内容感兴趣的读者可查看本站专题:《》、《》、《》、《》、《》、《》、《》及《PHP正则表达式用法总结》

@H_403_0@希望本文所述对大家PHP程序设计有所帮助。

猜你在找的PHP相关文章