Copyright NOTICE: This article for Bo Master original article, without Bo Master permission not reproduced.
1. Introduction
Because this article is relatively simple is not an example of code implementation, on-line MD5 and encryption algorithm many can download their own research, this article is just about the difference
MD5 is an irreversible encryption, it must be remembered is irreversible although now many algorithms can also be decrypted MD5 but MD5 still have a large degree of irreversible, and increase decryption is used double encryption, many of the places used to log in to MD5 encryption, Then some people will ask me to use MD5 encrypt the server how to decrypt it, if you think so wrong. Enter the user's password when logging in this password is MD5 encrypted in the server is also stored in this MD5 character format, that is, the server's data inventory is the format of the string, So why should the server be decrypted, as long as the comparison of the MD5 string sent by your client and its database string comparison on the line, and now the app operators are afraid to save a user's plaintext password this is not responsible for user information. So here must remember MD5 encryption is irreversible a lot of online decryption is just a simple decryption such as you can decrypt to get 9 you know is 1+8=9 or 2+7=9 or 3+6=9, want to decrypt also do not MD5, now MD5 is only used for database storage data.
There is an encryption algorithm that can be decrypted, one is divided into two, a symmetric encryption algorithm, now mostly using AES and DES, and so on, because both the server and the client are using a same key so it can be said to be symmetric encryption, For example, the client with this key to a text encryption server received this string will be decrypted with the same key, another asymmetric encryption is RSA, this encryption is called asymmetric because the client and the server is not the same key divided into public key and secret key. For example, party a generates a pair of keys and then exposes the public key to B or B 1, b 2, b 3 ..., then party B takes the public key to encrypt, and the party a decrypts the secret key. If you remember good, Alipay access is the use of RSA. So RSA is very popular, more suitable for some platform encryption.