Practical PHP shared with public key encryption class (different encryption results every time)

Source: Internet
Author: User
This article mainly introduces the Practical PHP shared encryption class with public key. this class achieves different encryption results each time, but there is no problem with decryption. it is a very practical encryption class, for more information, see WEB interaction security, which has always been the primary solution for all major websites. The PHP encryption class introduced in this article is very practical. it has a public key, which is the biggest highlight, decryption is not allowed without a public key, and the encryption density is very high.

Class code:

<? Php/*** PHP encryption class * Qiongtai blog */class Jiami {// public key protected $ key = 'Lee '; private function keyED ($ txt, $ encrypt_key) {$ encrypt_key = md5 ($ encrypt_key); $ ctr = 0; $ tmp = ''; for ($ I = 0; $ I
 
  
Key;} srand (double) microtime () * 1000000); $ encrypt_key = md5 (rand (); $ ctr = 0; $ tmp = ''; for ($ I = 0; $ I
  
   
KeyED ($ tmp, $ key);} public function decrypt ($ txt, $ key = '') {if (empty ($ key )) {$ key = $ this-> key;} $ txt = $ this-> keyED ($ txt, $ key); $ tmp = ''; for ($ I = 0; $ I
   
    
Key = $ key;} public function getPK () {return $ this-> key ;}}
   
  
 

Usage:

<? Php // contains the encryption class require_once ('jiami. class. php '); // The string to be encrypted $ string = 'http: // www.bitsCN.com'; // instantiate the encryption class $ jiami = new Jiami (); // set the public key $ jiami-> setKey ('qttc '); // encrypted string $ enc = $ jiami-> encrypt ($ string, $ jiami-> getPK ()); // decrypt the string $ dec = $ jiami-> decrypt ($ enc, $ jiami-> getPK (); echo'
 '; Echo' before encryption: '. $ string .'
'; Echo 'encrypted:'. $ enc .'
'; Echo': '. $ dec;?>

Page execution result

Result 1:

Result 2:

From the above results, we can see that each encryption produces different encrypted strings, which are random.
You must use the public key to decrypt the data. Otherwise, the data cannot be decrypted. For example, if you use 'qttc 'as the encryption public key, you also need to use this 'qttc' as the public key for decryption. Otherwise, the decryption will fail.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.