用jQuery.md5.js加密密码后后台怎么解密?

用jQuery.md5.js加密密码后后台怎么解密?,第1张

MD5不是加密算法,它是Hash算法,所以它不可逆,也没法还原成原文。
你可以用base64、异或或者aes des等加密算法去实现。

1、base64加密

在页面中引入base64js文件,调用方法为:

123456789101112131415161718<!DOCTYPE HTML><html><head><meta charset="utf-8"><title>base64加密</title><script type="text/javascript" src="base64js"></script><script type="text/javascript">  var b = new Base64();  var str = bencode("admin:admin");  alert("base64 encode:" + str);//解密  str = bdecode(str);  alert("base64 decode:" + str);</script></head><body></body></html>

2、md5加密

在页面中引用md5js文件,调用方法为

1234567891011121314<!DOCTYPE HTML><html><head><meta charset="utf-8"><title>md5加密</title><script type="text/ecmascript" src="md5js"></script><script type="text/javascript"> var hash = hex_md5("123dafd"); alert(hash)</script></head><body></body></html>

3、sha1加密

据说这是最安全的加密

页面中引入sha1js,调用方法为

1234567891011121314<!DOCTYPE HTML><html><head><meta charset="utf-8"><title>sha1加密</title><script type="text/ecmascript" src="sha1js"></script><script type="text/javascript"> var sha = hex_sha1('mima123465') alert(sha)</script></head><body></body></html>

一下为js们的源代码

base64js:

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106/ Base64 encode / decode @author haitaotu @date 2010-04-26 @email tuhaitao@foxmailcom/function Base64() { // private property _keyStr = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/="; // public method for encoding thisencode = function (input) {  var output = "";  var chr1, chr2, chr3, enc1, enc2, enc3, enc4;  var i = 0;  input = _utf8_encode(input);  while (i < inputlength) {   chr1 = inputcharCodeAt(i++);   chr2 = inputcharCodeAt(i++);   chr3 = inputcharCodeAt(i++);   enc1 = chr1 >> 2;   enc2 = ((chr1 & 3) << 4) | (chr2 >> 4);   enc3 = ((chr2 & 15) << 2) | (chr3 >> 6);   enc4 = chr3 & 63;   if (isNaN(chr2)) {    enc3 = enc4 = 64;   } else if (isNaN(chr3)) {    enc4 = 64;   }   output = output +   _keyStrcharAt(enc1) + _keyStrcharAt(enc2) +   _keyStrcharAt(enc3) + _keyStrcharAt(enc4);  }  return output; } // public method for decoding thisdecode = function (input) {  var output = "";  var chr1, chr2, chr3;  var enc1, enc2, enc3, enc4;  var i = 0;  input = inputreplace(/[^A-Za-z0-9\+\/\=]/g, "");  while (i < inputlength) {   enc1 = _keyStrindexOf(inputcharAt(i++));   enc2 = _keyStrindexOf(inputcharAt(i++));   enc3 = _keyStrindexOf(inputcharAt(i++));   enc4 = _keyStrindexOf(inputcharAt(i++));   chr1 = (enc1 << 2) | (enc2 >> 4);   chr2 = ((enc2 & 15) << 4) | (enc3 >> 2);   chr3 = ((enc3 & 3) << 6) | enc4;   output = output + StringfromCharCode(chr1);   if (enc3 != 64) {    output = output + StringfromCharCode(chr2);   }   if (enc4 != 64) {    output = output + StringfromCharCode(chr3);   }  }  output = _utf8_decode(output);  return output; } // private method for UTF-8 encoding _utf8_encode = function (string) {  string = stringreplace(/\r\n/g,"\n");  var utftext = "";  for (var n = 0; n < stringlength; n++) {   var c = stringcharCodeAt(n);   if (c < 128) {    utftext += StringfromCharCode(c);   } else if((c > 127) && (c < 2048)) {    utftext += StringfromCharCode((c >> 6) | 192);    utftext += StringfromCharCode((c & 63) | 128);   } else {    utftext += StringfromCharCode((c >> 12) | 224);    utftext += StringfromCharCode(((c >> 6) & 63) | 128);    utftext += StringfromCharCode((c & 63) | 128);   }  }  return utftext; } // private method for UTF-8 decoding _utf8_decode = function (utftext) {  var string = "";  var i = 0;  var c = c1 = c2 = 0;  while ( i < utftextlength ) {   c = utftextcharCodeAt(i);   if (c < 128) {    string += StringfromCharCode(c);    i++;   } else if((c > 191) && (c < 224)) {    c2 = utftextcharCodeAt(i+1);    string += StringfromCharCode(((c & 31) << 6) | (c2 & 63));    i += 2;   } else {    c2 = utftextcharCodeAt(i+1);    c3 = utftextcharCodeAt(i+2);    string += StringfromCharCode(((c & 15) << 12) | ((c2 & 63) << 6) | (c3 & 63));    i += 3;   }  }  return string; }}

PSP模拟的PS游戏其实是一个单独的文件包,包里含有一个EBOOTPBP的文件PS模拟游戏文件放置位置如下:H(你记忆棒盘符号) / PSP / GAME / XXXXX / EBOOTPBP要看清楚上面如何放置的说明,照这样放,显示文件损坏是你拿错了文件包有问题再追问

您可以根据这个后缀确定是用什么方法加密的,然后联系这款软件的客服试试。

给文件加密,我使用的是超级加密3000

超级加密3000采用国际上成熟的加密算法和安全快速的加密方法,可以有效保障数据安全!


欢迎分享,转载请注明来源:内存溢出

原文地址:https://54852.com/yw/10305835.html

(0)
打赏 微信扫一扫微信扫一扫 支付宝扫一扫支付宝扫一扫
上一篇 2023-05-07
下一篇2023-05-07

发表评论

登录后才能评论

评论列表(0条)

    保存