Example of HMacMD5 encryption algorithm implemented in Python_python

不言
Release: 2018-04-08 11:45:23
Original
2396 people have browsed it

This article mainly introduces the HMacMD5 encryption algorithm implemented in Python, briefly explains the concept and principle of the HMAC-MD5 encryption algorithm, and analyzes the relevant operating skills of the HMAC-MD5 encryption algorithm implemented in Python in the form of examples. It is also appended at the end. Here is an example of implementing the HMAC-MD5 encryption algorithm in Java. Friends who need it can refer to

. This article describes the HMacMD5 encryption algorithm implemented in Python. Share it with everyone for your reference, the details are as follows:

What is HMAC-MD5?

1. For example, you share a key K with the other party. Now you want to send a message to the other party. You must not only ensure that the message has not been tampered with, but also prove that the message is indeed yours. If sent, then the original information and the HMAC value calculated using K are sent together. After the other party receives it, he uses the K in his hand to calculate the HMAC of the message. If it is consistent with the HMAC you sent, then it can be considered that the message has not been tampered with or impersonated.

2. MD5 digests the data to be output through hashing. When the data is received, MD5 hashing is performed in the same way. When compared with the given MD5 hash value, it will be clear if it is consistent and inconsistent. Generally speaking, the transmitted data and MD5 are given through different channels. For example, MD5 is displayed on the web page and the download link is from a mirror website. If you want to send data and hash values ​​through the same channel (such as message authentication code), you must consider the problem of data and MD5 being tampered with at the same time. If a third party modifies the data, then perform MD5 hashing and send it to the recipient together. The receiving party cannot detect that the data has been tampered with. HMAC-MD5 can be calculated using a key shared by both the sender and the receiver, and a third party without this key cannot calculate the correct hash value, thus preventing data from being tampered with.

Python version:

#coding:utf-8
import sys
reload(sys)
sys.setdefaultencoding('utf-8')
import hmac
import hashlib
####################设置Key值##############
ekey = 'laidefa'
###############输入数据############
to_enc = '{"name":"zhangsan"}'
enc_res = hmac.new(ekey, to_enc, hashlib.md5).hexdigest()
print enc_res
Copy after login

Output result:

"D:\Program Files\Python27\python.exe" D:/PycharmProjects/learn2017/hmacmd5.py
2cbb94ce78b35e4030851c4d40dacf12
Process finished with exit code 0

java version:

package tom;
import java.security.MessageDigest;
import javax.crypto.KeyGenerator;
import javax.crypto.Mac;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;
/**
* 基础加密组件
* @version 1.0
*/
public class Hmacmd5 {
  /**
   * MAC算法可选以下多种算法
   *
   * <pre class="brush:php;toolbar:false">
   * HmacMD5
   * HmacSHA1
   * HmacSHA256
   * HmacSHA384
   * HmacSHA512
   * 
*/ public static final String KEY_MAC = "HmacMD5"; /** * HMAC加密 * * @param data * @param key * @return * @throws Exception */ public static byte[] encryptHMAC(byte[] data, String key) throws Exception { SecretKey secretKey = new SecretKeySpec(key.getBytes(), KEY_MAC); Mac mac = Mac.getInstance(secretKey.getAlgorithm()); mac.init(secretKey); return mac.doFinal(data); } /*byte数组转换为HexString*/ public static String byteArrayToHexString(byte[] b) { StringBuffer sb = new StringBuffer(b.length * 2); for (int i = 0; i < b.length; i++) { int v = b[i] & 0xff; if (v < 16) { sb.append('0'); } sb.append(Integer.toHexString(v)); } return sb.toString(); } public static void main(String[] args)throws Exception{ String inputStr = "{\"name\":\"zhangsan\"}"; byte[] inputData = inputStr.getBytes(); String key = "laidefa"; System.out.println(Hmacmd5.byteArrayToHexString(Hmacmd5.encryptHMAC(inputData, key))); } }
Copy after login

Output result:

##2cbb94ce78b35e4030851c4d40dacf12

PS: Friends who are interested in encryption and decryption can also refer to the online tools of this site:

Text online encryption and decryption tool ( Including AES, DES, RC4, etc.):
http://tools.jb51.net/password/txt_encode

MD5 Online encryption tools:
http://tools.jb51.net/password/CreateMD5Password

##Online hashing/hash Algorithm encryption tool:
http://tools.jb51.net/password/hash_encrypt

OnlineMD5/hash/SHA -1/SHA-2/SHA-256/SHA-512/SHA-3/RIPEMD-160 encryption tool:
http://tools.jb51.net/password/hash_md5_sha

Online sha1/sha224/sha256/sha384/sha512 encryption tool:
##http://tools.jb51.net/password/sha_encode

Related recommendations:

Transfer: HmacMD5 algorithm [php version]

The above is the detailed content of Example of HMacMD5 encryption algorithm implemented in Python_python. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template
About us Disclaimer Sitemap
php.cn:Public welfare online PHP training,Help PHP learners grow quickly!