Quickly understand the usage of crypto module in Nodejs in one article

青灯夜游
Release: 2021-08-02 10:09:12
forward
5802 people have browsed it

crypto is a module that implements encryption and decryption innode.js. This article will take you through the crypto module and introduce the use of the crypto module for hashing (hash) algorithms, HMAC algorithms, Symmetric encryption and asymmetric encryption methods.

Quickly understand the usage of crypto module in Nodejs in one article

1. crypto

cryptois the implementation of encryption innode.jsand decryption module, innode.js, theOpenSSLclass library is used as a means to internally implement encryption and decryption.OpenSSLis a reliable and rigorously tested Implementation tools for encryption and decryption algorithms. [Recommended learning: "nodejs Tutorial"]

windows version openSSL download

http://dl.pconline.com.cn/download/355862- 1.html

2. Hash (hash) algorithm

The hash algorithm is also called the hash algorithm and is used to transform input of any length into fixed-length output, common ones include md5, sha1, etc.

  • The same input will produce the same output
  • Different output will produce different output
  • The output length is the same for any input length
  • The input value cannot be deduced from the output

Quickly understand the usage of crypto module in Nodejs in one article

2.1 Get all hashes Algorithm

console.log(crypto.getHashes());
Copy after login

2.2 Syntax description

crypto.createHash(algorithm);//创建HASH对象 hash.update(data,[input_encoding]);//增加要添加摘要的数据,摘要输出前可以使用多次update hash.digest([encoding]);//输出摘要内容,输出后则不能再添加摘要内容
Copy after login

2.3 Hash algorithm example

var crypto = require('crypto'); var md5 = crypto.createHash('md5');//返回哈希算法 var md5Sum = md5.update('hello');//指定要摘要的原始内容,可以在摘要被输出之前使用多次update方法来添加摘要内容 var result = md5Sum.digest('hex');//摘要输出,在使用digest方法之后不能再向hash对象追加摘要内容。 console.log(result);
Copy after login

Multiple updates

var fs = require('fs'); var shasum = crypto.createHash('sha1');//返回sha1哈希算法 var rs = fs.createReadStream('./readme.txt'); rs.on('data', function (data) { shasum.update(data);//指定要摘要的原始内容,可以在摘要被输出之前使用多次update方法来添加摘要内容 }); rs.on('end', function () { var result = shasum.digest('hex');//摘要输出,在使用digest方法之后不能再向hash对象追加摘要内容。 console.log(result); })
Copy after login

3. HMAC algorithm

The HMAC algorithm combines a hashing algorithm with a key to prevent damage to the integrity of the signature

Quickly understand the usage of crypto module in Nodejs in one article

3.1 Syntax

let hmac crypto.createHmac(algorithm,key); hmac.update(data);
Copy after login
  • algorithm is an available digest algorithm, such as sha1, md5, sha256
  • key is one character String, used to specify a key in PEM format

3.2 Generate private key

PEM is the standard format of OpenSSL, and OpenSSL uses the PEM file format to store certificates and the key, which are based on the Base64 encoded certificate.

$ openssl genrsa -out rsa_private.key 1024
Copy after login

3.3 Example

let pem = fs.readFileSync(path.join(__dirname, './rsa_private.key')); let key = pem.toString('ascii'); let hmac = crypto.createHmac('sha1', key); let rs = fs.createReadStream(path.join(__dirname, './1.txt')); rs.on('data', function (data) { hmac.update(data); }); rs.on('end', function () { let result = hmac.digest('hex'); console.log(result); });
Copy after login

4. Symmetric encryption

  • blowfish algorithm is a symmetric encryption algorithm ,Symmetry means that the same key is used for ,encryption and decryption.

Quickly understand the usage of crypto module in Nodejs in one article

var crypto = require('crypto'); var fs = require('fs'); let str = 'hello'; let cipher = crypto.createCipher('blowfish', fs.readFileSync(path.join(__dirname, 'rsa_private.key'))); let encry = cipher.update(str, 'utf8','hex'); encry += cipher.final('hex'); console.log(encry); let deciper = crypto.createDecipher('blowfish', fs.readFileSync(path.join(__dirname, 'rsa_private.key'))); let deEncry = deciper.update(encry, 'hex','utf8'); deEncry += deciper.final('utf8'); console.log(deEncry);
Copy after login

5. Asymmetric encryption algorithm

  • The asymmetric encryption algorithm requires two keys: Public key (publickey) and private key (privatekey)
  • The public key and the private key are a pair. If the public key is used to encrypt data, only the corresponding private key can be used to decrypt it. If the private key is encrypted , only public key decryption
  • Because encryption and decryption use two different keys, this algorithm is called an asymmetric encryption algorithm

Quickly understand the usage of crypto module in Nodejs in one article

Create a public key for the private key

openssl rsa -in rsa_private.key -pubout -out rsa_public.key
Copy after login
var crypto = require('crypto'); var fs = require('fs'); let key = fs.readFileSync(path.join(__dirname, 'rsa_private.key')); let cert = fs.readFileSync(path.join(__dirname, 'rsa_public.key')); let secret = crypto.publicEncrypt(cert, buffer);//公钥加密 let result = crypto.privateDecrypt(key, secret);//私钥解密 console.log(result.toString());
Copy after login

6. Signature

In the network, the owner of the private key can sign a piece of data before it is sent. After the data issignedand a signature is obtained and the data is sent to the data recipient through the network, the data recipient can verify the signature through thepublic keyto ensure that this data It is the original data sent by the owner of the private key and has not been modified during transmission on the network.

Quickly understand the usage of crypto module in Nodejs in one article

let private = fs.readFileSync(path.join(__dirname, 'rsa_private.key'), 'ascii'); let public = fs.readFileSync(path.join(__dirname, 'rsa_public.key'), 'ascii'); let str = 'zhufengpeixun'; let sign = crypto.createSign('RSA-SHA256'); sign.update(str); let signed = sign.sign(private, 'hex'); let verify = crypto.createVerify('RSA-SHA256'); verify.update(str); let verifyResult = verify.verify(public,signed,'hex'); //true
Copy after login

Original address: https://juejin.cn/post/6844903800491376653

For more programming-related knowledge, please visit :Programming Video! !

The above is the detailed content of Quickly understand the usage of crypto module in Nodejs in one article. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:juejin.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template
About us Disclaimer Sitemap
php.cn:Public welfare online PHP training,Help PHP learners grow quickly!