search
HomeJavajavaTutorialJava detailed explanation of one-way encryption-MD5, SHA and HMAC and simple implementation example code

This article mainly introduces Java's detailed explanation of one-way encryption--MD5, SHA and HMAC and simple implementation examples. Friends in need can refer to

Java's detailed explanation of one-way encryption--MD5, SHA and HMAC and simple implementation examples

Summary:

The three encryption algorithms of MD5, SHA, and HMAC can be said to be non-reversible encryption, which is an encryption method that cannot be decrypted.

MD5

MD5 is Message-Digest Algorithm 5 (Message-Digest Algorithm 5), which is used to ensure complete and consistent information transmission. MD5 is an algorithm that inputs information of variable length and outputs a fixed length of 128-bits.

The MD5 algorithm has the following characteristics:

1. Compressibility: For data of any length, the length of the calculated MD5 value is fixed.
2. Easy to calculate: It is easy to calculate the MD5 value from the original data.
3. Anti-modification: If any changes are made to the original data, even if only 1 byte is modified, the resulting MD5 value will be very different.
4. Strong anti-collision: Given the original data and its MD5 value, it is very difficult to find data with the same MD5 value (ie, forged data).

MD5 is also widely used for login authentication of operating systems, such as Unix, various BSD system login passwords, digital signatures and many other aspects. For example, in a Unix system, the user's password is stored in the file system after hashing using MD5 (or other similar algorithms). When the user logs in, the system performs an MD5 hash operation on the password entered by the user, and then compares it with the MD5 value stored in the file system to determine whether the entered password is correct. Through such steps, the system can determine the legitimacy of the user's login to the system without knowing the clear code of the user's password. This prevents the user's password from becoming known to users with system administrator rights. MD5 maps a "byte string" of any length into a 128-bit large integer, and it is very difficult to reverse the original string through this 128-bit.

SHA

SHA (Secure Hash Algorithm, secure hash algorithm), digital signature and other important tools in cryptography applications, are widely used It is widely used in information security fields such as e-commerce. Although both SHA and MD5 have been cracked through collision methods, SHA is still a recognized secure encryption algorithm and is more secure than MD5.

The length defined by SHA

The relay hash value (internal state) in the following table represents the compressed hash of each data block The relay value (internal hash sum).


##80+,and,or, xor,shr,rotrhas not appeared yet
Algorithm Output hash value length (bits) Relay Hash value length (bits) Data block length (bits) Maximum input message length (bits) One Word length (bits) Number of cycles Operators used Collision attack
SHA-0 160 160 512 264 − 1 32 80 +,and,or,xor,rotl is
SHA-1 160 160 512 264 − 1 32 80 +,and,or,xor,rotl There is a 263 attack
SHA -256/224 256/224 256 512 264 − 1 32 64 +,and,or,xor,shr,rotr has not appeared yet
SHA-512/384 512/ 384 512 1024 2128 − 1 64

HMAC

HMAC(Hash Message Authentication Code ), hash message authentication code, key-based Hash algorithm authentication protocol. The principle of message authentication code is to use a public function and key to generate a fixed-length value as an authentication identifier, and use this identifier to authenticate the integrity of the message. A secret key is used to generate a small, fixed-size block of data, the MAC, which is added to the message and then transmitted. The receiver uses the key shared with the sender for authentication and authentication.

Java Example

package com.zzj.encryption; 
 
import java.security.MessageDigest; 
 
import javax.crypto.Mac; 
import javax.crypto.SecretKey; 
import javax.crypto.spec.SecretKeySpec; 
 
import org.apache.commons.codec.binary.Base64; 
 
/** 
 * 单向加密(非可逆加密) 
 * @author lenovo 
 * 
 */ 
public class OneWayEncryption { 
  static final String ALGORITHM_MD5 = "MD5"; 
  static final String ALGORITHM_SHA = "SHA"; 
  /** 
   * MAC算法可选以下多种算法 
   * <pre class="brush:php;toolbar:false"> 
   * HmacMD5 
   * HmacSHA1 
   * HmacSHA256 
   * HmacSHA384 
   * HmacSHA512 
   * 
     */    static final String ALGORITHM_MAC = "HmacMD5";    /** 密钥 **/    static final String MAC_KEY = "abcdef";        public static void main(String[] args) throws Exception {      String source = "我是程序猿!我很骄傲!";      // MD5加密      printBase64(encryptionMD5(source));      // SHA加密      printBase64(encryptionSHA(source));      // HMAC加密      printBase64(encryptionHMAC(source));    }      static void printBase64(byte[] out) throws Exception {      System.out.println(encodeBase64(out));    }      /**     * MD5加密     * @param source     * @return     * @throws Exception     */    static byte[] encryptionMD5(String source) throws Exception {      MessageDigest md = MessageDigest.getInstance(ALGORITHM_MD5);      md.update(source.getBytes("UTF-8"));      return md.digest();    }        /**     * SHA加密     * @param source     * @return     * @throws Exception     */    static byte[] encryptionSHA(String source) throws Exception {      MessageDigest md = MessageDigest.getInstance(ALGORITHM_SHA);      md.update(source.getBytes("UTF-8"));      return md.digest();    }        /**     * HMAC加密     * @return     * @throws Exception     */    static byte[] encryptionHMAC(String source) throws Exception {      SecretKey secretKey = new SecretKeySpec(MAC_KEY.getBytes("UTF-8"), ALGORITHM_MAC);      Mac mac = Mac.getInstance(ALGORITHM_MAC);      mac.init(secretKey);      mac.update(source.getBytes("UTF-8"));      return mac.doFinal();    }        /**     * base64编码     * @param source     * @return     * @throws Exception     */    static String encodeBase64(byte[] source) throws Exception{      return new String(Base64.encodeBase64(source), "UTF-8");    }    }

Result:


1cNbZhnhFsFV3BFPLA71wA== 
kl5KI61Xq44E/SzSPa2sUntMAEc= 
JF2v/u9td5l8yGAImNvTZw==


The above is the detailed content of Java detailed explanation of one-way encryption-MD5, SHA and HMAC and simple implementation example code. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Why is Java a popular choice for developing cross-platform desktop applications?Why is Java a popular choice for developing cross-platform desktop applications?Apr 25, 2025 am 12:23 AM

Javaispopularforcross-platformdesktopapplicationsduetoits"WriteOnce,RunAnywhere"philosophy.1)ItusesbytecodethatrunsonanyJVM-equippedplatform.2)LibrarieslikeSwingandJavaFXhelpcreatenative-lookingUIs.3)Itsextensivestandardlibrarysupportscompr

Discuss situations where writing platform-specific code in Java might be necessary.Discuss situations where writing platform-specific code in Java might be necessary.Apr 25, 2025 am 12:22 AM

Reasons for writing platform-specific code in Java include access to specific operating system features, interacting with specific hardware, and optimizing performance. 1) Use JNA or JNI to access the Windows registry; 2) Interact with Linux-specific hardware drivers through JNI; 3) Use Metal to optimize gaming performance on macOS through JNI. Nevertheless, writing platform-specific code can affect the portability of the code, increase complexity, and potentially pose performance overhead and security risks.

What are the future trends in Java development that relate to platform independence?What are the future trends in Java development that relate to platform independence?Apr 25, 2025 am 12:12 AM

Java will further enhance platform independence through cloud-native applications, multi-platform deployment and cross-language interoperability. 1) Cloud native applications will use GraalVM and Quarkus to increase startup speed. 2) Java will be extended to embedded devices, mobile devices and quantum computers. 3) Through GraalVM, Java will seamlessly integrate with languages ​​such as Python and JavaScript to enhance cross-language interoperability.

How does the strong typing of Java contribute to platform independence?How does the strong typing of Java contribute to platform independence?Apr 25, 2025 am 12:11 AM

Java's strong typed system ensures platform independence through type safety, unified type conversion and polymorphism. 1) Type safety performs type checking at compile time to avoid runtime errors; 2) Unified type conversion rules are consistent across all platforms; 3) Polymorphism and interface mechanisms make the code behave consistently on different platforms.

Explain how Java Native Interface (JNI) can compromise platform independence.Explain how Java Native Interface (JNI) can compromise platform independence.Apr 25, 2025 am 12:07 AM

JNI will destroy Java's platform independence. 1) JNI requires local libraries for a specific platform, 2) local code needs to be compiled and linked on the target platform, 3) Different versions of the operating system or JVM may require different local library versions, 4) local code may introduce security vulnerabilities or cause program crashes.

Are there any emerging technologies that threaten or enhance Java's platform independence?Are there any emerging technologies that threaten or enhance Java's platform independence?Apr 24, 2025 am 12:11 AM

Emerging technologies pose both threats and enhancements to Java's platform independence. 1) Cloud computing and containerization technologies such as Docker enhance Java's platform independence, but need to be optimized to adapt to different cloud environments. 2) WebAssembly compiles Java code through GraalVM, extending its platform independence, but it needs to compete with other languages ​​for performance.

What are the different implementations of the JVM, and do they all provide the same level of platform independence?What are the different implementations of the JVM, and do they all provide the same level of platform independence?Apr 24, 2025 am 12:10 AM

Different JVM implementations can provide platform independence, but their performance is slightly different. 1. OracleHotSpot and OpenJDKJVM perform similarly in platform independence, but OpenJDK may require additional configuration. 2. IBMJ9JVM performs optimization on specific operating systems. 3. GraalVM supports multiple languages ​​and requires additional configuration. 4. AzulZingJVM requires specific platform adjustments.

How does platform independence reduce development costs and time?How does platform independence reduce development costs and time?Apr 24, 2025 am 12:08 AM

Platform independence reduces development costs and shortens development time by running the same set of code on multiple operating systems. Specifically, it is manifested as: 1. Reduce development time, only one set of code is required; 2. Reduce maintenance costs and unify the testing process; 3. Quick iteration and team collaboration to simplify the deployment process.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)