


Example of HMacMD5 encryption algorithm implemented in Python_python
This article mainly introduces the HMacMD5 encryption algorithm implemented in Python, briefly explains the concept and principle of the HMAC-MD5 encryption algorithm, and analyzes the relevant operating skills of the HMAC-MD5 encryption algorithm implemented in Python in the form of examples. It is also appended at the end. Here is an example of implementing the HMAC-MD5 encryption algorithm in Java. Friends who need it can refer to
. This article describes the HMacMD5 encryption algorithm implemented in Python. Share it with everyone for your reference, the details are as follows:
What is HMAC-MD5?
1. For example, you share a key K with the other party. Now you want to send a message to the other party. You must not only ensure that the message has not been tampered with, but also prove that the message is indeed yours. If sent, then the original information and the HMAC value calculated using K are sent together. After the other party receives it, he uses the K in his hand to calculate the HMAC of the message. If it is consistent with the HMAC you sent, then it can be considered that the message has not been tampered with or impersonated.
2. MD5 digests the data to be output through hashing. When the data is received, MD5 hashing is performed in the same way. When compared with the given MD5 hash value, it will be clear if it is consistent and inconsistent. Generally speaking, the transmitted data and MD5 are given through different channels. For example, MD5 is displayed on the web page and the download link is from a mirror website. If you want to send data and hash values through the same channel (such as message authentication code), you must consider the problem of data and MD5 being tampered with at the same time. If a third party modifies the data, then perform MD5 hashing and send it to the recipient together. The receiving party cannot detect that the data has been tampered with. HMAC-MD5 can be calculated using a key shared by both the sender and the receiver, and a third party without this key cannot calculate the correct hash value, thus preventing data from being tampered with.
Python version:
#coding:utf-8 import sys reload(sys) sys.setdefaultencoding('utf-8') import hmac import hashlib ####################设置Key值############## ekey = 'laidefa' ###############输入数据############ to_enc = '{"name":"zhangsan"}' enc_res = hmac.new(ekey, to_enc, hashlib.md5).hexdigest() print enc_res
Output result:
"D:\Program Files\Python27\python.exe" D:/PycharmProjects/learn2017/hmacmd5.py
2cbb94ce78b35e4030851c4d40dacf12
Process finished with exit code 0
java version:
package tom; import java.security.MessageDigest; import javax.crypto.KeyGenerator; import javax.crypto.Mac; import javax.crypto.SecretKey; import javax.crypto.spec.SecretKeySpec; /** * 基础加密组件 * @version 1.0 */ public class Hmacmd5 { /** * MAC算法可选以下多种算法 * * <pre class="brush:php;toolbar:false"> * HmacMD5 * HmacSHA1 * HmacSHA256 * HmacSHA384 * HmacSHA512 **/ public static final String KEY_MAC = "HmacMD5"; /** * HMAC加密 * * @param data * @param key * @return * @throws Exception */ public static byte[] encryptHMAC(byte[] data, String key) throws Exception { SecretKey secretKey = new SecretKeySpec(key.getBytes(), KEY_MAC); Mac mac = Mac.getInstance(secretKey.getAlgorithm()); mac.init(secretKey); return mac.doFinal(data); } /*byte数组转换为HexString*/ public static String byteArrayToHexString(byte[] b) { StringBuffer sb = new StringBuffer(b.length * 2); for (int i = 0; i
Output result:
##2cbb94ce78b35e4030851c4d40dacf12
PS: Friends who are interested in encryption and decryption can also refer to the online tools of this site:
Text online encryption and decryption tool ( Including AES, DES, RC4, etc.):
http://tools.jb51.net/password/txt_encode
MD5 Online encryption tools:
http://tools.jb51.net/password/CreateMD5Password
##Online hashing/hash Algorithm encryption tool:
http://tools.jb51.net/password/hash_encrypt
OnlineMD5/hash/SHA -1/SHA-2/SHA-256/SHA-512/SHA-3/RIPEMD-160 encryption tool:
http://tools.jb51.net/password/hash_md5_sha
Online sha1/sha224/sha256/sha384/sha512 encryption tool:
##http://tools.jb51.net/password/sha_encode
Related recommendations:
Transfer: HmacMD5 algorithm [php version]
The above is the detailed content of Example of HMacMD5 encryption algorithm implemented in Python_python. For more information, please follow other related articles on the PHP Chinese website!

Pythonusesahybridapproach,combiningcompilationtobytecodeandinterpretation.1)Codeiscompiledtoplatform-independentbytecode.2)BytecodeisinterpretedbythePythonVirtualMachine,enhancingefficiencyandportability.

ThekeydifferencesbetweenPython's"for"and"while"loopsare:1)"For"loopsareidealforiteratingoversequencesorknowniterations,while2)"while"loopsarebetterforcontinuinguntilaconditionismetwithoutpredefinediterations.Un

In Python, you can connect lists and manage duplicate elements through a variety of methods: 1) Use operators or extend() to retain all duplicate elements; 2) Convert to sets and then return to lists to remove all duplicate elements, but the original order will be lost; 3) Use loops or list comprehensions to combine sets to remove duplicate elements and maintain the original order.

ThefastestmethodforlistconcatenationinPythondependsonlistsize:1)Forsmalllists,the operatorisefficient.2)Forlargerlists,list.extend()orlistcomprehensionisfaster,withextend()beingmorememory-efficientbymodifyinglistsin-place.

ToinsertelementsintoaPythonlist,useappend()toaddtotheend,insert()foraspecificposition,andextend()formultipleelements.1)Useappend()foraddingsingleitemstotheend.2)Useinsert()toaddataspecificindex,thoughit'sslowerforlargelists.3)Useextend()toaddmultiple

Pythonlistsareimplementedasdynamicarrays,notlinkedlists.1)Theyarestoredincontiguousmemoryblocks,whichmayrequirereallocationwhenappendingitems,impactingperformance.2)Linkedlistswouldofferefficientinsertions/deletionsbutslowerindexedaccess,leadingPytho

Pythonoffersfourmainmethodstoremoveelementsfromalist:1)remove(value)removesthefirstoccurrenceofavalue,2)pop(index)removesandreturnsanelementataspecifiedindex,3)delstatementremoveselementsbyindexorslice,and4)clear()removesallitemsfromthelist.Eachmetho

Toresolvea"Permissiondenied"errorwhenrunningascript,followthesesteps:1)Checkandadjustthescript'spermissionsusingchmod xmyscript.shtomakeitexecutable.2)Ensurethescriptislocatedinadirectorywhereyouhavewritepermissions,suchasyourhomedirectory.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

WebStorm Mac version
Useful JavaScript development tools

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

SublimeText3 English version
Recommended: Win version, supports code prompts!

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.
