ios 中开发中用户信息中的加密方式有哪些 在ios开发中有多少常用的加密解密方式

iOS\u4ee3\u7801\u52a0\u5bc6\u7684\u51e0\u79cd\u65b9\u5f0f

\u5bf9ios\u5e94\u7528\u52a0\u56fa\u6709\u4e24\u79cd\u5b9e\u73b0\u65b9\u5f0f\u3002
\u4e00\u79cd\u4f7f\u7528\u5b89\u5168\u7f16\u8bd1\u5668\u57fa\u4e8eLLVM\u7f16\u8bd1\u5668\u4e2d\u95f4\u5c42\u5b9e\u73b0\u3002\u57fa\u4e8e LLVM \u7684\u4fdd\u62a4\u65b9\u6848\uff0c\u5728\u4f7f\u7528\u65f6\u9700\u8981\u66f4\u6362\u5df2\u6709\u7684\u7f16\u8bd1\u73af\u5883\uff0c\u66ff\u6362\u7f16\u8bd1\u5668\uff0c\u8c03\u6574\u7f16\u8bd1\u9009\u9879\u7b49\uff0c\u5bf9\u5f00\u53d1\u73af\u5883\u9020\u6210\u4e86\u5f88\u591a\u5f71\u54cd\uff0c\u6613\u7528\u6027\u5dee\u3002\u4ece\u4fdd\u62a4\u6548\u679c\u4e0a\u770b\uff0c\u57fa\u4e8e LLVM \u7684\u4fdd\u62a4\u65b9\u6848\uff0c\u53d7\u9650\u4e8e\u7f16\u8bd1\u5668\u6846\u67b6\uff0c\u751f\u6210\u7684\u4ee3\u7801\u53ea\u80fd\u505a\u903b\u8f91\u4e0a\u7684\u6df7\u6dc6\u53d8\u6362\uff0c\u4ecd\u7136\u53ef\u4ee5\u88ab\u53cd\u7f16\u8bd1\uff0c\u5bf9\u63a7\u5236\u6d41\u7684\u6df7\u6dc6\u6548\u679c\u6709\u9650\uff0c\u4e14\u8fb9\u754c\u6e05\u6670\uff0c\u66f4\u5bb9\u6613\u88ab\u5206\u6790\u3002
\u53cd\u7f16\u8bd1\u6548\u679cOLLVM \u4fdd\u62a4\u540e\u53cd\u7f16\u8bd1\u6548\u679c\uff1a

\u4e00\u79cd\u4f7f\u7528VirboxProtector \u865a\u62df\u5316\u4fdd\u62a4\u3002ARM \u865a\u62df\u5316\u662f Virbox Protector \u9488\u5bf9 ARM \u67b6\u6784\u7684\u6307\u4ee4\u63a8\u51fa\u7684\u865a\u62df\u673a\u4fdd\u62a4\u65b9\u5f0f\uff0c\u901a\u8fc7\u5c06\u539f\u59cb\u7684 ARM \u6307\u4ee4\u8fdb\u884c\u7ffb\u8bd1\uff0c\u8f6c\u6362\u4e3a\u81ea\u5b9a\u4e49\u7684\u865a\u62df\u673a\u6307\u4ee4\uff0c\u8fd0\u884c\u65f6\u5728\u81ea\u5b9a\u4e49\u865a\u62df\u673a\u6267\u884c\u3002Virbox Protector \u5b9e\u73b0\u4e86\u9488\u5bf9 ARM \u6307\u4ee4\u7684\u865a\u62df\u673a\u4fdd\u62a4\u5de5\u5177\uff0c\u652f\u6301\u5bf9armv7\uff08\u5305\u62ec thumb, thumb2\uff09\uff0c\u53ca armv8 \u4ee5\u4e0a\u6307\u4ee4\u96c6\u8fdb\u884c\u7ffb\u8bd1\uff0c\u5b89\u5168\u5f3a\u5ea6\u9ad8\uff0c\u9002\u7528\u4e8e\u9700\u8981\u9ad8\u5b89\u5168\u6027\u7684\u4ee3\u7801\u4fdd\u62a4\u9700\u6c42\u3002\u901a\u8fc7\u865a\u62df\u5316\u4fdd\u62a4\u540e\u7684\u4ee3\u7801\u65e0\u6cd5\u88ab\u53cd\u7f16\u8bd1\u3002
Virbox Protector \u4fdd\u62a4\u540e\u53cd\u7f16\u8bd1\u6548\u679c\uff1a

\u6700\u5e38\u7528\u7684\u662fMD5\u548cbase64\u7f16\u7801\uff0c\u8fd8\u6709DES 3DES AES\u52a0\u5bc6

5.1 通过简单的URLENCODE + BASE64编码防止数据明文传输
5.2 对普通请求、返回数据,生成MD5校验(MD5中加入动态密钥),进行数据完整性(简单防篡改,安全性较低,优点:快速)校验。
5.3 对于重要数据,使用RSA进行数字签名,起到防篡改作用。
5.4 对于比较敏感的数据,如用户信息(登陆、注册等),客户端发送使用RSA加密,服务器返回使用DES(AES)加密。
原因:客户端发送之所以使用RSA加密,是因为RSA解密需要知道服务器私钥,而服务器私钥一般盗取难度较大;如果使用DES的话,可以通过破解客户端获取密钥,安全性较低。而服务器返回之所以使用DES,是因为不管使用DES还是RSA,密钥(或私钥)都存储在客户端,都存在被破解的风险,因此,需要采用动态密钥,而RSA的密钥生成比较复杂,不太适合动态密钥,并且RSA速度相对较慢,所以选用DES)
把相关算法的代码也贴一下吧 (其实使用一些成熟的第三方库或许会来得更加简单,不过自己写,自由点)。注,这里的大部分加密算法都是参考一些现有成熟的算法,或者直接拿来用的。
1、MD5
//因为是使用category,所以木有参数传入啦

-(NSString *) stringFromMD5 {
if(self == nil || [self length] == 0) {
return nil;
}
const char *value = [self UTF8String];
unsigned char outputBuffer[CC_MD5_DIGEST_LENGTH];
CC_MD5(value, strlen(value), outputBuffer);
NSMutableString *outputString = [[NSMutableString alloc] initWithCapacity:CC_MD5_DIGEST_LENGTH * 2];
for(NSInteger count = 0; count < CC_MD5_DIGEST_LENGTH; count++){
[outputString appendFormat:@"%02x",outputBuffer[count]];
}
return [outputString autorelease];
}

2、Base64

+ (NSString *) base64EncodeData: (NSData *) objData {
const unsigned char * objRawData = [objData bytes];
char * objPointer;
char * strResult;

// Get the Raw Data length and ensure we actually have data
int intLength = [objData length];
if (intLength == 0) return nil;

// Setup the String-based Result placeholder and pointer within that placeholder
strResult = (char *)calloc(((intLength + 2) / 3) * 4, sizeof(char));
objPointer = strResult;

// Iterate through everything
while (intLength > 2) { // keep going until we have less than 24 bits
*objPointer++ = _base64EncodingTable[objRawData[0] >> 2];
*objPointer++ = _base64EncodingTable[((objRawData[0] & 0x03) << 4) + (objRawData[1] >> 4)];
*objPointer++ = _base64EncodingTable[((objRawData[1] & 0x0f) << 2) + (objRawData[2] >> 6)];
*objPointer++ = _base64EncodingTable[objRawData[2] & 0x3f];

// we just handled 3 octets (24 bits) of data
objRawData += 3;
intLength -= 3;
}

// now deal with the tail end of things
if (intLength != 0) {
*objPointer++ = _base64EncodingTable[objRawData[0] >> 2];
if (intLength > 1) {
*objPointer++ = _base64EncodingTable[((objRawData[0] & 0x03) << 4) + (objRawData[1] >> 4)];
*objPointer++ = _base64EncodingTable[(objRawData[1] & 0x0f) << 2];
*objPointer++ = '=';
} else {
*objPointer++ = _base64EncodingTable[(objRawData[0] & 0x03) << 4];
*objPointer++ = '=';
*objPointer++ = '=';
}
}

// Terminate the string-based result
*objPointer = '\0';

NSString *rstStr = [NSString stringWithCString:strResult encoding:NSASCIIStringEncoding];
free(objPointer);
return rstStr;
}

3、AES
-(NSData*) EncryptAES: (NSString *) key {
char keyPtr[kCCKeySizeAES256+1];
bzero(keyPtr, sizeof(keyPtr));

[key getCString:keyPtr maxLength:sizeof(keyPtr) encoding:NSUTF8StringEncoding];

NSUInteger dataLength = [self length];

size_t bufferSize = dataLength + kCCBlockSizeAES128;
void *buffer = malloc(bufferSize);

size_t numBytesEncrypted = 0;
CCCryptorStatus cryptStatus = CCCrypt(kCCEncrypt, kCCAlgorithmAES128,
kCCOptionPKCS7Padding | kCCOptionECBMode,
keyPtr, kCCBlockSizeAES128,
NULL,
[self bytes], dataLength,
buffer, bufferSize,
&numBytesEncrypted);
if (cryptStatus == kCCSuccess) {
return [NSData dataWithBytesNoCopy:buffer length:numBytesEncrypted];
}

free(buffer);
return nil;
}

4、RSA

- (NSData *) encryptWithData:(NSData *)content {
size_t plainLen = [content length];
if (plainLen > maxPlainLen) {
NSLog(@"content(%ld) is too long, must < %ld", plainLen, maxPlainLen);
return nil;
}

void *plain = malloc(plainLen);
[content getBytes:plain
length:plainLen];

size_t cipherLen = 128; // currently RSA key length is set to 128 bytes
void *cipher = malloc(cipherLen);

OSStatus returnCode = SecKeyEncrypt(publicKey, kSecPaddingPKCS1, plain,
plainLen, cipher, &cipherLen);

NSData *result = nil;
if (returnCode != 0) {
NSLog(@"SecKeyEncrypt fail. Error Code: %ld", returnCode);
}
else {
result = [NSData dataWithBytes:cipher
length:cipherLen];
}

free(plain);
free(cipher);

return result;
}

扩展阅读:ios系统都是哪些手机 ... 平台参数下发中 请等待 ... ios软件下载 ... xsswzx.cdu.edu.cn ... 查个人信息 ... microsoft intune下载 ... app store ... chrome浏览器 ... 苹果手机怎么打开ios用户 ...

本站交流只代表网友个人观点,与本站立场无关
欢迎反馈与建议,请联系电邮
2024© 车视网