没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论





















crypto-js
JavaScript implementations of standard and secure cryptographic algorithms
CryptoJS is a growing collection of standard and secure cryptographic algorithms implemented in
JavaScript using best practices and patterns. They are fast, and they have a consistent and simple
interface.
If you have a problem with CryptoJS, if you want to discuss new features, or if you want to contribute to
the project, you can visit the CryptoJS discussion group.
http://groups.google.com/group/crypto-js/topics
Inactivity
CryptoJS is a project that I enjoy and work on in my spare time, but unfortunately my 9-to-5 hasn't left me
with as much free time as it used to. I'd still like to continue improving it in the future, but I can't say when
that will be. If you find that CryptoJS doesn't meet your needs, then I'd recommend you try Forge.
CryptoJS 3.1
• SHA-3!
• RIPEMD-160
• Typed arrays
See the full ChangeLog.
Quick-start Guide
Hashers
The Hasher Algorithms
MD5
MD5 is a widely used hash function. It's been used in a variety of security applications and is also
commonly used to check the integrity of files. Though, MD5 is not collision resistant, and it isn't suitable
for applications like SSL certificates or digital signatures that rely on this property.
```
var hash = CryptoJS.MD5("Message");
```
SHA-1

The SHA hash functions were designed by the National Security Agency (NSA). SHA-1 is the most
established of the existing SHA hash functions, and it's used in a variety of security applications and
protocols. Though, SHA-1's collision resistance has been weakening as new attacks are discovered or
improved.
```
var hash = CryptoJS.SHA1("Message");
```
SHA-2
SHA-256 is one of the four variants in the SHA-2 set. It isn't as widely used as SHA-1, though it appears
to provide much better security.
```
var hash = CryptoJS.SHA256("Message");
```
SHA-512 is largely identical to SHA-256 but operates on 64-bit words rather than 32.
```
var hash = CryptoJS.SHA512("Message");
```
CryptoJS also supports SHA-224 and SHA-384, which are largely identical but truncated versions of
SHA-256 and SHA-512 respectively.
SHA-3
SHA-3 is the winner of a five-year competition to select a new cryptographic hash algorithm where 64
competing designs were evaluated.
NOTE: I made a mistake when I named this implementation SHA-3. It should be named Keccak[c=2d].
Each of the SHA-3 functions is based on an instance of the Keccak algorithm, which NIST selected as the
winner of the SHA-3 competition, but those SHA-3 functions won't produce hashes identical to Keccak.
```
var hash = CryptoJS.SHA3("Message");
```
SHA-3 can be configured to output hash lengths of one of 224, 256, 384, or 512 bits. The default is 512
bits.
```
var hash = CryptoJS.SHA3("Message", { outputLength: 512 }); var hash = CryptoJS.SHA3("Message",
{ outputLength: 384 }); var hash = CryptoJS.SHA3("Message", { outputLength: 256 }); var hash =
CryptoJS.SHA3("Message", { outputLength: 224 });
```
RIPEMD-160
```
var hash = CryptoJS.RIPEMD160("Message");
剩余7页未读,继续阅读
资源评论


每天努力一点点
- 粉丝: 3
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助


最新资源
- 新型泄漏电缆在地铁隧道场景5G网络建设中的应用.docx
- 提出了一种结合卷积神经网络(CNN)和Transformer的混合模型(CNN-Transformer),用于测井孔隙度预测(含详细代码及解释)
- Apache与WebSphere平台部署方案.docx
- plc自动售货机大学本科方案设计书开题报告.doc
- 互联网时代高职英语教学模式创新策略探析.docx
- 实验指导书(软件详细设计).doc
- 环境科学持久性有机污染物人体累积模型(HAL)的深入研究与应用:基于全氟辛酸的长期健康风险评估系统设计(含详细代码及解释)
- WindowsServer2003教学-第七章软件更新服务.ppt
- PLC自动化控系统优化设计方案探究.doc
- 光学工程基于米氏散射模型的高斯激光束在海水中传输特性数值仿真:探究悬浮粒子对水下通信影响米氏散射(含详细代码及解释)
- 课结构化的程序设计.doc
- 网络+NVR+解码器解决方案.doc
- 当前计算机信息管理技术在网络安全中的应用分析.docx
- 【电子信息工程】ELEC3004信号系统与控制课程作业:涵盖信号采样、系统分析及滤波技术的关键问题解析与Python代码实现(含详细代码及解释)
- 社会工作小组程序设计分享.ppt
- 移动互联网产业链的演变与价值转移研究.docx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈



安全验证
文档复制为VIP权益,开通VIP直接复制
