移动安全 安全管理 应用案例 网络威胁 系统安全应用安全 数据安全 云安全
当前位置: 主页 > 信息安全 > 应用安全 >

若何安然的存储用户的暗码(二)

时间:2014-03-17 13:49来源:TuZhiJiaMi企业信息安全专家 点击:
本文供给的代码中 slowequals 函数是如何工作的 上一答复讲到了我们需要比较时候固定的函数,这部门具体讲一下代码的实现。 1. private static boolean slowEquals(byte[] a, byte[] b) 2. { 3. int diff = a.lengt
Tags应用安全(1006)安全密码(6)存储用户(3)  

  本文供给的代码中 slowequals 函数是如何工作的

  上一答复讲到了我们需要比较时候固定的函数,这部门具体讲一下代码的实现。

  1. private static boolean slowEquals(byte[] a, byte[] b)

  2. {

  3. int diff = a.length ^ b.length;

  4. for(int i = 0; i

  5. diff |= a[i] ^ b[i];

  6. return diff == 0;

  7. }

  这段代码利用了异或(XOR)把持符”^”来比较整数是不是相等,而没有益用”==”把持符。启事在于假定两个数完全一致,异或以后的值为零。因为 0 XOR 0 = 0, 1 XOR 1 = 0, 0 XOR 1 = 1, 1 XOR 0 = 1。

  所以,第一行代码假定a.length便是b.length,变量diff便是0,不然的话diff就是一个非零的值。然后,让a,b的每个字节XOR以后再跟diff OR。如许,只有diff一开端是0,并且,a,b的每个字节XOR的成果也是零,最后轮回完成后diff的值才是0,这类环境是a,b完全一样。不然最后diff是一个非零的值。

  我们利用XOR而不合用”==”的启事是”==”凡是编译成分支的情势。好比C代码”diff &= a == b” 可能编译成下面的X86汇编。

  MOV EAX, [A]

  CMP [B], EAX

  JZ equal

  JMP done

  equal:

  AND [VALID], 1

  done:

  AND [VALID], 0

  分支会导致代码履行的时候呈现差别。

  C代码的”diff |= a ^ b”编译以后近似于,

  MOV EAX, [A]

  XOR EAX, [B]

  OR [DIFF], EAX

  履行时候跟两个变量是不是相等没有关系。

  为甚么要会商这么多关于hash的东西

  用户在你的网站上输进暗码,是相信你的安然性。假定你的数据库被黑了。而用户暗码又没有得当的呵护,那么歹意的报复打击者便可以操纵这些暗码测验测验登岸其他的网站和办事。进行撞库报复打击。(良多用户在所有的处所都是利用不异的暗码)这不但仅是你的网站安然,是你的所有效户的安然。你要对你用户的安然负责。

  大年夜大都的web开辟者城市碰着设计用户账号系统的需求。账号系统最首要的一个方面就是若何呵护用户的暗码。一些大公司的用户数据库泄漏事务也时有产生,所以我们必需采纳一些办法来呵护用户的暗码,即便网站被攻破的环境下也不会造成较大年夜的风险。

  PHP PBKDF2 暗码hash代码

  代码下载

  /*

  * Password Hashing With PBKDF2 (http://crackstation.net/hashing-security.htm).

  * Copyright (c) 2013, Taylor Hornby

  * All rights reserved.

  *

  * Redistribution and use in source and binary forms, with or without

  * modification, are permitted provided that the following conditions are met:

  *

  * 1. Redistributions of source code must retain the above copyright notice,

  * this list of conditions and the following disclaimer.

  *

  * 2. Redistributions in binary form must reproduce the above copyright notice,

  * this list of conditions and the following disclaimer in the documentation

  * and/or other materials provided with the distribution.

  *

  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"

  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE

  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE

  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR

  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF

  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS

  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN

  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)

  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE

  * POSSIBILITY OF SUCH DAMAGE.

  */

  // These constants may be changed without breaking existing hashes.

  define("PBKDF2_HASH_ALGORITHM", "sha256");

  define("PBKDF2_ITERATIONS", 1000);

  define("PBKDF2_SALT_BYTE_SIZE", 24);

  define("PBKDF2_HASH_BYTE_SIZE", 24);

  define("HASH_SECTIONS", 4);

  define("HASH_ALGORITHM_INDEX", 0);

  define("HASH_ITERATION_INDEX", 1);

  define("HASH_SALT_INDEX", 2);

  define("HASH_PBKDF2_INDEX", 3);

  function create_hash($password)

  {

  // format: algorithm:iterations:salt:hash

  $salt = base64_encode(mcrypt_create_iv(PBKDF2_SALT_BYTE_SIZE, MCRYPT_DEV_URANDOM));

  return PBKDF2_HASH_ALGORITHM . ":" . PBKDF2_ITERATIONS . ":" . $salt . ":" .

  base64_encode(pbkdf2(

  PBKDF2_HASH_ALGORITHM,

  $password,

  $salt,

  PBKDF2_ITERATIONS,

  PBKDF2_HASH_BYTE_SIZE,

  true

  ));

  }

  function validate_password($password, $correct_hash)

  {

  $params = explode(":", $correct_hash);

  if(count($params) <  /*

  * Password Hashing With PBKDF2 (http://crackstation.net/hashing-security.htm).

  * Copyright (c) 2013, Taylor Hornby

  * All rights reserved.

  *

  * Redistribution and use in source and binary forms, with or without

  * modification, are permitted provided that the following conditions are met:

  *

  * 1. Redistributions of source code must retain the above copyright notice,

  * this list of conditions and the following disclaimer.

  *

  * 2. Redistributions in binary form must reproduce the above copyright notice,

  * this list of conditions and the following disclaimer in the documentation

  * and/or other materials provided with the distribution.

  *

  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"

  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE

  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE

  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR

  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF

  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS

  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN

  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)

  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE

  * POSSIBILITY OF SUCH DAMAGE.

  */

  // These constants may be changed without breaking existing hashes.

  define("PBKDF2_HASH_ALGORITHM", "sha256");

  define("PBKDF2_ITERATIONS", 1000);

  define("PBKDF2_SALT_BYTE_SIZE", 24);

  define("PBKDF2_HASH_BYTE_SIZE", 24);

  define("HASH_SECTIONS", 4);

  define("HASH_ALGORITHM_INDEX", 0);

  define("HASH_ITERATION_INDEX", 1);

  define("HASH_SALT_INDEX", 2);

  define("HASH_PBKDF2_INDEX", 3);

  function create_hash($password)

  {

  // format: algorithm:iterations:salt:hash

  $salt = base64_encode(mcrypt_create_iv(PBKDF2_SALT_BYTE_SIZE, MCRYPT_DEV_URANDOM));

  return PBKDF2_HASH_ALGORITHM . ":" . PBKDF2_ITERATIONS . ":" . $salt . ":" .

  base64_encode(pbkdf2(

  PBKDF2_HASH_ALGORITHM,

  $password,

  $salt,

  PBKDF2_ITERATIONS,

  PBKDF2_HASH_BYTE_SIZE,

  true

  ));

  }

  function validate_password($password, $correct_hash)

  {

  $params = explode(":", $correct_hash);

  if(count($params) <  /*

  * Password Hashing With PBKDF2 (http://crackstation.net/hashing-security.htm).

  * Copyright (c) 2013, Taylor Hornby

  * All rights reserved.

  *

  * Redistribution and use in source and binary forms, with or without

  * modification, are permitted provided that the following conditions are met:

  *

  * 1. Redistributions of source code must retain the above copyright notice,

  * this list of conditions and the following disclaimer.

  *

  * 2. Redistributions in binary form must reproduce the above copyright notice,

  * this list of conditions and the following disclaimer in the documentation

  * and/or other materials provided with the distribution.

  *

  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"

  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE

  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE

  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR

  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF

  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS

  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN

  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)

  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE

  * POSSIBILITY OF SUCH DAMAGE.

  */

  // These constants may be changed without breaking existing hashes.

  define("PBKDF2_HASH_ALGORITHM", "sha256");

  define("PBKDF2_ITERATIONS", 1000);

  define("PBKDF2_SALT_BYTE_SIZE", 24);

  define("PBKDF2_HASH_BYTE_SIZE", 24);

  define("HASH_SECTIONS", 4);

  define("HASH_ALGORITHM_INDEX", 0);

  define("HASH_ITERATION_INDEX", 1);

  define("HASH_SALT_INDEX", 2);

  define("HASH_PBKDF2_INDEX", 3);

  function create_hash($password)

  {

  // format: algorithm:iterations:salt:hash

  $salt = base64_encode(mcrypt_create_iv(PBKDF2_SALT_BYTE_SIZE, MCRYPT_DEV_URANDOM));

  return PBKDF2_HASH_ALGORITHM . ":" . PBKDF2_ITERATIONS . ":" . $salt . ":" .

  base64_encode(pbkdf2(

  PBKDF2_HASH_ALGORITHM,

  $password,

  $salt,

  PBKDF2_ITERATIONS,

  PBKDF2_HASH_BYTE_SIZE,

  true

  ));

  }

  function validate_password($password, $correct_hash)

  {

  $params = explode(":", $correct_hash);

  if(count($params) < HASH_SECTIONS)

  return false;

  $pbkdf2 = base64_decode($params[HASH_PBKDF2_INDEX]);

  return slow_equals(

  $pbkdf2,

  pbkdf2(

  $params[HASH_ALGORITHM_INDEX],

  $password,

  $params[HASH_SALT_INDEX],

  (int)$params[HASH_ITERATION_INDEX],

  strlen($pbkdf2),

  true

  )

  );

  }

  // Compares two strings $a and $b in length-constant time.

  function slow_equals($a, $b)

  {

  $diff = strlen($a) ^ strlen($b);

  for($i = 0; $i < strlen($a) && $i < strlen($b); $i++)

  {

  $diff |= ord($a[$i]) ^ ord($b[$i]);

  }

  return $diff === 0;

  }

  /*

  * PBKDF2 key derivation function as defined by RSA's PKCS #5: https://www.ietf.org/rfc/rfc2898.txt

  * $algorithm - The hash algorithm to use. Recommended: SHA256

  * $password - The password.

  * $salt - A salt that is unique to the password.

  * $count - Iteration count. Higher is better, but slower. Recommended: At least 1000.

  * $key_length - The length of the derived key in bytes.

  * $raw_output - If true, the key is returned in raw binary format. Hex encoded otherwise.

  * Returns: A $key_length-byte key derived from the password and salt.

  *

  * Test vectors can be found here: https://www.ietf.org/rfc/rfc6070.txt

  *

  * This implementation of PBKDF2 was originally created by https://defuse.ca

  * With improvements by http://www.variations-of-shadow.com

  */

  function pbkdf2($algorithm, $password, $salt, $count, $key_length, $raw_output = false)

  {

  $algorithm = strtolower($algorithm);

  if(!in_array($algorithm, hash_algos(), true))

  trigger_error('PBKDF2 ERROR: Invalid hash algorithm.', E_USER_ERROR);

  if($count <= 0 || $key_length <= 0)

  trigger_error('PBKDF2 ERROR: Invalid parameters.', E_USER_ERROR);

  if (function_exists("hash_pbkdf2")) {

  // The output length is in NIBBLES (4-bits) if $raw_output is false!

  if (!$raw_output) {

  $key_length = $key_length * 2;

  }

  return hash_pbkdf2($algorithm, $password, $salt, $count, $key_length, $raw_output);

  }

  $hash_length = strlen(hash($algorithm, "", true));

  $block_count = ceil($key_length / $hash_length);

  $output = "";

  for($i = 1; $i <= $block_count; $i++) {

  // $i encoded as 4 bytes, big endian.

  $last = $salt . pack("N", $i);

  // first iteration

  $last = $xorsum = hash_hmac($algorithm, $last, $password, true);

  // perform the other $count - 1 iterations

  for ($j = 1; $j < $count; $j++) {

  $xorsum ^= ($last = hash_hmac($algorithm, $last, $password, true));

  }

  $output .= $xorsum;

  }

  if($raw_output)

  return substr($output, 0, $key_length);

  else

  return bin2hex(substr($output, 0, $key_length));

  }

  >

------分隔线----------------------------

推荐内容