导入 IOS自带的密码库就能够了。算法
#import <CommonCrypto/CommonDigest.h>
//SHA1加密 -(NSString *)Sha:(NSString *)string{ const char *cstr = [string UTF8String]; NSData *data = [NSData dataWithBytes:cstr length:string.length]; uint8_t digest[CC_SHA1_DIGEST_LENGTH]; CC_SHA1(data.bytes, (CC_LONG)data.length, digest); NSMutableString *output = [NSMutableString stringWithCapacity:CC_SHA1_DIGEST_LENGTH *2]; for (int i = 0; i<CC_SHA1_DIGEST_LENGTH; i++) { [output appendFormat:@"%02x",digest[i]]; } return output; }
+(NSString *)ShainitWhit:(NSString *)string{ Helper* shaHelper = [[Helper alloc]init]; return [shaHelper Sha:string]; }
//MD5加密 -(NSString *)MD:(NSString *)string{ const char *cstr = [string UTF8String]; NSData *data = [NSData dataWithBytes:cstr length:string.length]; unsigned char digest[CC_MD5_DIGEST_LENGTH]; CC_MD5(data.bytes, (CC_LONG)data.length, digest); NSMutableString *output = [NSMutableString stringWithCapacity:CC_MD5_DIGEST_LENGTH *2]; for (int i = 0; i<CC_MD5_DIGEST_LENGTH; i++) { [output appendFormat:@"%02x",digest[i]]; } return output; }
+(NSString *)MDinitWhit:(NSString *)string{ Helper *mdHelper = [Helper new]; return [mdHelper MD:string]; }
MD5,SHA-1,SHA-224,SHA-256,SHA-384,SHA-512,以及它们对应的HMAC算法,都属于散列算法,又叫摘要算法,单 向运算,不可逆,因此无法解密。可是能够经过暴力方式破解(按顺序产生字符串一个个试),固然会花很是长的时间,并且这个试出来的结果也不必定是原结果, 由于的确存在多个源数据能计算出相同散列结果的状况。app