返回列表 发帖

[原创文章] 关于国内某知名大学网站加密算法的研究

原创作者:柔肠寸断 [3.A.S.T]  http://www.3ast.com.cm0 S+ J7 E% N% z8 L/ Z! f  P
原始出处:http://www.3ast.com.cm
- ^: W; f  B% U2 z; V1 @" s8 B( g) w: S
看不懂的直接绕过# ?* l  o1 x) b  j0 y0 a9 V
加密前为:hwy123456
8 L9 N, A7 z6 x  O3 p- a; I加密后为0F9C1C7A2EE76EBB5C1F4D7526CC4F883F4E
$ J3 l( z) c' a, P/ W! @: D% I$ n8 r! l
============================================: t  X" k, K1 ~
上面是当时自己校内的心情。现在已经解破出来了,分享给大家
8 V/ k: y. a4 b6 J5 d0 @9 L也就不隐瞒大家什么了,这个是国内某知名大学的后台加密算法5 E8 x2 O8 p; D& A
以下是RSA算法文件% w; w: b% _5 O  Y0 R
" ?* ^# M! C  L) ^/ c) Q; m% N
文件名RSA.ASP
) Q; M7 N8 {/ [===============================================
2 S7 u! K; g3 x7 S<% 3 ]8 F/ y* \) A: R. {' v3 ?
Class clsRSA 2 L8 V- \! ~5 |7 b
Public PrivateKey 3 l! ]- L. q6 q' \: X0 e! s# |
Public PublicKey
$ D& Z1 T6 H; t# J. S" wPublic Modulus
6 K% Y' x" p% S; k; e* y1 _$ ^Public Function Crypt(pLngMessage, pLngKey) " l1 ^8 u  C( L' F
On Error Resume Next
0 }5 P! e. j. o4 O6 E1 yDim lLngMod
2 H8 c8 v$ P8 JDim lLngResult 0 d2 E  F9 N( X# e+ }% s
Dim lLngIndex 0 x  T; K% f7 U7 q
If pLngKey Mod 2 = 0 Then ! P( s' H- o5 j2 E
lLngResult = 1 0 [, M4 z8 \! g# w$ \: T
For lLngIndex = 1 To pLngKey / 2 9 `& ]' d, K( R/ y+ X7 q2 }
lLngMod = (pLngMessage ^ 2) Mod Modulus
9 ?4 B, s) \+ }- q4 h$ w: o' Mod may error on key generation
0 O" N8 s, Z! v9 ~lLngResult = (lLngMod * lLngResult) Mod Modulus
+ \3 g) U. z2 Y+ Z- ~1 H9 e; mIf Err Then Exit Function
3 k# e8 R2 o5 G9 F% h. MNext
  E) L  t. h  u- O$ |* q9 {Else 5 }! X3 V5 F* r
lLngResult = pLngMessage
1 v5 @' B) u/ `3 U8 K5 nFor lLngIndex = 1 To pLngKey / 2 - c: ]2 r; d9 x
lLngMod = (pLngMessage ^ 2) Mod Modulus 3 `$ E; b9 e: `! m1 o$ x0 r
On Error Resume Next
7 D' r- h1 U1 f. r' l6 N# \6 [* ^+ w' Mod may error on key generation 2 u6 I+ t5 n5 N& ]5 X
lLngResult = (lLngMod * lLngResult) Mod Modulus
3 V3 b& `! L0 B8 K, jIf Err Then Exit Function
/ _( W, p' \" p6 V0 |Next   L" n  o; z$ H8 O- p
End If ) {* e8 J1 ^" Y  p0 ~5 ^  H% a( j
Crypt = lLngResult
. F$ _% s4 M5 mEnd Function/ @7 r, c! u3 c' O  O9 e

! y4 F# G/ w- X  |3 }! u, W( ?Public Function Encode(ByVal pStrMessage) * I- J& t% {. z: D: X/ u' V) G
Dim lLngIndex 0 Q! C& h! {  Q8 v
Dim lLngMaxIndex
8 p  C$ H& ?; PDim lBytAscii
- w8 g5 Q, V6 yDim lLngEncrypted
1 L6 [' a- z( llLngMaxIndex = Len(pStrMessage)
; A8 {9 q5 w6 e5 U5 [6 Q2 i0 bIf lLngMaxIndex = 0 Then Exit Function 8 V6 M. k% [# G/ @
For lLngIndex = 1 To lLngMaxIndex
0 `  W' ?$ J  O+ }lBytAscii = Asc(Mid(pStrMessage, lLngIndex, 1))
0 u  Y" L$ X7 x) WlLngEncrypted = Crypt(lBytAscii, PublicKey)
2 u* X$ `. `* m  c+ B% g, e7 HEncode = Encode & NumberToHex(lLngEncrypted, 4) - p- q: h! R- u
Next . g; ]& W# h6 o) e& ^' z8 j/ k
End Function
+ ~* B  T$ a+ q8 U9 OPublic Function Decode(ByVal pStrMessage)
* O9 ^. @& q. kDim lBytAscii
4 }6 K" B$ `( w. ADim lLngIndex
4 a7 ^9 I2 L( Y0 ^# C( V0 }$ A: kDim lLngMaxIndex # B) }: t0 u3 [% O. D. ^
Dim lLngEncryptedData
: B" R$ G' N9 W3 K9 \: PDecode = "" ; |" K0 D9 Q% c$ w
lLngMaxIndex = Len(pStrMessage) 5 w  E7 ?' J# H7 H
For lLngIndex = 1 To lLngMaxIndex Step 4
- _% J; v% M* P9 C/ s6 dlLngEncryptedData = HexToNumber(Mid(pStrMessage, lLngIndex, 4)) - i6 J9 \5 N" H" f  |& T1 V
lBytAscii = Crypt(lLngEncryptedData, PrivateKey)
1 I4 B0 n0 j- a6 ^9 lDecode = Decode & Chr(lBytAscii)
; M! i/ q, d6 ]1 M0 }Next ( ?0 y8 P) Y  }- z7 \* H
End Function
+ T+ @1 _6 P$ M. i8 iPrivate Function NumberToHex(ByRef pLngNumber, ByRef pLngLength) ; Y. x* X* a/ z" \: s
NumberToHex = Right(String(pLngLength, "0") & Hex(pLngNumber), pLngLength) 5 W. \. T# V* I1 @9 s8 s
End Function , \+ V) d2 Q5 j0 y" v$ O6 S
Private Function HexToNumber(ByRef pStrHex)
% J/ _4 i. i0 Q$ O% n: eHexToNumber = CLng("&h" & pStrHex)
5 I1 n" L' R* L% `3 Z5 T4 lEnd Function : A) H) b9 b% \) t6 J3 J5 ?
End Class
# R; c% u0 C! S- N/ x* z7 C& zfunction Encryptstr(Message) 9 q6 }, }5 ]# ^$ @  Q5 G
Dim LngKeyE - h+ E' ]; P9 @  x% f* R7 u* \; a0 Z
Dim LngKeyD 0 K  q) f8 J! g% [; G! i3 Z4 L
Dim LngKeyN
5 Z& s1 Z7 W9 ^3 @Dim StrMessage
6 l0 L* ^% e4 B5 v# N' TDim ObjRSA
3 a8 o- W) ~8 p: R1 ~3 \. I3 m2 P! sLngKeyE = "32823" 4 n/ ^! p8 S" \6 O
LngKeyD = "20643"
2 T, [4 E" N& z) A! [8 aLngKeyN = "29893"
$ e4 n0 y& s: zStrMessage = Message " u0 @# }  S" Y; e. q
Set ObjRSA = New clsRSA " {' y7 P9 j4 j. `1 W/ ?1 b
ObjRSA.PublicKey = LngKeyE & H- a8 x3 X2 M6 B$ x( S
ObjRSA.Modulus = LngKeyN
! A- r, v& s/ W2 \Encryptstr = ObjRSA.Encode(StrMessage) ) a8 N/ U8 S7 ^: T$ _- C0 H
Set ObjRSA = Nothing / l- _7 R) K' M. z" S3 v  n
end function0 z1 E& P6 I# u! F' R5 h2 Z1 V* V' T
Function Decryptstr(Message)
( j, m  U& Q. e5 i0 zDim LngKeyE
3 V# [- i  T. u! vDim LngKeyD , @& O5 Q! A, H" h
Dim LngKeyN ; m2 ?/ d) c. N' x4 k8 f5 V3 {
Dim StrMessage
2 x6 n8 n  n3 M4 s+ PDim ObjRSA
2 F# f2 H1 M3 M  M9 ~. g! G1 |LngKeyE = "32823"
5 D1 U- [) m. ~- z1 jLngKeyD = "20643" % u; O1 `6 [7 M
LngKeyN = "29893"
( s' R# u$ K2 q$ E2 ZStrMessage = Message ' ?5 Y& v$ l( j4 M% M9 \  k/ u( f
Set ObjRSA = New clsRSA
* M0 _4 z: G# [+ F9 EObjRSA.PrivateKey =LngKeyD 3 l9 B1 `) x+ w4 {9 n
ObjRSA.Modulus=LngKeyN
; z8 d$ W, V. y- Ldecryptstr=ObjRSA.Decode(StrMessage) # I% T6 k, \9 |2 @. N# x/ n$ O
Set ObjRSA = Nothing : _* q& P4 D3 x9 i
end function 8 V/ d; l( c% R/ Z
%>
2 k1 K! z& B4 r, b===============================================
4 [" ~2 Y+ K0 N) j$ l' I$ w' U8 g+ z
还有一个用于测试这段代码的test.asp* S- `6 d; w. _) P8 ^! i
有兴趣的自己搭建个IIS测试下+ _. H! W+ ^7 r% j( z3 d: N7 c1 s
<!--#INCLUDE FILE="RSA.asp"-->
5 Q. }, P! }( g5 X<%
1 h3 s/ F6 }! i, Zfunction Encryptstr(Message) 3 Q2 R) G- [& e. C5 I2 h9 h9 B1 N
Dim LngKeyE
6 N) C' ?) A" C9 vDim LngKeyD 5 ~8 E0 H0 Y+ q0 ^3 r5 n
Dim LngKeyN
! `0 ~! m* @7 F3 F+ M/ e" r% N1 eDim StrMessage 6 Q, {2 A' H3 r* q
Dim ObjRSA ( \- h: ]3 b- W& S
LngKeyE = "32823" * Y0 x! X2 \/ R! \" x" V" h, B* t4 ?
LngKeyD = "20643" 6 ?: D; |0 P# o% j  ^, u
LngKeyN = "29893"
' d/ d) J& B; J0 D; q$ s5 k: f0 lStrMessage = Message
1 L* j# A5 W+ O  n8 W1 {7 ]Set ObjRSA = New clsRSA . k3 P" e) q" Z4 }& x) N' w
ObjRSA.PublicKey = LngKeyE
: V. D! L  r* o, ~ObjRSA.Modulus = LngKeyN
4 h( M7 O1 u# OEncryptstr = ObjRSA.Encode(StrMessage) % f$ X8 }" Y) ~, J; _0 |, D( h
Set ObjRSA = Nothing
3 d8 o: u+ w3 N# R( a$ w  uend function
* I! L) `( B: g/ Bfunction decryptstr(Message)
( `2 e$ E4 a& T& ?& r. wDim LngKeyE 9 F/ p6 x" J) i5 ^- ]# W
Dim LngKeyD
5 y# H; |1 j( z7 C( Z  E5 h: WDim LngKeyN
& u+ G1 u; J, T9 kDim StrMessage " s" @2 H2 U2 C9 \$ b1 z, a
Dim ObjRSA
" U  c8 k+ v, k- `" x& wLngKeyE = "32823"
/ V" q; J) {7 Q* O5 HLngKeyD = "20643" ! C) E1 z$ j2 O4 I
LngKeyN = "29893" 3 O5 X  g+ z: I' T: B
StrMessage = Message $ i0 o! p, s$ \: ?
Set ObjRSA = New clsRSA # l  @% H0 l. k5 T& p7 m
ObjRSA.PrivateKey =LngKeyD - |" [4 r& r6 B0 T1 q
ObjRSA.Modulus=LngKeyN - @- p; A  Q. h6 w& F' A. Q
decryptstr=ObjRSA.Decode(StrMessage)
( _( n4 d5 f8 c7 T/ RSet ObjRSA = Nothing
2 Z% A4 m1 m0 c, |end function 0 m2 Y5 e& Q8 u4 k
dim last,first & [& h( z! T. W" G# m
first="!@#$%^&*()" 7 o6 C$ k7 C4 }# B- F
Response.Write "加密前为:"&first
6 u3 R% D3 r+ O6 Tlast=Encryptstr(first)
* G. U5 x5 o1 t9 h4 N8 q5 A0 A0 rResponse.Write "加密后为"&last
2 I0 R9 ?3 `2 ^+ P8 VResponse.Write "解密后为" &decryptstr(last) 6 V. z" ?. t$ n# `2 O: p% B( u
%> ==============================================/ l) \8 P* r' k: c# H- J
剩下的就是字符的对照表了# V: L7 D7 r8 M7 _) M
===================字符集================/ |+ E; A( E3 C0 L5 h6 Y# H
1_____6EBB  o- U; w% N( G5 V& }5 `( D
2_____5C1F: j0 R2 J$ d) V8 |
3_____4D75% S# }" L& x, O1 L  a) e- g
4_____26CC" V) z9 N3 x; J+ {  ]7 e: k% g
5_____4F88
" }7 R6 [9 u$ o& f# Z6 u6_____3F4E
4 Q9 q( }  v- ~2 V3 H( F, J7_____0A9D
' ~5 d- \  M0 T' U+ W" n! T8_____1A1C
9 s4 N5 u; {& _( d9_____6D201 m+ {2 q9 |- F) t; q. E
0_____10897 H2 ~5 r% U' }# E$ P4 w9 C& \! O
a_____0F3E4 M6 A+ \1 r4 h- O
b_____3159
9 u% y! h* F: V1 t( i! Sc_____3517
# J( Z0 R; y2 m" l0 Pd_____419C
% h) c( c7 e( e- x* k. [$ ue_____615C
+ @0 Y5 F+ f# ?+ v- hf_____556F
" q5 n: D. Q1 Vg_____2B7F' V* t) ^! p. m) ~
h_____0F9C
3 u1 H+ A  y; mi_____00FA
8 X- u6 H& `5 K' ]j_____5A50, a# D% n- B" U9 c
k_____2850
% e% Y3 r- \/ A; u3 Y( `l_____3E7B
6 K( D3 G7 {1 x. l/ Fm_____71C5. s" T" X1 Z+ r+ J# \
n_____1FC8. {, ?: @* Z( i0 P( p; c$ H. a& q
o_____74C18 ?! T/ a% F2 g6 A+ f$ P
p_____5FB8+ p; G9 @" E. ?. s/ V, B9 u3 J
q_____6085
5 a0 m( @1 M. Y. tr_____3AC4) F5 f, P, t& o. K8 x# }% C6 B
s_____2F50
$ }! Z% t2 Q$ w4 nt_____36F8
% a3 i% B( L3 P  @u_____70107 b, \& V0 J: Q% o0 ^9 y! z3 W
v_____0B42
( W& S! C2 k: r' Nw_____1C7A
7 K/ y7 z0 I( ^6 a4 j2 }' lx_____16F8
* h8 o( k9 ?' d4 Ly_____2EE7) u0 v: q$ f- x: j) y
z_____5CF30 S% Y4 O! G! {% a: ?% n8 h9 {
!_____6233
* S! _7 R# u9 U) X+ Y  k, U@_____3A45
% H: L6 Q3 F2 }+ {; M4 I; L  @#_____22918 L) w5 K) M8 [8 F6 }( z
$_____5D5C) v5 P& `8 ?9 P" @9 I/ p
%_____09B9, y; ~0 a  E3 ~$ ]3 n3 n
^_____43EA7 Z& H! N% |! c1 g) ~- n9 w
&_____62B9
" Z+ A/ s' q& I/ o*_____63019 u" I6 }$ ?5 L
(_____46596 H* E) Q4 a" [
)_____5C82
希望做站长本人的学生请点击
http://www.3ast.com/viewthread.php?tid=13841
QQ790653916只负责SEO以及收费教学等方面联系,他人勿扰

于智者同行,你会不同凡响;与高人为伍,你会登上巅峰

收藏了。。。。。。。。

TOP

返回列表