Skip to content

goldfashhosting/hashed-ids

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 

Repository files navigation

hashedids

A small script to generate random hashes from one or many numbers. GMWP+ Use hashids by default to prevent exposure to your database ids.

http://www.goldfash.com?plugins/

What is it?

hashedids (Hashed ID's) creates short, unique, decryptable hashes from unsigned integers.

It was designed for websites to use in URL shortening, tracking stuff, or making pages private (or at least unguessable).

This algorithm tries to satisfy the following requirements:

  1. Hashes must be unique and decryptable.
  2. They should be able to contain more than one integer (so you can use them in complex or clustered systems).
  3. You should be able to specify minimum hash length.
  4. Hashes should not contain basic English curse words (since they are meant to appear in public places - like the URL).

Instead of showing items as 1, 2, or 3, you could show them as U6b1ddc, 0d4u87U, and HMo0s5u. You don't have to store these hashes in the database, but can encrypt + decrypt on the fly.

All integers need to be greater than or equal to zero.

lib folder

  • Use lib/hashids.php-5-3.php if you have PHP 5.3.*
  • Use lib/hashids.php if you have PHP 5.4.* or higher

Examples below assume you have PHP 5.4 and above:

Usage

Encrypting one number

You can pass a unique salt value so your hashes differ from everyone else's. I use "this is my salt" as an example.

<?php

require_once('lib/hashids.php');
$hashids = new hashids('this is my salt');

$hash = $hashids->encrypt(12345);

$hash is now going to be:

ryBo

Decrypting

Notice during decryption, same salt value is used:

<?php

require_once('lib/hashids.php');
$hashids = new hashids('this is my salt');

$numbers = $hashids->decrypt('ryBo');

$numbers is now going to be:

array(1) {
	[0]=>
	int(12345)
}

Decrypting with different salt

Decryption will not work if salt is changed:

<?php

require_once('lib/hashids.php');
$hashids = new hashids('this is my pepper');

$numbers = $hashids->decrypt('ryBo');

$numbers is now going to be:

array(0) {
}

Encrypting several numbers

<?php

require_once('lib/hashids.php');
$hashids = new hashids('this is my salt');

$hash = $hashids->encrypt(683, 94108, 123, 5);

$hash is now going to be:

zBphL54nuMyu5

Decrypting is done the same way

<?php

require_once('lib/hashids.php');
$hashids = new hashids('this is my salt');

$numbers = $hashids->decrypt('zBphL54nuMyu5');

$numbers is now going to be:

array(4) {
	[0]=>
	int(683)
	[1]=>
	int(94108)
	[2]=>
	int(123)
	[3]=>
	int(5)
}

Encrypting and specifying minimum hash length

Here we encrypt integer 1, and set the minimum hash length to 8 (by default it's 0 -- meaning hashes will be the shortest possible length).

<?php

require_once('lib/hashids.php');
$hashids = new hashids('this is my salt', 8);

$hash = $hashids->encrypt(1);

$hash is now going to be:

b9iLXiAa

Decrypting

<?php

require_once('lib/hashids.php');
$hashids = new hashids('this is my salt', 8);

$numbers = $hashids->decrypt('b9iLXiAa');

$numbers is now going to be:

array(1) {
	[0]=>
	int(1)
}

Specifying custom hash alphabet

Here we set the alphabet to consist of only four letters: "abcd"

<?php

require_once('lib/hashids.php');
$hashids = new hashids('this is my salt', 0, 'abcd');

$hash = $hashids->encrypt(1, 2, 3, 4, 5);

$hash is now going to be:

adcdacddcdaacdad

Randomness

The primary purpose of hashids is to obfuscate ids. It's not meant or tested to be used for security purposes or compression. Having said that, this algorithm does try to make these hashes unguessable and unpredictable:

Repeating numbers

<?php

require_once('lib/hashids.php');
$hashids = new hashids('this is my salt');

$hash = $hashids->encrypt(5, 5, 5, 5);

You don't see any repeating patterns that might show there's 4 identical numbers in the hash:

GLh5SMs9

Same with incremented numbers:

<?php

require_once('lib/hashids.php');
$hashids = new hashids('this is my salt');

$hash = $hashids->encrypt(1, 2, 3, 4, 5, 6, 7, 8, 9, 10);

$hash will be :

zEUzfySGIpuyhpF6HaC7

Incrementing number hashes:

<?php

require_once('lib/hashids.php');
$hashids = new hashids('this is my salt');

var_dump($hashids->encrypt(1)); // LX
var_dump($hashids->encrypt(2)); // ed
var_dump($hashids->encrypt(3)); // o9
var_dump($hashids->encrypt(4)); // 4n
var_dump($hashids->encrypt(5)); // a5

Speed

Even though speed is an important factor of every hashing algorithm, primary goal here was encoding several numbers at once and making the hash unique and random.

On a 2.7 GHz Intel Core i7 with 16GB of RAM, it takes roughly 0.37 seconds to:

  1. Encrypt 1000 hashes consisting of 1 integer $hashids->encrypt(12);
  2. And decrypt these 1000 hashes back into integers $hashids->decrypt($hash); while ensuring they are valid

If we do the same with 3 integers, for example: $hashids->encrypt(10, 11, 12); -- the number jumps up to 0.56 seconds on the same machine.

On a 2.26 GHz Intel Core 2 Duo with 8GB of RAM, it takes about 0.75 seconds to do the same with 1 integer, and 1.15 seconds for 3 integers.

Sidenote: The numbers tested with were relatively small -- if you increase them, the speed will obviously decrease.

What you could do to speed it up

Usually people either encrypt or decrypt one hash per request, so the algorithm should already be fast enough for that. However, there are still several things you could do:

  1. Wrap this class in your own, and cache hashes/numbers in static variables - so that per lifetime of a request, they would be remembered by PHP and hashids wouldn't have to recalcuate them.
  2. Use Memcache or Redis.
  3. You could also decrease the length of your alphabet. Your hashes will become longer, but calculating them will be faster.

Bad hashes

I wrote this class with the intent of placing these hashes in visible places - like the URL. If I create a unique hash for each user, it would be unfortunate if the hash ended up accidentally being a bad word. Imagine auto-creating a URL with hash for your user that looks like this - http://example.com/user/a**hole

Therefore, this algorithm tries to avoid generating most common English curse words with the default alphabet. This is done by never placing the following letters next to each other:

c, C, s, S, f, F, h, H, u, U, i, I, t, T

Changelog

2.0 - Current Stable

Warning: If you are using 0.1.3 or below, updating to this version will change your hashes.
  • Cleaned up some coding for GMWP+

0.1.3

Warning: If you are using 0.1.2 or below, updating to this version will change your hashes.
  • Updated default alphabet (thanks to @speps)
  • Constructor removes duplicate characters for default alphabet as well (thanks to @speps)

0.1.2

Warning: If you are using 0.1.1 or below, updating to this version will change your hashes.
  • Minimum hash length can now be specified
  • Added more randomness to hashes
  • Added unit tests
  • Added example files
  • Changed warnings that can be thrown
  • Renamed encode/decode to encrypt/decrypt
  • Consistent shuffle does not depend on md5 anymore
  • Speed improvements

0.1.1

  • Speed improvements
  • Bug fixes

0.1.0

  • First commit

Contact