Tag:ciphertext

  • Jingdong real combat: how can data desensitization avoid system reconfiguration or modification?

    Time:2021-2-15

    Introduction to the author Pan Juan, senior DBA of Jingdong digital science, is mainly responsible for the development of database middleware, database operation and maintenance automation platform, and production database operation and maintenance. Participated in the escort work of Jingdong’s 6.18 and 11.11 promotion activities for many times. He was responsible for the design and […]

  • Another artifact! Universal website password blasting tool

    Time:2021-2-4

    Author: whw1sfbOriginal text:__https://www.freebuf.com/secto…Disclaimer: the tools and test methods mentioned in this article are only for research and learning, please abide by the “network security law” and other relevant laws and regulations. There is a key test item in Web penetration testing: password explosion. At present, more and more website systems add various encryption algorithms to […]

  • use Volo.Abp.MailKit Send mail

    Time:2021-1-12

    Volo.Abp.MailKit Encapsulates and inherits mailkit library, which provides a quick implementation for ABP mail sending. Mailbox configuration QQ mailbox supports the function of SMTP, you need to apply to open. Referring to QQ mailbox settings, the most important thing is to send email by SMTP. The password corresponding to QQ mailbox is not the user’s […]

  • Apache shardingsphere data desensitization solution (2)

    Time:2021-1-6

    Introduction to the author Pan Juan, senior DBA of Jingdong digital science, is mainly responsible for the development of database middleware, database operation and maintenance automation platform, and production database operation and maintenance. Participated in the escort work of Jingdong’s 6.18 and 11.11 promotion activities for many times. He was responsible for the design and […]

  • PHP encryption and decryption, refer to discuz

    Time:2021-1-3

    <?php /** *Encryption key */ define(“ENCRYPT_KEY”, “sqltest1179631111”); //Encryption $password = “123456”; $enCryPass = demoEncode($password); var_dump($enCryPass); //Decryption $deCryPass = demoDecode($enCryPass); var_dump($deCryPass); /** *Encryption *@ param $password string password before encryption * @return false|string */ function demoEncode($password) { return authCode($password, “ENCODE”, ENCRYPT_KEY); } /** *Encryption *@ param $encrypass string password to decrypt * @return false|string */ function […]

  • Federated computing: how to accomplish collaborative modeling without exposing real data?

    Time:2020-10-7

    Introduction | in the financial scenario, banks and other institutions have a strong desire to cooperate with other data owners in modeling, but for commercial and compliance considerations, they are reluctant to share core data, leading to the delay in promoting large-scale data sharing in the industry. This article will start from the plot of […]

  • The security model of AEC encryption and decryption

    Time:2020-9-23

    (1) The principle of CBC mode In this mode, the plaintext is first divided into several segments, and then each segment is XOR with the initial block (IV vector) or the ciphertext segment of the previous segment, and then encrypted with the key. Before encrypting the first data block, we need to do XOR operation […]

  • Node application of AES encryption algorithm

    Time:2020-9-6

    AES It belongs to symmetric encryption algorithm Three elements: Secret key fill pattern Secret key Symmetric encryption is symmetric because it uses the same secret key to encrypt and decrypt plaintext AES supports secret keys of three lengths: 128 bit 128 has the best performance 192 bits 256 bit 256 has the highest security and […]

  • Stunned! You can easily solve sensitive information encryption and decryption without changing a line of Java code

    Time:2020-6-19

    preface For the sake of security, we need to encrypt and store the sensitive information in the database, but normal business interaction still needs to use plaintext data, so we need to decrypt the query return to the caller. PS: in our daily development, we need to have a certain sense of security and protect […]

  • Password security

    Time:2020-6-9

    Password security The role of the code – prove it’s youPassword storageTransmission of passwordsPassword alternativesThe problem of biometric cipher Password – disclosure channel Database stolen Server intruded Communication bugged Internal personnel leak database Other websites (collision Library) Password – store No clear text storage (leak proof) One way change (leak proof) Transformation complexity requirements (anti […]

  • Password through user.myd MySQL

    Time:2020-3-15

      Specific acquisition methods:   1) Open user.myd file through hex tool Here: 0xed   2) Copy the MySQL password for analysis *Ceaf6e9fa3a448a25ac9d00c8d7078385 ා 33 bits The * sign on the front indicates 40 bit encryptionList all the ciphertext hash 6b54fbc ා seven digit hash:*CEAF6E9FA3A448A25AC9D00C8D70783856B54FBC   3) Cmd5 attempts to crack   Another method: Download […]

  • [Java library] how to use jasypt, an excellent encryption library, to protect your sensitive information?

    Time:2020-2-9

    1 Introduction Today we introduce a Java library-JasyptThe full name isJava Simplified EncryptionFor encryption and decryption. It allows developers to integrate encryption into projects with minimal effort, and does not require a deep understanding of encryption / decryption. adoptMavenRefer to the jar package as follows: <dependency> <groupId>org.jasypt</groupId> <artifactId>jasypt</artifactId> <version>1.9.3</version> <scope>compile</scope> </dependency> 2 simple text encryption […]