Tag:ciphertext

  • Cryptosystem

    Time:2021-6-3

    Generally, a cryptosystem can have the following parts: Message space m (also known as plaintext space): the set of all possible plaintext M; Ciphertext space C: the set of all possible ciphertext C; Key space K: the set of all possible key K, in which each key K is composed of encryption key K and […]

  • The concept of cryptosystem

    Time:2021-6-2

    A series of articles: The main tasks of cryptography The concept of cryptosystem Plaintext: the original message.Ciphertext: transformed message.Encryption: the process of transforming the original information (plaintext) into ciphertext.Decrypt: the process of restoring encrypted information (ciphertext) to original plaintext, also known as decryption.Cryptographic algorithm: cipher, usually refers to the information transformation rules used in the […]

  • The attack of cryptosystem

    Time:2021-5-30

    The methods of cryptanalyzers to decipher or attack passwords are mainly qiongju attack, statistical analysis and mathematical analysis. exhaustive attack Exhaustive attack is also called brute force attack. This attack is to traverse all possible keys to the intercepted ciphertext until an understandable transformation from ciphertext to plaintext is obtained; Or encrypt all possible plaintexts […]

  • Permutation cipher

    Time:2021-5-1

    Permutation cipher is also called transposition cipher. This kind of cipher changes the relative position of the elements of the plaintext message, but the value or content form of the plaintext message element itself remains unchanged; In the previous alternative cipher, it can be considered that the order of plaintext symbols is maintained, but they […]

  • Block cipher and mode

    Time:2021-3-27

    What is block cipher and mode We have talked about DES and AES algorithm, they can only encrypt a fixed length of plaintext each time, such a cryptographic algorithm is called block cipher. If we need to encrypt longer plaintext, we need to iterate the block cipher. The iterative method of block cipher is called […]

  • Hybrid cryptosystem

    Time:2021-3-17

    In the previous article, we talked about two encryption methods, one is symmetric encryption, the other is asymmetric encryption. Symmetric encryption can solve the problem of communication confidentiality, but can not solve the problem of key distribution. Asymmetric encryption algorithm can solve the problem of key distribution, but its encryption speed is relatively slow, and […]

  • Jingdong real combat: how can data desensitization avoid system reconfiguration or modification?

    Time:2021-2-15

    Introduction to the author Pan Juan, senior DBA of Jingdong digital science, is mainly responsible for the development of database middleware, database operation and maintenance automation platform, and production database operation and maintenance. Participated in the escort work of Jingdong’s 6.18 and 11.11 promotion activities for many times. He was responsible for the design and […]

  • Another artifact! Universal website password blasting tool

    Time:2021-2-4

    Author: whw1sfbOriginal text:__https://www.freebuf.com/secto…Disclaimer: the tools and test methods mentioned in this article are only for research and learning, please abide by the “network security law” and other relevant laws and regulations. There is a key test item in Web penetration testing: password explosion. At present, more and more website systems add various encryption algorithms to […]

  • use Volo.Abp.MailKit Send mail

    Time:2021-1-12

    Volo.Abp.MailKit Encapsulates and inherits mailkit library, which provides a quick implementation for ABP mail sending. Mailbox configuration QQ mailbox supports the function of SMTP, you need to apply to open. Referring to QQ mailbox settings, the most important thing is to send email by SMTP. The password corresponding to QQ mailbox is not the user’s […]

  • Apache shardingsphere data desensitization solution (2)

    Time:2021-1-6

    Introduction to the author Pan Juan, senior DBA of Jingdong digital science, is mainly responsible for the development of database middleware, database operation and maintenance automation platform, and production database operation and maintenance. Participated in the escort work of Jingdong’s 6.18 and 11.11 promotion activities for many times. He was responsible for the design and […]

  • PHP encryption and decryption, refer to discuz

    Time:2021-1-3

    <?php /** *Encryption key */ define(“ENCRYPT_KEY”, “sqltest1179631111”); //Encryption $password = “123456”; $enCryPass = demoEncode($password); var_dump($enCryPass); //Decryption $deCryPass = demoDecode($enCryPass); var_dump($deCryPass); /** *Encryption *@ param $password string password before encryption * @return false|string */ function demoEncode($password) { return authCode($password, “ENCODE”, ENCRYPT_KEY); } /** *Encryption *@ param $encrypass string password to decrypt * @return false|string */ function […]

  • Federated computing: how to accomplish collaborative modeling without exposing real data?

    Time:2020-10-7

    Introduction | in the financial scenario, banks and other institutions have a strong desire to cooperate with other data owners in modeling, but for commercial and compliance considerations, they are reluctant to share core data, leading to the delay in promoting large-scale data sharing in the industry. This article will start from the plot of […]