• C # common encryption algorithms: MD5, Base64, SHA1, sha256, hmacsha256, DES, AES, RSA


    RSA generates c# the public and private keys in XML format and the base64 bit public and private keys of Java. Reference article:C# Ras generates. Net public key and private key and converts. Net public key and private key to Java public key and private key classes catalogue brief introduction Class to reference 1、 MD5 […]

  • Encapsulation of wechat, Baidu, byte beating and other applet public class libraries


    Many small programs have been developed. Each time, they have to turn over the documents and find the previous project to copy it,It takes time and trouble. In order to facilitate the development of small programs, we simply build our own wheels,Integration of small programs (WeChat, QQ, Baidu, byte beating, Alipay) related development. !! Please […]

  • C language to achieve encryption and decryption function


    Encryption mainly processes the original content through an algorithm to make the original content invisible. The decryption process usually needs to know the encryption algorithm, and then reverse process the encrypted content to realize the decryption function. Of course, decryption also has some methods of violent cracking. Next, take C language as an example to […]

  • Secure data transmission between front and rear terminals – pre research on “1” technology


    lead It’s not the first time I’ve written about this topic. Recently, a friend asked me about “ensuring password transmission security in web applications” five years ago: “why can’t the back end solve it step by step as you say?” encryption and decryption is a thousand miles away. I think most of it is that […]

  • Go implements laravel’s encrypt () and decrypt () methods


    Recently, the project plans to migrate from laravel to go, but in order to minimize the impact, it can only migrate slowly part by part, so it will involve the problem of compatible laravel encryption and decryption. Now record the code here for future reference. Encryption mode AES-256-CBC Key format It supports both regular 32-bit […]

  • PHP RSA encryption and decryption


    <?php /** *App RSA encryption and decryption auxiliary function **/ function app_pri_encrypt($data){ $privateKey = openssl_pkey_get_private(file_get_contents(“app-private.key”)); $encrypted = null; openssl_private_encrypt($data,$encrypted,$privateKey); return base64_encode($encrypted); } function app_pri_decrypt($data){ $privateKey = openssl_pkey_get_private(file_get_contents(“app-private.key”)); $decrypted = null; openssl_private_decrypt(base64_decode($data),$decrypted,$privateKey); return $decrypted; } function app_pub_encrypt($data){ $publicKey = openssl_pkey_get_public(file_get_contents(“app-public.key”)); $encrypted = null; openssl_public_encrypt($data,$encrypted,$publicKey); return base64_encode($encrypted); } function app_pub_decrypt($data){ $publicKey = openssl_pkey_get_public(file_get_contents(“app-public.key”)); $decrypted = null; openssl_public_decrypt(base64_decode($data),$decrypted,$publicKey); […]

  • Grab and decrypt HTTPS traffic


    WireShark Wireshark decrypts TLS data stream in two ways: one is to directly decrypt the server private key, and the other is to use sslkeylogfile to obtain the session key information in the handshake process for decryption. Only the second way to decrypt TLS data is tried here. Available applications include: chrome, Firefox, curl. First, […]

  • Conversion between aes.js encryption and decryption and c#


    Introduction to AES AES, advanced encryption standard, is actually a set of standards: FIPS 197, and the AES algorithm we call is actually Rijndael algorithm. NIST (National Institute of standards and Technology) publicly solicited more efficient and secure alternative DES encryption algorithms on September 12, 1997. In the first round, 15 algorithms were selected, of […]

  • Laravel wechat applet obtains “user details” and “applet code with parameters” extension


    Function introduction This expansion package includes the functions of decrypting user details, generating and saving small program code with parameters in the local directory.The user details decryption official also provides multiple language versions of SDK (c + +, PHP, node, python), which is only encapsulated in this expansion package.Small program code generation with parameters, officially […]

  • Cryptography — symmetric encryption algorithm and go language application


    Symmetric encryption algorithm DES Data encryption standard (data encryption standard) is a symmetric password adopted in the federal information processing standard (FIPS) of the United States in 1977. Des has been widely used by governments and banks in the United States and other countries. However, with the progress of computers, des can now be brutally […]



    Basic concepts Symmetric encryption Both communication parties use the same key for encryption and decryption.Example: AES. Asymmetric encryption The server uses the private key to encrypt and the client uses the public key to decrypt.The data encrypted by the public key can only be decrypted by the private key, and the data encrypted by the […]

  • How to implement data protection API in ASP. Net core


    In the ASP. Net core data protection stack, a very simple method is provided to encrypt the API to protect the security of datadata encryption anddata decryption In this article, let’s take a look at how to use the data protection API. Understand encryption and hashing In the security field, encryption and hash are two […]