Tag:encryption algorithm

  • Detailed explanation of encryption and decryption in PHP


    In order to ensure the security of network data transmission, it is better to encrypt the data in advance, and then transmit it on the network. At the same time, it is also necessary to ensure that the data can be decrypted at the other end, and it must be decrypted by the key (public […]

  • Analysis of HTTPS


    HTTPS related brief introduction HTTP is encrypted by SSL to generate HTTPS, which makes the network communication more secure Three encryption methods are used in HTTPS, namely symmetric encryption AES, asymmetric encryption RSA and hash algorithm (irreversible), AES transmission (efficiency consideration), RSA communication AES and HTTP (efficiency verification) There are three main problems solved by […]

  • Another artifact! Universal website password blasting tool


    Author: whw1sfbOriginal text:__https://www.freebuf.com/secto…Disclaimer: the tools and test methods mentioned in this article are only for research and learning, please abide by the “network security law” and other relevant laws and regulations. There is a key test item in Web penetration testing: password explosion. At present, more and more website systems add various encryption algorithms to […]

  • Tiktok, bullet screen comments and live broadcast encryption algorithm


    First, here is an article about Android reverse engineering tiktok. libuserinfo.so Due to various encryption entry restrictions, Android programs can call the so file to directly encrypt and verify. The effect is that there is no need to crack the encryption algorithm in real sense. Here tiktok is the direct algorithm for the encryption algorithm […]

  • A thorough understanding of the transfer process of HTTPS


    1、 The difference between HTTP and HTTPS Http: is a client-side and server-side request and response standard (TCP). It is used to transfer hypertext from WWW server to local browser. It can make browser more efficient and reduce network transmission. HTTPS: it is an HTTP channel with security as the goal. In short, it is […]

  • How to realize DES encryption algorithm code example through PHP


    How to realize DES encryption algorithm code example through PHP Note: php7 or above is not supported, because php7 removes some functions, and the {} of the variable should be changed to [] <?php class Des { /** *Encryption method * *@ param string $STR content to be encrypted *@ param string $key key *@ […]

  • Jsonwebtoken Chinese document


    jsonwebtoken usage jwt.sign(payload, secretOrPrivateKey, [options, callback]) (asynchronous) if a callback is provided, the callback is called using err or JWT. (synchronous) returns the jsonwebtoken as a string. Payload must be an object, buffer or string. Note that exp can only be set if payload is an object literal.Secretorprivatekey is a string or buffer containing the […]

  • How to use PHP JWT in Web


    Explain JWT JWT is a string, which is encrypted and verified by three parts. Token based authentication can replace the traditional cookie + session authentication method. The three parts are as follows: header.payload.signature Header part The header format is: { “typ”:”JWT”, “alg”:”HS256″ } This is a JSON string. Both fields are required,algField specifies the buildsignatureThe […]

  • Information security topic arrangement (1)


    1. In recent years, hackers’ network attack behavior mode has changed greatly, and it is becoming more and more intense. What is the basic reason? ( )  A: hackers are keen to create a sensation B: hackers are driven by interests C: more and more system security defects D: hacker technology advances by leaps […]

  • JWT help class (related methods)


    Note: install the JWT package first   using System;using System.Collections.Generic;using System.Linq;using System.Web; using JWT;using JWT.Algorithms ; / / encryption algorithmusing JWT.Builder;using JWT.Exceptions;using JWT.Serializers; namespace WebApplication1.Models{   public class JWTHelper   {Private string key {get; set;} = bfdhargrtjuykreawtuyjtretryjgafasdgrth “; / / this keyPrivate ijwtalgorithm algorithm algorithm {get; set;} / / this is hmacsha256 encryption algorithmPrivate ijsonserializer serializer {get; […]

  • Knowledge points of node full stack development


    1. Time formatting moment.jsLink: http://momentjs.cn/ 2. Cache mechanism LRU cacheLink: https://www.npmjs.com/package… 3. Encryption algorithm cryptoLink: https://www.liaoxuefeng.com/w… 4. Using the tool library lodashLink: https://www.lodashjs.com/ 5. Log processing log4jsLink: https://www.cnblogs.com/Joans… 6. Automatic building tool gulpLink: https://www.gulpjs.com.cn/ 7. Server user state storage express sessionLink: https://www.cnblogs.com/loade… 8. Save the session to Mongo connect MongoLink: https://blog.csdn.net/u011144… 9. Express: a common […]

  • Play with hybrid encryption


    Data encryption is a technology with a long history, which means that plaintext is transformed into ciphertext through encryption algorithm and encryption key, while decryption is to recover ciphertext into plaintext through decryption algorithm and decryption key. Its core is cryptography. Data encryption is still the most reliable way for computer system to protect information. […]