Tag:Encryption and decryption
-
Sqlserver encryption and decryption function (asymmetric key certificate encryption symmetric key) usage code
Encryptbyasymkey() — asymmetric keyEncryptbycert() — certificate encryptionEncryptbykey() — symmetric keyEncrypt passphrase() — passphrase encryption Copy codeThe codes are as follows: –Encryption function in sqlserver July 11, 2013Encryptbyasymkey() — asymmetric keyEncryptbycert() — certificate encryptionEncryptbykey() — symmetric keyEncrypt passphrase() — passphrase encryption —————————————————————————————–The asymmetric key contains the internal public key and private key at the database level, […]
-
The solution to the prompt “error: failed to run ` phpize ‘” in the installation of xxtea extension
Today, I changed the server for the website, but it didn’t work normally. After checking step by step, I found that the encryption and decryption function could not be used because the xxtea extension was not installed, so I installed the xxtea extension pecl install xxtea The result is a pile of warnings and an […]
-
RC4 encryption and decryption in Java and PHP
Introduction to RC4 encryption and decryption RC4 does not group the plaintext, but encrypts each byte in the plaintext in turn in the way of byte stream. When decrypting, it also decrypts each byte in the ciphertext in turn. The algorithm is simple and fast, and the key length is variable, ranging from 1 to […]
-
10 exhaustive penetration test 02
After many days, I finally finished the master’s class in October in one day. At present, the idea of exhaustive is to find one or two points for exhaustive, and then use tools to test constantly Although master Yue introduced several blasting test methods I didn’t know before And test ideas. The previous understanding of […]
-
Springboot + shardingsphere completely solves the problem of encryption and decryption of database fields in production environment
preface companies in the Internet industry must encrypt the sensitive fields of the database. There are many schemes. The most direct one is to write an encryption and decryption tool class and then process it manually in each business logic. This method is obviously unrealistic in slightly large-scale projects, which is not only heavy […]
-
SDK solution for client on demand video encryption and decryption
Many training institutions have their own websites or app client software, but can not realize the security of video encryption and anti-theft. In order to avoid immature development, long time and unskilled technology, a set of mature on-demand video encryption and decryption SDK tools is needed to connect with the existing platform. First, encrypt the […]
-
openssl_private_encrypt(): key param is not a valid
A local test data encryption and decryption error (public key and private key generated from other tools) openssl_private_encrypt(): key param is not a valid private keyCause investigation 1 As the Internet says, “begin public key – \ n” is added, and the private key segmentation is not easy to use.resolvent;1. Check your PHP version2. Whether […]
-
Add the first unit test for your Android
Add the first unit test for your Android Continued《From the kotlin double lock single case》, we add a unit test for this encryption and decryption singleton and continue to optimize our code. You can learn from this article: Addition of Android unit test Life cycle of unit test Mock object for unit test Use of […]
-
Several methods of MySQL encryption and decryption (summary)
Write in front A problem encountered before was how to encrypt MySQL information. In fact, there are two ideas of encryption. One is to store the encrypted data outside the database, and the other is to encrypt the data inside the database. The difference between the two is that the second one is more convenient […]
-
Daily soul question – understanding of buffer in node
Buffer Nodejs needs to deal with network protocols, operate databases, process pictures, receive and upload files, etc. in the operation of network streams and files, it needs to deal with a large amount of binary dataBuffer is used to store binary dataBuffer is equivalent to stringdifference:character stringIs read-only, and any modification of the string will […]
-
[Android] implementation of AES encryption algorithm
1 import android.text.TextUtils; 2 import android.util.Base64; 3 import android.util.Log; 4 5 import javax.crypto.Cipher; 6 import javax.crypto.spec.IvParameterSpec; 7 import javax.crypto.spec.SecretKeySpec; 8 9 public class AESCBCUtils { 10 private static final String TAG = “AESCBCUtils”; 11 12 // CBC (cipher block chaining) mode, pkcs5padding complement mode 13 // AES is the encryption mode, CBC is the working […]
-
. PFX private key certificate encryption,. Cer public key certificate decryption – PHP practice
origin enterprise projects need to be connected with third parties, which inevitably involves some encryption and decryption. As a member of an outsourcing company, this situation is more common. I’ve done it several times in the middle, and I met it allRSAEncryption, and then this is a special case.pfxPrivate key certificate encryption and.cerThe function […]