Tag:Plaintext

  • Jingdong real combat: how can data desensitization avoid system reconfiguration or modification?

    Time:2021-2-15

    Introduction to the author Pan Juan, senior DBA of Jingdong digital science, is mainly responsible for the development of database middleware, database operation and maintenance automation platform, and production database operation and maintenance. Participated in the escort work of Jingdong’s 6.18 and 11.11 promotion activities for many times. He was responsible for the design and […]

  • AES encryption and decryption (according to the specified secret key)

    Time:2021-2-1

    Recently, we are calling the third-party interface, which requires AES encryption and the secret key is 16 bits in length. Please record here. First, reference the namespace: using System.IO; using System.Text; using System.Security.Cryptography; /// ///AES encryption (vector free) /// ///Encrypted plaintext ///Key ///Ciphertext public string AESEncrypt(string Data, string Key) { MemoryStream mStream = new MemoryStream(); […]

  • One secret at a time

    Time:2021-1-23

    One time one secret (OTP) A sequence cipher is called one key at a time, which must meet the following conditions:1. Get the key sequence through the true random number generators_0, s_1, s_2,…;2. Only legitimate communicators know the key sequence;3. Each key sequences_iUse only once.One secret at a time is unconditionally safeIt is proved that […]

  • Sequence cipher and block cipher

    Time:2021-1-21

    Sequence cipher The sequence cipher encrypts each bit individually. It is realized by adding each bit in the key sequence to each plaintext bit. The key sequence of synchronous sequence cipher only depends on the key, while the key sequence of asynchronous sequence cipher depends on the key and ciphertext. Most of the sequence ciphers […]

  • Shift Cipher

    Time:2021-1-18

    Shift Cipher The Shift Cipher itself is very simple, that is, each letter in plaintext moves a fixed length position in the alphabet. Suppose x, y, K, Z_ If {26}, then\\ From the previous discussion on replacement ciphers, it is not difficult to come to the conclusion that shift ciphers are not secure at all. […]

  • Apache shardingsphere data desensitization solution (2)

    Time:2021-1-6

    Introduction to the author Pan Juan, senior DBA of Jingdong digital science, is mainly responsible for the development of database middleware, database operation and maintenance automation platform, and production database operation and maintenance. Participated in the escort work of Jingdong’s 6.18 and 11.11 promotion activities for many times. He was responsible for the design and […]

  • PHP encryption and decryption, refer to discuz

    Time:2021-1-3

    <?php /** *Encryption key */ define(“ENCRYPT_KEY”, “sqltest1179631111”); //Encryption $password = “123456”; $enCryPass = demoEncode($password); var_dump($enCryPass); //Decryption $deCryPass = demoDecode($enCryPass); var_dump($deCryPass); /** *Encryption *@ param $password string password before encryption * @return false|string */ function demoEncode($password) { return authCode($password, “ENCODE”, ENCRYPT_KEY); } /** *Encryption *@ param $encrypass string password to decrypt * @return false|string */ function […]

  • Django——auth

    Time:2020-12-21

    1Introduction to auth components It can realize such functions as user registration, user login, user authentication, logout, password modification, etc., and has built-in powerful user authentication system — auth, which is actually an app 2Built in property method Note: before using the attribute method, the database must be migrated. There are two commands 1. Authenticate […]

  • Cryptography: 2. AES principle of symmetric encryption

    Time:2020-12-8

    Using the encryption method of single key cryptosystem, the same key can be used to encrypt and decrypt information at the same time. This encryption method is called symmetric encryption, also known as single key encryption. The encryption algorithms based on “symmetric key” mainly include DES, 3DES (tripledes), AES, RC2, RC4, RC5 and blowfish. At […]

  • Do you think that I will not dig out the configuration file in the database?

    Time:2020-11-28

    1: Background 1. Tell a story I found a bug in the terminal of IOT cabinet a few days ago app.config The database connection string in is encrypted, because I want to switch the database during debugging, I need to put the ciphertext on a special tool to decrypt. After changing the database name on […]

  • MySQL of MySQL_ config_ Editor summary

    Time:2020-10-26

    mysql_config_editorintroduce   mysql_config_editoryesMySQLWith a security encryption login tool, you can avoid using password plaintext in some occasions, for example, writeshellWhen scripting, there is no need to worry about writing clear text password in the script; it can also be used to manage multiple stationsMySQLexample. In addition, if you usemysqlThe command can log in to the […]

  • Node application of AES encryption algorithm

    Time:2020-9-6

    AES It belongs to symmetric encryption algorithm Three elements: Secret key fill pattern Secret key Symmetric encryption is symmetric because it uses the same secret key to encrypt and decrypt plaintext AES supports secret keys of three lengths: 128 bit 128 has the best performance 192 bits 256 bit 256 has the highest security and […]