Why Did Google Crack the SHA-1 Algorithm?

Why Did Google Crack the SHA-1 Algorithm?

A few days ago, the news of Google cracking the SHA-1 algorithm flooded my social media feed. In fact, the term “crack” is not entirely accurate, it should be that they published an example of breaking the SHA-1 algorithm. Regarding this news, I saw two different comments: A: Wow, that’s amazing! They actually cracked an … Read more

How to Test Encrypted APIs?

How to Test Encrypted APIs?

Generate an information digest from plaintext encoding to prevent tampering. For example, MD5 uses a hash algorithm, which outputs a 128-bit string regardless of the input length. The digest algorithm does not require a secret key; both the client and server can use the same digest algorithm to obtain consistent ciphertext for the same plaintext. … Read more

How to Encrypt Chinese Text

How to Encrypt Chinese Text

Photographer: Product Manager This Skewered Food Shop Has Finally Opened When reading various encryption articles, you often see that the authors use numbers as examples for encryption. However, in real life, we communicate in Chinese. So how can we encrypt Chinese text? In the article “Don’t Worry, No One Can Snooze Our Chat Messages”, we … Read more

Enhanced Logic Encryption Algorithm Based on Secure Authorization Keys

Enhanced Logic Encryption Algorithm Based on Secure Authorization Keys

Authors:Zhao Yiqiang,Song Kaiyue,He Jiajie,Ma Haocheng Abstract:In response to current hardware security threats such as integrated circuit (IC) counterfeiting and intellectual property (IP) theft, we propose an enhanced logic encryption algorithm based on secure authorization keys. This algorithm locates the insertion point of the “key gate” through a rare node analysis method, using the fully correlated … Read more

Understanding Block Ciphers: A Comprehensive Overview

Understanding Block Ciphers: A Comprehensive Overview

Reliable and Efficient: The Block Cipher Written by | Teacher Kang In the previous five issues, we discussed the intrinsic characteristics and structures of cryptography, as well as the relationship between cryptography and security. Starting from this issue, we enter the second part of this series – the

Introduction to Commercial Cryptographic Algorithms

Introduction to Commercial Cryptographic Algorithms

Commercial cryptographic technology refers to the technology that can implement encryption, decryption, and authentication functions of commercial cryptographic algorithms (including programming technology for cryptographic algorithms and implementation technologies for cryptographic algorithm chips, encryption cards, etc.). Commercial cryptographic technology is the core of commercial cryptography, and the state has classified commercial cryptographic technology as a national … Read more

Organizing Notes | Team Learning Cryptography Session 6: Basics of Cryptographic Mathematics – Finite Fields

Organizing Notes | Team Learning Cryptography Session 6: Basics of Cryptographic Mathematics - Finite Fields

1. Operations In simple terms, a group ring field is a collection with operations. Let’s first look at some content related to operations. An operation is actually a mapping from one set to another: We call an operation involving n operands an n-ary (target) operation; specifically, if n=2, it is called a binary operation. At … Read more

Understanding Android Signature Versions: v1, v2, v3, and v4

Understanding Android Signature Versions: v1, v2, v3, and v4

This article is authored by Jiu Xin, originally published at: Jiu Xin Says. Introduction Recently, I helped the testing team with some signature-related requirements, and today I would like to briefly discuss the topic of signatures with everyone. If you ask why Android needs signatures, everyone might think of the official explanation: ❝ The Android … Read more

Hybrid Encryption Scheme Based on Elliptic Curves (ECIES)

Hybrid Encryption Scheme Based on Elliptic Curves (ECIES)

0 Introduction With the help of ECC (Elliptic Curve Cryptography), we can utilize the powerful capabilities of public key encryption while achieving the speed and security of symmetric encryption. Therefore, we gradually turn to practical scenarios, focusing on the following categories: (1). Public Key Key Exchange Protocols: ECDH (P256), ECDH (P384), ECDH (P521), X25519 and … Read more

Research and Implementation of RSA Encryption Algorithm Improvement

Research and Implementation of RSA Encryption Algorithm Improvement

Research and Realization of the RSA Encryption Algorithm Improvement YU Xin–hong,CHEN Qi,YAN Yu (Economy and Technology Institute, Anhui Agricultural University, Hefei, Anhui 230011, China) Abstract:The modular exponentiation and modular multiplication are essential elements to secure RSA algorithm. However, modular exponentiation has been so time-intensive that it impedes RSA algorithm’s application. Therefore, it is paramount to … Read more