Understanding Cryptographic Algorithms: ECC vs RSA

Understanding Cryptographic Algorithms: ECC vs RSA

1. Background According to records, the ancient Greeks invented substitution ciphers around 400 BC. The world’s first telephone secrecy patent appeared in 1881. During World War II, the German military used the “Enigma” cipher machine, and cryptography played a very important role in the war. With the development of information and digital society, people’s awareness … Read more

Mastering PyCrypto: Secure Your Data with Python

Mastering PyCrypto: Secure Your Data with Python

Click the “Blue Word” to Follow Us Mastering the PyCrypto Library for Enhanced Data Security! When writing code, we often encounter sensitive data that needs to be encrypted for protection. If we talk about the most user-friendly encryption library in Python, it has to be PyCrypto. This tool is like a Swiss Army knife in … Read more

Comprehensive Guide to Cryptography Library in Python

Comprehensive Guide to Cryptography Library in Python

Click the blue words to follow us Beginner: Jing Ge, I’ve been researching data security recently and heard that Python has a great library called cryptography. Can you tell me how to use it? It seems a bit complicated, and I don’t know where to start. Jing Ge: No problem! The cryptography library is indeed … Read more

Mastering Data Encryption with PyAES in Python

Mastering Data Encryption with PyAES in Python

PyAES: Making Data Security as Simple as Magic! 🔒✨ Hey, Python buddies! Have you ever worried that your sensitive information could be easily exposed? Today, we will unveil the most powerful encryption tool in Python — PyAES! Don’t worry, follow along with Sister Na, and we will easily master the art of data encryption, ensuring … Read more

Base64 Is Not An Encryption Algorithm

Base64 Is Not An Encryption Algorithm

What is Base64? Base64, as the name suggests, is a character set that includes lowercase letters a-z, uppercase letters A-Z, digits 0-9, and symbols “+” and “/”, totaling 64 characters (plus one “=”, making it actually 65 characters; the reason for the “=” will be explained later). Any symbol can be converted into a character … Read more

Implementation and Reverse Analysis of Tiny Encryption Algorithm

Implementation and Reverse Analysis of Tiny Encryption Algorithm

This article is a featured post from the KX forum. KX forum Author ID: 丿feng This article mainly provides a simple analysis of the TEA series algorithms, originally written by myself. If there are any infringements regarding the images and some code quoted in the text, please contact me. >>>> 1. About TEA Series Algorithms … Read more

Exploring Poco Util Net SSL Cipher Factory Manager in C++

Exploring Poco Util Net SSL Cipher Factory Manager in C++

# Exploring C++ Network Encryption Tool: poco-util-netsslcipherfactorymanagerfactorymanagerfactory Hello everyone, I am your C++ learning buddy! Today we are going to explore a super long C++ library: poco-util-netsslcipherfactorymanagerfactorymanagerfactory. Don't be intimidated by the name, it is actually a very powerful network SSL encryption tool. Through today's learning, you will understand the basic concepts, main functions, and … Read more

Analysis of Encryption Algorithms After Light Obfuscation with OLLVM

Analysis of Encryption Algorithms After Light Obfuscation with OLLVM

This article is an excellent piece from the Kanxue Forum. Author from Kanxue ForumID: Avacci This topic originates from the third question of the Kanxue Advanced Research Class 3W in September. The target app has a very simple interface. Clicking the “CHECK” button will continuously print the encrypted string below. The goal is to analyze … Read more

Double Encryption Efficiency with Cursor in Two Hours

Double Encryption Efficiency with Cursor in Two Hours

Click the blue words to follow us 1. Origin As a developer focused on AI-assisted programming for ten years, I deeply understand the importance of encryption algorithms for project security. In daily development, various encryption and decryption functions are often needed, but traditional programming methods usually require referencing a lot of documentation and worrying about … Read more

ICLR 2020 | Simplifying Cryptographic Algorithms: SJTU’s Approach to Privacy in Mid-Level Features Using Complex Neural Networks

ICLR 2020 | Simplifying Cryptographic Algorithms: SJTU's Approach to Privacy in Mid-Level Features Using Complex Neural Networks

Machine Heart Report Machine Heart Editorial Team The top AI conference ICLR 2020 will be held on April 26 in Addis Ababa, Ethiopia. Among the final 2594 submitted papers, 687 were accepted, with an acceptance rate of 26.5%. This article introduces a paper accepted by the team of Zhang Quanshi from Shanghai Jiao Tong University … Read more