A Brief History of Cryptography: From Art to Science

A Brief History of Cryptography: From Art to Science

In May 2017, the WannaCry ransomware virus broke out globally, with some university students in mainland China reporting that their computers were attacked by the virus and documents were maliciously encrypted. The ransomware wreaked havoc, resembling a global internet disaster, causing significant losses to computer users. According to the latest statistics, over 100 countries and … Read more

20 Lines of Python Code for Encrypted Communication

20 Lines of Python Code for Encrypted Communication

1. Introduction The internet is filled with eavesdropping, and our information can easily be obtained by malicious individuals, causing us negative impacts. If you need to transmit confidential or sensitive personal information over the internet, you may need to encrypt it to guard against prying eyes. Using online or mobile encryption software may also expose … Read more

Symmetric Encryption Algorithms Explained

Symmetric Encryption Algorithms Explained

5Typical Symmetric Encryption Algorithms This article introduces AES, SM4, and ZUC as representatives. AES, the Advanced Encryption Standard, is a block cipher algorithm adopted by the United States federal government; SM4 is a commercial block cipher algorithm developed and promoted for use in China; ZUC, the Zu Chongzhi algorithm, is a stream cipher algorithm independently … Read more

Top 5 Data Encryption Methods Loved by Cybersecurity Experts in 2022

Top 5 Data Encryption Methods Loved by Cybersecurity Experts in 2022

With cybercrime being so rampant, what should you do if your data is seen or even stolen by others? Data encryption is a common and effective security method and is the first choice for protecting enterprise data. But how do you encrypt data? Do you know what technologies are involved? Today, we will learn about … Read more

Data Encryption Algorithms in ASP.NET Core

Data Encryption Algorithms in ASP.NET Core

0. Introduction In this article, we will introduce the encryption and decryption in .NET Core. In web applications, user passwords are stored as MD5 hashes. In other cases, encryption and decryption functionalities are also used. Common encryption algorithms are divided into symmetric and asymmetric encryption. Symmetric encryption means that the encryption key and the decryption … Read more

Three Common Encryption Algorithms: MD5, Symmetric and Asymmetric Encryption

Three Common Encryption Algorithms: MD5, Symmetric and Asymmetric Encryption

1. MD5 Encryption MD5 encryption characteristics: irreversible operation (cannot be cracked, cannot be decrypted) The result of encrypting different data is a fixed-length 32-character string (no matter how large the file is, it remains the same). The result of encrypting the same data is the same (that is, it is copied). Resistance to modification: the … Read more

Hacking and Attacking Smart Door Locks

Hacking and Attacking Smart Door Locks

Experiment Description In this experiment, we will study how to analyze the security of the OKLOK smart lock, as well as analyze the Android app, dynamic code debugging, and BLE analysis control, ultimately achieving remote control of the smart lock using our code. We will first interact with the smart lock using a BLE adapter … Read more

Wireless WiFi Password Cracking Techniques and Principles Explained

Wireless WiFi Password Cracking Techniques and Principles Explained

Everyone has probably experienced that feeling when their home WiFi seems to be slowing down, wondering, “Is someone using my internet?” Sometimes we even want to try connecting to someone else’s WiFi when we are out. The premise of “borrowing WiFi” is to crack the other party’s “wireless password.” So, how secure is this “wireless … Read more

Analysis of BLE Communication in Loock Touch Smart Lock

Analysis of BLE Communication in Loock Touch Smart Lock

This article is a featured article from the Kanxue ForumAuthor of Kanxue ForumID: Hu Yimi 1 Introduction In this article, we share some research content about the Loock Touch smart lock, which is produced by Yunding Technology. Yunding Technology is a company focused on the research and production of smart home security products, with two … Read more

Assembly Optimization of AES-128-CTR Algorithm Based on Cortex-M4

Assembly Optimization of AES-128-CTR Algorithm Based on Cortex-M4

Computer Science Assembly Optimization of an AES-128-CTR Algorithm Based on a Cortex-M4 Core Dongxuan YANG1, Ganggang ZHANG2, Xinliang LIU1 1. School of E-commerce and Logistics, Beijing Technology and Business University; 2. Digital Campus, Capital Normal University Abstract: With the rapid development of the Internet of Things, embedded hardware products face great challenges in data security. … Read more