Introducing the New System Programming Language Hare: A Challenge to C Language!

Introducing the New System Programming Language Hare: A Challenge to C Language!

Source | Luo Qiqi / OSC Open Source Community (ID: oschina2013) Previous Valuable Notes Compilation Burning the Midnight Oil: Linux Quick Reference Guide.pdf My Browser Bookmarks Revealed Data Structures and Algorithms Problem-Solving Notes.pdf Download LeetCode Algorithm Problem-Solving C/C++ Version Answers pdf Download LeetCode Algorithm Problem-Solving Java Version Answers pdf Download Job Application Resume Template Collection … Read more

Cryptographic Algorithms That Embedded Engineers Need to Know

Cryptographic Algorithms That Embedded Engineers Need to Know

Follow and star our public account to access exciting content Source: Online materials With the advent of artificial intelligence and the Internet of Things, data applications have become more frequent. How should data security be protected? What software encryption algorithms are available, and in what areas are these algorithms applied? As you read on, you … Read more

A Discussion on Zen Buddhism and Cryptography

A Discussion on Zen Buddhism and Cryptography

It is well known that the stability of the world’s financial infrastructure relies on the RSA encryption algorithm used by banks. This algorithm ultimately hinges on the difficulty of prime factorization. Since factorizing large numbers is a challenging task, almost impossible to accomplish manually, even computers would take thousands of years to crack a large … Read more

An Overview of Cryptographic Encryption Algorithms

An Overview of Cryptographic Encryption Algorithms

This article introduces commonly used cryptographic algorithms in daily development. abstract.png Classical Cryptography Classical cryptography typically employs simple techniques such as substitution (replacing letters in plaintext with other letters) and transposition (rearranging the order of letters in plaintext), without the need for complex machines or algorithms. Therefore, its security is insufficient and easily compromised. Caesar … Read more

April 15th National Security Education Day

April 15th National Security Education Day

2024 marks the 75th anniversary of the founding of the People’s Republic of China, a crucial year for achieving the goals of the 14th Five-Year Plan, and also the 10th anniversary of General Secretary Xi Jinping’s overall national security concept. April 15th is the ninth National Security Education Day, and this year’s theme for the … Read more

Quick Collection! A Comprehensive Analysis of 12 Symmetric Encryption Algorithms!

Quick Collection! A Comprehensive Analysis of 12 Symmetric Encryption Algorithms!

Dog Yu If this article is helpful to you Please give a “like” or “view” to support us Thank you~ This article is quite lengthy, totaling around 7000 words, so it is recommended to bookmark it for leisurely reading~~1. Overview of Symmetric Encryption Algorithms Symmetric encryption algorithms are one of the cornerstones of modern cryptography, … Read more

Cryptography: A Powerful Library for Encryption Algorithms!

Cryptography: A Powerful Library for Encryption Algorithms!

Cryptography: A Powerful Library for Encryption Algorithms! Hello everyone! Today I want to introduce you to a powerful encryption library – cryptography. As a Python developer who is particularly concerned about data security, I highly recommend this library. It is like a Swiss Army knife in the field of cryptography, providing simple interfaces for various … Read more

China’s ‘Queen of Cryptography’ Wang Xiaoyun: A Legendary Scholar Who Broke America’s Top Encryption Algorithms to Safeguard National Cybersecurity

China's 'Queen of Cryptography' Wang Xiaoyun: A Legendary Scholar Who Broke America's Top Encryption Algorithms to Safeguard National Cybersecurity

She is known as the “Queen of Cryptography” in China and is a mathematical genius that gives headaches to American intelligence agencies. She led her team to successively crack globally recognized secure encryption algorithms such as MD5 and SHA-1, shocking the international cryptography community and forcing the U.S. National Institute of Standards and Technology (NIST) … Read more

Resolving a Node.js Error Related to Cryptographic Algorithms

Resolving a Node.js Error Related to Cryptographic Algorithms

Error: error:0308010C:digital envelope routines::unsupported This is usually because Node.js is attempting to use an unsupported cryptographic algorithm or option. Solution: 1. Roll back to a lower, compatible version. 2. Add the following statement to the startup command (Windows): # Before modification: "dev": "cross-env PATH_TYPE=dev nuxt",# After modification: "dev": "SET NODE_OPTIONS=–openssl-legacy-provider && cross-env PATH_TYPE=dev nuxt", There … Read more

RSA: A Classic Asymmetric Encryption Algorithm

RSA: A Classic Asymmetric Encryption Algorithm

RSA (Rivest-Shamir-Adleman) is a classic asymmetric encryption algorithm proposed by three cryptographers Ron Rivest, Adi Shamir, and Leonard Adleman in 1977. Its core function is to achieve secure communication through public key encryption and private key decryption, widely used in digital signatures, SSL/TLS protocols, data encryption, and other fields. Key Generation Principle of RSA Significance … Read more