Principles and Characteristics of Encryption Algorithms DES, AES, and RSA

Principles and Characteristics of Encryption Algorithms DES, AES, and RSA

Follow+Star Public Account Number, don’t miss out on exciting content Compiled by | strongerHuang WeChat Public Account | Embedded Column Today, we will summarize the commonly used symmetric encryption algorithms DES and AES, and the asymmetric encryption algorithm RSA. Embedded Column 1 DES Encryption Algorithm1. Meaning of DESDES stands for Data Encryption Standard, which is … Read more

Introduction to Popular Ransomware Encryption Algorithms

Introduction to Popular Ransomware Encryption Algorithms

Ransomware is a new type of virus trojan that has emerged alongside the rise of digital currencies. It typically spreads through various forms such as brute force cracking, exploiting vulnerabilities, spam emails, and bundled software. Once a machine is attacked by ransomware, most files will be modified by encryption algorithms and have a special suffix … Read more

Essential Skills for API Integration: Detailed Explanation of Common Encryption and Signature Algorithms

Essential Skills for API Integration: Detailed Explanation of Common Encryption and Signature Algorithms

Before reading this chapter, please first understand the theory of encoding and decoding in computer basics and an introduction to OpenSSL.What is the relationship between binary, hexadecimal, bytes, and strings? HTTPS, certificates, data encryption… How many of these OpenSSL skills have you used? Below is the main content Encryption Algorithms In API integration, commonly used … Read more

Performance Comparison of AES and SM4 Encryption Algorithms Using OpenVPN: National Secret Algorithm Doesn’t Seem So Bad

Performance Comparison of AES and SM4 Encryption Algorithms Using OpenVPN: National Secret Algorithm Doesn't Seem So Bad

From the previous test (Performance Comparison of Different Encryption Algorithms in OpenVPN), we found that there are differences in forwarding performance when OpenVPN uses different encryption algorithms, as shown below: Comparing the encryption algorithms, we can see that the specific encryption algorithms are divided into three parts: the first part is the algorithm name, which … Read more

Practical Use of Burpy Plugin – Cracking the Encryption Algorithm of a WeChat Mini Program

Practical Use of Burpy Plugin - Cracking the Encryption Algorithm of a WeChat Mini Program

Author: 0pening 1. Introduction Testing a certain WeChat mini program, without further ado, let’s start using BurpSuite to capture packets. However, upon capturing the packets, I noticed something was off 🤨. This application encrypts the parameters into bizContent and uses a signature parameter sign to prevent man-in-the-middle attacks on the data packets… not very honorable. … Read more

Initial Experience with C# Quantum Computing: Using Q# for Hybrid Development to Break Encryption Algorithms and the Microsoft Lab Data Leak

Initial Experience with C# Quantum Computing: Using Q# for Hybrid Development to Break Encryption Algorithms and the Microsoft Lab Data Leak

In the rapidly advancing field of technology, every breakthrough in quantum computing attracts significant attention. Recently, a piece of news regarding C# and quantum computing has caused a stir in the tech community: developers have attempted to break encryption algorithms using a hybrid development approach with C# and Q#, which unexpectedly led to a data … Read more

Performance Comparison of Different Encryption Algorithms in OpenVPN

Performance Comparison of Different Encryption Algorithms in OpenVPN

We previously introduced that the forwarding performance of IPsec VPN varies with different encryption algorithms (using vSRX to test the performance differences of various IPsec VPN encryption algorithms), but does OpenVPN have this issue? First, we need to confirm the algorithm information used during the OpenVPN negotiation process. For the default configuration, the algorithm information … Read more

What Is Encryption? From Caesar to Enigma Machine

What Is Encryption? From Caesar to Enigma Machine

This article is an excerpt from a book produced by Zhihu: “Cats, Einstein, and Cryptography: Quantum Communication That I Can Understand” From Julius Caesar to Sherlock Holmes from Nazi leader Hitler to the father of AI, Turing… How did the ultimate code in the field of communication come into being? All of this must start … Read more

Top 5 Data Encryption Methods Loved by Cybersecurity Experts in 2022

Top 5 Data Encryption Methods Loved by Cybersecurity Experts in 2022

With cybercrime being so rampant, what should you do if your data is seen or even stolen by others? Data encryption is a common and effective security method and is the first choice for protecting enterprise data. But how do you encrypt data? Do you know what technologies are involved? Today, we will learn about … Read more

The Race Between Cryptography and Quantum Computing

The Race Between Cryptography and Quantum Computing

Author: Kelsey Houston-Edwards“Guangming Daily” (November 7, 2024, Page 14)   The advent of future quantum computers will threaten the security of all classical encrypted information, and cryptographers are racing against time to develop encryption algorithms that can confound quantum computers. Rapidly Developing Quantum Computers   Digital security experts worldwide are focusing on the Quantum Year Clock (Y2Q … Read more