Performance Comparison of AES and SM4 Encryption Algorithms Using OpenVPN: National Secret Algorithm Doesn’t Seem So Bad

Performance Comparison of AES and SM4 Encryption Algorithms Using OpenVPN: National Secret Algorithm Doesn't Seem So Bad

From the previous test (Performance Comparison of Different Encryption Algorithms in OpenVPN), we found that there are differences in forwarding performance when OpenVPN uses different encryption algorithms, as shown below: Comparing the encryption algorithms, we can see that the specific encryption algorithms are divided into three parts: the first part is the algorithm name, which … Read more

Practical Use of Burpy Plugin – Cracking the Encryption Algorithm of a WeChat Mini Program

Practical Use of Burpy Plugin - Cracking the Encryption Algorithm of a WeChat Mini Program

Author: 0pening 1. Introduction Testing a certain WeChat mini program, without further ado, let’s start using BurpSuite to capture packets. However, upon capturing the packets, I noticed something was off 🤨. This application encrypts the parameters into bizContent and uses a signature parameter sign to prevent man-in-the-middle attacks on the data packets… not very honorable. … Read more

Initial Experience with C# Quantum Computing: Using Q# for Hybrid Development to Break Encryption Algorithms and the Microsoft Lab Data Leak

Initial Experience with C# Quantum Computing: Using Q# for Hybrid Development to Break Encryption Algorithms and the Microsoft Lab Data Leak

In the rapidly advancing field of technology, every breakthrough in quantum computing attracts significant attention. Recently, a piece of news regarding C# and quantum computing has caused a stir in the tech community: developers have attempted to break encryption algorithms using a hybrid development approach with C# and Q#, which unexpectedly led to a data … Read more

Performance Comparison of Different Encryption Algorithms in OpenVPN

Performance Comparison of Different Encryption Algorithms in OpenVPN

We previously introduced that the forwarding performance of IPsec VPN varies with different encryption algorithms (using vSRX to test the performance differences of various IPsec VPN encryption algorithms), but does OpenVPN have this issue? First, we need to confirm the algorithm information used during the OpenVPN negotiation process. For the default configuration, the algorithm information … Read more

What Is Encryption? From Caesar to Enigma Machine

What Is Encryption? From Caesar to Enigma Machine

This article is an excerpt from a book produced by Zhihu: “Cats, Einstein, and Cryptography: Quantum Communication That I Can Understand” From Julius Caesar to Sherlock Holmes from Nazi leader Hitler to the father of AI, Turing… How did the ultimate code in the field of communication come into being? All of this must start … Read more

Top 5 Data Encryption Methods Loved by Cybersecurity Experts in 2022

Top 5 Data Encryption Methods Loved by Cybersecurity Experts in 2022

With cybercrime being so rampant, what should you do if your data is seen or even stolen by others? Data encryption is a common and effective security method and is the first choice for protecting enterprise data. But how do you encrypt data? Do you know what technologies are involved? Today, we will learn about … Read more

The Race Between Cryptography and Quantum Computing

The Race Between Cryptography and Quantum Computing

Author: Kelsey Houston-Edwards“Guangming Daily” (November 7, 2024, Page 14)   The advent of future quantum computers will threaten the security of all classical encrypted information, and cryptographers are racing against time to develop encryption algorithms that can confound quantum computers. Rapidly Developing Quantum Computers   Digital security experts worldwide are focusing on the Quantum Year Clock (Y2Q … Read more

The Relationship Between Riemann Hypothesis and Blockchain Encryption Algorithms

The Relationship Between Riemann Hypothesis and Blockchain Encryption Algorithms

Recently, a piece of news that originated from foreign media and was widely spread by domestic media has caused a stir in the mathematics community: the Riemann Hypothesis has been proven. Meanwhile, the blockchain community is also buzzing, suggesting that encryption algorithms may be compromised. Fields Medal and Abel Prize winner, Sir Michael Atiyah (April … Read more

Three Powerful Encryption Algorithms

Three Powerful Encryption Algorithms

DES Algorithm •DES stands for Data Encryption Standard, which is a block algorithm that uses a key for encryption. DES Algorithm Input Parameters •The input parameters for the DES algorithm are three: Key, Data, Mode. The Key is 7 bytes or 56 bits long, serving as the working key for the DES algorithm; Data is … Read more