Wireless Security: 9 Wi-Fi Configuration Mistakes to Avoid

Wireless Security: 9 Wi-Fi Configuration Mistakes to Avoid

Wireless networks can provide significant business advantages for enterprises, such as ensuring employees can connect across multiple devices and even buildings, thereby improving productivity. However, wireless networks can also bring visible and invisible risks to business privacy. Below are nine common wireless network security pitfalls that enterprises should pay attention to. As BYOD continues to … Read more

Unpacking Malware: Weak Encryption Algorithms

Unpacking Malware: Weak Encryption Algorithms

A few days ago, I started writing a series of articles about tools and methods for unpacking malware. Each piece of malware or packer is different, and sometimes a universal method cannot be used for unpacking. However, common characteristics can sometimes be found. For example, packers often use weak encryption algorithms, and breaking these algorithms … Read more

Research on Data Encryption Security System in Securities Trading

Research on Data Encryption Security System in Securities Trading

Author / Tao Jianfeng, Director of Information Technology Department, CITIC Construction Investment Securities Co., Ltd. Du Guowei, Chen Hongping, CITIC Construction Investment Securities Co., Ltd. Information Technology Department Since the implementation of the “Cryptography Law of the People’s Republic of China”, it has effectively promoted the advancement of cryptographic technology, industry development, and standardized applications. … Read more

How to Test Encrypted APIs?

How to Test Encrypted APIs?

Generate an information digest from plaintext encoding to prevent tampering. For example, MD5 uses a hash algorithm, which outputs a 128-bit string regardless of the input length. The digest algorithm does not require a secret key; both the client and server can use the same digest algorithm to obtain consistent ciphertext for the same plaintext. … Read more

How to Encrypt Chinese Text

How to Encrypt Chinese Text

Photographer: Product Manager This Skewered Food Shop Has Finally Opened When reading various encryption articles, you often see that the authors use numbers as examples for encryption. However, in real life, we communicate in Chinese. So how can we encrypt Chinese text? In the article “Don’t Worry, No One Can Snooze Our Chat Messages”, we … Read more

Understanding Block Ciphers: A Comprehensive Overview

Understanding Block Ciphers: A Comprehensive Overview

Reliable and Efficient: The Block Cipher Written by | Teacher Kang In the previous five issues, we discussed the intrinsic characteristics and structures of cryptography, as well as the relationship between cryptography and security. Starting from this issue, we enter the second part of this series – the

Understanding Android Signature Versions: v1, v2, v3, and v4

Understanding Android Signature Versions: v1, v2, v3, and v4

This article is authored by Jiu Xin, originally published at: Jiu Xin Says. Introduction Recently, I helped the testing team with some signature-related requirements, and today I would like to briefly discuss the topic of signatures with everyone. If you ask why Android needs signatures, everyone might think of the official explanation: ❝ The Android … Read more

Research and Implementation of RSA Encryption Algorithm Improvement

Research and Implementation of RSA Encryption Algorithm Improvement

Research and Realization of the RSA Encryption Algorithm Improvement YU Xin–hong,CHEN Qi,YAN Yu (Economy and Technology Institute, Anhui Agricultural University, Hefei, Anhui 230011, China) Abstract:The modular exponentiation and modular multiplication are essential elements to secure RSA algorithm. However, modular exponentiation has been so time-intensive that it impedes RSA algorithm’s application. Therefore, it is paramount to … Read more

Understanding RSA Algorithm Principles (Part 1)

Understanding RSA Algorithm Principles (Part 1)

If you ask me, which algorithm is the most important? I might answer “Public Key Encryption Algorithm“. Because it is the cornerstone of computer communication security, ensuring that encrypted data cannot be cracked. You can imagine the consequences if credit card transactions are compromised. Before getting into the main topic, let me briefly introduce what … Read more

Obfuscation Techniques: The Safest Way to Encrypt Code

Obfuscation Techniques: The Safest Way to Encrypt Code

For decades, computer scientists have sought to verify whether there exists an absolutely secure method to encrypt computer programs, rendering them uncrackable during use. At the end of 2020, several scholars successfully discovered an encryption method that prevents computer users from cracking programs by obtaining the code. Encrypting Program Code First, It Must Be Obfuscated … Read more