How to Test Encrypted APIs?

How to Test Encrypted APIs?

Generate an information digest from plaintext encoding to prevent tampering. For example, MD5 uses a hash algorithm, which outputs a 128-bit string regardless of the input length. The digest algorithm does not require a secret key; both the client and server can use the same digest algorithm to obtain consistent ciphertext for the same plaintext. … Read more

Understanding Block Ciphers: A Comprehensive Overview

Understanding Block Ciphers: A Comprehensive Overview

Reliable and Efficient: The Block Cipher Written by | Teacher Kang In the previous five issues, we discussed the intrinsic characteristics and structures of cryptography, as well as the relationship between cryptography and security. Starting from this issue, we enter the second part of this series – the

Understanding Android Signature Versions: v1, v2, v3, and v4

Understanding Android Signature Versions: v1, v2, v3, and v4

This article is authored by Jiu Xin, originally published at: Jiu Xin Says. Introduction Recently, I helped the testing team with some signature-related requirements, and today I would like to briefly discuss the topic of signatures with everyone. If you ask why Android needs signatures, everyone might think of the official explanation: ❝ The Android … Read more

A Brief History of Cryptography: From Art to Science

A Brief History of Cryptography: From Art to Science

In May 2017, the WannaCry ransomware virus broke out globally, with some university students in mainland China reporting that their computers were attacked by the virus and documents were maliciously encrypted. The ransomware wreaked havoc, resembling a global internet disaster, causing significant losses to computer users. According to the latest statistics, over 100 countries and … Read more

The Birth of Asymmetric Encryption

The Birth of Asymmetric Encryption

Click the blue text Follow us The Birth of Asymmetric Encryption Tree Brother: Cryptography can be simply divided into classical cryptography and modern cryptography. We have already introduced substitution ciphers and the Enigma machine in classical cryptography, and now we will begin to discuss symmetric and asymmetric encryption methods in modern cryptography. I’m sure you … Read more

Understanding HTTPS and Its Encryption Principles

Understanding HTTPS and Its Encryption Principles

HTTPS (full name: Hypertext Transfer Protocol Secure, is a secure version of HTTP designed with security in mind. This article will delve into its principles. 1 Why HTTPS is Necessary The reason for using HTTPS is quite simple: it is due to the insecurity of HTTP. When we send sensitive data to a server (such … Read more

Introduction to Information Security and Cryptography

Introduction to Information Security and Cryptography

This article provides a preliminary understanding of the field of information security. 1. Briefly describe security attacks, security mechanisms, and security services. Security attack: Any act that jeopardizes the security of an information system. Security mechanism: A process used to detect, prevent attacks, or recover from an attack state to a normal state. Security service … Read more

Challenges and Thoughts on Information Security of Intelligent Connected Vehicles

Challenges and Thoughts on Information Security of Intelligent Connected Vehicles

On July 27, the National Standardization Administration of the Ministry of Industry and Information Technology issued the “Guidelines for the Construction of the National Internet of Vehicles Industry Standard System (Intelligent Connected Vehicles) (2023 Edition)” (referred to as the “2023 Standard System Construction Guidelines”). “To adapt to the new trends, new characteristics, and new demands … Read more

Understanding the Vehicle Networking Industry

Understanding the Vehicle Networking Industry

Article Outline Information Security Risks and Challenges of Intelligent Connected Vehicles Current Status of Information Security Policies and Regulations for Intelligent Connected Vehicles in China Analysis and Interpretation of Key Policies and Regulations (Network | Data | Software Security) Assessment of Future Management Directions Intelligent Vehicles Information Securityof Intelligent Connected Vehicles Risks and Challenges Intelligent … Read more

Industrial Control System Information Security Protection Guidelines

Industrial Control System Information Security Protection Guidelines

Notice on Issuing the “Industrial Control System Information Security Protection Guidelines” Ministry of Industry and Information Technology Document No. 338, 2016 In order to implement the “Guiding Opinions of the State Council on Deepening the Integration of Manufacturing and the Internet” (Guofa [2016] No. 28), and to ensure the information security of industrial control systems … Read more