How to Test Encrypted APIs?

How to Test Encrypted APIs?

Generate an information digest from plaintext encoding to prevent tampering. For example, MD5 uses a hash algorithm, which outputs a 128-bit string regardless of the input length. The digest algorithm does not require a secret key; both the client and server can use the same digest algorithm to obtain consistent ciphertext for the same plaintext. … Read more

Data Encryption Algorithms in ASP.NET Core

Data Encryption Algorithms in ASP.NET Core

0. Introduction In this article, we will introduce the encryption and decryption in .NET Core. In web applications, user passwords are stored as MD5 hashes. In other cases, encryption and decryption functionalities are also used. Common encryption algorithms are divided into symmetric and asymmetric encryption. Symmetric encryption means that the encryption key and the decryption … Read more

Introduction to Java Encryption Algorithms

Introduction to Java Encryption Algorithms

There are three types of Java encryption algorithms: 1. One-way encryption algorithm 2. Symmetric encryption algorithm 3. Asymmetric encryption algorithm One-way Encryption Algorithm One-way encryption is an irreversible encryption algorithm, and the encrypted ciphertext cannot be decrypted. Common algorithms include MD5, SHA, and HMAC. MD5 (Message-Digest Algorithm) No matter how long the data is, it … Read more

Three Common Encryption Algorithms: MD5, Symmetric and Asymmetric Encryption

Three Common Encryption Algorithms: MD5, Symmetric and Asymmetric Encryption

1. MD5 Encryption MD5 encryption characteristics: irreversible operation (cannot be cracked, cannot be decrypted) The result of encrypting different data is a fixed-length 32-character string (no matter how large the file is, it remains the same). The result of encrypting the same data is the same (that is, it is copied). Resistance to modification: the … Read more

Understanding MD5 and RSA Encryption in Automation

Understanding MD5 and RSA Encryption in Automation

In interface automation, we often encounter situations where passwords need to be encrypted. Sometimes, we look for developers to solve this. However, test engineers can also solve it themselves. Below, I will introduce the methods and applications of encryption in requests. Characteristics and Processing of MD5 Encryption Symmetric encryption algorithms: The same key is used … Read more

Various Encryption Algorithms Implemented in Python

Various Encryption Algorithms Implemented in Python

Encryption is generally about encrypting binary encoded formats, which corresponds to Python as Bytes. You need to convert str to Bytes using encode and decode. 01 md5 import hashlib def MD5(str): h1 =hashlib.md5() h1.update(str.encode(encoding = 'utf-8')) return h1.hexdigest() # lowercase if __name__ == "__main__": str ='123232' md5 =MD5(str) print("Before encryption: "+ str) print("After encryption: " … Read more

5 Commonly Used Encryption Algorithms in Work

5 Commonly Used Encryption Algorithms in Work

Background Recently, some security requirements were rectified in the project. Encryption is one of the commonly used means during the process. Here is a brief summary, hoping to help everyone. Usage Scenarios Encryption is a process that transforms raw information (plaintext) into a form (ciphertext) that is difficult to understand directly. The main purpose is … Read more

iOS Reverse Engineering – Encryption Algorithms

iOS Reverse Engineering - Encryption Algorithms

๐Ÿ‘‡๐Ÿ‘‡Follow and reply “Join Group” to be added to the Programmer Group Chat๐Ÿ‘‡๐Ÿ‘‡ Author | iOS_BigBook Source | Juejin https://juejin.cn/post/7010665487809904647 1. Classification of Encryption Algorithms Hash (hash) functions: Not encryption algorithms. For example, MD5, SHA1/256/512 Symmetric encryption algorithms: DES, 3DES, AES (Advanced Encryption Standard, the keychain on Mac computers uses AES) Asymmetric encryption algorithms: RSA … Read more

Introduction to Common Frontend Encryption Algorithms

Introduction to Common Frontend Encryption Algorithms

This article is reprinted from the SegmentFault community Community Column: Love Frontend Author: linshuai In today’s world, where information security is becoming increasingly important, various encryption methods in frontend development have also become more critical. Typically, in interactions with servers, to ensure the security of data transmission and prevent data tampering, in addition to the … Read more

Essential Encryption Algorithms for System Security

Essential Encryption Algorithms for System Security

With the advent of the era of artificial intelligence and the Internet of Things, data applications have become frequent. How should data security be protected? What software encryption algorithms are there, and in what areas are these algorithms applied? As you read on, you will discover the “small passwords” surrounding us. Symmetric Encryption Algorithms Symmetric … Read more