Android Secure Encryption

Source: Internet
Author: User

Android Secure Encryption Introductionthe knowledge of symmetric encryption, asymmetric encryption, message digest, and digital signature are all designed to understand how digital certificates work and act as a preparatory knowledge. Digital certificate is the ultimate weapon in cryptography, the crystallization of wisdom of human thousands of-year history, only after understanding the principle of digital certificate, can we understand the security communication mechanism of HTTPS protocol. In the end, the SSL development process will be handy. In addition, symmetric encryption and message digest are two points of knowledge that can be used separately. The digital certificate uses all the knowledge learned above
    • Symmetric encryption is used in conjunction with asymmetric encryption to achieve a secret key exchange, after which the two parties use the secret key for symmetric encrypted communication.
    • Message digest and asymmetric encryption implement a digital signature, the root certificate authority to sign the target certificate, at the time of verification, the root certificate with the public key to verify it. If the validation is successful, the certificate is trusted.
    • The Keytool tool can create a certificate, which is then passed to the root certification authority for direct use of the self-signed certificate, and can also output the RFC format information for the certificate.
    • Digital signature technology realizes identity authentication and data integrity guarantee.
    • Encryption technology to ensure the confidentiality of data, Message digest algorithm to ensure the integrity of the data, symmetric encryption of high efficiency to ensure the reliability of data processing, digital signature technology to ensure the non-repudiation of the operation.
through the above content of learning, we should be able to grasp the following knowledge points:
    • Basics: Bit bit, Byte, character, character encoding, binary conversion, IO
    • Know how to use symmetric encryption to solve problems in real-world development
    • Know symmetric encryption, asymmetric encryption, message digest, digital signature, digital certificate are to solve what problems occur
    • Understanding SSL Communication processes
    • How to request HTTPS interface in real development
Caesar Password
Symmetric encryption Overview General algorithm of symmetric encryption des algorithm introduction reference Android Secure encryption: Symmetric encryption http://blog.csdn.net/axi295309066/article/details/52491077

Android Secure Encryption

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.