Introduction to Simulation information encryption flowchart

Source: Internet
Author: User
Tags hash md5 md5 hash asymmetric encryption

The Encryption_demo code simulates the flowchart content of Tuyi and figure II, but only simulates, not what application, its application process is limited to the transfer process between the programs, does not involve the data transmission between the network, so just simulates its process.

Figure one information encryption flowchart with security authentication

Figure II Information decryption process diagram using Security authentication technology

Figure III Using security-certified Information encryption Flowchart text description

Figure Four text description of the information decryption process diagram using Security authentication technology

There's nothing new about Encryption_demo code. The purpose of the release is to enable you to understand the "use of security-certified information Encryption Flowchart" of the operation process. Code, you can download and take a look. The next thing I want to say is that the most important work is reflected in the calculation of the offset of the byte array. For example, in this program using MD5 hash, its hash value fixed length 16 bytes, using DES algorithm group encryption, its key and iv bytes are 8 bytes; signed with RSA, signature length fixed to 128 bytes, and the length of the encryption results, we want to encrypt the length of the byte array is 128+8 +8 = 144, the number of bytes after RSA asymmetric encryption is 1152 bytes long. So, in the first flowchart, the entire ciphertext byte length we know is not fixed, but the length of the first and third parts is fixed (again, we use the DES block encryption algorithm, MD5 hash function, RSA method signature and encryption, The following analysis results are also based on this. Like what:

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.