\ config \ jdbc" and place the key file in "C: \ bea \ weblogic92 \ samples \ domains \ wl_server \ security ", and then use the following WebLogicDecryptor. class cracking: WebLogicDecryptor. the source code of java is as follows:
import java.util.*;import java.io.*;import javax.xml.parsers.*;import javax.xml.xpath.*;import org.w3c.dom.*;import weblogic.security.internal.*; // requires weblogic.jar in the class pathimport weblogic.security.internal.encryption.*; public class WebLogicDecryptor
key.
Caesar's password is symmetric encryption, and his character offset is the secret key.
Common algorithms for symmetric encryption
AES, DES, 3DES, Tdea, Blowfish, RC2, RC4, RC5, Idea, skipjack and so on.
DES: All known as the data encryption Standard, the encryption
decryption both use the same key. According to the definition of cryptography, the symmetric encryption system consists of five components: plaintext space, ciphertext space, key space, encryption space, and decryption algorithm. Next we will use one to represent it:
Algorithm name
Algorithm DescriptionDES encryption algorithmThe block
1. Encryption overviewEncrypted scenarios1) password encryption, often used for login password and payment password, such as the characteristics of this type of encryption is not to be decrypted after the password encryption, so it can be more secure to save the password without leaking clear text, so suitable for the
algorithms: DES algorithm, 3DES algorithm, TDEA algorithm, Blowfish algorithm, RC5 algorithm, IDEA algorithm,AES Algorithm.
Asymmetric encryption algorithm:RSA, Elgamal, backpack algorithm, Rabin, D-H, ECC.
Typical hash algorithms: MD2, MD4,MD5And SHA-1 (the purpose is to convert any long input to a fixed long output by using an algorithm, and ensure that the input changes slightly and the output is differ
ObjectiveIt's been bothering me. About data encryption this piece, 24th night with nearly 3 hours to complete a task, this thought can be solved immediately, but in order to ensure the security of data, we began to encrypt the data, and then the next 3 hours specifically to study the encryption of this piece, but using the use but found a little problem, So come back from work to write this blog until late
specific party.
Two. Introduction to cryptographic algorithms
According to the different key types, modern cryptography is divided into two categories: symmetric encryption Algorithm (secret key encryption) and asymmetric encryption algorithm (public key encryption).
Symmetric key
provided for stream encryption algorithms such as WAKE and RC4.
NOFB and STREAM are valid only when the version number of mycrypt is greater than or equal to the libmcrypt-2.4.x. (Now it is basically later than this version, and libmcrypt's latest main version has reached 4)
4. view supported algorithms and Models
①. Mcrypt_list_modes () lists models supported by the current environment
②. Mcrypt_list_algorithms () lists the algorithms supported by t
*
@param data to be encrypted string
* @param key encryption private key, length can not be less than 8 bits
* @return encrypted byte array, General associative BASE64 encoding using
/public static string encode (string key, byte[] data) {
try {
Cipher Cipher = Cipher . getinstance (transformation);
Ivparameterspec IV = new Ivparameterspec (Ivparameterspec.getbytes ());
Cipher.init (Cipher.encrypt_mode, Getrawkey (key), iv);
b
Asp.net encryption and decryption skills, asp.net encryption and decryption
We all know about encryption and decryption. The following describes encryption and decryption in ASP. NET.
I. Data Encryption/encoding algorithm list
Common enc
1.Encryption Algorithm Daquan:Rsa:RSA is made of the initial letters of the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who first publicly desc Ribed the algorithm in 1977.Http://www.emc.com/corporate/about-rsa/index.htmHttps://en.wikipedia.org/wiki/RSA_%28cryptosystem%29DSA: Digitally Signature algorithm digital Signature AlgorithmECDSA: Elliptic Curve digital Signature algorithm Elliptic curve Signature algorithmDSS: Digital Signature S
following is an asymmetric encryption algorithm for PHP extracted from the Internet using openssl.
Symmetric encryption algorithm
Symmetric encryption (also called private key encryption) refers to the encryption algorithm that uses the same key for
The classical symmetric encryption algorithm is DES algorithm, and then derives the enhanced des algorithm of 3DES, TripleDES and so on. Moreover,. NET also provides symmetric encryption algorithms such as RC2, Rijndael, and so on. The details are detailed below.
DES encryption algorithm
The most classical algorithm
requires a total of n × (n-1) keys. the generation and distribution of keys will become a nightmare for the Enterprise Information Department. The security of symmetric encryption algorithms depends on the storage of encryption keys. However, it is impossible for everyone in the enterprise to keep a secret, generally, they intentionally or unintentionally disclose the key. If a user's key is obtained by an
Symmetric encryption and asymmetric encryption, asymmetric encryption
What is encryption? Encryption is divided into two parts: algorithm and key. The algorithm remains unchanged, and the key changes. For more information, see the following example.
Key: abcedfgh-> 12345678.
650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M01/89/00/wKiom1gEbU7Rk8J9AAAgh7lHOtQ358.png "title=" Symmetric encryption. png "alt=" Wkiom1gebu7rk8j9aaagh7lhotq358.png "/>Symmetric encryption is the fastest and simplest way to encrypt encryption and decryption with the same key. Symmetric encryption has many a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.