It is important to understand the following for encryption and decryption:The two sides want to communicate, the middle connection may be bugged or even tampered with. The solution is to encrypt the contents of the transmission, using ciphertext to transmit, so that even if the listener can not know the specific content of the information.When encrypting, both parties can contract a password A, a with a encryption
Disclaimer: The purpose of this document is to analyze the common tea algorithms of TX. The reference information is based on the information published on the Internet. The key information is also filtered and there is no attack or leakage.
The simple encryption algorithm tea is so famous in China, probably because Tx is used in a large number of protocols and local data. Many people on the internet even ca
Symmetric encryption algorithm (with the same decryption key)
name
Key Length
Operation Speed
Security
Resource Consumption
Des
56 Guests
More quickly
Low
In
3DES
112-bit or 168-bit
Slow
In
High
Aes
128, 192, 256-bit
Fast
High
Low
asymmetric algorithm (
two . Introduction to cryptographic algorithms
Symmetric encryption algorithm
Symmetric encryption algorithm used to encrypt sensitive data and other information, commonly used algorithms include:
DES (
Symmetric encryption algorithm (identical encryption and decryption keys)
Name
Key Length
Computing speed
Security
Resource Consumption
Des
56
Fast
Low
Medium
3DES
112-bit or 168-bit
Slow
Medium
High
AES
128, 192, 256
Fast
High
Low
Asymmetric
Introduction to several common encryption algorithmssuch as the basic one-way encryption algorithm:BASE64 strictly speaking, it belongs to the encoding format, not the encryption algorithm--cbase64MD5 (Message Digest algorithm 5, Information Digest algorithm)--CMD5SHA (Secure Hash algorithm, security hashing algorithm)HMAC (Hash message authentication code, hash
The DES algorithm is one of the most general symmetric key algorithms, because the algorithm itself is public, so its security lies in the security of the key. There are usually two kinds of algorithms based on key: symmetric algorithm and public key algorithm. Symmetry of the symm
algorithmIn 1973, the U.S. National Standards Bureau began to study data encryption standards for computer systems in other departments except the Ministry of Defence, and issued two public announcements on May 15, 1973 and August 27, 1974 to solicit encryption algorithms. In January 1977, the Government of the United States issued the adoption of IBM-designed p
the decomposition of large numbers.
Because big data computing is carried out, RSA is slower than DES in the fastest case, whether it is software or hardware implementation. Speed has always been a defect of RSA. Generally, it is used only for a small amount of data encryption. Is a public key algorithm that supports variable-length keys. The length of the file block to be encrypted is also variable. asymmetric
When using the yum installation package of the Red Hat system, one option is the gpgcheck option. When I first started learning, I disabled this option by default, recently, I finally understood how gpg uses gpg as a user's personal encryption and signature protocol. In the gpg protocol, there are both symmetric and asymmetric passwords, and symmetric passwords a
and can be used anytime and anywhere.
(3) it is effective for any character. unlike some simple encryption algorithms, it is only valid for Spanish characters and cannot be restored to the original character after Chinese characters are encrypted.
XOR algorithm implementation
The previous section describes how to use the XOR operation to encrypt/decrypt user logon information. According to the principles o
First, MD5 encryption overviewMessage Digest algorithm MD5 (Chinese named message Digest Algorithm version fifth) is a hash function widely used in the field of computer security to provide integrity protection for messages. The algorithm's file number is RFC 1321 (R.rivest,mit Laboratory for computer science and RSA Data Security Inc. April 1992).MD5 is message-digest algorithm 5 (Information-Digest algorithm 5), which is used to ensure complete and
.
(2) it is fast and can be used anytime and anywhere.
(3) it is effective for any character. unlike some simple encryption algorithms, it is only valid for Spanish characters and cannot be restored to the original character after Chinese characters are encrypted.
XOR algorithm implementation
The previous section describes how to use the XOR operation to encrypt/decrypt user logon information. According to
AsymmetricAlgorithm: Public key encryption and Private Key decryption. Decryption of the private key is not transmitted over the network to ensure the security of the key.
Digital signature is a typical application of asymmetric encryption algorithms. It ensures the integrity of information transmission, the sender's identity authentication, and prevents the occ
and can be used anytime and anywhere.
(3) it is effective for any character. unlike some simple encryption algorithms, it is only valid for Spanish characters and cannot be restored to the original character after Chinese characters are encrypted.
XOR algorithm implementation
The previous section describes how to use the XOR operation to encrypt/decrypt user logon information. According to the principles o
Secretkeyspec (decryptBASE64 (key), KEY_MAC);Mac Mac = Mac.getinstance (Secretkey.getalgorithm ());Mac.init (Secretkey);return mac.dofinal (data);}/*** DES Algorithm * Can be replaced with any of the following algorithms, while the size of the key value is changed accordingly.** * DES key size must is equal to 56* Desede (TripleDES) key size must is equal to 112 or 168* AES key size must is equal to 128, or 256,but and 256 bits is available* Blowfish
Common encryption algorithms
Hashing (hash) function
MD5
SHA1
SHA256
Symmetric encryption algorithm
Des
3DES (use 3 keys, perform three encryption on the same data, strength enhancement)
AES (Advanced password standard, us
Encryption algorithm:MD5 The full name of the (one-way hashing algorithm) is message-digest algorithm 5MD5 algorithm principlehttp://blog.csdn.net/forgotaboutgirl/article/details/7258109Why do you say MD5 is not reversible? https://www.zhihu.com/question/22651987Base64The principle of coding --Base64 codingHttp://www.cnblogs.com/chengxiaohui/articles/3951129.htmlAesVernacular Interpretation symmetric
only removes the padding ' = ' at the end, but also changes the "+" and "/" in standard Base64 to "-" and "_" respectively, thus eliminating the need for conversion in URL codec and database storage. Avoids the increase in the length of encoded information in this process, and unifies the format of object identifiers in databases, forms, and so on.BASE64 is a symmetric encryption algorithm (PS:
remind you that the previously provided images may give you the illusion that the elliptic curve is symmetric on the X axis. In fact, the elliptic curve is not necessarily symmetrical about the X axis. Such as y2-xy = X3 + 1
V. Elliptic Curve in cryptography
We now have a preliminary understanding of the elliptic curve, which is worth noting. But please note that the elliptic curve we learned is continuous and not suitable for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.