cryptography

Read about cryptography, The latest news, videos, and discussion topics about cryptography from alibabacloud.com

Symmetric cipher, asymmetric cipher, hashing algorithm and PKI

symmetric cipher, asymmetric cipher, hashing algorithm and PKICryptography issues to solve: confidentiality, integrity, authentication (anti-repudiation):First, symmetric password:Symmetric cryptography: The sender and recipient use a single key

Java encryption and digital signature programming _jsp programming

This article mainly discusses cryptography and digital signature, and how it is used in Java. The partner who is interested in cryptography is recommended to see Bruce Schneier's book: Applied Crypotography. There has been a great improvement in

Overview of XML Signatures

Xml   absrtact: This paper introduces the XML signature in a comprehensive way, but it is not explored in depth. My level is limited, mistakes unavoidably, welcome correction, common discussion.   Directory: XML Signature Overview ... 1 Brief

Code Legends | CAS Academician, Turing Award, the only Chinese-American winner: Andrew Yao

Code Legends Andrew Yao Turing Award winner Andrew Yao: 57-year-old resolutely returned to sell in the United States property Academician of CAs, dean of Interdisciplinary information Research Institute of Tsinghua University, is a world-renowned

Cryptography Hash Function __ Cryptography

What is a hash function. A hash function is a mathematical function that has the following three attributes: Enter a string that can be of any size; it produces a fixed-size output; for a specific input string, the result can be calculated at a

ASP. NET uses X509Certificate2 to solve a series of problems,

ASP. NET uses X509Certificate2 to solve a series of problems, When you make a refund, because you need to use the p12 certificate, the results encountered a series of pitfalls. Make a record for future reference. Code for loading the original

Introduction to the principle of ECC encryption algorithms

Preface Like RSA (names of Ron Rivest, Adi Shamir, And Len Adleman), ECC (elliptic curves cryptography, Elliptic Curve Cryptography) is also a public key algorithm. At present, there are not many public documents about ECC in China (I have not found

Use ASP. NET to encrypt cookie data

Use ASP. NET to encrypt cookie dataTang Jinhua 2003-1-21 13:34:54 Cookies provide convenience for both visitors and programmers in Web applications. However, there are security

Test signature and verify signature

Static Void Main ( String [] ARGs) {system. Security. cryptography. cspparameters para = New System. Security. cryptography. cspparameters (); para. keycontainername = " G " ; Para. keynumber = 2 ; System. Security. cryptography.

How to mcrypt the extension library for encryption and decryption _php tutorial

Summary: Mcrypt 2.4.7 is a powerful cryptographic algorithm extension library that includes 22 algorithms, including the following algorithms:???? Blowfish RC2 safer-sk64 Xtea???? Cast-256 RC4 safer-sk128???? DES Rc4-iv Serpent???? Enigma Rijndael-12

Encrypt and decrypt the Mcrypt Extension Library

The limcrypt extension library is used for encryption and decryption. Read the limcrypt extension library for encryption and decryption. Summary: Mcrypt2.4.7 is a powerful encryption algorithm Extension Library, which includes 22 algorithms, which

Private Key in data public key encryption and authentication

This involves mainly the concepts in cryptography. In general, we also have cryptography-like things in our computer, such as kerbovers, so we can leave them here for more information. I have previously written an article titled "secure login

A Reversible Encryption Class (using 3DES encryption)

I. Summary Namespace: System. Security. Cryptography. TripleDES class Simple Description: it indicates the base class of the Triple Data Encryption Standard algorithm. All implementations of TripleDES must be derived from this base class. Is

Encryption and decryption Technology Foundation, PKI and private CA creation

In the OSI model and the TCP/IP model, the application sends a data to the server, through a number of paths to reach the server, on the way to the transmission, because the data is clear, and anyone can view, which poses a risk to the data.

SSL and CA Creation

In the OSI model and the TCP/IP model, the application sends a data to the server, through a number of paths to reach the server, on the way to the transmission, because the data is clear, and anyone can view, which poses a risk to the data.

I have been studying the configuration of Enterprise Library over the past few days.

First, the configurationmanager class is actually a collection of basic operation configuration data methods. This class has no specific purpose. The most important class is the configurationbuilder class, which is the class for initial

How to encrypt and decrypt the Mcrypt extension Library

Summary: Mcrypt 2.4.7 is a powerful extension library for encryption algorithms. It includes 22 algorithms, including the following algorithms :???? Blowfish RC2 Safer-sk64 xtea ???? Cast-256 RC4 Safer-sk128 ???? DES RC4-iv Serpent ???? Enigma

Linux about cryptographic decryption technology fundamentals, KPIs, and creating private CAs

Linux encryption and decryption technology fundamentals, KPIs, and creating private CAsOne, the encryption method is divided into:1. Symmetric encryption: Encryption and decryption using the same key;Symmetric encryption: The encryption method using

WSE3.0 Building Web Services Security (2)

WSE3.0 Building Web Services Security (2) Asymmetric encryption, public key, key, certificate, signature differences and contacts, and X.509 certificate acquisition and management Previous article WSE3.0 Building Web Services Security (1): WSE3.0

In-depth PHP Data encryption detailed _php skills

The role of data encryption in our lives has become increasingly important, especially given the large number of transactions and data transmissions that occur on the web. If you are interested in adopting security measures, you will also be

Total Pages: 15 1 .... 10 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.