The simple Java encryption algorithm is:
BASE64 strictly speaking, it belongs to the encoding format, not the encryption algorithm
MD5 (Message Digest algorithm 5, Information Digest algorithm)
SHA (Secure Hash algorithm
, compared with the previous algorithm does not have a new idea, just based on the object survival period of the different memory divided into several pieces.In general, the Java heap is divided into the new generation and the old age , so that according to the characteristics of each era to adopt the most appropriate collection algorithm. In the Cenozoic, each g
fully blend the operations of each straight line in the matrix. This step uses a linear transformation to mix four bytes of each column.
Omit the Mixcolumns step in the last cryptographic loop and replace it with another addroundkey.
Java Basic implementation:
Package com.stone.security;
Import Java.util.Arrays;
Import Javax.crypto.Cipher;
Import Javax.crypto.KeyGenerator;
Import Javax.crypto.SecretKey;
Import Javax.crypto.spec.Iv
This article uses the Java self-contained messagedigest to implement the MD5 encryption algorithm for the text, the specific code is as follows:
/** * @Description: Convert the string into MD5 * * Package cn.yicha.novel.util;
Import Java.security.MessageDigest;
Import java.security.NoSuchAlgorithmException; public class ParseMD5 {/** * @param str * @return * @Description: 32-bit lowercase MD5/
algorithm, we still need to make a data complement to the information. The difference is that this complement makes the byte length of its information add 448 bytes and becomes a multiple of 512 (information byte length mod 512 =448). In addition, there is a big difference between the processing of MD4 and the MD2 algorithm. Eventually, however, a hash value of 128 is still obtained. MD4
The JDK's javax. crypto package provides support for encryption and decryption of some common algorithms. This article describes how to use the DES algorithm to encrypt and decrypt data. Generally, the Data Encryption party uses the key to encrypt the data, and the data decryption party uses the same key to decrypt the data. This key is a binary file containing 8 bytes. the encryption and decryption party can be any development language.
You can use
replication operations will be performed, and the efficiency becomes lower; : The size of the hotspot virtual machine default Eden and Survivor is 8:1.
3, tag-finishing algorithm (mark-compact)
1, the tagging process is the same as the "mark-clear" algorithm; 2, the next step is not to clean up the reclaimed object directly, but to let all surviving objects move
Translator's preface
This blog is actually a series of replies from Uncle Bob to xreborner (in the previous blog, xreborner proposed a series of sharp ideas for Uncle Bob to protect C ++ rights ).
Body
I compared the time consumption of C ++, Java, and Ruby in a recent blog. One of the participants (xreborner) submitted a convex hull algorithm code. It took me a long time to study the pitfalls. I did not fi
, to see if its score is equal to the top-4/3, or left-4/3, or left +1, or left-1/3. In short, just look at the tuple as "who's coming from."4) The critical condition of the backtracking termination is that a tuple has a score of 0, which means that we have not found a substring that matches the two strings.5) After the entire backtracking process is complete, the following substring is found:AaugccauugAcagcc-ucgHere is the source code written in the Java
algorithm.
Generation Garbage Collection details
Shows the Generation Distribution in the Java heap.
Young (Young generation)The young generation is divided into three zones. One Eden zone and two vor zones. Most objects are stored inGenerated in the Eden area. When the Eden area is full, the surviving objects will be copied to the same vor area (one of the two). When the same vor area is full, the surv
Garbage collection (Garbage Collection, GC) is one of the important features of Java that differs from C and C + +.He helps Java automatically empty objects that are no longer used in the heap.Because there is no need to manually free up memory, programmers can reduce the chance of making mistakes in programming.With garbage collection, programmers can avoid some pointers and memory leaks related bugs (this
This article mainly introduces the Java implementation of the Fast sorting algorithm (Quicktsort), the need for friends can refer to the The fast sorting algorithm introduces the method of divide-and-conquer to design the algorithm in fast sorting and merging sort. The difference is that the merge sort divides the ar
elements in the following insertion sorting algorithm, in order to write a program we can introduce a sentinel element L[0], which is less than any record in L[1..N]. So, we have a constant-∞ in the type ElementType of the element, which is smaller than any record that might occur. If the constant-∞ is not good in advance, it is necessary to check if the current position is 1 before deciding whether L[i] will move forward, and if the current position
generational Collection algorithm to divide memory into chunks based on the lifetime of the object. In general, the Java heap is divided into the new generation and the old age, so you can use the most appropriate collection algorithm according to the characteristics of each age. The new generation uses the replication algor
To find the shortest path in the program, I used the dijela algorithm, found an implementation on the Internet, and then upgraded myself to a lower level, as shown below:
Package reverse;Import java. util. ArrayList;Import java. util. HashMap;Import java. util. List;Import java
"); after introducing "virtual nodes, calculate the hash values of cache A1 and cache A2 at "virtual node": Hash ("2018.14.241 #1"); // cache A1 Hash ("2018.14.241 #2 "); // cache A2 The following is the java code for implementing this algorithm: First, we implement a HashFunction, refer to net. spy. memcached. the hash algorithm in DefaultHashAlgorithm. The KETA
In Java, a hashcode algorithm can be used to compute the hash value of a string, today a friend suddenly asked me if I can calculate the hashcode in JS, the requirements and Java hashcode calculation results.
For Java Hashcode, has not known its algorithm until now, but gue
The example of this article describes the Java implementation des Encryption and decryption algorithm analysis. Share to everyone for your reference, specific as follows:
Brief introduction:
Data encryption Algorithm (encryption Algorithm,dea) is a symmetric encryption algorithm
small, 5W data sorting is already unbearable .... It's far less efficient than LUA, so just use it as a web crud. Even if you configure the page memory pool size to meet the requirements of 5000 it takes close to 2s~ ~ ~ still enclose the code. java Real Fast sorting algorithm if it is not because the Java Big Data processing JVM is prone to stack overflow, th
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.