For security reasons, we typically choose an encryption method to encrypt text that requires security, while BASE64 encryption and DES64 encryption are common cryptographic algorithms. I remember what I used in the previous project was the
Encryption and decryption were once an important component of my graduation project. After many years of work, it was too simple to recall the encryption and decryption algorithm at that time.To put it
Base64 is one of the most common coding methods for transmitting 8Bit byte code on the network, and you can view the rfc2045~rfc2049, which has a MIME detail specification. The BASE64 encoding can be used to pass longer identity information in an
To put it bluntly, here we mainly describe some encryption and decryption algorithms implemented by Java, and finally introduce digital certificates. For example, the basic one-way encryption algorithm:
Base64 strictly speaking, it belongs to the
Base64 is one of the most common encoding methods for transmitting 8Bit bytes of code on the network, and you can view rfc2045~rfc2049, which has a detailed specification of MIME. BASE64 encoding can be used to pass longer identity information in an
Basic one-way encryption algorithm:BASE64 strictly speaking, it belongs to the encoding format, not the encryption algorithmMD5 (Message Digest algorithm 5, Information Digest algorithm)SHA (Secure Hash algorithm, security hashing algorithm)HMAC
Base64 is one of the most common encoding methods for transmitting 8Bit bytes of code on the network , and you can view rfc2045~rfc2049, which has a detailed specification of MIME. BASE64 encoding can be used to pass longer identity information in
Java one-Way encryption algorithm Summary (1)--base64 algorithmStarting with the simplest of the most common cryptographic algorithms and demos used in Java, start with this article.Easy to understandBase64 is not strictly a cryptographic algorithm,
Chapter 2: Base64, URLBase64, and base64urlbase64
2.1 Basic algorithm rules:
Public encryption algorithms
The encrypted key is not public.
The features of Base64 algorithm disclosure and Key Disclosure do not comply with basic algorithm rules,
[Preface]This article briefly introduces the concepts related to encryption technology, and finally summarizes the existing encryption technology in java as well as its usage and examples.
1. Simple concept
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
and provide relevant evidence. A staff member will contact you within 5 working days.