cryptography

Read about cryptography, The latest news, videos, and discussion topics about cryptography from alibabacloud.com

A detailed explanation of DES encryption and decryption algorithm

In recent time because the project needs, so has been committed to the network and information security, inevitably involved in information encryption and decryption, so these days have been hard to delve into cryptography. Cryptography is an

C # MD5 encryption,

C # MD5 encryption,First, let's briefly introduce MD5. The full name of MD5 is message-digest algorithm 5 (Information-digest algorithm, which was developed by mit laboratory for computer science and rsa data security inc ronald l in early 1990s.

How to Use the Mcrypt extension library for encryption and decryption

Summary: Mcrypt 2.4.7 is a powerful extension library for encryption algorithms. It includes 22 algorithms, including the following algorithms: Reference content is as follows: Blowfish RC2 Safer-sk64 xtea Cast-256 RC4 Safer-sk128 DES RC4-iv Serpent

Security https-Full details symmetric encryption, asymmetric encryption, digital signatures, digital certificates and HTTPS "under"

1. HTTPS1.1. What is HTTPSHTTPS (Hypertexttransfer Protocol Secure) is a secure HTTP. The security foundation for HTTPS is the Secure Sockets Layer (secure Sockets layer,ssl). HTTP works at the application layer (the highest layer of the OSI model),

How to use the Mcrypt extension library for encryption and decryption _ PHP Tutorial

How to use the Mcrypt extension library for encryption and decryption. Summary: Mcrypt2.4.7 is a powerful Extension Library for encryption algorithms. It includes 22 algorithms, including the following algorithms :???? BlowfishRC2Safer-sk64xtea ????

Detailed description of dynamic encryption/decryption technology (figure)

Comments: With the rapid development of computer and network technologies, more and more information is stored in personal and commercial computers in electronic form, and is widely transmitted through the network, in the mass storage and exchange

SSH Chinese documents

SSH Chinese documentsSSH is a security protocol created on the application layer and transport layer, which is used to replace the poor security telnet and secure login.SSH is currently a more reliable protocol that provides security for Telnet

Go The principle of SSL protocol and digital certificate

1 SSL (Secure Socket lclientyer) is a secure transport protocol designed primarily for Weserver by NETSCCLIENTPE Corporation. This kind of protocol has been widely used in weserver.SSL establishes an encrypted channel on top of TCP, and the data

(turn) understand the four tokens of Keystone

What's Token?Popularly speaking, token is a user's credential, need to take the correct user name/password to Keystone application to get. If users use username/password to access OpenStack API each time, it is easy to disclose user information,

Certificate related knowledge

Public key encryption This topic describes the public key encryption elements related to clear email security at a higher level. In addition, you can refer to other materials to learn more about the topic. Cryptography is a discipline that

Configuration (Zhuan) of Enterprise Library)

Lai zi http://www.vbgood.com/vb.good/article-do-view-articleid-3856.html First, the configurationmanager class is actually a collection of basic operation configuration data methods. This class has no specific purpose. The most important class

Network Security Note 1

I. Basic network security knowledge 1. network security means that the hardware and software of the network system and the data in the system are protected, and the system runs reliably and normally without accidental or malicious reasons. 2. Five

How to use the MCrypt extension library for encryption and decryption _php tutorial

Summary: Mcrypt 2.4.7 is a powerful cryptographic algorithm extension library that includes 22 algorithms, including the following: The following is the referenced content: Blowfish RC2 safer-sk64 Xtea Cast-256 RC4 safer-sk128 DES Rc4-iv

2017-2018-2 20165318 Experiment Report of Java object-oriented programming

2017-2018-2 20165318 Experiment Report of Java object-oriented programming experiment report I. COVER of experimental reportsCourse : Java Programming Class : 1653 class name : Sun Xiaolin No. : 20165318 Instructor: Lou Jia Peng experiment Date :

SUN Solaris Cryptographic Framework cipher System

Claiming to be a Solaris system administrator, you should understand the Solaris Cryptography system: The Solaris OS cryptographic Framework (SCF) cryptographic system provides users with application and kernel-module encryption services in a

The story of the password (go from MSDN)

The story of the password Billy Hollis. March 14, 2002 This article is caused by a problem. I need a way to keep my password in an encrypted file because I need to remember a lot of passwords, but my memory is not as good as before. I know there

China Blockchain Technology white Paper

1: Blockchain and cloud computing Blockchain technology development, research and testing work involving multiple systems, time and capital costs and other issues will hinder the breakthrough of blockchain technology, software development based on

RSA encryption and decryption and digital signature Java implementation

The RSA public Key cryptography algorithm was introduced in 1977 by Ronald Leevist (Ron rivest), Adi Samor (Adi Shamir) and Lennard Adman (Leonard Adleman). At the time, all three of them worked at MIT. RSA is the first letter of their three

Python-scrapy Frame

Scrapy is a fast and extensible crawler Framework for crawling Web site content developed using Python.Scrapy,python developed a fast, high-level screen capture and web crawling framework for crawling web sites and extracting structured data from

Introduction to CTF

Thanks to the white hat Adog a.k.a D3adca7 (Dead Cat & overbearing President), the following content for security enthusiasts Reference study, this article won the Contribution Award 300 yuan, will enter the author account, submission please send

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.