Previous wordsThe basic certification described in the previous article is convenient and flexible, but extremely unsafe. The user name and password are transmitted in clear text, and no action is taken to prevent tampering with the message. The
No authentication method
After a correct client request is sent to the server, the HTTP server returns the 200 status code and directly returns the content.
Message example:
Request:
Get. http: // 10.127.194.3: 8061/voiceobjects .....
Return
Information digest encryption MD2, MD4, MD5, md2md4
The confidentiality of user data has always been a headache for Internet companies. How can we prevent the disclosure of users' personal information? Today we will introduce you to the information
Reprint Address: http://www.cnblogs.com/songwenlong/p/6517165.html
Table of Contents 0. Overview 1. Security of data transmission 2. Guaranteed Integrity 3. Guarantee the authenticity of the data 4. Public key Certificate 5. Algorithm detailed
Chapter 3 message digest algorithm-MD5, digest-md5
Note: In this section, refer to "verify data integrity-message digest algorithm" in Chapter 2nd of Java encryption and decryption art (version 6th"
3.1 message digest algorithm: prevents tampering
Basic authentication is convenient and flexible, but extremely unsafe. The user name and password are transmitted in clear text, and no action is taken to prevent tampering with the message. The only way to safely use Basic authentication is to use
First, briefMAC (message authentication code, messaging authentication Code algorithm) is a key hash function algorithm that is compatible with the features of the MD and SHA algorithms, and adds a key on this basis. So Mac algorithms are often
SHA and sha of message digest algorithm for Information Encryption
SHA is an implementation method of the message digest algorithm. The implementation of MD2 \ 4 \ 5 has been summarized earlier. Next, we will summarize the implementation of SHA.
Jdk
MAC (Message authentication code, messaging authentication Code algorithm) is a key hash function algorithm that is compatible with the features of the MD and SHA algorithms, and adds a key on this basis. So Mac algorithms are often called HMAC
Http authentication .... BASIC:In the context of an HTTP transaction, Basic access authentication are a method for a Web browser or other client Program to provide a user name and password when making a request. [1]Before transmission, the user name
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.