OPPO Amber Lab
OPPO Amber Lab
Oct 26, 2020 · Information Security

Understanding Core Cryptography Concepts: Public Keys, Digital Signatures, and AEAD

This article introduces essential cryptography fundamentals for programmers, covering public‑key encryption, key‑exchange protocols, digital envelopes, signatures, certificates, hash functions, MACs, and authenticated encryption with associated data, while highlighting practical security considerations.

AEADdigital signaturehash function
0 likes · 5 min read
Understanding Core Cryptography Concepts: Public Keys, Digital Signatures, and AEAD
WeChat Backend Team
WeChat Backend Team
Dec 9, 2016 · Information Security

Understanding TLS Record Protocol: Encryption, MAC, and Key Management

This article explains how the TLS record layer encrypts and authenticates application data by fragmenting, sequencing, optionally compressing, encrypting, computing HMAC, and transmitting over TCP/IP, while detailing the security parameters, key derivation, and the evolution from MAC‑then‑Encrypt to AEAD modes.

AEADEncryptionKey Expansion
0 likes · 15 min read
Understanding TLS Record Protocol: Encryption, MAC, and Key Management