Tagged articles
54 articles
Page 1 of 1
Linux Tech Enthusiast
Linux Tech Enthusiast
May 15, 2026 · Information Security

Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS Handshake

The article explains HTTP’s plaintext nature and its susceptibility to man‑in‑the‑middle attacks, then details how HTTPS (TLS) uses asymmetric key exchange, certificates, and a trusted CA hierarchy to establish encrypted communication and prevent such attacks.

AESCACertificate
0 likes · 10 min read
Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS Handshake
Black & White Path
Black & White Path
Mar 24, 2026 · Information Security

Step‑by‑Step Reconstruction of Mini‑Program/Web Encryption Authentication Bypass Cases

The article walks through six real penetration‑testing scenarios, dissecting common encryption and authentication mechanisms in mini‑programs and web applications, demonstrating how to reverse‑engineer, debug, and script the bypass of Hawk signatures, MD5 timestamps, RSA and AES encryptions to achieve unauthorized data access and account takeover.

AESAuthentication BypassHawk protocol
0 likes · 13 min read
Step‑by‑Step Reconstruction of Mini‑Program/Web Encryption Authentication Bypass Cases
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 27, 2026 · Information Security

Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS and CA Trust

HTTPS secures web communication by replacing plaintext HTTP with TLS encryption, using asymmetric key exchange to protect symmetric keys, and relying on a hierarchical CA certificate chain to verify server identities, thereby preventing man‑in‑the‑middle attacks that exploit HTTP’s unencrypted traffic.

AESCertificate AuthorityHTTPS
0 likes · 10 min read
Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS and CA Trust
Code Wrench
Code Wrench
Sep 12, 2025 · Information Security

Master Secure Go Cryptography: Common Pitfalls & Best Practices

This article provides a comprehensive guide to Go cryptography, covering fundamental concepts, common mistakes like using math/rand for keys or RSA v1.5 padding, correct implementations with crypto/rand, AES‑GCM, RSA‑OAEP/PSS, password‑derived keys, performance benchmarks, and practical testing strategies.

AESGoRSA
0 likes · 12 min read
Master Secure Go Cryptography: Common Pitfalls & Best Practices
Test Development Learning Exchange
Test Development Learning Exchange
Apr 30, 2025 · Information Security

Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR

This article presents concise Python examples for a wide range of encryption and encoding methods—including MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, and XOR—explaining their usage scenarios and highlighting the importance of selecting appropriate cryptographic techniques for security.

AESHashingRSA
0 likes · 7 min read
Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR
Architect
Architect
Apr 12, 2025 · Backend Development

Secure Spring Boot APIs with Hybrid AES‑RSA Encryption, Transparent Request Wrappers, and Response‑Encryption AOP

This article walks through a complete solution for protecting data in Spring Boot applications, covering symmetric, asymmetric, and hybrid encryption schemes, utility classes for AES and RSA, a custom HttpServletRequestWrapper to enable multiple reads of the request body, a filter that transparently decrypts incoming parameters, and an AOP‑based response‑encryption mechanism triggered by a custom annotation.

AESRSASpring Boot
0 likes · 45 min read
Secure Spring Boot APIs with Hybrid AES‑RSA Encryption, Transparent Request Wrappers, and Response‑Encryption AOP
Python Programming Learning Circle
Python Programming Learning Circle
Feb 15, 2025 · Information Security

Building a File Encrypter in Python with AES and PBKDF2

This tutorial walks readers through building a Python‑based file encrypter using the Pycryptodome library, covering AES‑CBC encryption, PBKDF2 key derivation, functions for encrypting and decrypting files, environment setup on Windows, macOS and Linux, and a simple driver script for testing.

AESFile SecurityPyCryptodome
0 likes · 12 min read
Building a File Encrypter in Python with AES and PBKDF2
Selected Java Interview Questions
Selected Java Interview Questions
Jan 12, 2025 · Information Security

Encrypting and Dynamically Decrypting Spring Boot JAR Files for Secure Deployment

This article demonstrates a practical approach to protect sensitive Spring Boot applications by encrypting the JAR with AES, storing the key in a secure vault, and using a custom ClassLoader to decrypt and load classes at runtime, while highlighting key management, performance, and additional hardening considerations.

AESJAR encryptionSecure Coding
0 likes · 8 min read
Encrypting and Dynamically Decrypting Spring Boot JAR Files for Secure Deployment
Architect's Guide
Architect's Guide
Dec 23, 2024 · Backend Development

Implementing API Request and Response Encryption/Decryption with Spring Boot and ControllerAdvice

This article walks through the design and implementation of symmetric AES encryption for both GET and POST API endpoints in a Spring Boot application, covering requirement analysis, data model definition, custom RequestBodyAdvice and ResponseBodyAdvice, serialization challenges with FastJSON vs Jackson, and final configuration to ensure consistent JSON output across encrypted and non‑encrypted responses.

AESBackendControllerAdvice
0 likes · 12 min read
Implementing API Request and Response Encryption/Decryption with Spring Boot and ControllerAdvice
Architect
Architect
Nov 30, 2024 · Information Security

Secure Spring Boot API Data Transmission with AES/RSA Hybrid Encryption

This article explains how to protect front‑end and back‑end communication in a Spring Boot application by encrypting request and response data using a hybrid AES and RSA scheme, custom request wrappers, filters, and AOP‑based response encryption, complete with code examples and implementation details.

AESAPI SecurityBackend
0 likes · 48 min read
Secure Spring Boot API Data Transmission with AES/RSA Hybrid Encryption
php Courses
php Courses
Jul 4, 2024 · Information Security

Overview of Common PHP Encryption Algorithms

This article introduces several widely used PHP encryption algorithms—including MD5, SHA family, AES, RSA, and Base64 encoding—explaining their functions, security considerations, and PHP functions for implementation, while also mentioning additional algorithms like DES, RC4, and Blowfish for specific use cases.

AESHashingPHP
0 likes · 3 min read
Overview of Common PHP Encryption Algorithms
Architect
Architect
Jun 19, 2024 · Information Security

Implementing RSA and AES Hybrid Encryption for API Security in Java

This article describes a real‑world API security incident, explains the fundamentals of asymmetric RSA and symmetric AES encryption, and provides a complete Java implementation—including a hybrid encryption strategy, custom @RequestRSA annotation, Spring AOP decryption aspect, and utility classes—to securely transmit and automatically decrypt request parameters.

AESRSAencryption
0 likes · 23 min read
Implementing RSA and AES Hybrid Encryption for API Security in Java
Programmer DD
Programmer DD
May 14, 2024 · Information Security

Why My Game Score Rankings Went Crazy: Lessons from RSA & AES API Encryption

The article recounts a real‑world incident where a game’s leaderboard showed absurd scores due to insecure API parameters, then explains RSA and AES fundamentals, demonstrates how to combine asymmetric and symmetric encryption for secure request handling, and provides Java code, custom annotations, and AOP logic to automate decryption on the server side.

AESAPI SecurityBackend
0 likes · 23 min read
Why My Game Score Rankings Went Crazy: Lessons from RSA & AES API Encryption
Open Source Tech Hub
Open Source Tech Hub
May 13, 2024 · Information Security

How to Implement AES Encryption in Java and PHP: Code, Comparison, and Tips

This guide explains the fundamentals of AES symmetric encryption, compares Java and PHP implementations, highlights their shared features and differences, provides complete code samples for encryption and decryption, and offers practical advice on key management, IV usage, and performance considerations.

AESPHPSymmetric Cryptography
0 likes · 8 min read
How to Implement AES Encryption in Java and PHP: Code, Comparison, and Tips
Architect
Architect
Apr 5, 2024 · Backend Development

Implementing a Spring Boot Encryption/Decryption Starter with Hutool-Crypto

This article explains how to build a reusable Spring Boot starter that automatically encrypts response data and decrypts request payloads using Hutool-Crypto's AES utilities, covering request stream handling, validation, custom starter configuration, and example code for controllers and entities.

AESRequestBodyAdviceSpring Boot
0 likes · 23 min read
Implementing a Spring Boot Encryption/Decryption Starter with Hutool-Crypto
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Aug 28, 2023 · Information Security

How to Secure API Transmission with Spring Boot, Vue, and AES/DES Encryption

This guide explains how to protect API data exchange by implementing HTTPS, JWT, rate limiting, MAC, and symmetric encryption (AES/DES) in a Spring Boot backend, while using Vue and Axios on the frontend, including custom annotations, request/response advice, and crypto‑js utilities for end‑to‑end encryption.

AESAPI SecurityJWT
0 likes · 15 min read
How to Secure API Transmission with Spring Boot, Vue, and AES/DES Encryption
The Dominant Programmer
The Dominant Programmer
May 31, 2023 · Backend Development

SpringBoot Essentials: AES Encryption, Netty TCP Client, Redis Integration, and More

This article compiles a series of practical SpringBoot implementations—including AES encryption with Vue, a Netty‑based TCP client that parses hex data into MySQL, multiple Redis integration patterns, strategy‑factory designs, custom annotations for rate limiting, global exception handling, and scheduled tasks—each linked to detailed examples.

AESNettySpringBoot
0 likes · 5 min read
SpringBoot Essentials: AES Encryption, Netty TCP Client, Redis Integration, and More
Architect's Guide
Architect's Guide
Nov 30, 2022 · Information Security

How to Perform Fuzzy Queries on Encrypted Data

This article reviews why reversible encryption is needed for certain sensitive fields, classifies three categories of fuzzy‑search‑on‑encrypted‑data techniques—naïve, conventional, and advanced—and evaluates their implementation steps, performance trade‑offs, and practical recommendations.

AESalgorithmdata security
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data
Top Architect
Top Architect
Jul 3, 2022 · Backend Development

Implementing Request and Response Encryption in Spring MVC Using ControllerAdvice

This article demonstrates how to secure GET and POST API endpoints in a Spring MVC application by encrypting request bodies and responses with AES, using custom ControllerAdvice classes, handling serialization issues with FastJSON and Jackson, and configuring ObjectMapper for proper date and enum formatting.

AESControllerAdviceJackson
0 likes · 15 min read
Implementing Request and Response Encryption in Spring MVC Using ControllerAdvice
Java High-Performance Architecture
Java High-Performance Architecture
Jul 3, 2022 · Backend Development

Securing Spring Boot APIs with Request/Response Encryption via ControllerAdvice

This article walks through implementing symmetric request and response encryption for Spring Boot APIs—covering requirements, data models, controller examples, debugging serialization issues, and using ControllerAdvice with Jackson to ensure encrypted payloads remain compatible across Android, iOS, and H5 clients.

AESControllerAdviceJackson
0 likes · 13 min read
Securing Spring Boot APIs with Request/Response Encryption via ControllerAdvice
Architecture Digest
Architecture Digest
May 24, 2022 · Information Security

Encryption Algorithms and Their Application in User Management Modules

This article introduces common encryption algorithms—symmetric, asymmetric, and hash—explains where encryption is needed in a user management module, and details implementation steps using RSA and AES128, while also warning about man‑in‑the‑middle attacks and recommending best practices.

AESMD5RSA
0 likes · 9 min read
Encryption Algorithms and Their Application in User Management Modules
Python Crawling & Data Mining
Python Crawling & Data Mining
Nov 15, 2021 · Information Security

Python Encryption Guide: Base64, MD5, SHA1, HMAC, DES, AES, RSA

This article introduces common encryption methods—including Base64, MD5, SHA‑1, HMAC, DES, AES, and RSA—explains their principles, and provides complete Python code examples for encoding, decoding, and key handling, enabling readers to implement secure data transformations in their own projects.

AESBase64MD5
0 likes · 12 min read
Python Encryption Guide: Base64, MD5, SHA1, HMAC, DES, AES, RSA
JD Tech Talk
JD Tech Talk
Nov 3, 2021 · Information Security

HLS Encryption and DRM Techniques for Secure Video Delivery

This article explains the background, challenges, and technical solutions for protecting video content using HLS encryption, DRM standards, key protection, and token-based authentication, highlighting the limitations of simple encryption and proposing a multi-layered approach for secure streaming across platforms.

AESDRMDigital Rights Management
0 likes · 9 min read
HLS Encryption and DRM Techniques for Secure Video Delivery
Douyu Streaming
Douyu Streaming
Oct 29, 2021 · Information Security

Understanding SSL/TLS and DTLS: From Cryptographic Basics to WebRTC Security

This article explains the security risks of early Internet protocols, the evolution of SSL/TLS and DTLS, fundamental cryptographic concepts such as symmetric and asymmetric encryption, hashing, MACs, digital signatures, AES modes and padding, and how these technologies are applied in TLS handshakes, DTLS, and WebRTC.

AESDTLSSSL
0 likes · 27 min read
Understanding SSL/TLS and DTLS: From Cryptographic Basics to WebRTC Security
Programmer DD
Programmer DD
Aug 24, 2021 · Databases

Seamless Data Encryption with ShardingSphere: A Spring Guide

This article explains why encrypting sensitive customer data in databases is essential, outlines common pain points, and demonstrates how Apache ShardingSphere’s data‑desensitization module can be quickly configured in Spring (XML and Boot) to provide transparent AES encryption and decryption without altering business code.

AESDatabase SecurityShardingSphere
0 likes · 8 min read
Seamless Data Encryption with ShardingSphere: A Spring Guide
MaGe Linux Operations
MaGe Linux Operations
Jul 24, 2021 · Information Security

Master Go Encryption: MD5, HMAC, SHA1, AES, RSA and More Explained

This article introduces common encryption algorithms—including symmetric, asymmetric, and digital signature methods—and provides detailed Go code examples for MD5, HMAC, SHA1, AES (with various modes), and RSA, helping developers understand and implement secure cryptographic operations in Go.

AESHMACMD5
0 likes · 16 min read
Master Go Encryption: MD5, HMAC, SHA1, AES, RSA and More Explained
Programmer DD
Programmer DD
Nov 2, 2020 · Information Security

Unlock Java Encryption: A Hands‑On Guide to Bouncy Castle

This article introduces Java developers to the Bouncy Castle library, detailing how to integrate it via Maven, demonstrating MD5 hashing and AES encryption/decryption code, and highlighting usage considerations and export compliance risks associated with cryptographic algorithms.

AESBouncy CastleMD5
0 likes · 5 min read
Unlock Java Encryption: A Hands‑On Guide to Bouncy Castle
政采云技术
政采云技术
Oct 18, 2020 · Information Security

How to Secure Front‑End Data with Hybrid AES‑RSA Encryption: A Complete Guide

In the era of big data and GDPR, front‑end developers must protect personal information beyond HTTPS by using a hybrid AES‑RSA encryption scheme, and this article explains the threats, compares symmetric, asymmetric and hash algorithms, and provides full client‑side and Node.js server implementations with code examples.

AESGDPRJavaScript
0 likes · 16 min read
How to Secure Front‑End Data with Hybrid AES‑RSA Encryption: A Complete Guide
Fulu Network R&D Team
Fulu Network R&D Team
Sep 11, 2020 · Information Security

Symmetric Encryption Algorithms in .NET Core Using BouncyCastle

This article introduces symmetric encryption algorithms such as DES, 3DES, and AES, explains their principles, advantages and drawbacks, and provides complete .NET Core sample code using the BouncyCastle library for encryption and decryption with various padding modes.

.NET Core3DESAES
0 likes · 21 min read
Symmetric Encryption Algorithms in .NET Core Using BouncyCastle
Laravel Tech Community
Laravel Tech Community
May 13, 2020 · Information Security

PHP AES Encryption and Decryption Using OpenSSL

This article demonstrates how to replace the deprecated mcrypt functions in PHP with OpenSSL by providing a compact Aes class that handles AES‑128‑CBC encryption and decryption, including configuration of key, IV, and method, and shows practical usage examples.

AESOpenSSLdecryption
0 likes · 3 min read
PHP AES Encryption and Decryption Using OpenSSL
Java Backend Technology
Java Backend Technology
Jun 7, 2018 · Information Security

How to Secure API Calls with End-to-End Encryption Using Spring Boot

This article explains why API security is crucial in front‑end/back‑end separated systems and provides practical measures—including HTTPS, request signing, SSL pinning, and full request/response AES encryption—along with a Spring Boot starter and JavaScript Axios interceptor to protect data in transit.

AESAPI SecurityRSA
0 likes · 8 min read
How to Secure API Calls with End-to-End Encryption Using Spring Boot