Tag

AES

1 views collected around this technical thread.

Test Development Learning Exchange
Test Development Learning Exchange
Apr 30, 2025 · Information Security

Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR

This article presents concise Python examples for a wide range of encryption and encoding methods—including MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, and XOR—explaining their usage scenarios and highlighting the importance of selecting appropriate cryptographic techniques for security.

AESEncryptionHashing
0 likes · 7 min read
Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR
Test Development Learning Exchange
Test Development Learning Exchange
Mar 23, 2025 · Information Security

Implementing Symmetric Encryption in API Automation Testing with Python

This article explains the fundamentals of symmetric encryption, presents Python examples for AES and DES using the pycryptodome library, demonstrates how to encrypt API request data, and outlines key management and performance considerations for secure API automation testing.

AESAPI TestingDES
0 likes · 6 min read
Implementing Symmetric Encryption in API Automation Testing with Python
Python Programming Learning Circle
Python Programming Learning Circle
Feb 15, 2025 · Information Security

Building a File Encrypter in Python with AES and PBKDF2

This tutorial walks readers through building a Python‑based file encrypter using the Pycryptodome library, covering AES‑CBC encryption, PBKDF2 key derivation, functions for encrypting and decrypting files, environment setup on Windows, macOS and Linux, and a simple driver script for testing.

AESEncryptionFile Security
0 likes · 12 min read
Building a File Encrypter in Python with AES and PBKDF2
Selected Java Interview Questions
Selected Java Interview Questions
Jan 12, 2025 · Information Security

Encrypting and Dynamically Decrypting Spring Boot JAR Files for Secure Deployment

This article demonstrates a practical approach to protect sensitive Spring Boot applications by encrypting the JAR with AES, storing the key in a secure vault, and using a custom ClassLoader to decrypt and load classes at runtime, while highlighting key management, performance, and additional hardening considerations.

AESClassLoaderJAR encryption
0 likes · 8 min read
Encrypting and Dynamically Decrypting Spring Boot JAR Files for Secure Deployment
Architect's Guide
Architect's Guide
Dec 23, 2024 · Backend Development

Implementing API Request and Response Encryption/Decryption with Spring Boot and ControllerAdvice

This article walks through the design and implementation of symmetric AES encryption for both GET and POST API endpoints in a Spring Boot application, covering requirement analysis, data model definition, custom RequestBodyAdvice and ResponseBodyAdvice, serialization challenges with FastJSON vs Jackson, and final configuration to ensure consistent JSON output across encrypted and non‑encrypted responses.

AESAPI EncryptionBackend
0 likes · 12 min read
Implementing API Request and Response Encryption/Decryption with Spring Boot and ControllerAdvice
Code Ape Tech Column
Code Ape Tech Column
Nov 22, 2024 · Information Security

Design and Implementation of Secure Data Transmission in Spring Boot Using AES/RSA Encryption

This article explains how to ensure secure data transmission between front‑end and back‑end in a Spring Boot application by employing hybrid AES/RSA encryption, custom request wrappers, filters for decryption, and AOP for response encryption, complete with utility classes and testing examples.

AESAOPEncryption
0 likes · 44 min read
Design and Implementation of Secure Data Transmission in Spring Boot Using AES/RSA Encryption
Java Architect Essentials
Java Architect Essentials
Aug 29, 2024 · Information Security

Combining RSA and AES for Secure API Parameter Transmission: A Practical Guide

This article explains a real‑world incident where insecure API parameters led to leaderboard manipulation, then details how to securely combine RSA asymmetric encryption with AES symmetric encryption, covering key concepts, padding modes, implementation steps, and server‑side decryption using Java.

AESAPI securityEncryption
0 likes · 22 min read
Combining RSA and AES for Secure API Parameter Transmission: A Practical Guide
php中文网 Courses
php中文网 Courses
Jul 4, 2024 · Information Security

Overview of Common PHP Encryption Algorithms

This article introduces several widely used PHP encryption algorithms—including MD5, SHA family, AES, RSA, and Base64 encoding—explaining their functions, security considerations, and PHP functions for implementation, while also mentioning additional algorithms like DES, RC4, and Blowfish for specific use cases.

AESEncryptionHashing
0 likes · 3 min read
Overview of Common PHP Encryption Algorithms
Architect
Architect
Jun 19, 2024 · Information Security

Implementing RSA and AES Hybrid Encryption for API Security in Java

This article describes a real‑world API security incident, explains the fundamentals of asymmetric RSA and symmetric AES encryption, and provides a complete Java implementation—including a hybrid encryption strategy, custom @RequestRSA annotation, Spring AOP decryption aspect, and utility classes—to securely transmit and automatically decrypt request parameters.

AESAPI securityEncryption
0 likes · 23 min read
Implementing RSA and AES Hybrid Encryption for API Security in Java
Code Ape Tech Column
Code Ape Tech Column
May 11, 2024 · Information Security

Hybrid RSA‑AES Encryption for Secure API Parameter Transmission in Java

This article recounts a leaderboard data breach caused by tampered Base64 request parameters, then details a hybrid RSA‑AES encryption strategy—using RSA to protect the AES key, IV and timestamp while AES encrypts the actual payload—along with Java implementations, key‑generation utilities, and a Spring AOP aspect for automatic decryption, providing a comprehensive guide to securing API communications.

AESAPI securityBackend
0 likes · 20 min read
Hybrid RSA‑AES Encryption for Secure API Parameter Transmission in Java
Architect
Architect
Apr 5, 2024 · Backend Development

Implementing a Spring Boot Encryption/Decryption Starter with Hutool-Crypto

This article explains how to build a reusable Spring Boot starter that automatically encrypts response data and decrypts request payloads using Hutool-Crypto's AES utilities, covering request stream handling, validation, custom starter configuration, and example code for controllers and entities.

AESEncryptionHutool
0 likes · 23 min read
Implementing a Spring Boot Encryption/Decryption Starter with Hutool-Crypto
Test Development Learning Exchange
Test Development Learning Exchange
Dec 22, 2023 · Information Security

Python Encryption and Decryption Code Examples for Various Algorithms

This article provides Python implementations and usage examples for a range of encryption and decryption techniques—including AES, RSA, Caesar cipher, Base64, SHA‑256/HMAC, Blowfish, DES, ChaCha20‑Poly1305, and XOR—along with notes on required libraries and security considerations.

AESEncryptionPython
0 likes · 11 min read
Python Encryption and Decryption Code Examples for Various Algorithms
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Aug 28, 2023 · Information Security

How to Secure API Transmission with Spring Boot, Vue, and AES/DES Encryption

This guide explains how to protect API data exchange by implementing HTTPS, JWT, rate limiting, MAC, and symmetric encryption (AES/DES) in a Spring Boot backend, while using Vue and Axios on the frontend, including custom annotations, request/response advice, and crypto‑js utilities for end‑to‑end encryption.

AESAPI securityJWT
0 likes · 15 min read
How to Secure API Transmission with Spring Boot, Vue, and AES/DES Encryption
IT Services Circle
IT Services Circle
Aug 22, 2023 · Information Security

Understanding Symmetric and Asymmetric Encryption: Public/Private Keys, AES, and RSA

This article explains the basic concepts of encryption, distinguishes between symmetric and asymmetric methods, describes how public and private keys work, and compares common algorithms such as AES and RSA, highlighting their security properties, performance trade‑offs, and typical use cases.

AESEncryptionRSA
0 likes · 8 min read
Understanding Symmetric and Asymmetric Encryption: Public/Private Keys, AES, and RSA
Code Ape Tech Column
Code Ape Tech Column
Dec 14, 2022 · Information Security

Implementing API Request and Response Encryption in Spring Boot with ControllerAdvice

This article walks through a complete Spring Boot solution for encrypting and decrypting API requests and responses, covering requirement analysis, data models, custom ControllerAdvice implementations, serialization challenges, and practical code examples using AES and Jackson.

AESAPI securityControllerAdvice
0 likes · 14 min read
Implementing API Request and Response Encryption in Spring Boot with ControllerAdvice
Architect's Guide
Architect's Guide
Nov 30, 2022 · Information Security

How to Perform Fuzzy Queries on Encrypted Data

This article reviews why reversible encryption is needed for certain sensitive fields, classifies three categories of fuzzy‑search‑on‑encrypted‑data techniques—naïve, conventional, and advanced—and evaluates their implementation steps, performance trade‑offs, and practical recommendations.

AESData SecurityDatabase
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data
Aikesheng Open Source Community
Aikesheng Open Source Community
Nov 3, 2022 · Databases

Using MySQL AES_ENCRYPT and AES_DECRYPT for Data Encryption

This article explains MySQL's native data encryption capabilities, detailing the AES_ENCRYPT/AES_DECRYPT functions, their parameters, storage considerations, example usage, and best‑practice recommendations for secure and efficient encryption of sensitive fields.

AESEncryptionMySQL
0 likes · 8 min read
Using MySQL AES_ENCRYPT and AES_DECRYPT for Data Encryption
Code Ape Tech Column
Code Ape Tech Column
Jul 27, 2022 · Backend Development

Implementing Request and Response Encryption in Spring MVC with ControllerAdvice

This article presents a step‑by‑step guide on securing Spring MVC interfaces by encrypting and decrypting both GET and POST requests using symmetric AES, custom ControllerAdvice components, and Jackson configuration to ensure consistent JSON serialization across mobile, H5, and backend services.

AESControllerAdviceEncryption
0 likes · 12 min read
Implementing Request and Response Encryption in Spring MVC with ControllerAdvice