Tagged articles
33 articles
Page 1 of 1
Architect
Architect
Dec 5, 2025 · Information Security

How to Secure API Calls with Hybrid Symmetric‑Asymmetric Encryption and HTTPS

This guide explains a comprehensive API encryption scheme that combines symmetric and asymmetric cryptography, HTTPS principles, and WeChat Pay encryption to protect against crawlers, tampering, replay attacks, and ensure data integrity, complete with design rationale, implementation steps, code examples, and security analysis.

JavaWeChat Payasymmetric encryption
0 likes · 13 min read
How to Secure API Calls with Hybrid Symmetric‑Asymmetric Encryption and HTTPS
Su San Talks Tech
Su San Talks Tech
Jul 15, 2025 · Information Security

Master the 7 Most Essential Encryption Algorithms for Secure Systems

Explore the seven most commonly used encryption algorithms—including MD5, SHA families, HMAC, AES, DES/3DES, RSA, and DSA—detailing their principles, Java implementations, performance, and practical security guidelines, while highlighting real-world attack scenarios and best‑practice recommendations for robust information protection.

HashingJavaasymmetric encryption
0 likes · 9 min read
Master the 7 Most Essential Encryption Algorithms for Secure Systems
php Courses
php Courses
Apr 25, 2025 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, introduces HTTPS, demonstrates how to apply symmetric encryption algorithms like AES in PHP, and shows how to use PHP's OpenSSL extension for asymmetric encryption, providing practical code examples and key‑management tips.

HTTPSPHPasymmetric encryption
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
php Courses
php Courses
Jan 16, 2025 · Information Security

Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption

This article explains how to secure PHP data transmission using HTTPS, symmetric encryption (AES, DES, 3DES) and asymmetric encryption with OpenSSL, providing code examples and key management advice to protect confidentiality, integrity, and prevent man‑in‑the‑middle attacks.

HTTPSPHPasymmetric encryption
0 likes · 4 min read
Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption
Raymond Ops
Raymond Ops
Jan 7, 2025 · Information Security

Mastering SSH: Asymmetric Encryption, Authentication, and Configuration Explained

This comprehensive guide explores the fundamentals of asymmetric encryption, delves into SSH’s architecture—including host verification, user authentication, and key management—provides detailed walkthroughs of configuration files, command usage, SCP transfers, automation scripts, and performance optimization techniques for secure and efficient remote access.

AutomationConfigurationPublic Key Authentication
0 likes · 47 min read
Mastering SSH: Asymmetric Encryption, Authentication, and Configuration Explained
php Courses
php Courses
Jul 31, 2024 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, then demonstrates three PHP-based methods—enabling HTTPS via SSL/TLS, applying symmetric algorithms such as AES, and using asymmetric encryption with OpenSSL—to protect confidentiality, integrity, and authentication of web communications.

HTTPSasymmetric encryptiondata security
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
Top Architect
Top Architect
Jul 12, 2024 · Information Security

API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques

This article presents a comprehensive API encryption scheme that combines symmetric and asymmetric cryptography, hashing, and digital signatures, explains HTTPS fundamentals, details WeChat Pay encryption, outlines key exchange and data protection processes, provides Java code examples, and analyzes security, anti‑tampering, anti‑replay, and performance considerations.

API SecurityHTTPSHashing
0 likes · 16 min read
API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques
Selected Java Interview Questions
Selected Java Interview Questions
May 22, 2024 · Information Security

Design and Implementation of API Encryption Using HTTPS and WeChat Pay Principles

This article presents a comprehensive design and implementation guide for securing API interfaces by combining HTTPS fundamentals with WeChat Pay encryption techniques, detailing symmetric and asymmetric encryption, hashing, signature verification, key exchange, parameter handling, and backend processing to protect against tampering, replay attacks, and data leakage.

API SecurityHTTPSWeChat Pay
0 likes · 15 min read
Design and Implementation of API Encryption Using HTTPS and WeChat Pay Principles
Sohu Tech Products
Sohu Tech Products
Apr 17, 2024 · Information Security

Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security

HTTPS secures web traffic by combining symmetric and asymmetric encryption, digital signatures, and certificate authorities within the TLS protocol to ensure confidentiality, integrity, authentication, and non‑repudiation, replacing insecure HTTP and becoming mandatory for modern browsers, servers, and platforms despite earlier concerns about cost and complexity.

CAHTTPSSSL/TLS
0 likes · 17 min read
Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security
MaGe Linux Operations
MaGe Linux Operations
Apr 4, 2024 · Information Security

Master SSH: Asymmetric Encryption, Key Management, and Advanced Usage Explained

This comprehensive guide covers the fundamentals of asymmetric encryption, detailed SSH architecture, host and user authentication processes, configuration file nuances, command syntax, secure key distribution scripts, and performance tuning tips, providing practical examples and code snippets for secure remote operations.

Public Key AuthenticationSSHasymmetric encryption
0 likes · 46 min read
Master SSH: Asymmetric Encryption, Key Management, and Advanced Usage Explained
Sanyou's Java Diary
Sanyou's Java Diary
Feb 5, 2024 · Information Security

Master the Top 5 Encryption Algorithms: MD5, SHA-256, DES, AES, RSA Explained

This article introduces the five most common encryption algorithms—MD5, SHA‑256, DES, AES, and RSA—explaining their classifications, security properties, typical use cases, and providing complete Java implementations for each, while also showing how they underpin HTTPS security.

asymmetric encryptionencryptionhash algorithms
0 likes · 18 min read
Master the Top 5 Encryption Algorithms: MD5, SHA-256, DES, AES, RSA Explained
php Courses
php Courses
Jan 30, 2024 · Information Security

Using PHP to Secure Data Transmission with HTTPS, Symmetric and Asymmetric Encryption

This article explains how to protect data transmission in PHP applications by employing HTTPS (SSL/TLS), implementing symmetric encryption such as AES, and using asymmetric encryption with OpenSSL, while highlighting key management practices to ensure confidentiality, integrity, and resistance to man‑in‑the‑middle attacks.

HTTPSOpenSSLPHP
0 likes · 4 min read
Using PHP to Secure Data Transmission with HTTPS, Symmetric and Asymmetric Encryption
Liangxu Linux
Liangxu Linux
Jan 3, 2023 · Information Security

Why Can Public Key Encrypt but Not Decrypt? Unpacking HTTPS Encryption

An in‑depth guide explains the difference between symmetric and asymmetric encryption, why a public key can encrypt but not decrypt, and walks through the TLS 1.2 handshake that underpins HTTPS, covering certificates, random numbers, session key derivation, and the role of public‑private key pairs.

HTTPSHandshakeTLS
0 likes · 16 min read
Why Can Public Key Encrypt but Not Decrypt? Unpacking HTTPS Encryption
Selected Java Interview Questions
Selected Java Interview Questions
Feb 6, 2022 · Information Security

Symmetric, Asymmetric, and Hybrid Encryption: Principles, Advantages, and Key Distribution Issues

This article explains the fundamentals of symmetric, asymmetric, and hybrid encryption, compares their strengths and weaknesses, discusses key distribution challenges, and illustrates how combining both methods can address security gaps while highlighting potential man‑in‑the‑middle attacks.

Hybrid Encryptionasymmetric encryptioninformation security
0 likes · 7 min read
Symmetric, Asymmetric, and Hybrid Encryption: Principles, Advantages, and Key Distribution Issues
Top Architect
Top Architect
Jun 29, 2021 · Blockchain

Understanding Bitcoin: From Its Origin to Wallets, Transactions, Mining, and the Blockchain

This article explains the technical foundations of Bitcoin—including its 2008 white‑paper origin, asymmetric encryption, wallet addresses, transaction verification, mining rewards, block size debates, and the peer‑to‑peer network—providing a comprehensive, non‑investment‑focused overview of how the cryptocurrency works.

BitcoinBlockchainMining
0 likes · 12 min read
Understanding Bitcoin: From Its Origin to Wallets, Transactions, Mining, and the Blockchain
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jun 13, 2021 · Information Security

Master RSA Encryption in Java: Theory, Code, and Execution

This article explains why asymmetric encryption like RSA is paired with symmetric algorithms, outlines RSA's history and key concepts, and provides a complete Java implementation with code examples and execution results, illustrating both public‑key and private‑key operations.

RSAasymmetric encryptioncryptography
0 likes · 8 min read
Master RSA Encryption in Java: Theory, Code, and Execution
Efficient Ops
Efficient Ops
May 16, 2021 · Information Security

Why HTTPS Combines Symmetric and Asymmetric Encryption: A Deep Design Walkthrough

This article reconstructs the design of HTTPS step by step, explaining why both symmetric and asymmetric encryption are required, how key negotiation works, the role of digital certificates and certificate authorities, and the underlying security mechanisms that protect client‑server communication.

Certificate AuthorityHTTPSTLS
0 likes · 13 min read
Why HTTPS Combines Symmetric and Asymmetric Encryption: A Deep Design Walkthrough
vivo Internet Technology
vivo Internet Technology
Apr 14, 2021 · Information Security

Understanding Encryption: From Simple Stories to Diffie‑Hellman and RSA

This article explains the fundamentals of encryption by walking through a relatable story, defining keys, comparing symmetric and asymmetric methods, illustrating key‑exchange techniques such as paint‑mixing, multiplication tricks, Diffie‑Hellman, AES block processing, and the RSA algorithm with step‑by‑step calculations.

Diffie-HellmanRSAasymmetric encryption
0 likes · 15 min read
Understanding Encryption: From Simple Stories to Diffie‑Hellman and RSA
Selected Java Interview Questions
Selected Java Interview Questions
Jan 23, 2021 · Information Security

Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange

This article provides a comprehensive introduction to cryptographic techniques, covering the goals of confidentiality, integrity and authentication, and detailing symmetric, asymmetric and hash algorithms, common implementations, their advantages and drawbacks, as well as key exchange methods and public key infrastructure.

PKIasymmetric encryptioncryptography
0 likes · 16 min read
Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange
Top Architect
Top Architect
Jun 12, 2020 · Information Security

Understanding HTTPS: Why It Is Secure and How It Works

This article explains why HTTPS is necessary, describes symmetric and asymmetric encryption, illustrates the key exchange process, and outlines how HTTPS ensures secure communication by preventing eavesdropping, man‑in‑the‑middle attacks, and ensuring certificate trustworthiness.

HTTPSPublic Key InfrastructureTLS
0 likes · 5 min read
Understanding HTTPS: Why It Is Secure and How It Works
Java Captain
Java Captain
Dec 15, 2018 · Information Security

Understanding HTTPS Design: From Symmetric Encryption to Digital Certificates

This article reconstructs the design of HTTPS by explaining why symmetric encryption, asymmetric encryption, random numbers, digital certificates, and certificate authorities are combined to securely negotiate a shared secret between a client and a web server, while addressing man‑in‑the‑middle attacks and certificate validation.

HTTPSPublic Key InfrastructureTLS
0 likes · 14 min read
Understanding HTTPS Design: From Symmetric Encryption to Digital Certificates
Architect's Tech Stack
Architect's Tech Stack
May 11, 2018 · Information Security

Understanding Symmetric and Asymmetric Encryption, Key Distribution, Digital Signatures, and Their Practical Applications

This article explains the fundamentals of cryptography, covering symmetric and asymmetric encryption, key distribution challenges and solutions, digital signatures, certificates, and practical applications such as SSH login, HTTPS handshakes, and API authentication, providing clear examples and code snippets.

asymmetric encryptioncryptographydigital signature
0 likes · 17 min read
Understanding Symmetric and Asymmetric Encryption, Key Distribution, Digital Signatures, and Their Practical Applications
Programmer DD
Programmer DD
Apr 15, 2018 · Cloud Native

How to Secure Spring Cloud Config with Encryption: A Step‑by‑Step Guide

This tutorial explains why sensitive configuration data must be encrypted in microservice environments, walks through installing the Unlimited Strength JCE, configuring Spring Cloud Config’s {cipher} syntax, using symmetric and asymmetric keys, testing encryption endpoints, and managing keystores with keytool.

JCEasymmetric encryptionconfig-server
0 likes · 9 min read
How to Secure Spring Cloud Config with Encryption: A Step‑by‑Step Guide
21CTO
21CTO
Jan 11, 2018 · Information Security

How Carrier Pigeons Explain HTTPS: From Caesar Cipher to Public Keys

This article uses the classic Alice‑Bob‑pigeon analogy to demystify HTTPS, illustrating symmetric Caesar‑cipher encryption, asymmetric public‑key exchange, digital signatures, and why a certificate authority is essential for secure web communication.

HTTPSPublic Key Infrastructureasymmetric encryption
0 likes · 8 min read
How Carrier Pigeons Explain HTTPS: From Caesar Cipher to Public Keys