Tag

asymmetric encryption

0 views collected around this technical thread.

php中文网 Courses
php中文网 Courses
Apr 25, 2025 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, introduces HTTPS, demonstrates how to apply symmetric encryption algorithms like AES in PHP, and shows how to use PHP's OpenSSL extension for asymmetric encryption, providing practical code examples and key‑management tips.

Data SecurityHTTPSPHP
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
Test Development Learning Exchange
Test Development Learning Exchange
Mar 24, 2025 · Information Security

Understanding Asymmetric Encryption and Its Application in API Automation

This article explains the fundamentals of asymmetric encryption, its key concepts, common application scenarios such as HTTPS and blockchain, provides a Python RSA implementation, and outlines how to apply it securely in API automation testing, including best practices and precautions.

API securityRSAasymmetric encryption
0 likes · 5 min read
Understanding Asymmetric Encryption and Its Application in API Automation
php中文网 Courses
php中文网 Courses
Jan 16, 2025 · Information Security

Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption

This article explains how to secure PHP data transmission using HTTPS, symmetric encryption (AES, DES, 3DES) and asymmetric encryption with OpenSSL, providing code examples and key management advice to protect confidentiality, integrity, and prevent man‑in‑the‑middle attacks.

Data SecurityHTTPSPHP
0 likes · 4 min read
Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption
Raymond Ops
Raymond Ops
Jan 7, 2025 · Information Security

Mastering SSH: Asymmetric Encryption, Authentication, and Configuration Explained

This comprehensive guide explores the fundamentals of asymmetric encryption, delves into SSH’s architecture—including host verification, user authentication, and key management—provides detailed walkthroughs of configuration files, command usage, SCP transfers, automation scripts, and performance optimization techniques for secure and efficient remote access.

AutomationConfigurationSSH
0 likes · 47 min read
Mastering SSH: Asymmetric Encryption, Authentication, and Configuration Explained
IT Services Circle
IT Services Circle
Sep 28, 2024 · Information Security

From Paper Notes to Cryptographic Locks: An Analogy of Symmetric and Asymmetric Encryption

The article uses a classroom love‑note scenario to illustrate how single‑key (symmetric) and double‑key (asymmetric) locks model modern cryptographic techniques, explaining key exchange, signatures, man‑in‑the‑middle attacks, and how HTTPS secures communication.

HTTPSSymmetric Encryptionasymmetric encryption
0 likes · 12 min read
From Paper Notes to Cryptographic Locks: An Analogy of Symmetric and Asymmetric Encryption
php中文网 Courses
php中文网 Courses
Aug 6, 2024 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains how to secure data transmission in PHP by using HTTPS, symmetric encryption algorithms like AES, and asymmetric encryption with OpenSSL, including code examples and key management recommendations for web applications.

HTTPSPHPSymmetric Encryption
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
php中文网 Courses
php中文网 Courses
Jul 31, 2024 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, then demonstrates three PHP-based methods—enabling HTTPS via SSL/TLS, applying symmetric algorithms such as AES, and using asymmetric encryption with OpenSSL—to protect confidentiality, integrity, and authentication of web communications.

Data SecurityHTTPSSymmetric Encryption
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
php中文网 Courses
php中文网 Courses
Jul 15, 2024 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, then demonstrates how to secure PHP-based communications using HTTPS, symmetric algorithms such as AES, and asymmetric encryption with OpenSSL, including complete code examples and key management tips.

HTTPSOpenSSLPHP
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
Top Architect
Top Architect
Jul 12, 2024 · Information Security

API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques

This article presents a comprehensive API encryption scheme that combines symmetric and asymmetric cryptography, hashing, and digital signatures, explains HTTPS fundamentals, details WeChat Pay encryption, outlines key exchange and data protection processes, provides Java code examples, and analyzes security, anti‑tampering, anti‑replay, and performance considerations.

API securityHTTPSHashing
0 likes · 16 min read
API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques
Selected Java Interview Questions
Selected Java Interview Questions
May 22, 2024 · Information Security

Design and Implementation of API Encryption Using HTTPS and WeChat Pay Principles

This article presents a comprehensive design and implementation guide for securing API interfaces by combining HTTPS fundamentals with WeChat Pay encryption techniques, detailing symmetric and asymmetric encryption, hashing, signature verification, key exchange, parameter handling, and backend processing to protect against tampering, replay attacks, and data leakage.

API securityHTTPSSignature
0 likes · 15 min read
Design and Implementation of API Encryption Using HTTPS and WeChat Pay Principles
Sohu Tech Products
Sohu Tech Products
Apr 17, 2024 · Information Security

Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security

HTTPS secures web traffic by combining symmetric and asymmetric encryption, digital signatures, and certificate authorities within the TLS protocol to ensure confidentiality, integrity, authentication, and non‑repudiation, replacing insecure HTTP and becoming mandatory for modern browsers, servers, and platforms despite earlier concerns about cost and complexity.

CADigital CertificateHTTPS
0 likes · 17 min read
Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security
Sanyou's Java Diary
Sanyou's Java Diary
Feb 5, 2024 · Information Security

Master the Top 5 Encryption Algorithms: MD5, SHA-256, DES, AES, RSA Explained

This article introduces the five most common encryption algorithms—MD5, SHA‑256, DES, AES, and RSA—explaining their classifications, security properties, typical use cases, and providing complete Java implementations for each, while also showing how they underpin HTTPS security.

JavaSymmetric Encryptionasymmetric encryption
0 likes · 18 min read
Master the Top 5 Encryption Algorithms: MD5, SHA-256, DES, AES, RSA Explained
php中文网 Courses
php中文网 Courses
Jan 30, 2024 · Information Security

Using PHP to Secure Data Transmission with HTTPS, Symmetric and Asymmetric Encryption

This article explains how to protect data transmission in PHP applications by employing HTTPS (SSL/TLS), implementing symmetric encryption such as AES, and using asymmetric encryption with OpenSSL, while highlighting key management practices to ensure confidentiality, integrity, and resistance to man‑in‑the‑middle attacks.

HTTPSOpenSSLPHP
0 likes · 4 min read
Using PHP to Secure Data Transmission with HTTPS, Symmetric and Asymmetric Encryption
Selected Java Interview Questions
Selected Java Interview Questions
Feb 6, 2022 · Information Security

Symmetric, Asymmetric, and Hybrid Encryption: Principles, Advantages, and Key Distribution Issues

This article explains the fundamentals of symmetric, asymmetric, and hybrid encryption, compares their strengths and weaknesses, discusses key distribution challenges, and illustrates how combining both methods can address security gaps while highlighting potential man‑in‑the‑middle attacks.

Symmetric Encryptionasymmetric encryptionencryption
0 likes · 7 min read
Symmetric, Asymmetric, and Hybrid Encryption: Principles, Advantages, and Key Distribution Issues
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jul 21, 2021 · Information Security

Master RSA Asymmetric Encryption in Java: From Keytool to Code

This guide walks you through generating an RSA keystore, exporting a public‑key certificate, and implementing full asymmetric encryption and decryption in Java, illustrating each step with command‑line examples, code snippets, and expected outputs.

JavaKeytoolRSA
0 likes · 6 min read
Master RSA Asymmetric Encryption in Java: From Keytool to Code
Top Architect
Top Architect
Jun 29, 2021 · Blockchain

Understanding Bitcoin: From Its Origin to Wallets, Transactions, Mining, and the Blockchain

This article explains the technical foundations of Bitcoin—including its 2008 white‑paper origin, asymmetric encryption, wallet addresses, transaction verification, mining rewards, block size debates, and the peer‑to‑peer network—providing a comprehensive, non‑investment‑focused overview of how the cryptocurrency works.

BitcoinBlockchainCryptocurrency
0 likes · 12 min read
Understanding Bitcoin: From Its Origin to Wallets, Transactions, Mining, and the Blockchain
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jun 13, 2021 · Information Security

Master RSA Encryption in Java: Theory, Code, and Execution

This article explains why asymmetric encryption like RSA is paired with symmetric algorithms, outlines RSA's history and key concepts, and provides a complete Java implementation with code examples and execution results, illustrating both public‑key and private‑key operations.

JavaRSAasymmetric encryption
0 likes · 8 min read
Master RSA Encryption in Java: Theory, Code, and Execution
Efficient Ops
Efficient Ops
May 16, 2021 · Information Security

Why HTTPS Combines Symmetric and Asymmetric Encryption: A Deep Design Walkthrough

This article reconstructs the design of HTTPS step by step, explaining why both symmetric and asymmetric encryption are required, how key negotiation works, the role of digital certificates and certificate authorities, and the underlying security mechanisms that protect client‑server communication.

Certificate AuthorityDigital CertificateHTTPS
0 likes · 13 min read
Why HTTPS Combines Symmetric and Asymmetric Encryption: A Deep Design Walkthrough
Selected Java Interview Questions
Selected Java Interview Questions
Jan 23, 2021 · Information Security

Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange

This article provides a comprehensive introduction to cryptographic techniques, covering the goals of confidentiality, integrity and authentication, and detailing symmetric, asymmetric and hash algorithms, common implementations, their advantages and drawbacks, as well as key exchange methods and public key infrastructure.

PKISymmetric Encryptionasymmetric encryption
0 likes · 16 min read
Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange
Top Architect
Top Architect
Jun 12, 2020 · Information Security

Understanding HTTPS: Why It Is Secure and How It Works

This article explains why HTTPS is necessary, describes symmetric and asymmetric encryption, illustrates the key exchange process, and outlines how HTTPS ensures secure communication by preventing eavesdropping, man‑in‑the‑middle attacks, and ensuring certificate trustworthiness.

HTTPSSymmetric EncryptionTLS
0 likes · 5 min read
Understanding HTTPS: Why It Is Secure and How It Works