Tagged articles
200 articles
Page 2 of 2
Programmer DD
Programmer DD
Apr 22, 2022 · Information Security

Java ECDSA Bug Lets Attackers Forge SSL Certificates – What You Must Do

Oracle’s recent security update patches a critical Java vulnerability (CVE‑2022‑21449) that lets attackers forge SSL certificates, bypass two‑factor authentication, and create fraudulent digital signatures by exploiting a flaw in the ECDSA implementation of Java 15‑18, a bug rated as a crypto‑bug of the year.

CVE-2022-21449ECDSAJava
0 likes · 6 min read
Java ECDSA Bug Lets Attackers Forge SSL Certificates – What You Must Do
IT Services Circle
IT Services Circle
Mar 31, 2022 · Information Security

Overview of Common Information Security Techniques: Network, System, and Cryptography

This article provides a comprehensive overview of essential information security technologies, covering network attacks such as SQL injection, XSS, CSRF, DDoS, DNS and TCP hijacking, system vulnerabilities like stack overflow and privilege escalation, and core cryptographic concepts including symmetric/asymmetric encryption, key exchange, hashing, encoding, and multi‑factor authentication.

DDoSDNS hijackingSQL injection
0 likes · 23 min read
Overview of Common Information Security Techniques: Network, System, and Cryptography
DataFunTalk
DataFunTalk
Mar 30, 2022 · Information Security

A Brief History of Cryptography and the Rise of Privacy Computing

This article surveys the evolution of cryptography from ancient Mesopotamian cipher sticks through classical ciphers, the Enigma machine, modern public‑key systems, and multi‑party computation, then explains the concept, current challenges, and future directions of privacy‑preserving computation technologies.

MPCcryptographyinformation security
0 likes · 19 min read
A Brief History of Cryptography and the Rise of Privacy Computing
Bilibili Tech
Bilibili Tech
Mar 17, 2022 · Information Security

How to Secure SM2 Elliptic Curve Operations with Constant‑Time Techniques

This article explains why side‑channel attacks threaten SM2, SM3, and SM4 algorithms, describes the vulnerabilities of table‑lookup and double‑and‑add implementations, and presents constant‑time scalar multiplication and selection methods in Go to protect private keys on blockchain platforms.

GoSM2constant-time
0 likes · 13 min read
How to Secure SM2 Elliptic Curve Operations with Constant‑Time Techniques
AntTech
AntTech
Feb 21, 2022 · Information Security

Trusted Privacy Computing: A Key Technology for the Emerging Data Confidentiality Era

The article analyzes the shift from plaintext data exchange to a data‑confidentiality era, outlines regulatory drivers, describes technical challenges of privacy‑preserving computation, evaluates existing cryptographic approaches, and argues that trusted privacy computing is the most promising solution to meet performance, reliability, cost, applicability, and security requirements.

Privacy Computingcomplianceconfidential data
0 likes · 19 min read
Trusted Privacy Computing: A Key Technology for the Emerging Data Confidentiality Era
Tencent Cloud Developer
Tencent Cloud Developer
Jan 19, 2022 · Information Security

Unveiling MD5: How It Works, Its Fixed Length, and Why It’s Vulnerable

This article explores the MD5 hashing algorithm in depth, detailing its fixed 128‑bit output, the padding and block processing steps defined in RFC 1321, the internal round functions, and the reasons it is considered irreversible yet vulnerable to collisions and various cracking techniques such as brute‑force, rainbow tables, and differential attacks.

MD5collision attackcryptography
0 likes · 15 min read
Unveiling MD5: How It Works, Its Fixed Length, and Why It’s Vulnerable
Python Programming Learning Circle
Python Programming Learning Circle
Jan 5, 2022 · Backend Development

Integrating Alipay Payment in Python Projects

This article explains why third‑party payment platforms like Alipay are used, describes Alipay's payment flow, outlines the configuration steps to obtain APPID and keys, and provides a complete Python implementation for integrating Alipay into backend services.

APIAlipayBackend
0 likes · 7 min read
Integrating Alipay Payment in Python Projects
21CTO
21CTO
Jan 2, 2022 · Information Security

How to Secure Public APIs: Signatures, OAuth2, and Encryption Strategies

This article explains practical methods to protect externally exposed APIs, covering token‑based access, OAuth2.0 authorization, signature verification, encryption techniques (hashing, symmetric and asymmetric), key management, and provides Java code samples for DES and RSA implementations.

API SecurityJavaOAuth2
0 likes · 13 min read
How to Secure Public APIs: Signatures, OAuth2, and Encryption Strategies
AntTech
AntTech
Dec 21, 2021 · Information Security

Hardware‑Software Integration Accelerates Privacy Computing: Technical Overview

The article explains how combining hardware and software solutions can address the data‑lifecycle security and cryptographic performance challenges of privacy computing, describing the underlying technology stack, acceleration techniques, and the integrated privacy‑computing appliance released by Ant Group.

Hardware accelerationPrivacy Computingcryptography
0 likes · 13 min read
Hardware‑Software Integration Accelerates Privacy Computing: Technical Overview
Python Crawling & Data Mining
Python Crawling & Data Mining
Nov 15, 2021 · Information Security

Python Encryption Guide: Base64, MD5, SHA1, HMAC, DES, AES, RSA

This article introduces common encryption methods—including Base64, MD5, SHA‑1, HMAC, DES, AES, and RSA—explains their principles, and provides complete Python code examples for encoding, decoding, and key handling, enabling readers to implement secure data transformations in their own projects.

AESBase64MD5
0 likes · 12 min read
Python Encryption Guide: Base64, MD5, SHA1, HMAC, DES, AES, RSA
Douyu Streaming
Douyu Streaming
Oct 29, 2021 · Information Security

Understanding SSL/TLS and DTLS: From Cryptographic Basics to WebRTC Security

This article explains the security risks of early Internet protocols, the evolution of SSL/TLS and DTLS, fundamental cryptographic concepts such as symmetric and asymmetric encryption, hashing, MACs, digital signatures, AES modes and padding, and how these technologies are applied in TLS handshakes, DTLS, and WebRTC.

AESDTLSSSL
0 likes · 27 min read
Understanding SSL/TLS and DTLS: From Cryptographic Basics to WebRTC Security
MaGe Linux Operations
MaGe Linux Operations
Jul 24, 2021 · Information Security

Master Go Encryption: MD5, HMAC, SHA1, AES, RSA and More Explained

This article introduces common encryption algorithms—including symmetric, asymmetric, and digital signature methods—and provides detailed Go code examples for MD5, HMAC, SHA1, AES (with various modes), and RSA, helping developers understand and implement secure cryptographic operations in Go.

AESHMACMD5
0 likes · 16 min read
Master Go Encryption: MD5, HMAC, SHA1, AES, RSA and More Explained
Laravel Tech Community
Laravel Tech Community
Jun 19, 2021 · Information Security

OpenSSL 3.0 Beta Released: New Features and Changes

OpenSSL 3.0 has entered its beta stage, treated as a release candidate, inviting users to build, test, and provide feedback, while introducing a new Apache 2.0 license, provider‑based architecture, FIPS‑validated provider, pluggable TLS 1.3 groups, new encoders/decoders, CMP support, and updated APIs, with ABI changes requiring recompilation.

FIPSOpenSSLProvider Architecture
0 likes · 3 min read
OpenSSL 3.0 Beta Released: New Features and Changes
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jun 13, 2021 · Information Security

Master RSA Encryption in Java: Theory, Code, and Execution

This article explains why asymmetric encryption like RSA is paired with symmetric algorithms, outlines RSA's history and key concepts, and provides a complete Java implementation with code examples and execution results, illustrating both public‑key and private‑key operations.

RSAasymmetric encryptioncryptography
0 likes · 8 min read
Master RSA Encryption in Java: Theory, Code, and Execution
vivo Internet Technology
vivo Internet Technology
Apr 14, 2021 · Information Security

Understanding Encryption: From Simple Stories to Diffie‑Hellman and RSA

This article explains the fundamentals of encryption by walking through a relatable story, defining keys, comparing symmetric and asymmetric methods, illustrating key‑exchange techniques such as paint‑mixing, multiplication tricks, Diffie‑Hellman, AES block processing, and the RSA algorithm with step‑by‑step calculations.

Diffie-HellmanRSAasymmetric encryption
0 likes · 15 min read
Understanding Encryption: From Simple Stories to Diffie‑Hellman and RSA
Beike Product & Technology
Beike Product & Technology
Mar 19, 2021 · Information Security

Key Management System (KMS) Overview and Common Cryptographic Security Risks

The article outlines typical cryptographic security risks such as weak algorithms, insufficient key lengths, poor key management, and then introduces a comprehensive Key Management System (KMS) architecture, its core functions, key hierarchy, and practical application scenarios like API signing and data encryption.

API signingKMSSecurity Risks
0 likes · 9 min read
Key Management System (KMS) Overview and Common Cryptographic Security Risks
Selected Java Interview Questions
Selected Java Interview Questions
Jan 23, 2021 · Information Security

Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange

This article provides a comprehensive introduction to cryptographic techniques, covering the goals of confidentiality, integrity and authentication, and detailing symmetric, asymmetric and hash algorithms, common implementations, their advantages and drawbacks, as well as key exchange methods and public key infrastructure.

PKIasymmetric encryptioncryptography
0 likes · 16 min read
Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange
Senior Brother's Insights
Senior Brother's Insights
Jan 20, 2021 · Information Security

Understanding Apache Shiro: Core Concepts, Architecture, and Features

This article introduces Apache Shiro, a lightweight Java security framework, covering its authentication, authorization, cryptography, session management, core components, module functions, and overall architecture to help developers grasp its practical use in permission management.

Apache ShiroAuthorizationJava Security
0 likes · 10 min read
Understanding Apache Shiro: Core Concepts, Architecture, and Features
vivo Internet Technology
vivo Internet Technology
Jan 13, 2021 · Information Security

Understanding RSA Key Files: Mathematics, Six‑Layer Model, Tools, and Usage Scenarios

The article explains RSA key files by detailing the underlying mathematics of prime factorization and modular exponents, introduces a six‑layer abstraction from raw values to application use, demonstrates OpenSSL and keytool commands for generation, conversion, and inspection, and illustrates common deployment scenarios such as HTTPS and MySQL SSL.

ASN.1OpenSSLPKCS
0 likes · 19 min read
Understanding RSA Key Files: Mathematics, Six‑Layer Model, Tools, and Usage Scenarios
macrozheng
macrozheng
Dec 18, 2020 · Information Security

How HTTPS Secures Your Data: From Symmetric Encryption to Digital Certificates

This article explains why HTTP is insecure, outlines the four core principles of secure communication, and details how HTTPS uses symmetric encryption, asymmetric encryption, digital certificates, and signatures to establish confidentiality, integrity, authentication, and non-repudiation for safe data transmission.

HTTPSTLScryptography
0 likes · 15 min read
How HTTPS Secures Your Data: From Symmetric Encryption to Digital Certificates
FunTester
FunTester
Dec 4, 2020 · Information Security

Introduction to Cryptography: History, Significance, and Future Directions

This introductory text explores the evolution of cryptography from ancient symbols to modern quantum and DNA‑based codes, highlighting its pivotal role in politics, warfare, and society while emphasizing the need for universal understanding of encryption and decryption across all fields.

Quantum Cryptographycodebreakingcryptography
0 likes · 14 min read
Introduction to Cryptography: History, Significance, and Future Directions
JD Cloud Developers
JD Cloud Developers
Dec 3, 2020 · Information Security

Why Weak Passwords Still Prevail and How Modern Cryptography Secures Your Data

This article explores the prevalence of weak passwords, introduces fundamental concepts of cryptography, explains symmetric encryption algorithms and their key distribution challenges, and demonstrates the Diffie‑Hellman key‑exchange process with a concrete example and a Python implementation of primitive‑root calculation.

Diffie-Hellmancryptographyinformation security
0 likes · 9 min read
Why Weak Passwords Still Prevail and How Modern Cryptography Secures Your Data
Programmer DD
Programmer DD
Nov 2, 2020 · Information Security

Unlock Java Encryption: A Hands‑On Guide to Bouncy Castle

This article introduces Java developers to the Bouncy Castle library, detailing how to integrate it via Maven, demonstrating MD5 hashing and AES encryption/decryption code, and highlighting usage considerations and export compliance risks associated with cryptographic algorithms.

AESBouncy CastleJava
0 likes · 5 min read
Unlock Java Encryption: A Hands‑On Guide to Bouncy Castle
Liangxu Linux
Liangxu Linux
Oct 8, 2020 · Information Security

How Offline Payment Codes Enable Alipay & WeChat Payments Without Network

This article explains the technical principles behind offline payment codes used by Alipay and WeChat, covering common payment modes, online and offline code schemes, OTP generation, cryptographic algorithms, their advantages, drawbacks, and practical implementation details.

AlipayOTPWeChat
0 likes · 13 min read
How Offline Payment Codes Enable Alipay & WeChat Payments Without Network
JD Tech Talk
JD Tech Talk
Sep 21, 2020 · Blockchain

JD Digits' JACOBI Blockchain Innovation Lab Announces Major Research Achievements Including Dumbo Asynchronous Consensus and Identity Management Protocols

JD Digits' JACOBI Blockchain Innovation Lab unveiled a series of breakthrough research results—such as the Dumbo and Dumbo‑MVBA asynchronous consensus protocols, a blockchain identity management scheme, and a storage‑time proof—demonstrating leading academic contributions across consensus, cryptography, and distributed applications.

BlockchainConsensusDistributed Systems
0 likes · 8 min read
JD Digits' JACOBI Blockchain Innovation Lab Announces Major Research Achievements Including Dumbo Asynchronous Consensus and Identity Management Protocols
Fulu Network R&D Team
Fulu Network R&D Team
Sep 11, 2020 · Information Security

Symmetric Encryption Algorithms in .NET Core Using BouncyCastle

This article introduces symmetric encryption algorithms such as DES, 3DES, and AES, explains their principles, advantages and drawbacks, and provides complete .NET Core sample code using the BouncyCastle library for encryption and decryption with various padding modes.

.NET Core3DESAES
0 likes · 21 min read
Symmetric Encryption Algorithms in .NET Core Using BouncyCastle
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Jul 10, 2020 · Information Security

Linux Kernel Crypto Framework: Architecture, Data Structures, and Application in File System Encryption

The Linux kernel’s generic crypto framework, introduced in version 2.5.45, defines core structures such as crypto_template, crypto_alg, crypto_instance and crypto_tfm to dynamically register and combine algorithms (e.g., ecb(aes)), providing a uniform API for symmetric, asymmetric, hash and other primitives, supporting user‑space access via AF_ALG and practical use cases like Android file‑based encryption with built‑in self‑tests for correctness.

Data StructuresLinux kernelSelf-test
0 likes · 11 min read
Linux Kernel Crypto Framework: Architecture, Data Structures, and Application in File System Encryption
Programmer DD
Programmer DD
Jul 3, 2020 · Information Security

Tracking Ad Clicks Without Exposing User Data: A Privacy‑Preserving Approach

This article explains how marketers can use UTM parameters to identify the source of ad clicks, compares click‑based (CPC) and impression‑based (CPM) pricing models, and introduces a cryptographic private‑set‑intersection protocol that lets advertisers and e‑commerce platforms measure ad exposure effects while fully protecting user privacy.

UTM parametersadvertising analyticscryptography
0 likes · 9 min read
Tracking Ad Clicks Without Exposing User Data: A Privacy‑Preserving Approach
Fulu Network R&D Team
Fulu Network R&D Team
Jun 29, 2020 · Information Security

Comprehensive Guide to Message Digest, MAC, and Digital Signature Algorithms in .NET Core with BouncyCastle

This article introduces various cryptographic primitives—including MD, SHA, MAC, and digital signature algorithms such as RSA, DSA, and ECDSA—explains their usage and security considerations, and provides complete .NET Core code examples using the BouncyCastle library for implementation.

.NET CoreBouncyCastleECDSA
0 likes · 24 min read
Comprehensive Guide to Message Digest, MAC, and Digital Signature Algorithms in .NET Core with BouncyCastle
Programmer DD
Programmer DD
Apr 16, 2020 · Fundamentals

10 Game-Changing Algorithms That Shaped Modern Technology

This article explains what an algorithm is, outlines its essential properties, traces its historical roots, and introduces ten pivotal algorithms—from sorting and Fourier transforms to RSA, hash functions, and random number generators—that underpin today’s digital world.

AlgorithmsNetworkingSorting
0 likes · 10 min read
10 Game-Changing Algorithms That Shaped Modern Technology
Liangxu Linux
Liangxu Linux
Mar 21, 2020 · Information Security

Why HTTPS Exists: From HTTP’s Flaws to TLS Encryption Explained

This article explains why HTTPS was created to address HTTP’s lack of encryption, authentication, and integrity, describes how TLS/SSL adds security, details the roles of symmetric and asymmetric encryption, hash algorithms, digital certificates, and the full handshake process that secures modern web communication.

HTTPSSSLTLS
0 likes · 19 min read
Why HTTPS Exists: From HTTP’s Flaws to TLS Encryption Explained
JD Retail Technology
JD Retail Technology
Dec 19, 2019 · Mobile Development

Understanding iOS App Signing Mechanism and Its Underlying Cryptography

This article explains the iOS app signing process, covering symmetric encryption, public‑key cryptography, hybrid cryptosystems, digital signatures, certificates, and how Apple verifies app packages during distribution and on‑device installation, providing both beginner and advanced insights.

App DistributionCode SigningMobile Security
0 likes · 13 min read
Understanding iOS App Signing Mechanism and Its Underlying Cryptography
360 Tech Engineering
360 Tech Engineering
Dec 16, 2019 · Information Security

Understanding Random Number Generation for Lottery Programs and Cryptographic Security in JavaScript

This article explains the differences between true and pseudo‑random numbers, why JavaScript's Math.random is unsuitable for secure lottery draws, and how to use the Web Crypto API's Crypto.getRandomValues with a provided code example to achieve cryptographically strong randomness.

Crypto.getRandomValuesMath.randomSecurity
0 likes · 8 min read
Understanding Random Number Generation for Lottery Programs and Cryptographic Security in JavaScript
Programmer DD
Programmer DD
Nov 18, 2019 · Blockchain

Build a Simple Blockchain in Java: From Basics to Advanced Concepts

This tutorial explains blockchain fundamentals, its decentralized and tamper‑proof nature, and walks through a complete Java implementation—including block structure, hash calculation, mining, validation, and testing—while also covering advanced topics such as consensus algorithms, transaction verification, node types, real‑world applications, and essential development tools.

BlockchainConsensuscryptography
0 likes · 13 min read
Build a Simple Blockchain in Java: From Basics to Advanced Concepts
Efficient Ops
Efficient Ops
Nov 12, 2019 · Information Security

Why HTTPS Needs Both Symmetric and Asymmetric Encryption (Explained)

This article walks through the design of HTTPS, showing how symmetric encryption secures data while asymmetric encryption safely negotiates keys, and explains the role of digital certificates and certificate authorities in preventing man‑in‑the‑middle attacks.

HTTPSPublic Key InfrastructureTLS
0 likes · 13 min read
Why HTTPS Needs Both Symmetric and Asymmetric Encryption (Explained)
360 Tech Engineering
360 Tech Engineering
Jul 17, 2019 · Information Security

Practical SSL/TLS and Cryptography Guide Using Go and kubeadm

This article provides a comprehensive walkthrough of using Go's crypto library for hashing, symmetric and asymmetric encryption, certificate generation, and TLS/HTTPS server and client implementation, illustrating how these techniques are applied in kubeadm to simplify Kubernetes cluster security.

GoHashingKubernetes
0 likes · 18 min read
Practical SSL/TLS and Cryptography Guide Using Go and kubeadm
JD Tech Talk
JD Tech Talk
Jun 4, 2019 · Blockchain

JD Chain: JD Digital Technology’s Open‑Source Blockchain Engine Overview

JD Chain, JD Digital Technology’s open‑source blockchain engine announced in 2019, offers enterprise‑grade features such as modular cryptographic algorithms, pluggable consensus protocols, key‑value ledger model, flexible storage, and comprehensive APIs, aiming to accelerate blockchain adoption across diverse business scenarios.

APIBlockchainConsensus
0 likes · 7 min read
JD Chain: JD Digital Technology’s Open‑Source Blockchain Engine Overview
21CTO
21CTO
May 17, 2019 · Information Security

Why SHA-1 Is Dead: New Prefix Collision Attack Signals Its End

A recent $100k research effort demonstrated a prefix collision attack on SHA-1, proving that attackers can forge signed documents and TLS certificates, and highlighting why the cryptographic community must retire SHA-1 in favor of stronger hash algorithms.

Hash CollisionSHA-1cryptography
0 likes · 6 min read
Why SHA-1 Is Dead: New Prefix Collision Attack Signals Its End
MaGe Linux Operations
MaGe Linux Operations
May 7, 2019 · Fundamentals

Is Thanos’ Snap Truly Random? Exploring True vs Pseudo Random Numbers

The article uses Thanos' snap from the Avengers to examine the concept of randomness, compares true random numbers with pseudo‑random generators, explains quantum random number generators, and demonstrates how Java provides various APIs for generating random values, highlighting their strengths and limitations.

Javacomputer sciencecryptography
0 likes · 11 min read
Is Thanos’ Snap Truly Random? Exploring True vs Pseudo Random Numbers
Open Source Tech Hub
Open Source Tech Hub
Dec 26, 2018 · Information Security

How to Implement RSA Encryption and Decryption in PHP with OpenSSL

This guide explains how to generate RSA key pairs on Linux, use OpenSSL commands, and implement PHP code for public‑key encryption, private‑key decryption, padding options, data‑size limits, and helper functions for handling messages larger than the RSA block size.

OpenSSLRSAcryptography
0 likes · 6 min read
How to Implement RSA Encryption and Decryption in PHP with OpenSSL
21CTO
21CTO
Nov 29, 2018 · Information Security

How Carrier Pigeons Explain HTTPS: From Caesar Cipher to Public Keys

This article uses the whimsical story of Alice, Bob, and a meddling pigeon to illustrate how HTTPS works, covering symmetric Caesar‑style ciphers, asymmetric public‑key encryption, certificate authorities, and the trade‑offs between security and performance in modern web communication.

HTTPScryptographypublic key
0 likes · 7 min read
How Carrier Pigeons Explain HTTPS: From Caesar Cipher to Public Keys
Efficient Ops
Efficient Ops
Oct 23, 2018 · Information Security

Why HTTPS Matters: Performance, Security, and the Cryptography Behind It

This article explains why HTTPS is essential by comparing HTTP’s performance drawbacks, detailing its security vulnerabilities, and describing the cryptographic mechanisms—including TLS, symmetric and asymmetric encryption, certificates, and HMAC—that HTTPS employs to protect data and enable modern features like HTTP/2.

HTTP/2HTTPSTLS
0 likes · 7 min read
Why HTTPS Matters: Performance, Security, and the Cryptography Behind It
Alibaba Cloud Developer
Alibaba Cloud Developer
Aug 30, 2018 · Information Security

How Alice & Bob Outsmart Eavesdroppers: A Fun Guide to Encryption, MACs, and Digital Signatures

This article uses a playful story of Alice, Bob, Eve, Mallory, and Trent to explain the fundamentals of symmetric and asymmetric encryption, message authentication codes, digital signatures, and public‑key certificates, showing how each technique protects confidentiality, integrity, and authenticity in communications.

CertificateMacasymmetric key
0 likes · 14 min read
How Alice & Bob Outsmart Eavesdroppers: A Fun Guide to Encryption, MACs, and Digital Signatures
Senior Brother's Insights
Senior Brother's Insights
Jul 30, 2018 · Blockchain

Why Blockchain Matters: From Hash Functions to Decentralized Ledgers

The article explains how blockchain, introduced by Satoshi Nakamoto in 2008, uses cryptographic hash functions, Merkle trees, proof‑of‑work, and digital signatures to create an immutable, trust‑minimized ledger, compares naïve and validated coin models, and contrasts public versus private blockchains while forecasting massive future growth.

DecentralizationMerkle TreeProof of Work
0 likes · 23 min read
Why Blockchain Matters: From Hash Functions to Decentralized Ledgers
21CTO
21CTO
Jul 13, 2018 · Blockchain

Build a Simple PHP Blockchain from Scratch – Step‑by‑Step Guide

This tutorial explains the fundamentals of blockchain by defining block and blockchain classes in PHP, detailing fields, hash generation with SHA‑256, constructing genesis and subsequent blocks, and providing complete example code with a test run that demonstrates how each block links to its predecessor.

PHPTutorialcryptography
0 likes · 6 min read
Build a Simple PHP Blockchain from Scratch – Step‑by‑Step Guide
Programmer DD
Programmer DD
Jul 9, 2018 · Blockchain

Understanding Blockchain: From Trust to Mining Explained for Developers

This comprehensive guide walks developers through the fundamental principles of blockchain, covering monetary trust, cryptographic primitives, Bitcoin's transaction model, block structure, proof‑of‑work mining, security challenges, alternative consensus mechanisms, and real‑world applications beyond cryptocurrency.

BitcoinBlockchainConsensus
0 likes · 29 min read
Understanding Blockchain: From Trust to Mining Explained for Developers
Architecture Digest
Architecture Digest
May 26, 2018 · Blockchain

Blockchain Explained from a Developer’s Perspective

The article introduces blockchain fundamentals for programmers, covering asymmetric cryptography, public ledgers, double‑spending, transaction ordering, consensus mechanisms, proof‑of‑work mining, smart contracts, gas, token transfers, zero‑knowledge proofs, and self‑regulation, while relating each concept to familiar software engineering patterns.

BlockchainConsensusDecentralization
0 likes · 11 min read
Blockchain Explained from a Developer’s Perspective
Architect's Tech Stack
Architect's Tech Stack
May 11, 2018 · Information Security

Understanding Symmetric and Asymmetric Encryption, Key Distribution, Digital Signatures, and Their Practical Applications

This article explains the fundamentals of cryptography, covering symmetric and asymmetric encryption, key distribution challenges and solutions, digital signatures, certificates, and practical applications such as SSH login, HTTPS handshakes, and API authentication, providing clear examples and code snippets.

asymmetric encryptioncryptographydigital signature
0 likes · 17 min read
Understanding Symmetric and Asymmetric Encryption, Key Distribution, Digital Signatures, and Their Practical Applications
Java High-Performance Architecture
Java High-Performance Architecture
May 3, 2018 · Blockchain

Understanding Blockchain’s Core Technologies: Hashing, Public-Key Encryption, and Proof of Work

Blockchain relies on three fundamental technologies—SHA‑256 hashing, public‑key cryptography, and proof‑of‑work consensus—each ensuring data integrity, secure identity verification, and decentralized block creation, with detailed examples illustrating hash collisions, transaction signing, and nonce‑driven mining challenges.

HashingProof of Workcryptography
0 likes · 6 min read
Understanding Blockchain’s Core Technologies: Hashing, Public-Key Encryption, and Proof of Work
Architecture Digest
Architecture Digest
Mar 19, 2018 · Blockchain

Fundamentals and Applications of Blockchain Technology

This article explains the core technical concepts of blockchain—including encrypted data relationships, immutability, peer-to-peer networks, blocks, mining, consensus mechanisms, Merkle trees—and discusses suitable and unsuitable use cases, typical applications such as Bitcoin and Ethereum, and practical considerations for developers.

BlockchainConsensusDecentralization
0 likes · 24 min read
Fundamentals and Applications of Blockchain Technology
Alibaba Cloud Developer
Alibaba Cloud Developer
Mar 12, 2018 · Blockchain

Why Bitcoin’s Architecture Turns Simple Tech into Decentralized Currency

This article explains how Bitcoin’s system combines existing technologies—P2P networking, cryptographic hashing, Merkle trees, and consensus mechanisms—to create a decentralized electronic currency, covering its architecture, data immutability, final consistency, and the economic incentives behind mining.

BitcoinBlockchainDecentralization
0 likes · 17 min read
Why Bitcoin’s Architecture Turns Simple Tech into Decentralized Currency
Tencent Cloud Developer
Tencent Cloud Developer
Mar 6, 2018 · Blockchain

Fundamentals of Cryptography in Bitcoin: Public/Private Keys, Digital Signatures, and Large Integers

Bitcoin’s security relies on proven cryptographic principles—large‑integer public/private key pairs and digital signatures that authenticate transactions locally without exposing secret keys—making brute‑force attacks infeasible and ensuring that only implementation errors, not the mathematics, can compromise the system.

cryptographydigital signaturepublic key
0 likes · 11 min read
Fundamentals of Cryptography in Bitcoin: Public/Private Keys, Digital Signatures, and Large Integers
ITPUB
ITPUB
Jan 14, 2018 · Blockchain

Can Blockchain Redefine Trust and Build a Decentralized Future?

The article explores blockchain’s fundamental data structure—a hash‑linked list forming an immutable ledger—and its broader vision of enabling trust‑less, decentralized systems that can reshape finance, governance, and many coordination problems, while warning that speculation currently overshadows its true potential.

BlockchainDecentralizationcryptography
0 likes · 9 min read
Can Blockchain Redefine Trust and Build a Decentralized Future?
21CTO
21CTO
Jan 13, 2018 · Blockchain

Why Is Blockchain Booming? A Beginner’s Guide to Its Core Principles

This article explains the fundamentals of blockchain technology, covering its definition as a distributed database, the structure of blocks and chains, mining, decentralization, node verification, and the five key characteristics that make it secure and transparent.

BlockchainDecentralizationMining
0 likes · 6 min read
Why Is Blockchain Booming? A Beginner’s Guide to Its Core Principles
21CTO
21CTO
Jan 11, 2018 · Information Security

How Carrier Pigeons Explain HTTPS: From Caesar Cipher to Public Keys

This article uses the classic Alice‑Bob‑pigeon analogy to demystify HTTPS, illustrating symmetric Caesar‑cipher encryption, asymmetric public‑key exchange, digital signatures, and why a certificate authority is essential for secure web communication.

HTTPSPublic Key Infrastructureasymmetric encryption
0 likes · 8 min read
How Carrier Pigeons Explain HTTPS: From Caesar Cipher to Public Keys
21CTO
21CTO
Sep 1, 2017 · Blockchain

Building a Simple Haskell Blockchain: Types, Mining, and Persistence

This article walks through creating a minimal blockchain in Haskell, covering data structures, serialization, mining logic, difficulty adjustment, and command‑line tools for mining and balance listing, while illustrating core concepts such as Merkle trees, hash functions, and transaction validation.

BlockchainHaskellMining
0 likes · 23 min read
Building a Simple Haskell Blockchain: Types, Mining, and Persistence
Tencent Architect
Tencent Architect
Jun 30, 2017 · Information Security

Asynchronous RSA Proxy Computation and Performance Optimization for SSL Handshake

The article presents a comprehensive engineering solution that separates RSA operations, employs parallel and asynchronous processing, modifies OpenSSL and Nginx event handling, and adds symmetric‑encryption optimizations to boost SSL/TLS handshake throughput by over threefold while reducing CPU load.

OpenSSLPerformance OptimizationRSA
0 likes · 16 min read
Asynchronous RSA Proxy Computation and Performance Optimization for SSL Handshake
WeChat Backend Team
WeChat Backend Team
Dec 12, 2016 · Information Security

TLS Security Deep Dive: Threat Models, Handshakes & Best Practices

This article provides a comprehensive security analysis of the TLS protocol, covering attacker models, authentication and key exchange mechanisms, version rollback attacks, handshake vulnerabilities, session resumption, application data protection, explicit IV concerns, DoS threats, session ticket security, TLS extensions, PKI considerations, historical flaws, and the major improvements introduced in TLS 1.3.

TLSTLS 1.3cryptography
0 likes · 30 min read
TLS Security Deep Dive: Threat Models, Handshakes & Best Practices
WeChat Backend Team
WeChat Backend Team
Dec 9, 2016 · Information Security

Understanding TLS Record Protocol: Encryption, MAC, and Key Management

This article explains how the TLS record layer encrypts and authenticates application data by fragmenting, sequencing, optionally compressing, encrypting, computing HMAC, and transmitting over TCP/IP, while detailing the security parameters, key derivation, and the evolution from MAC‑then‑Encrypt to AEAD modes.

AEADKey ExpansionMac
0 likes · 15 min read
Understanding TLS Record Protocol: Encryption, MAC, and Key Management
WeChat Backend Team
WeChat Backend Team
Dec 9, 2016 · Information Security

Understanding TLS Handshake: Protocol Flow, Algorithms, and Security

This article explains the TLS handshake protocol in depth, covering its overall flow, the generation of security parameters, the role of asymmetric algorithms, message structures, performance considerations, and mechanisms like session caching and abbreviated handshakes to ensure secure communication.

HandshakeTLSTLS1.2
0 likes · 22 min read
Understanding TLS Handshake: Protocol Flow, Algorithms, and Security
Architects' Tech Alliance
Architects' Tech Alliance
Oct 14, 2016 · Blockchain

Understanding Blockchain from a Technical Perspective: Architecture, Consensus, and Ecosystem

This article explains blockchain as a distributed, fault‑tolerant ledger that combines P2P networking, cryptography, and economic game theory, describing its layered architecture, consensus mechanisms, public versus consortium chains, major platforms, and the distinction between UTXO and account‑balance models.

BlockchainConsensusP2P
0 likes · 13 min read
Understanding Blockchain from a Technical Perspective: Architecture, Consensus, and Ecosystem
ITPUB
ITPUB
Aug 16, 2016 · Information Security

Real PGP Short‑ID Collisions Expose Fake Keys and MITM Risks – Use Full Fingerprints

Since June, genuine PGP short‑ID collision attacks have surfaced, allowing attackers to create fake keys that exactly copy the name, email, and trust signatures of real keys, enabling man‑in‑the‑middle exploits, and experts now urge displaying full fingerprints to eliminate the threat.

MITMPGPcollision attack
0 likes · 4 min read
Real PGP Short‑ID Collisions Expose Fake Keys and MITM Risks – Use Full Fingerprints
ITPUB
ITPUB
Jul 14, 2016 · Information Security

Essential Guide to Classic Encodings and Ciphers for CTF Challenges

This article provides a comprehensive overview of classic text encodings and simple ciphers frequently encountered in CTF challenges, detailing ASCII, Base64, URL, Unicode, various substitution and transposition ciphers, as well as practical encoding/decoding examples and useful online tools.

CTFciphercryptography
0 likes · 14 min read
Essential Guide to Classic Encodings and Ciphers for CTF Challenges
Architect
Architect
Feb 25, 2016 · Information Security

Proper Password Hashing: Salting, Key Stretching, and Secure Implementation

This article explains why simple password hashing is insufficient, describes common attacks such as dictionary, brute‑force, lookup‑table and rainbow‑table attacks, and provides best‑practice guidance—including random salts, CSPRNGs, key‑stretching algorithms like PBKDF2, bcrypt and scrypt—and complete PHP reference implementations.

PBKDF2PHPSecurity
0 likes · 34 min read
Proper Password Hashing: Salting, Key Stretching, and Secure Implementation
21CTO
21CTO
Dec 17, 2015 · Information Security

Can Frontend Slow Encryption Really Strengthen Password Security?

This article explores the concept of front‑end slow encryption, explaining how deliberately increasing hashing time can hinder password cracking, discussing implementation techniques, performance trade‑offs, salt handling, adaptive strength strategies, and the broader security implications for web applications.

client‑side encryptioncryptographyfrontend
0 likes · 21 min read
Can Frontend Slow Encryption Really Strengthen Password Security?
21CTO
21CTO
Aug 19, 2015 · Information Security

How Shor’s Algorithm Threatens RSA: Quantum Steps to Break Encryption

Shor’s algorithm leverages quantum parallelism to efficiently find integer factors, exposing the vulnerability of RSA encryption by locating periodicity in modular exponentiation, and the article outlines a five-step hybrid quantum‑classical procedure—including quantum Fourier transform—to break RSA keys.

Quantum ComputingRSAShor's algorithm
0 likes · 8 min read
How Shor’s Algorithm Threatens RSA: Quantum Steps to Break Encryption
Architect
Architect
Jun 9, 2015 · Information Security

Why Use bcrypt for Password Hashing Instead of MD5, SHA1, SHA256, etc.

The article explains that general‑purpose hash functions like MD5 and SHA families are fast and vulnerable to brute‑force attacks, while bcrypt’s deliberately slow, work‑factor‑adjustable design makes it a far more secure choice for storing passwords.

Securitybcryptcryptography
0 likes · 4 min read
Why Use bcrypt for Password Hashing Instead of MD5, SHA1, SHA256, etc.
Qunar Tech Salon
Qunar Tech Salon
Mar 27, 2015 · Fundamentals

Classic Algorithms that Shaped Modern Computing

This article surveys a collection of seminal algorithms—including Huffman coding, public‑key encryption, Dijkstra's shortest‑path, binary search, quicksort, Karatsuba multiplication, Euclid's GCD, Bresenham's line drawing, and the fast inverse square‑root—explaining their origins, principles, and lasting impact on computer science.

AlgorithmsSearchSorting
0 likes · 7 min read
Classic Algorithms that Shaped Modern Computing
MaGe Linux Operations
MaGe Linux Operations
Jan 5, 2015 · Information Security

Inside a 220 ms TLS Handshake: How Firefox Secures Your Amazon Purchase

This article walks through a real‑time TLS 1.0 handshake captured with Wireshark, explaining client and server hello messages, certificate verification, RSA key exchange, pre‑master and master secret derivation, key block generation, RC4 encryption, and how the encrypted HTTP request and response are finally delivered to the application layer.

HTTPSRSATLS
0 likes · 30 min read
Inside a 220 ms TLS Handshake: How Firefox Secures Your Amazon Purchase
Baidu Tech Salon
Baidu Tech Salon
Sep 4, 2014 · Information Security

Understanding MD5: Hash Function vs Encryption and the Importance of Mathematical Thinking in Programming

MD5 is a one‑way hash, not an encryption method, and its 128‑bit output cannot be mathematically reversed; understanding this requires solid algorithmic and mathematical foundations, which the author argues are essential for programmers alongside broader theoretical knowledge rather than relying on mere trial‑and‑error experience.

MD5collision attackcryptography
0 likes · 7 min read
Understanding MD5: Hash Function vs Encryption and the Importance of Mathematical Thinking in Programming
MaGe Linux Operations
MaGe Linux Operations
Jul 4, 2014 · Information Security

How Digital Signatures Secure Data: Principles, Algorithms, and Implementation

This article explains the concept of digital signatures, their role in verifying data integrity and origin, outlines common algorithms such as RSA, DSS, and hash‑based signatures, and details the full PKI‑based workflow—including authentication, signing, and verification—while also describing how to combine encryption with signatures for confidential transmission.

PKIRSAcryptography
0 likes · 8 min read
How Digital Signatures Secure Data: Principles, Algorithms, and Implementation
Baidu Tech Salon
Baidu Tech Salon
May 12, 2014 · Information Security

Pulse Position Modulation for Secure Optical Communication

Scientists at the University of Massachusetts have demonstrated a pulse‑position‑modulation optical link that encodes data in sparse laser pulses amid unrelated photons, making eavesdropping appear as random noise and offering theoretically unbreakable encryption, though it requires a pre‑shared decoding key.

cryptographylaser transmissionoptical communication
0 likes · 3 min read
Pulse Position Modulation for Secure Optical Communication