Tagged articles
17 articles
Page 1 of 1
Lin is Dream
Lin is Dream
Mar 19, 2025 · Information Security

Master Encryption: Symmetric, Asymmetric, Certificates & Code Samples Explained

This article explains common encryption and signing algorithms—including AES, SM4, RSA2, and SM2—covers key representations in hex and Base64, details digital certificate structures, CSR application, TLS usage scenarios, OpenSSL commands for PEM conversion, and provides Java and JavaScript code examples for secure communication.

JavaNGINXOpenSSL
0 likes · 27 min read
Master Encryption: Symmetric, Asymmetric, Certificates & Code Samples Explained
Raymond Ops
Raymond Ops
Mar 18, 2025 · Information Security

Master OpenSSL: From Symmetric Encryption to Digital Certificates

This comprehensive guide explains OpenSSL’s role in cryptography, covering symmetric and asymmetric encryption, hashing, key generation, certificate creation, and practical command‑line examples for encrypting files, managing keys, signing data, and configuring TLS servers, empowering readers to master secure communications.

OpenSSLcommand-linecryptography
0 likes · 24 min read
Master OpenSSL: From Symmetric Encryption to Digital Certificates
MaGe Linux Operations
MaGe Linux Operations
Jun 27, 2024 · Information Security

Master OpenSSL: Comprehensive Guide to Encryption, Keys, and Certificates

This article provides a thorough walkthrough of OpenSSL, covering cryptographic standards, symmetric and public‑key encryption, message digests, digital certificate creation and management, plus practical command‑line examples for each operation, making it a valuable resource for security professionals and developers.

OpenSSLcommand-linedigital certificates
0 likes · 31 min read
Master OpenSSL: Comprehensive Guide to Encryption, Keys, and Certificates
DevOps Engineer
DevOps Engineer
Apr 29, 2024 · Information Security

Understanding Code Signing: Importance, Process, and Tool Comparison

This article explains what code signing is, why it is essential for software integrity and trust, outlines the signing process, compares traditional code signing certificates with the GaraSign cloud service, and offers guidance on choosing the right solution based on cost, scalability, and compliance needs.

Code SigningSoftware Securitydigital certificates
0 likes · 7 min read
Understanding Code Signing: Importance, Process, and Tool Comparison
ZhongAn Tech Team
ZhongAn Tech Team
Oct 9, 2023 · Information Security

Network Security Communication: Principles, Protocols, and Implementation in the ZA App

This article explains the fundamentals of symmetric and asymmetric encryption, one‑way and trapdoor functions, forward secrecy, TLS handshake, and how the ZA financial app applies a multi‑layered secure communication protocol—including certificate verification, replay protection, payload encryption, and request signing—to achieve robust, high‑performance network security across iOS, Android, and web platforms.

TLSasymmetric cryptographydigital certificates
0 likes · 21 min read
Network Security Communication: Principles, Protocols, and Implementation in the ZA App
37 Mobile Game Tech Team
37 Mobile Game Tech Team
Apr 8, 2021 · Information Security

Why HTTPS Beats HTTP: Inside SSL/TLS, Certificates & Secure Handshakes

HTTPS enhances web security over HTTP by encrypting data, authenticating parties with digital certificates, and employing a combined symmetric‑asymmetric handshake using SSL/TLS, which ensures confidentiality, integrity, and trust through certificate chains, hash functions, and secure key exchange mechanisms.

HTTPSSSL/TLSdigital certificates
0 likes · 18 min read
Why HTTPS Beats HTTP: Inside SSL/TLS, Certificates & Secure Handshakes
Open Source Linux
Open Source Linux
Jul 13, 2020 · Information Security

Demystifying HTTPS: How Encryption and Certificates Secure the Web

This article explains in plain language what HTTPS is, how it encrypts data using symmetric and asymmetric techniques, how it verifies server identity with digital signatures and certificates, and why these mechanisms keep web communications safe from eavesdropping and tampering.

HTTPSTLSWeb Security
0 likes · 7 min read
Demystifying HTTPS: How Encryption and Certificates Secure the Web
JD Retail Technology
JD Retail Technology
Dec 19, 2019 · Mobile Development

Understanding iOS App Signing Mechanism and Its Underlying Cryptography

This article explains the iOS app signing process, covering symmetric encryption, public‑key cryptography, hybrid cryptosystems, digital signatures, certificates, and how Apple verifies app packages during distribution and on‑device installation, providing both beginner and advanced insights.

App DistributionCode SigningMobile Security
0 likes · 13 min read
Understanding iOS App Signing Mechanism and Its Underlying Cryptography
Senior Brother's Insights
Senior Brother's Insights
Nov 14, 2019 · Information Security

Why HTTPS Needs Both Symmetric and Asymmetric Encryption: A Step‑by‑Step Design Walkthrough

This article reconstructs the design of HTTPS by starting from a simple secure chat, explaining why symmetric encryption alone cannot secure web traffic, introducing asymmetric encryption for key exchange, detailing how digital certificates and certificate authorities solve public‑key distribution, and summarizing the TLS handshake process.

HTTPSTLSdigital certificates
0 likes · 12 min read
Why HTTPS Needs Both Symmetric and Asymmetric Encryption: A Step‑by‑Step Design Walkthrough
Efficient Ops
Efficient Ops
Nov 12, 2019 · Information Security

Why HTTPS Needs Both Symmetric and Asymmetric Encryption (Explained)

This article walks through the design of HTTPS, showing how symmetric encryption secures data while asymmetric encryption safely negotiates keys, and explains the role of digital certificates and certificate authorities in preventing man‑in‑the‑middle attacks.

HTTPSPublic Key InfrastructureTLS
0 likes · 13 min read
Why HTTPS Needs Both Symmetric and Asymmetric Encryption (Explained)
Efficient Ops
Efficient Ops
Feb 28, 2016 · Information Security

How Much Do Hackers Spend and Earn? A Deep Dive into Cybercrime Economics

This article breaks down the monthly expenses hackers incur for tools, services, and infrastructure, then reveals how much they can earn through ransomware, malicious certificates, fake antivirus, IP reputation abuse, web shells, and user data trading, highlighting the lucrative yet risky nature of cybercrime.

cybersecuritydata theftdigital certificates
0 likes · 9 min read
How Much Do Hackers Spend and Earn? A Deep Dive into Cybercrime Economics
MaGe Linux Operations
MaGe Linux Operations
May 26, 2015 · Information Security

Mastering Encryption: From Basics to OpenSSL PKI Implementation

This article explains the fundamentals of encryption, symmetric and asymmetric cryptography, digital certificates, PKI, and provides step‑by‑step guidance on using OpenSSL to generate keys, create a private CA, issue and revoke certificates for secure data transmission.

OpenSSLPKIdigital certificates
0 likes · 16 min read
Mastering Encryption: From Basics to OpenSSL PKI Implementation