Tagged articles
39 articles
Page 1 of 1
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
May 7, 2026 · Information Security

Secure Anything with Google Tink: Encrypt Everywhere in Just Three Lines

This article introduces Google Tink, an open‑source cryptographic library for Java, explains its design goals and primitive abstractions, and walks through concise code examples that generate keysets, perform AEAD encryption, stream large files, compute MACs, and create digital signatures, all with minimal boilerplate.

AEADGoogle TinkJava
0 likes · 13 min read
Secure Anything with Google Tink: Encrypt Everywhere in Just Three Lines
Top Architect
Top Architect
Dec 21, 2025 · Information Security

Securing API Calls with Hybrid Symmetric‑Asymmetric Encryption and HTTPS Principles

This article presents a comprehensive design for API request and response protection that combines symmetric and asymmetric encryption, HTTPS fundamentals, and WeChat Pay specific cryptographic mechanisms, detailing key exchange, data signing, parameter handling, implementation code, common pitfalls, and a security analysis.

API SecurityHTTPSJava
0 likes · 14 min read
Securing API Calls with Hybrid Symmetric‑Asymmetric Encryption and HTTPS Principles
IT Services Circle
IT Services Circle
Sep 27, 2025 · Information Security

GitHub’s New Moves to Harden npm Supply‑Chain Security

The article examines recent supply‑chain attacks on the front‑end ecosystem, explains pnpm’s cooling‑off feature, and details GitHub’s multi‑layered plan—including mandatory 2FA, package signing, backend refactoring, and automatic detection—to transform the time gap of attacks into a difficulty gap, while acknowledging the added overhead for maintainers.

2FAGitHubdigital signature
0 likes · 5 min read
GitHub’s New Moves to Harden npm Supply‑Chain Security
Top Architect
Top Architect
Jul 12, 2024 · Information Security

API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques

This article presents a comprehensive API encryption scheme that combines symmetric and asymmetric cryptography, hashing, and digital signatures, explains HTTPS fundamentals, details WeChat Pay encryption, outlines key exchange and data protection processes, provides Java code examples, and analyzes security, anti‑tampering, anti‑replay, and performance considerations.

API SecurityHTTPSHashing
0 likes · 16 min read
API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques
Selected Java Interview Questions
Selected Java Interview Questions
Jul 10, 2024 · Information Security

Symmetric and Asymmetric Encryption, Digital Signatures, HTTPS, and Secure URL Handling with Spring Cloud Gateway

This article explains the fundamentals of symmetric and asymmetric encryption, how digital signatures and HTTPS work with certificate authorities, and demonstrates a practical implementation of secure URL encryption, key exchange, and request validation using custom Spring Cloud Gateway filters written in Java.

HTTPSJavaSpring Cloud Gateway
0 likes · 22 min read
Symmetric and Asymmetric Encryption, Digital Signatures, HTTPS, and Secure URL Handling with Spring Cloud Gateway
IT Services Circle
IT Services Circle
Apr 4, 2024 · Information Security

Understanding HTTPS: Security Principles, SSL/TLS, and Encryption Mechanisms

HTTPS secures web communication by adding SSL/TLS encryption to HTTP, providing confidentiality, integrity, authentication, and non-repudiation through a combination of symmetric and asymmetric cryptography, hash functions, digital signatures, and certificate authorities, while addressing migration concerns and performance considerations.

HTTPSSSL/TLSTLS
0 likes · 18 min read
Understanding HTTPS: Security Principles, SSL/TLS, and Encryption Mechanisms
Code Ape Tech Column
Code Ape Tech Column
Dec 7, 2023 · Information Security

Implementing Symmetric and Asymmetric Encryption, Digital Signatures, and Dynamic URL Encryption in Spring Cloud Gateway

This article explains the principles of symmetric and asymmetric encryption, digital signatures, HTTPS with CA, and demonstrates how to generate RSA keys, handle symmetric keys, encrypt URLs with AES, and verify signatures using custom Spring Cloud Gateway filters, complete with Java code examples.

digital signatureencryptioninformation security
0 likes · 24 min read
Implementing Symmetric and Asymmetric Encryption, Digital Signatures, and Dynamic URL Encryption in Spring Cloud Gateway
Liangxu Linux
Liangxu Linux
Sep 20, 2023 · Information Security

How to Secure Your Bootloader: Image Verification, Signature Authentication, and Memory Protection

This article explains essential bootloader security mechanisms—including image integrity checks, digital signature verification, hardware/software memory protection, and the use of read‑only storage—while highlighting practical implementation tips for STM32 and the trade‑offs between security and system complexity.

bootloaderdigital signatureembedded
0 likes · 8 min read
How to Secure Your Bootloader: Image Verification, Signature Authentication, and Memory Protection
Java High-Performance Architecture
Java High-Performance Architecture
Oct 29, 2022 · Backend Development

Build a Java SpringBoot Digital Signature & Seal System with PageOffice

This article walks through creating a Java SpringBoot demo that implements digital signing and electronic sealing of Office documents, explains the underlying cryptographic concepts, shows the full source code (controller, service, utility classes), and provides step‑by‑step deployment and UI demonstration of the workflow.

Document WorkflowJavaPageOffice
0 likes · 11 min read
Build a Java SpringBoot Digital Signature & Seal System with PageOffice
JD Tech
JD Tech
Aug 26, 2022 · Information Security

API Security Governance and Authentication Practices in JD Logistics Sorting Platform

This article examines security challenges encountered in JD Logistics' sorting platform, details the investigative process for abnormal API requests, proposes a SHA‑256 based authentication scheme with digital signatures, compares industry‑wide API protection methods, and shares practical insights from the author's experience in financial API gateway design.

API SecurityAuthenticationdigital signature
0 likes · 15 min read
API Security Governance and Authentication Practices in JD Logistics Sorting Platform
37 Interactive Technology Team
37 Interactive Technology Team
Jul 27, 2022 · Mobile Development

Android APK Digital Signature: Purpose, Principles, and v1‑v4 Signing Schemes

Android APK digital signatures ensure app integrity and author authenticity by hashing files and signing with a private key, with four schemes—v1 (JAR‑style per‑file digests), v2 (whole‑APK block), v3 (key‑rotation support), and v4 (external .idsig for fast incremental installs)—each offering progressively stronger protection and installation speed.

APK signingAndroidMobile Security
0 likes · 16 min read
Android APK Digital Signature: Purpose, Principles, and v1‑v4 Signing Schemes
ITPUB
ITPUB
Jul 4, 2022 · Information Security

10 Proven Strategies to Secure API Interfaces: Encryption, Signing, Tokens & More

This article outlines ten practical methods for protecting API data, covering transmission encryption, digital signatures, token authentication, timestamp and nonce mechanisms, rate limiting, blacklist/whitelist controls, data masking, and parameter validation to ensure comprehensive interface security.

API SecurityParameter Validationdata masking
0 likes · 14 min read
10 Proven Strategies to Secure API Interfaces: Encryption, Signing, Tokens & More
Code DAO
Code DAO
May 2, 2022 · Information Security

Understanding the Principles Behind HTTPS

This article explains how HTTPS combines HTTP with SSL/TLS, walks through the TLS handshake steps, describes symmetric and asymmetric encryption, the role of X.509 certificates, digital signatures, certificate chains, and provides a hands‑on OpenSSL guide for manually verifying a server certificate.

CertificateHTTPSOpenSSL
0 likes · 25 min read
Understanding the Principles Behind HTTPS
360 Quality & Efficiency
360 Quality & Efficiency
Mar 25, 2022 · Information Security

Adding a Graphical Seal and Network Timestamp Electronic Signature to PDF Documents with Java and Spire

This tutorial demonstrates how to programmatically embed a graphical seal and a trusted network timestamp electronic signature into a PDF using Java, the Spire library, and a .pfx certificate, covering preparation, signature creation, positioning, timestamp configuration, visual settings, and final saving.

Electronic SealPDFSpire
0 likes · 5 min read
Adding a Graphical Seal and Network Timestamp Electronic Signature to PDF Documents with Java and Spire
21CTO
21CTO
Aug 25, 2021 · Information Security

Why Simple Web Login Is Vulnerable and How to Secure It with Encryption and Tokens

This article examines common security flaws in basic web login forms, demonstrates how plain‑text passwords can be intercepted, and presents practical countermeasures such as client‑side encryption, hashing, captchas, tokens, and digital signatures to protect credentials and data integrity.

CaptchaMD5Token
0 likes · 13 min read
Why Simple Web Login Is Vulnerable and How to Secure It with Encryption and Tokens
Top Architect
Top Architect
Aug 23, 2021 · Information Security

Security Considerations for Web Login: From Plain HTTP to Encryption, Tokens, and Digital Signatures

This article examines common security vulnerabilities in web login processes, illustrating how plain HTTP exposes credentials, evaluating symmetric and asymmetric encryption, token-based authentication, and digital signatures, and proposes layered protection strategies such as MD5 hashing, CAPTCHA, and token mechanisms to safeguard user data.

MD5TokenWeb Security
0 likes · 12 min read
Security Considerations for Web Login: From Plain HTTP to Encryption, Tokens, and Digital Signatures
Selected Java Interview Questions
Selected Java Interview Questions
Aug 15, 2021 · Information Security

Understanding Web Login Security: Risks, Encryption Methods, Tokens, and Digital Signatures

This article examines common security vulnerabilities in web login processes, demonstrates how plain‑text passwords can be intercepted over HTTP/HTTPS, evaluates symmetric and asymmetric encryption, discusses the limitations of MD5, and proposes token‑based and digital‑signature solutions to protect credentials and data integrity.

AuthenticationHTTPSMD5
0 likes · 14 min read
Understanding Web Login Security: Risks, Encryption Methods, Tokens, and Digital Signatures
Programmer DD
Programmer DD
Aug 2, 2021 · Information Security

Why Simple HTML Login Forms Leak Passwords and How to Secure Them

This article examines common security flaws in basic HTML login forms, demonstrates how plaintext passwords can be intercepted over HTTP, evaluates symmetric and asymmetric encryption, discusses the limitations of HTTPS, and proposes practical safeguards such as MD5 hashing, token-based authentication, captchas, and digital signatures to protect user credentials.

HTTPSMD5Token
0 likes · 14 min read
Why Simple HTML Login Forms Leak Passwords and How to Secure Them
Top Architect
Top Architect
Jun 29, 2021 · Blockchain

Understanding Bitcoin: From Its Origin to Wallets, Transactions, Mining, and the Blockchain

This article explains the technical foundations of Bitcoin—including its 2008 white‑paper origin, asymmetric encryption, wallet addresses, transaction verification, mining rewards, block size debates, and the peer‑to‑peer network—providing a comprehensive, non‑investment‑focused overview of how the cryptocurrency works.

BitcoinBlockchainMining
0 likes · 12 min read
Understanding Bitcoin: From Its Origin to Wallets, Transactions, Mining, and the Blockchain
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jun 13, 2021 · Information Security

Master RSA Encryption in Java: Theory, Code, and Execution

This article explains why asymmetric encryption like RSA is paired with symmetric algorithms, outlines RSA's history and key concepts, and provides a complete Java implementation with code examples and execution results, illustrating both public‑key and private‑key operations.

RSAasymmetric encryptioncryptography
0 likes · 8 min read
Master RSA Encryption in Java: Theory, Code, and Execution
OPPO Amber Lab
OPPO Amber Lab
Oct 26, 2020 · Information Security

Understanding Core Cryptography Concepts: Public Keys, Digital Signatures, and AEAD

This article introduces essential cryptography fundamentals for programmers, covering public‑key encryption, key‑exchange protocols, digital envelopes, signatures, certificates, hash functions, MACs, and authenticated encryption with associated data, while highlighting practical security considerations.

AEADdigital signaturehash function
0 likes · 5 min read
Understanding Core Cryptography Concepts: Public Keys, Digital Signatures, and AEAD
Fulu Network R&D Team
Fulu Network R&D Team
Jun 29, 2020 · Information Security

Comprehensive Guide to Message Digest, MAC, and Digital Signature Algorithms in .NET Core with BouncyCastle

This article introduces various cryptographic primitives—including MD, SHA, MAC, and digital signature algorithms such as RSA, DSA, and ECDSA—explains their usage and security considerations, and provides complete .NET Core code examples using the BouncyCastle library for implementation.

.NET CoreBouncyCastleECDSA
0 likes · 24 min read
Comprehensive Guide to Message Digest, MAC, and Digital Signature Algorithms in .NET Core with BouncyCastle
Ziru Technology
Ziru Technology
Jul 25, 2019 · Information Security

PKI, Digital Signatures & SSH: A Practical Guide to Information Security

This article explains the fundamentals of Public Key Infrastructure, the differences between symmetric and asymmetric encryption, how digital signatures and certificates ensure data integrity and authenticity, and illustrates the SSH protocol’s secure authentication mechanisms, providing a comprehensive overview of modern information security techniques.

PKISSHdigital signature
0 likes · 16 min read
PKI, Digital Signatures & SSH: A Practical Guide to Information Security
Alibaba Cloud Developer
Alibaba Cloud Developer
Aug 30, 2018 · Information Security

How Alice & Bob Outsmart Eavesdroppers: A Fun Guide to Encryption, MACs, and Digital Signatures

This article uses a playful story of Alice, Bob, Eve, Mallory, and Trent to explain the fundamentals of symmetric and asymmetric encryption, message authentication codes, digital signatures, and public‑key certificates, showing how each technique protects confidentiality, integrity, and authenticity in communications.

CertificateMacasymmetric key
0 likes · 14 min read
How Alice & Bob Outsmart Eavesdroppers: A Fun Guide to Encryption, MACs, and Digital Signatures
Architect's Tech Stack
Architect's Tech Stack
May 11, 2018 · Information Security

Understanding Symmetric and Asymmetric Encryption, Key Distribution, Digital Signatures, and Their Practical Applications

This article explains the fundamentals of cryptography, covering symmetric and asymmetric encryption, key distribution challenges and solutions, digital signatures, certificates, and practical applications such as SSH login, HTTPS handshakes, and API authentication, providing clear examples and code snippets.

asymmetric encryptioncryptographydigital signature
0 likes · 17 min read
Understanding Symmetric and Asymmetric Encryption, Key Distribution, Digital Signatures, and Their Practical Applications
Tencent Cloud Developer
Tencent Cloud Developer
Mar 6, 2018 · Blockchain

Fundamentals of Cryptography in Bitcoin: Public/Private Keys, Digital Signatures, and Large Integers

Bitcoin’s security relies on proven cryptographic principles—large‑integer public/private key pairs and digital signatures that authenticate transactions locally without exposing secret keys—making brute‑force attacks infeasible and ensuring that only implementation errors, not the mathematics, can compromise the system.

cryptographydigital signaturepublic key
0 likes · 11 min read
Fundamentals of Cryptography in Bitcoin: Public/Private Keys, Digital Signatures, and Large Integers
JD Retail Technology
JD Retail Technology
Jan 12, 2018 · Blockchain

Understanding the Relationship Between Blockchain and Bitcoin

This article explains how blockchain technology underpins Bitcoin, covering basic concepts such as distributed ledgers, cryptographic hash functions, digital signatures, hash pointers, Merkle trees, and the structure of Bitcoin's blockchain, while also highlighting broader applications and future considerations.

BitcoinBlockchainDecentralization
0 likes · 8 min read
Understanding the Relationship Between Blockchain and Bitcoin
21CTO
21CTO
Nov 10, 2017 · Information Security

Symmetric vs Asymmetric Encryption: MACs, Signatures & Certificates Explained

This article explains the fundamentals of symmetric and asymmetric encryption, the key distribution challenges they face, how hybrid cryptosystems combine their strengths, and introduces essential cryptographic tools such as hash functions, message authentication codes, digital signatures, and public‑key certificates, comparing their capabilities.

CertificateMacdigital signature
0 likes · 15 min read
Symmetric vs Asymmetric Encryption: MACs, Signatures & Certificates Explained
Architect
Architect
Jan 22, 2016 · Information Security

Analysis of New MD5 Collision Malware and Its Attack Techniques

This article examines the evolution of a malicious MD5 collision campaign from 2014‑2015, detailing the chosen‑prefix collision method, the combination with digital signatures and dual‑signature tricks, the full infection workflow, and the large‑scale propagation and impact on millions of Windows users.

MD5 collisionchosen-prefix collisiondigital signature
0 likes · 15 min read
Analysis of New MD5 Collision Malware and Its Attack Techniques
MaGe Linux Operations
MaGe Linux Operations
Jul 4, 2014 · Information Security

How Digital Signatures Secure Data: Principles, Algorithms, and Implementation

This article explains the concept of digital signatures, their role in verifying data integrity and origin, outlines common algorithms such as RSA, DSS, and hash‑based signatures, and details the full PKI‑based workflow—including authentication, signing, and verification—while also describing how to combine encryption with signatures for confidential transmission.

PKIRSAcryptography
0 likes · 8 min read
How Digital Signatures Secure Data: Principles, Algorithms, and Implementation