Tag

digital signature

0 views collected around this technical thread.

Top Architect
Top Architect
Jul 12, 2024 · Information Security

API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques

This article presents a comprehensive API encryption scheme that combines symmetric and asymmetric cryptography, hashing, and digital signatures, explains HTTPS fundamentals, details WeChat Pay encryption, outlines key exchange and data protection processes, provides Java code examples, and analyzes security, anti‑tampering, anti‑replay, and performance considerations.

API securityEncryptionHTTPS
0 likes · 16 min read
API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques
Selected Java Interview Questions
Selected Java Interview Questions
Jul 10, 2024 · Information Security

Symmetric and Asymmetric Encryption, Digital Signatures, HTTPS, and Secure URL Handling with Spring Cloud Gateway

This article explains the fundamentals of symmetric and asymmetric encryption, how digital signatures and HTTPS work with certificate authorities, and demonstrates a practical implementation of secure URL encryption, key exchange, and request validation using custom Spring Cloud Gateway filters written in Java.

EncryptionHTTPSJava
0 likes · 22 min read
Symmetric and Asymmetric Encryption, Digital Signatures, HTTPS, and Secure URL Handling with Spring Cloud Gateway
IT Services Circle
IT Services Circle
Apr 4, 2024 · Information Security

Understanding HTTPS: Security Principles, SSL/TLS, and Encryption Mechanisms

HTTPS secures web communication by adding SSL/TLS encryption to HTTP, providing confidentiality, integrity, authentication, and non-repudiation through a combination of symmetric and asymmetric cryptography, hash functions, digital signatures, and certificate authorities, while addressing migration concerns and performance considerations.

EncryptionHTTPSSSL/TLS
0 likes · 18 min read
Understanding HTTPS: Security Principles, SSL/TLS, and Encryption Mechanisms
IT Services Circle
IT Services Circle
Feb 29, 2024 · Information Security

Understanding DNS: Hierarchy, Vulnerabilities, and the Key Ceremony that Secures the Internet

The article explains how IP addresses and DNS work, why a centralized DNS design is problematic, describes the distributed three‑level DNS architecture, introduces DNS security with digital signatures, and details the rigorous key‑ceremony process that protects the ICANN root key.

DNSICANNIP address
0 likes · 7 min read
Understanding DNS: Hierarchy, Vulnerabilities, and the Key Ceremony that Secures the Internet
Code Ape Tech Column
Code Ape Tech Column
Dec 7, 2023 · Information Security

Implementing Symmetric and Asymmetric Encryption, Digital Signatures, and Dynamic URL Encryption in Spring Cloud Gateway

This article explains the principles of symmetric and asymmetric encryption, digital signatures, HTTPS with CA, and demonstrates how to generate RSA keys, handle symmetric keys, encrypt URLs with AES, and verify signatures using custom Spring Cloud Gateway filters, complete with Java code examples.

EncryptionJavaSpring Cloud Gateway
0 likes · 24 min read
Implementing Symmetric and Asymmetric Encryption, Digital Signatures, and Dynamic URL Encryption in Spring Cloud Gateway
JD Tech
JD Tech
Aug 26, 2022 · Information Security

API Security Governance and Authentication Practices in JD Logistics Sorting Platform

This article examines security challenges encountered in JD Logistics' sorting platform, details the investigative process for abnormal API requests, proposes a SHA‑256 based authentication scheme with digital signatures, compares industry‑wide API protection methods, and shares practical insights from the author's experience in financial API gateway design.

API securityAuthenticationIndustry Comparison
0 likes · 15 min read
API Security Governance and Authentication Practices in JD Logistics Sorting Platform
37 Interactive Technology Team
37 Interactive Technology Team
Jul 27, 2022 · Mobile Development

Android APK Digital Signature: Purpose, Principles, and v1‑v4 Signing Schemes

Android APK digital signatures ensure app integrity and author authenticity by hashing files and signing with a private key, with four schemes—v1 (JAR‑style per‑file digests), v2 (whole‑APK block), v3 (key‑rotation support), and v4 (external .idsig for fast incremental installs)—each offering progressively stronger protection and installation speed.

APK signingMobile SecurityV3
0 likes · 16 min read
Android APK Digital Signature: Purpose, Principles, and v1‑v4 Signing Schemes
360 Quality & Efficiency
360 Quality & Efficiency
Mar 25, 2022 · Information Security

Adding a Graphical Seal and Network Timestamp Electronic Signature to PDF Documents with Java and Spire

This tutorial demonstrates how to programmatically embed a graphical seal and a trusted network timestamp electronic signature into a PDF using Java, the Spire library, and a .pfx certificate, covering preparation, signature creation, positioning, timestamp configuration, visual settings, and final saving.

Electronic SealJavaPDF
0 likes · 5 min read
Adding a Graphical Seal and Network Timestamp Electronic Signature to PDF Documents with Java and Spire
Top Architect
Top Architect
Aug 23, 2021 · Information Security

Security Considerations for Web Login: From Plain HTTP to Encryption, Tokens, and Digital Signatures

This article examines common security vulnerabilities in web login processes, illustrating how plain HTTP exposes credentials, evaluating symmetric and asymmetric encryption, token-based authentication, and digital signatures, and proposes layered protection strategies such as MD5 hashing, CAPTCHA, and token mechanisms to safeguard user data.

AuthenticationEncryptionMD5
0 likes · 12 min read
Security Considerations for Web Login: From Plain HTTP to Encryption, Tokens, and Digital Signatures
Selected Java Interview Questions
Selected Java Interview Questions
Aug 15, 2021 · Information Security

Understanding Web Login Security: Risks, Encryption Methods, Tokens, and Digital Signatures

This article examines common security vulnerabilities in web login processes, demonstrates how plain‑text passwords can be intercepted over HTTP/HTTPS, evaluates symmetric and asymmetric encryption, discusses the limitations of MD5, and proposes token‑based and digital‑signature solutions to protect credentials and data integrity.

AuthenticationEncryptionHTTPS
0 likes · 14 min read
Understanding Web Login Security: Risks, Encryption Methods, Tokens, and Digital Signatures
Top Architect
Top Architect
Jun 29, 2021 · Blockchain

Understanding Bitcoin: From Its Origin to Wallets, Transactions, Mining, and the Blockchain

This article explains the technical foundations of Bitcoin—including its 2008 white‑paper origin, asymmetric encryption, wallet addresses, transaction verification, mining rewards, block size debates, and the peer‑to‑peer network—providing a comprehensive, non‑investment‑focused overview of how the cryptocurrency works.

asymmetric encryptionbitcoinblockchain
0 likes · 12 min read
Understanding Bitcoin: From Its Origin to Wallets, Transactions, Mining, and the Blockchain
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jun 13, 2021 · Information Security

Master RSA Encryption in Java: Theory, Code, and Execution

This article explains why asymmetric encryption like RSA is paired with symmetric algorithms, outlines RSA's history and key concepts, and provides a complete Java implementation with code examples and execution results, illustrating both public‑key and private‑key operations.

JavaRSAasymmetric encryption
0 likes · 8 min read
Master RSA Encryption in Java: Theory, Code, and Execution
Fulu Network R&D Team
Fulu Network R&D Team
Jun 29, 2020 · Information Security

Comprehensive Guide to Message Digest, MAC, and Digital Signature Algorithms in .NET Core with BouncyCastle

This article introduces various cryptographic primitives—including MD, SHA, MAC, and digital signature algorithms such as RSA, DSA, and ECDSA—explains their usage and security considerations, and provides complete .NET Core code examples using the BouncyCastle library for implementation.

.NET CoreBouncyCastleECDSA
0 likes · 24 min read
Comprehensive Guide to Message Digest, MAC, and Digital Signature Algorithms in .NET Core with BouncyCastle
Architect's Tech Stack
Architect's Tech Stack
May 11, 2018 · Information Security

Understanding Symmetric and Asymmetric Encryption, Key Distribution, Digital Signatures, and Their Practical Applications

This article explains the fundamentals of cryptography, covering symmetric and asymmetric encryption, key distribution challenges and solutions, digital signatures, certificates, and practical applications such as SSH login, HTTPS handshakes, and API authentication, providing clear examples and code snippets.

Symmetric Encryptionasymmetric encryptioncryptography
0 likes · 17 min read
Understanding Symmetric and Asymmetric Encryption, Key Distribution, Digital Signatures, and Their Practical Applications
Tencent Cloud Developer
Tencent Cloud Developer
Mar 6, 2018 · Blockchain

Fundamentals of Cryptography in Bitcoin: Public/Private Keys, Digital Signatures, and Large Integers

Bitcoin’s security relies on proven cryptographic principles—large‑integer public/private key pairs and digital signatures that authenticate transactions locally without exposing secret keys—making brute‑force attacks infeasible and ensuring that only implementation errors, not the mathematics, can compromise the system.

Bitcoinblockchaincryptography
0 likes · 11 min read
Fundamentals of Cryptography in Bitcoin: Public/Private Keys, Digital Signatures, and Large Integers
JD Retail Technology
JD Retail Technology
Jan 12, 2018 · Blockchain

Understanding the Relationship Between Blockchain and Bitcoin

This article explains how blockchain technology underpins Bitcoin, covering basic concepts such as distributed ledgers, cryptographic hash functions, digital signatures, hash pointers, Merkle trees, and the structure of Bitcoin's blockchain, while also highlighting broader applications and future considerations.

Merkle treebitcoinblockchain
0 likes · 8 min read
Understanding the Relationship Between Blockchain and Bitcoin