Tag

encryption

0 views collected around this technical thread.

Code Ape Tech Column
Code Ape Tech Column
Jun 10, 2025 · Information Security

Securing OpenAPI Interfaces with AppId, AppSecret, and RSA Signatures

This article explains how to standardize and protect OpenAPI interfaces by using globally unique AppId/AppSecret pairs, generating RSA‑based signatures, implementing timestamp and nonce checks, and applying common security measures such as rate limiting, whitelist/blacklist controls, and sensitive data handling, all illustrated with complete Java code examples.

API securityAppIdAppSecret
0 likes · 28 min read
Securing OpenAPI Interfaces with AppId, AppSecret, and RSA Signatures
php中文网 Courses
php中文网 Courses
May 30, 2025 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, and demonstrates three PHP-based methods—using HTTPS, symmetric encryption (e.g., AES), and asymmetric encryption with OpenSSL—to protect communication, along with sample code and key management tips.

HTTPSOpenSSLPHP
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
IT Services Circle
IT Services Circle
May 20, 2025 · Information Security

Six Common Data Masking Techniques: From Simple String Replacement to K‑Anonymity

This article presents six practical data‑desensitization methods—including string replacement, encryption, database masking, cache‑based replacement, dynamic AOP masking, and K‑anonymity—explains their principles, shows Java implementations, compares security, performance, and reversibility, and offers concrete recommendations for protecting sensitive fields such as phone numbers and ID cards.

Javadata maskingencryption
0 likes · 8 min read
Six Common Data Masking Techniques: From Simple String Replacement to K‑Anonymity
Code Mala Tang
Code Mala Tang
May 5, 2025 · Information Security

6 Essential Python Security Practices Every Developer Should Follow

Learn how to safeguard your Python applications by avoiding hard‑coded secrets, using .env files, employing virtual environments, validating and sanitizing inputs, handling files securely, encrypting sensitive data, and implementing proper exception handling—all essential steps for robust information security.

Exception HandlingPythonbest practices
0 likes · 5 min read
6 Essential Python Security Practices Every Developer Should Follow
Test Development Learning Exchange
Test Development Learning Exchange
Apr 30, 2025 · Information Security

Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR

This article presents concise Python examples for a wide range of encryption and encoding methods—including MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, and XOR—explaining their usage scenarios and highlighting the importance of selecting appropriate cryptographic techniques for security.

AESHashingRSA
0 likes · 7 min read
Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR
php中文网 Courses
php中文网 Courses
Apr 25, 2025 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, introduces HTTPS, demonstrates how to apply symmetric encryption algorithms like AES in PHP, and shows how to use PHP's OpenSSL extension for asymmetric encryption, providing practical code examples and key‑management tips.

Asymmetric EncryptionHTTPSPHP
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
Top Architecture Tech Stack
Top Architecture Tech Stack
Apr 25, 2025 · Databases

MyBatis-Mate: Enterprise-Level Features for Sharding, Encryption, Data Permissions and Automatic DDL Management

mybatis-mate is an enterprise‑level MyBatis‑Plus extension that offers sharding, data auditing, dictionary binding, field encryption, sensitive‑word filtering, automatic DDL maintenance, multi‑datasource switching, performance logging, and data‑scope control, providing a comprehensive solution for agile and secure database operations.

Data PermissionJavaMyBatis
0 likes · 12 min read
MyBatis-Mate: Enterprise-Level Features for Sharding, Encryption, Data Permissions and Automatic DDL Management
Sohu Tech Products
Sohu Tech Products
Apr 9, 2025 · Mobile Development

DRM (FairPlay) Implementation and Key Management on iOS

The article explains iOS FairPlay DRM implementation, detailing the encryption workflow, SPC/CKC exchange, and key terminology, and compares two key‑management methods—AVAssetResourceLoader and the newer AVContentKeySession—while covering usage scenarios such as on‑demand, pre‑warming, offline playback, persistable keys, and video downloading via AVAssetDownloadTask.

AVFoundationContentKeyDRM
0 likes · 21 min read
DRM (FairPlay) Implementation and Key Management on iOS
vivo Internet Technology
vivo Internet Technology
Mar 26, 2025 · Big Data

Reading Encrypted ORC Files in StarRocks: Architecture and Implementation Details

The article details how StarRocks extends the Apache ORC C++ library to decrypt column‑level encrypted ORC files, describing the file hierarchy, AES‑128‑CTR key handling, the query‑time master‑key retrieval, a decorator‑based decryption/decompression pipeline, and the block‑skip‑read mechanism that enables efficient predicate push‑down.

Big DataFile FormatStarRocks
0 likes · 19 min read
Reading Encrypted ORC Files in StarRocks: Architecture and Implementation Details
Raymond Ops
Raymond Ops
Mar 18, 2025 · Information Security

Master OpenSSL: From Symmetric Encryption to Digital Certificates

This comprehensive guide explains OpenSSL’s role in cryptography, covering symmetric and asymmetric encryption, hashing, key generation, certificate creation, and practical command‑line examples for encrypting files, managing keys, signing data, and configuring TLS servers, empowering readers to master secure communications.

OpenSSLcommand linecryptography
0 likes · 24 min read
Master OpenSSL: From Symmetric Encryption to Digital Certificates
Code Ape Tech Column
Code Ape Tech Column
Mar 8, 2025 · Information Security

Enterprise Data Desensitization Solutions Using MyBatis and Fastjson

The article explains why data desensitization is essential for enterprises, classifies common masking techniques, and provides concrete implementation guides for database, log, and output level masking in Java applications using MyBatis plugins and Fastjson filters, complete with sample code and configuration.

JavaMyBatisbackend security
0 likes · 12 min read
Enterprise Data Desensitization Solutions Using MyBatis and Fastjson
Code Ape Tech Column
Code Ape Tech Column
Feb 27, 2025 · Information Security

Implementing Single Sign-On (SSO) with Ticket‑Based Authentication in Java

This article explains the concept of Single Sign-On, its advantages, and two practical implementations using ticket‑based authentication and encrypted user data exchange between Service A and Service B, complete with database schema, configuration files, and full Java code examples.

AuthenticationJavaSSO
0 likes · 18 min read
Implementing Single Sign-On (SSO) with Ticket‑Based Authentication in Java
Python Programming Learning Circle
Python Programming Learning Circle
Feb 15, 2025 · Information Security

Building a File Encrypter in Python with AES and PBKDF2

This tutorial walks readers through building a Python‑based file encrypter using the Pycryptodome library, covering AES‑CBC encryption, PBKDF2 key derivation, functions for encrypting and decrypting files, environment setup on Windows, macOS and Linux, and a simple driver script for testing.

AESFile SecurityPython
0 likes · 12 min read
Building a File Encrypter in Python with AES and PBKDF2
Python Programming Learning Circle
Python Programming Learning Circle
Jan 23, 2025 · Fundamentals

Comprehensive Overview of Classic Algorithms and Their Python Implementations

This article presents a detailed guide to classic sorting, searching, and encryption algorithms, explains their principles and use cases, and provides Python implementation links and visualizations, offering a valuable resource for learners seeking to master fundamental algorithmic techniques.

AlgorithmsData StructuresPython
0 likes · 14 min read
Comprehensive Overview of Classic Algorithms and Their Python Implementations
php中文网 Courses
php中文网 Courses
Jan 16, 2025 · Information Security

Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption

This article explains how to secure PHP data transmission using HTTPS, symmetric encryption (AES, DES, 3DES) and asymmetric encryption with OpenSSL, providing code examples and key management advice to protect confidentiality, integrity, and prevent man‑in‑the‑middle attacks.

Asymmetric EncryptionHTTPSPHP
0 likes · 4 min read
Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption
Java Architect Essentials
Java Architect Essentials
Dec 24, 2024 · Information Security

Techniques for Performing Fuzzy Queries on Encrypted Data

This article examines the challenges of fuzzy searching encrypted data and presents three categories of solutions—naïve in‑memory decryption, conventional database‑level approaches, and advanced algorithmic methods—evaluating their implementation steps, security implications, and performance trade‑offs.

algorithmdatabaseencryption
0 likes · 11 min read
Techniques for Performing Fuzzy Queries on Encrypted Data
Test Development Learning Exchange
Test Development Learning Exchange
Dec 2, 2024 · Information Security

Implementing a Simple Caesar Cipher for Data Encryption in Python

This tutorial explains the fundamentals of data encryption, introduces differential privacy, and guides you through implementing a simple Caesar Cipher encrypt‑and‑decrypt program in Python, complete with code examples, execution instructions, and sample output.

Pythoncaesar-ciphercryptography
0 likes · 7 min read
Implementing a Simple Caesar Cipher for Data Encryption in Python
Code Ape Tech Column
Code Ape Tech Column
Nov 22, 2024 · Information Security

Design and Implementation of Secure Data Transmission in Spring Boot Using AES/RSA Encryption

This article explains how to ensure secure data transmission between front‑end and back‑end in a Spring Boot application by employing hybrid AES/RSA encryption, custom request wrappers, filters for decryption, and AOP for response encryption, complete with utility classes and testing examples.

AESAOPFilter
0 likes · 44 min read
Design and Implementation of Secure Data Transmission in Spring Boot Using AES/RSA Encryption