Tagged articles
12 articles
Page 1 of 1
Xiao Liu Lab
Xiao Liu Lab
Nov 26, 2025 · Information Security

Why SecureCRT Fails on New Linux and How to Fix It

After upgrading to recent Linux distributions, SecureCRT often cannot establish SSH connections due to disabled legacy algorithms, but the issue can be resolved by updating SecureCRT or manually enabling modern key‑exchange and host‑key types in its settings.

SSHSecureCRTinformation security
0 likes · 4 min read
Why SecureCRT Fails on New Linux and How to Fix It
Liangxu Linux
Liangxu Linux
Nov 26, 2023 · Information Security

Understanding SSH: Ports, Authentication, and Encryption Explained

SSH (Secure Shell) is a widely used network security protocol that replaces insecure methods like Telnet and FTP by encrypting data and authenticating users, typically operating on port 22, and employing both symmetric and asymmetric encryption, key exchange, and various authentication methods such as passwords and public‑key pairs.

AuthenticationOpenSSHPutty
0 likes · 10 min read
Understanding SSH: Ports, Authentication, and Encryption Explained
Baidu App Technology
Baidu App Technology
Aug 11, 2022 · Information Security

How Baidu’s bdtls Protocol Secures Mini‑Programs with TLS 1.3‑Inspired Design

This article explains Baidu’s custom bdtls security communication protocol for mini‑programs, detailing its TLS 1.3‑based architecture, DHE‑RSA key exchange, AES‑GCM encryption, implementation on both server and client sides, and the strategies used to achieve strong security, low latency, high availability, and extensibility.

TLSbdtlsencryption
0 likes · 23 min read
How Baidu’s bdtls Protocol Secures Mini‑Programs with TLS 1.3‑Inspired Design
MaGe Linux Operations
MaGe Linux Operations
May 7, 2022 · Information Security

Cryptography Basics: Symmetric, Asymmetric, Hashing & Digital Signatures

This article introduces fundamental cryptography concepts, explaining how symmetric and asymmetric encryption work, the role of key exchange, the purpose and properties of hashing algorithms, and how digital signatures combine encryption and hashing to ensure data authenticity and integrity.

Hashingcryptographydigital signatures
0 likes · 7 min read
Cryptography Basics: Symmetric, Asymmetric, Hashing & Digital Signatures
Programmer DD
Programmer DD
Apr 23, 2022 · Information Security

How SSH Secures Remote Access: Ports, Handshakes, and Key Authentication Explained

This article explains the SSH protocol, covering its default port, the step‑by‑step handshake process—including connection establishment, version and algorithm negotiation, key exchange, and user authentication methods—while also describing common clients like PuTTY and OpenSSH and the role of symmetric and asymmetric encryption.

AuthenticationOpenSSHPutty
0 likes · 11 min read
How SSH Secures Remote Access: Ports, Handshakes, and Key Authentication Explained
Selected Java Interview Questions
Selected Java Interview Questions
Jan 23, 2021 · Information Security

Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange

This article provides a comprehensive introduction to cryptographic techniques, covering the goals of confidentiality, integrity and authentication, and detailing symmetric, asymmetric and hash algorithms, common implementations, their advantages and drawbacks, as well as key exchange methods and public key infrastructure.

PKIasymmetric encryptioncryptography
0 likes · 16 min read
Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange
JD Cloud Developers
JD Cloud Developers
Dec 3, 2020 · Information Security

Why Weak Passwords Still Prevail and How Modern Cryptography Secures Your Data

This article explores the prevalence of weak passwords, introduces fundamental concepts of cryptography, explains symmetric encryption algorithms and their key distribution challenges, and demonstrates the Diffie‑Hellman key‑exchange process with a concrete example and a Python implementation of primitive‑root calculation.

Diffie-Hellmancryptographyinformation security
0 likes · 9 min read
Why Weak Passwords Still Prevail and How Modern Cryptography Secures Your Data
WeChat Backend Team
WeChat Backend Team
Dec 13, 2016 · Information Security

What TLS Design Lessons Can Revolutionize Modern Secure Communications?

This article distills practical design decisions for modern encrypted communication protocols—covering algorithm selection, versioning, PKI choices, library alternatives, replay protection, performance tuning, and latency considerations—while providing a concise appendix of fundamental cryptographic concepts and key references.

TLSkey exchangeprotocol design
0 likes · 15 min read
What TLS Design Lessons Can Revolutionize Modern Secure Communications?
WeChat Client Technology Team
WeChat Client Technology Team
May 10, 2016 · Information Security

How We Built mmtls: A High‑Performance, Low‑Latency Secure Protocol for WeChat

mmtls is a custom, lightweight secure communication protocol designed for WeChat that encrypts all client‑to‑server traffic, offering confidentiality, integrity, low latency, scalability, and forward secrecy by adapting TLS 1.3 concepts with optimized handshake, key‑exchange, record, and replay‑protection mechanisms.

AuthenticationLow latencyTLS
0 likes · 32 min read
How We Built mmtls: A High‑Performance, Low‑Latency Secure Protocol for WeChat