Tag

RSA

2 views collected around this technical thread.

Test Development Learning Exchange
Test Development Learning Exchange
Apr 30, 2025 · Information Security

Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR

This article presents concise Python examples for a wide range of encryption and encoding methods—including MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, and XOR—explaining their usage scenarios and highlighting the importance of selecting appropriate cryptographic techniques for security.

AESRSAcryptography
0 likes · 7 min read
Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR
Test Development Learning Exchange
Test Development Learning Exchange
Mar 24, 2025 · Information Security

Understanding Asymmetric Encryption and Its Application in API Automation

This article explains the fundamentals of asymmetric encryption, its key concepts, common application scenarios such as HTTPS and blockchain, provides a Python RSA implementation, and outlines how to apply it securely in API automation testing, including best practices and precautions.

API securityRSAasymmetric encryption
0 likes · 5 min read
Understanding Asymmetric Encryption and Its Application in API Automation
Code Ape Tech Column
Code Ape Tech Column
Nov 22, 2024 · Information Security

Design and Implementation of Secure Data Transmission in Spring Boot Using AES/RSA Encryption

This article explains how to ensure secure data transmission between front‑end and back‑end in a Spring Boot application by employing hybrid AES/RSA encryption, custom request wrappers, filters for decryption, and AOP for response encryption, complete with utility classes and testing examples.

AESRSARequest Wrapper
0 likes · 44 min read
Design and Implementation of Secure Data Transmission in Spring Boot Using AES/RSA Encryption
Java Architect Essentials
Java Architect Essentials
Aug 29, 2024 · Information Security

Combining RSA and AES for Secure API Parameter Transmission: A Practical Guide

This article explains a real‑world incident where insecure API parameters led to leaderboard manipulation, then details how to securely combine RSA asymmetric encryption with AES symmetric encryption, covering key concepts, padding modes, implementation steps, and server‑side decryption using Java.

AESAPI securityJava
0 likes · 22 min read
Combining RSA and AES for Secure API Parameter Transmission: A Practical Guide
Architect
Architect
Jul 15, 2024 · Information Security

Secure OpenAPI Design: AppId/AppSecret, RSA Signatures, Timestamp & Nonce Best Practices

This article explains how to secure OpenAPI interfaces by using globally unique AppId/AppSecret pairs, SHA‑256 and RSA signatures, timestamp and nonce validation, caching, rate‑limiting, parameter validation, and encryption algorithms, providing complete client‑server implementation examples in Java.

API securityJavaOpenAPI
0 likes · 26 min read
Secure OpenAPI Design: AppId/AppSecret, RSA Signatures, Timestamp & Nonce Best Practices
php中文网 Courses
php中文网 Courses
Jul 4, 2024 · Information Security

Overview of Common PHP Encryption Algorithms

This article introduces several widely used PHP encryption algorithms—including MD5, SHA family, AES, RSA, and Base64 encoding—explaining their functions, security considerations, and PHP functions for implementation, while also mentioning additional algorithms like DES, RC4, and Blowfish for specific use cases.

AESPHPRSA
0 likes · 3 min read
Overview of Common PHP Encryption Algorithms
Architect
Architect
Jun 19, 2024 · Information Security

Implementing RSA and AES Hybrid Encryption for API Security in Java

This article describes a real‑world API security incident, explains the fundamentals of asymmetric RSA and symmetric AES encryption, and provides a complete Java implementation—including a hybrid encryption strategy, custom @RequestRSA annotation, Spring AOP decryption aspect, and utility classes—to securely transmit and automatically decrypt request parameters.

AESAPI securityJava
0 likes · 23 min read
Implementing RSA and AES Hybrid Encryption for API Security in Java
Architecture Digest
Architecture Digest
Jun 7, 2024 · Information Security

Implementing RSA Encryption and Decryption in Spring Boot APIs

This article explains how to secure Spring Boot API responses using RSA asymmetric encryption and digital signatures, covering RSA fundamentals, project setup, Maven configuration, key management, annotation‑driven encryption/decryption, front‑end JavaScript encryption with JSEncrypt, and practical testing steps.

API EncryptionJavaRSA
0 likes · 10 min read
Implementing RSA Encryption and Decryption in Spring Boot APIs
Code Ape Tech Column
Code Ape Tech Column
May 11, 2024 · Information Security

Hybrid RSA‑AES Encryption for Secure API Parameter Transmission in Java

This article recounts a leaderboard data breach caused by tampered Base64 request parameters, then details a hybrid RSA‑AES encryption strategy—using RSA to protect the AES key, IV and timestamp while AES encrypts the actual payload—along with Java implementations, key‑generation utilities, and a Spring AOP aspect for automatic decryption, providing a comprehensive guide to securing API communications.

AESAPI securityRSA
0 likes · 20 min read
Hybrid RSA‑AES Encryption for Secure API Parameter Transmission in Java
Architecture Digest
Architecture Digest
May 6, 2024 · Information Security

RSA Encryption and Decryption in Spring Boot: A Practical Guide

This tutorial explains RSA asymmetric encryption and signing, then walks through securing Spring Boot API endpoints by adding annotations, configuring keys, integrating JavaScript decryption, and addressing practical deployment considerations to protect data from interception and tampering.

API securityFrontendJava
0 likes · 6 min read
RSA Encryption and Decryption in Spring Boot: A Practical Guide
Architect's Guide
Architect's Guide
Jan 7, 2024 · Information Security

Implementing RSA Encryption and Decryption in Spring Boot APIs

This guide explains how to secure Spring Boot API responses using RSA asymmetric encryption, covering the theory of RSA, practical scenarios, Maven setup, annotation‑based encryption/decryption, configuration files, and a JavaScript front‑end example for encrypting request payloads.

API securityJavaRSA
0 likes · 10 min read
Implementing RSA Encryption and Decryption in Spring Boot APIs
Test Development Learning Exchange
Test Development Learning Exchange
Dec 22, 2023 · Information Security

Python Encryption and Decryption Code Examples for Various Algorithms

This article provides Python implementations and usage examples for a range of encryption and decryption techniques—including AES, RSA, Caesar cipher, Base64, SHA‑256/HMAC, Blowfish, DES, ChaCha20‑Poly1305, and XOR—along with notes on required libraries and security considerations.

AESCaesar CipherRSA
0 likes · 11 min read
Python Encryption and Decryption Code Examples for Various Algorithms
Code Ape Tech Column
Code Ape Tech Column
Dec 19, 2023 · Information Security

Implementation of Single Sign-On (SSO) with Service A and Service B Using Ticket and Token Mechanisms

This article explains the concept, advantages, and three implementation methods of Single Sign-On (SSO), then provides two complete practical examples—including architecture diagrams, step‑by‑step flows, and full Java code for ticket‑based and encrypted data‑based SSO—followed by supplementary RSA key generation notes and a brief promotional note.

JavaRSARedis
0 likes · 18 min read
Implementation of Single Sign-On (SSO) with Service A and Service B Using Ticket and Token Mechanisms
Top Architect
Top Architect
Oct 16, 2023 · Information Security

RSA Encryption and Decryption in Spring Boot – A Practical Guide

This article explains the principles of RSA asymmetric encryption, illustrates two communication scenarios, and provides a step‑by‑step Spring Boot implementation with Maven dependencies, configuration, annotations, and front‑end JavaScript code to encrypt API requests and decrypt responses, helping developers secure their APIs.

API securityJavaRSA
0 likes · 12 min read
RSA Encryption and Decryption in Spring Boot – A Practical Guide
Selected Java Interview Questions
Selected Java Interview Questions
Oct 7, 2023 · Information Security

Implementing RSA Encryption for Spring Boot API Requests and Responses

This article demonstrates how to secure Spring Boot API data using RSA asymmetric encryption, covering the theory of RSA, step‑by‑step project setup, Maven dependencies, annotations for automatic encryption/decryption, Java and JavaScript client implementations, and practical testing of encrypted endpoints.

API securityJavaRSA
0 likes · 11 min read
Implementing RSA Encryption for Spring Boot API Requests and Responses
IT Services Circle
IT Services Circle
Aug 22, 2023 · Information Security

Understanding Symmetric and Asymmetric Encryption: Public/Private Keys, AES, and RSA

This article explains the basic concepts of encryption, distinguishes between symmetric and asymmetric methods, describes how public and private keys work, and compares common algorithms such as AES and RSA, highlighting their security properties, performance trade‑offs, and typical use cases.

AESRSAasymmetric
0 likes · 8 min read
Understanding Symmetric and Asymmetric Encryption: Public/Private Keys, AES, and RSA
Top Architect
Top Architect
Aug 9, 2022 · Backend Development

Implementing a JWT-Based Authentication Center with Spring Boot and Java

This article provides a comprehensive guide to building a JWT authentication service in Java, covering JWT fundamentals, Spring Boot configuration, entity and DAO definitions, service interfaces, token generation and parsing, RSA key handling, controller endpoints, testing procedures, and a comparison with traditional session-based authentication.

JWTJavaRSA
0 likes · 20 min read
Implementing a JWT-Based Authentication Center with Spring Boot and Java
Aikesheng Open Source Community
Aikesheng Open Source Community
Jun 21, 2022 · Databases

Understanding MySQL 8.0 caching_sha2_password Authentication Errors and Solutions

This article explains why the MySQL 8.0 client may report the caching_sha2_password authentication error requiring a secure connection, describes the plugin’s design, RSA and SSL mechanisms, cache behavior, and provides practical commands and replication settings to resolve the issue.

RSAauthenticationcaching_sha2_password
0 likes · 8 min read
Understanding MySQL 8.0 caching_sha2_password Authentication Errors and Solutions