Tagged articles
78 articles
Page 1 of 1
Linux Tech Enthusiast
Linux Tech Enthusiast
May 15, 2026 · Information Security

Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS Handshake

The article explains HTTP’s plaintext nature and its susceptibility to man‑in‑the‑middle attacks, then details how HTTPS (TLS) uses asymmetric key exchange, certificates, and a trusted CA hierarchy to establish encrypted communication and prevent such attacks.

AESCACertificate
0 likes · 10 min read
Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS Handshake
Architect's Guide
Architect's Guide
May 6, 2026 · Backend Development

Quickly Implement API Encryption in Spring Boot with a Single Library

This article walks through using RSA to encrypt Spring Boot API responses, covering the theory behind RSA, two security scenarios, Maven dependency setup, configuration, controller annotations, encryption/decryption code, a front‑end JavaScript example, common pitfalls, and a final security summary.

BackendRSASpring Boot
0 likes · 11 min read
Quickly Implement API Encryption in Spring Boot with a Single Library
Java Architect Handbook
Java Architect Handbook
Apr 21, 2026 · Information Security

How to Secure Spring Boot APIs with RSA Encryption: A Step‑by‑Step Guide

This article explains RSA encryption fundamentals, illustrates two practical scenarios, and walks through creating a Spring Boot project, adding Maven dependencies, configuring RSA keys, annotating controllers for automatic encryption/decryption, testing the endpoints, and handling client‑side encryption with JavaScript, while highlighting common pitfalls.

API SecurityBackendRSA
0 likes · 13 min read
How to Secure Spring Boot APIs with RSA Encryption: A Step‑by‑Step Guide
Black & White Path
Black & White Path
Mar 24, 2026 · Information Security

Step‑by‑Step Reconstruction of Mini‑Program/Web Encryption Authentication Bypass Cases

The article walks through six real penetration‑testing scenarios, dissecting common encryption and authentication mechanisms in mini‑programs and web applications, demonstrating how to reverse‑engineer, debug, and script the bypass of Hawk signatures, MD5 timestamps, RSA and AES encryptions to achieve unauthorized data access and account takeover.

AESAuthentication BypassHawk protocol
0 likes · 13 min read
Step‑by‑Step Reconstruction of Mini‑Program/Web Encryption Authentication Bypass Cases
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 27, 2026 · Information Security

Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS and CA Trust

HTTPS secures web communication by replacing plaintext HTTP with TLS encryption, using asymmetric key exchange to protect symmetric keys, and relying on a hierarchical CA certificate chain to verify server identities, thereby preventing man‑in‑the‑middle attacks that exploit HTTP’s unencrypted traffic.

AESCertificate AuthorityHTTPS
0 likes · 10 min read
Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS and CA Trust
Ray's Galactic Tech
Ray's Galactic Tech
Nov 2, 2025 · Information Security

How to Secure Third‑Party API Calls with TLS, HMAC Signatures & RSA Encryption

To protect sensitive data in third‑party API integrations, this guide outlines a three‑layer security architecture—mutual TLS for channel protection, HMAC‑based request signing for integrity, and RSA encryption for data confidentiality—plus key management, monitoring, performance considerations, and implementation roadmaps.

API SecurityHMACRSA
0 likes · 10 min read
How to Secure Third‑Party API Calls with TLS, HMAC Signatures & RSA Encryption
Code Wrench
Code Wrench
Sep 12, 2025 · Information Security

Master Secure Go Cryptography: Common Pitfalls & Best Practices

This article provides a comprehensive guide to Go cryptography, covering fundamental concepts, common mistakes like using math/rand for keys or RSA v1.5 padding, correct implementations with crypto/rand, AES‑GCM, RSA‑OAEP/PSS, password‑derived keys, performance benchmarks, and practical testing strategies.

AESGoInformation Security
0 likes · 12 min read
Master Secure Go Cryptography: Common Pitfalls & Best Practices
Test Development Learning Exchange
Test Development Learning Exchange
Apr 30, 2025 · Information Security

Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR

This article presents concise Python examples for a wide range of encryption and encoding methods—including MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, and XOR—explaining their usage scenarios and highlighting the importance of selecting appropriate cryptographic techniques for security.

AESHashingRSA
0 likes · 7 min read
Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR
Architect
Architect
Apr 12, 2025 · Backend Development

Secure Spring Boot APIs with Hybrid AES‑RSA Encryption, Transparent Request Wrappers, and Response‑Encryption AOP

This article walks through a complete solution for protecting data in Spring Boot applications, covering symmetric, asymmetric, and hybrid encryption schemes, utility classes for AES and RSA, a custom HttpServletRequestWrapper to enable multiple reads of the request body, a filter that transparently decrypts incoming parameters, and an AOP‑based response‑encryption mechanism triggered by a custom annotation.

AESRSASpring Boot
0 likes · 45 min read
Secure Spring Boot APIs with Hybrid AES‑RSA Encryption, Transparent Request Wrappers, and Response‑Encryption AOP
Lin is Dream
Lin is Dream
Mar 18, 2025 · Information Security

Master OpenSSL on CentOS: Install, Upgrade, and Generate RSA/SM2 Keys

This article explains OpenSSL’s origins, its role in encryption on CentOS, common use cases such as web servers and database security, provides step‑by‑step installation and upgrade commands, and demonstrates how to generate RSA, SM2, AES, and SM4 keys via the OpenSSL command line and Java alternatives.

CentOSOpenSSLRSA
0 likes · 8 min read
Master OpenSSL on CentOS: Install, Upgrade, and Generate RSA/SM2 Keys
Architect
Architect
Nov 30, 2024 · Information Security

Secure Spring Boot API Data Transmission with AES/RSA Hybrid Encryption

This article explains how to protect front‑end and back‑end communication in a Spring Boot application by encrypting request and response data using a hybrid AES and RSA scheme, custom request wrappers, filters, and AOP‑based response encryption, complete with code examples and implementation details.

AESAPI SecurityBackend
0 likes · 48 min read
Secure Spring Boot API Data Transmission with AES/RSA Hybrid Encryption
MaGe Linux Operations
MaGe Linux Operations
Sep 15, 2024 · Information Security

Understanding TLS Handshakes: RSA vs ECDHE and TLS 1.3 Explained

This article provides a comprehensive overview of TLS handshakes, detailing the RSA and ECDHE key exchange mechanisms, their step-by-step processes, security properties, and the differences between TLS 1.2 and TLS 1.3, including cipher suite structures and certificate validation.

ECDHEInformation SecurityRSA
0 likes · 21 min read
Understanding TLS Handshakes: RSA vs ECDHE and TLS 1.3 Explained
php Courses
php Courses
Jul 4, 2024 · Information Security

Overview of Common PHP Encryption Algorithms

This article introduces several widely used PHP encryption algorithms—including MD5, SHA family, AES, RSA, and Base64 encoding—explaining their functions, security considerations, and PHP functions for implementation, while also mentioning additional algorithms like DES, RC4, and Blowfish for specific use cases.

AESHashingPHP
0 likes · 3 min read
Overview of Common PHP Encryption Algorithms
Architect
Architect
Jun 19, 2024 · Information Security

Implementing RSA and AES Hybrid Encryption for API Security in Java

This article describes a real‑world API security incident, explains the fundamentals of asymmetric RSA and symmetric AES encryption, and provides a complete Java implementation—including a hybrid encryption strategy, custom @RequestRSA annotation, Spring AOP decryption aspect, and utility classes—to securely transmit and automatically decrypt request parameters.

AESRSAencryption
0 likes · 23 min read
Implementing RSA and AES Hybrid Encryption for API Security in Java
Architecture Digest
Architecture Digest
Jun 7, 2024 · Information Security

Implementing RSA Encryption and Decryption in Spring Boot APIs

This article explains how to secure Spring Boot API responses using RSA asymmetric encryption and digital signatures, covering RSA fundamentals, project setup, Maven configuration, key management, annotation‑driven encryption/decryption, front‑end JavaScript encryption with JSEncrypt, and practical testing steps.

RSASpring Bootapi-encryption
0 likes · 10 min read
Implementing RSA Encryption and Decryption in Spring Boot APIs
Programmer DD
Programmer DD
May 14, 2024 · Information Security

Why My Game Score Rankings Went Crazy: Lessons from RSA & AES API Encryption

The article recounts a real‑world incident where a game’s leaderboard showed absurd scores due to insecure API parameters, then explains RSA and AES fundamentals, demonstrates how to combine asymmetric and symmetric encryption for secure request handling, and provides Java code, custom annotations, and AOP logic to automate decryption on the server side.

AESAPI SecurityBackend
0 likes · 23 min read
Why My Game Score Rankings Went Crazy: Lessons from RSA & AES API Encryption
Architecture Digest
Architecture Digest
May 6, 2024 · Information Security

RSA Encryption and Decryption in Spring Boot: A Practical Guide

This tutorial explains RSA asymmetric encryption and signing, then walks through securing Spring Boot API endpoints by adding annotations, configuring keys, integrating JavaScript decryption, and addressing practical deployment considerations to protect data from interception and tampering.

RSASpring Bootencryption
0 likes · 6 min read
RSA Encryption and Decryption in Spring Boot: A Practical Guide
Architect's Guide
Architect's Guide
Jan 7, 2024 · Information Security

Implementing RSA Encryption and Decryption in Spring Boot APIs

This guide explains how to secure Spring Boot API responses using RSA asymmetric encryption, covering the theory of RSA, practical scenarios, Maven setup, annotation‑based encryption/decryption, configuration files, and a JavaScript front‑end example for encrypting request payloads.

API SecurityRSASpring Boot
0 likes · 10 min read
Implementing RSA Encryption and Decryption in Spring Boot APIs
Code Ape Tech Column
Code Ape Tech Column
Dec 19, 2023 · Information Security

Implementation of Single Sign-On (SSO) with Service A and Service B Using Ticket and Token Mechanisms

This article explains the concept, advantages, and three implementation methods of Single Sign-On (SSO), then provides two complete practical examples—including architecture diagrams, step‑by‑step flows, and full Java code for ticket‑based and encrypted data‑based SSO—followed by supplementary RSA key generation notes and a brief promotional note.

AuthenticationBackendRSA
0 likes · 18 min read
Implementation of Single Sign-On (SSO) with Service A and Service B Using Ticket and Token Mechanisms
Architect
Architect
Oct 24, 2023 · Information Security

How to Secure Spring Boot APIs with RSA Encryption: A Step‑by‑Step Guide

This article walks through the theory behind RSA, illustrates two battlefield‑style scenarios for encryption and signing, and then shows how to integrate RSA‑based request/response encryption into a Spring Boot application using Maven, annotations, configuration files, and a JavaScript front‑end, complete with code snippets and troubleshooting tips.

Backend SecurityRSASpring Boot
0 likes · 12 min read
How to Secure Spring Boot APIs with RSA Encryption: A Step‑by‑Step Guide
Java High-Performance Architecture
Java High-Performance Architecture
Oct 17, 2023 · Information Security

Secure Your Spring Boot APIs with RSA: A Hands‑On Encryption & Decryption Guide

This article walks you through implementing RSA‑based encryption and digital signatures in a Spring Boot application, covering the theory of asymmetric cryptography, practical code snippets for Maven, configuration, controller annotations, and a JavaScript client that encrypts requests and verifies responses to protect API data from eavesdropping and tampering.

Backend SecurityRSASpring Boot
0 likes · 11 min read
Secure Your Spring Boot APIs with RSA: A Hands‑On Encryption & Decryption Guide
Top Architect
Top Architect
Oct 16, 2023 · Information Security

RSA Encryption and Decryption in Spring Boot – A Practical Guide

This article explains the principles of RSA asymmetric encryption, illustrates two communication scenarios, and provides a step‑by‑step Spring Boot implementation with Maven dependencies, configuration, annotations, and front‑end JavaScript code to encrypt API requests and decrypt responses, helping developers secure their APIs.

API SecurityRSASpring Boot
0 likes · 12 min read
RSA Encryption and Decryption in Spring Boot – A Practical Guide
Top Architect
Top Architect
Aug 9, 2022 · Backend Development

Implementing a JWT-Based Authentication Center with Spring Boot and Java

This article provides a comprehensive guide to building a JWT authentication service in Java, covering JWT fundamentals, Spring Boot configuration, entity and DAO definitions, service interfaces, token generation and parsing, RSA key handling, controller endpoints, testing procedures, and a comparison with traditional session-based authentication.

AuthenticationJWTMicroservices
0 likes · 20 min read
Implementing a JWT-Based Authentication Center with Spring Boot and Java
Architecture Digest
Architecture Digest
May 24, 2022 · Information Security

Encryption Algorithms and Their Application in User Management Modules

This article introduces common encryption algorithms—symmetric, asymmetric, and hash—explains where encryption is needed in a user management module, and details implementation steps using RSA and AES128, while also warning about man‑in‑the‑middle attacks and recommending best practices.

AESMD5RSA
0 likes · 9 min read
Encryption Algorithms and Their Application in User Management Modules
Selected Java Interview Questions
Selected Java Interview Questions
Apr 21, 2022 · Backend Development

Encrypting Spring Boot Configuration with Jasypt and a Custom EnvironmentPostProcessor

This guide demonstrates how to secure Spring Boot configuration values by using Jasypt encryption and a custom EnvironmentPostProcessor with RSA, covering Maven dependencies, property setup, encrypted YAML syntax, utility classes, processor implementation, and registration via spring.factories.

EnvironmentPostProcessorJasyptRSA
0 likes · 9 min read
Encrypting Spring Boot Configuration with Jasypt and a Custom EnvironmentPostProcessor
Python Crawling & Data Mining
Python Crawling & Data Mining
Nov 15, 2021 · Information Security

Python Encryption Guide: Base64, MD5, SHA1, HMAC, DES, AES, RSA

This article introduces common encryption methods—including Base64, MD5, SHA‑1, HMAC, DES, AES, and RSA—explains their principles, and provides complete Python code examples for encoding, decoding, and key handling, enabling readers to implement secure data transformations in their own projects.

AESBase64MD5
0 likes · 12 min read
Python Encryption Guide: Base64, MD5, SHA1, HMAC, DES, AES, RSA
DeWu Technology
DeWu Technology
Oct 1, 2021 · Databases

MySQL 8.0 New Authentication Plugin: caching_sha2_password

MySQL 8.0 replaces the default mysql_native_password with the caching_sha2_password plugin, which stores a 70‑byte salted SHA‑256 hash with configurable rounds, caches SHA256(password) for fast logins, and falls back to RSA‑encrypted full verification on insecure connections, supporting user creation, replication and key management.

AuthenticationRSAcaching_sha2_password
0 likes · 14 min read
MySQL 8.0 New Authentication Plugin: caching_sha2_password
MaGe Linux Operations
MaGe Linux Operations
Jul 24, 2021 · Information Security

Master Go Encryption: MD5, HMAC, SHA1, AES, RSA and More Explained

This article introduces common encryption algorithms—including symmetric, asymmetric, and digital signature methods—and provides detailed Go code examples for MD5, HMAC, SHA1, AES (with various modes), and RSA, helping developers understand and implement secure cryptographic operations in Go.

AESHMACMD5
0 likes · 16 min read
Master Go Encryption: MD5, HMAC, SHA1, AES, RSA and More Explained
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jun 13, 2021 · Information Security

Master RSA Encryption in Java: Theory, Code, and Execution

This article explains why asymmetric encryption like RSA is paired with symmetric algorithms, outlines RSA's history and key concepts, and provides a complete Java implementation with code examples and execution results, illustrating both public‑key and private‑key operations.

RSAasymmetric encryptioncryptography
0 likes · 8 min read
Master RSA Encryption in Java: Theory, Code, and Execution
vivo Internet Technology
vivo Internet Technology
Apr 14, 2021 · Information Security

Understanding Encryption: From Simple Stories to Diffie‑Hellman and RSA

This article explains the fundamentals of encryption by walking through a relatable story, defining keys, comparing symmetric and asymmetric methods, illustrating key‑exchange techniques such as paint‑mixing, multiplication tricks, Diffie‑Hellman, AES block processing, and the RSA algorithm with step‑by‑step calculations.

Diffie-HellmanInformation SecurityRSA
0 likes · 15 min read
Understanding Encryption: From Simple Stories to Diffie‑Hellman and RSA
Code Ape Tech Column
Code Ape Tech Column
Jan 26, 2021 · Backend Development

Step‑by‑Step Guide to Building SSO with JWT and Spring Security

This tutorial explains the concept of Single Sign‑On, demonstrates a simple ticket‑based analogy, introduces JWT structure and RSA signing, and walks through a complete Spring Boot implementation—including project layout, Maven dependencies, configuration files, utility classes, custom authentication and verification filters, security configuration, and Postman testing—so readers can build a secure SSO service from scratch.

AuthenticationAuthorizationJWT
0 likes · 25 min read
Step‑by‑Step Guide to Building SSO with JWT and Spring Security
vivo Internet Technology
vivo Internet Technology
Jan 13, 2021 · Information Security

Understanding RSA Key Files: Mathematics, Six‑Layer Model, Tools, and Usage Scenarios

The article explains RSA key files by detailing the underlying mathematics of prime factorization and modular exponents, introduces a six‑layer abstraction from raw values to application use, demonstrates OpenSSL and keytool commands for generation, conversion, and inspection, and illustrates common deployment scenarios such as HTTPS and MySQL SSL.

ASN.1OpenSSLPKCS
0 likes · 19 min read
Understanding RSA Key Files: Mathematics, Six‑Layer Model, Tools, and Usage Scenarios
Programmer DD
Programmer DD
Nov 5, 2020 · Information Security

How to Verify WeChat Pay V3 Response Signatures in Java

This guide explains why and how to verify WeChat Pay V3 response signatures using Java, covering certificate serial checks, constructing the verification string from response headers, and performing SHA256‑with‑RSA validation to ensure responses truly originate from the WeChat Pay server.

API SecurityRSAWeChat Pay
0 likes · 7 min read
How to Verify WeChat Pay V3 Response Signatures in Java
政采云技术
政采云技术
Oct 18, 2020 · Information Security

How to Secure Front‑End Data with Hybrid AES‑RSA Encryption: A Complete Guide

In the era of big data and GDPR, front‑end developers must protect personal information beyond HTTPS by using a hybrid AES‑RSA encryption scheme, and this article explains the threats, compares symmetric, asymmetric and hash algorithms, and provides full client‑side and Node.js server implementations with code examples.

AESGDPRJavaScript
0 likes · 16 min read
How to Secure Front‑End Data with Hybrid AES‑RSA Encryption: A Complete Guide
Programmer DD
Programmer DD
Oct 13, 2020 · Information Security

How Payment Platforms Secure Data: From DES to TLS and RSA

This article explains the security architecture of payment platforms, covering terminal data protection, symmetric and asymmetric encryption methods such as DES, 3DES, AES, and RSA, code implementations for Android, TLS transmission security, anti‑tampering signatures, and practical key‑management strategies.

AndroidDESRSA
0 likes · 20 min read
How Payment Platforms Secure Data: From DES to TLS and RSA
The Dominant Programmer
The Dominant Programmer
Sep 2, 2020 · Frontend Development

How to Encrypt Passwords in Vue with RSA and JSEncrypt

This guide shows how to protect plaintext passwords in a Vue login flow by using RSA asymmetric encryption with the JSEncrypt library, generating key pairs, creating utility functions, and storing encrypted credentials in cookies while providing decryption on retrieval.

JavaScriptRSAVue
0 likes · 5 min read
How to Encrypt Passwords in Vue with RSA and JSEncrypt
Fulu Network R&D Team
Fulu Network R&D Team
Jun 29, 2020 · Information Security

Comprehensive Guide to Message Digest, MAC, and Digital Signature Algorithms in .NET Core with BouncyCastle

This article introduces various cryptographic primitives—including MD, SHA, MAC, and digital signature algorithms such as RSA, DSA, and ECDSA—explains their usage and security considerations, and provides complete .NET Core code examples using the BouncyCastle library for implementation.

.NET CoreBouncyCastleECDSA
0 likes · 24 min read
Comprehensive Guide to Message Digest, MAC, and Digital Signature Algorithms in .NET Core with BouncyCastle
FunTester
FunTester
Apr 24, 2020 · Operations

How to Sign JMeter Parameters with Groovy: A Step‑by‑Step Guide

This article demonstrates how to use Groovy scripts within JMeter’s JSR223 pre‑processor to generate RSA‑based signatures for request parameters, providing a complete utility class, configuration steps, sample code, and console output to verify that the signature is correctly added to the request.

GroovyJMeterJSR223
0 likes · 10 min read
How to Sign JMeter Parameters with Groovy: A Step‑by‑Step Guide
FunTester
FunTester
Apr 17, 2020 · Information Security

Using Groovy in JMeter to Sign Request Parameters with RSA

This article demonstrates how to use Groovy scripts within JMeter's JSR223 pre‑processor to generate RSA signatures for request parameters, covering key handling, encryption, decryption, signing, verification, map conversion, and how to attach the signature to the HTTP sampler for automated performance testing.

GroovyJMeterPerformance Testing
0 likes · 11 min read
Using Groovy in JMeter to Sign Request Parameters with RSA
Java Captain
Java Captain
Feb 19, 2020 · Information Security

Stateless Login Principle and Implementation Using JWT and RSA

The article explains the drawbacks of stateful authentication, defines stateless services, describes a token‑based login flow using JWT with RSA asymmetric encryption, and shows how to integrate this approach into a Zuul‑based microservice architecture to achieve scalable, secure, and session‑free authentication.

JWTRSAStateless Authentication
0 likes · 9 min read
Stateless Login Principle and Implementation Using JWT and RSA
Open Source Tech Hub
Open Source Tech Hub
Dec 28, 2018 · Information Security

Generate RSA Keys and Use PHP for Encryption & Decryption

This guide explains what RSA encryption is, outlines common use cases, shows step‑by‑step commands to generate private and public keys with OpenSSL, and provides a complete PHP class with methods for public‑key encryption, private‑key decryption, signing and verification, plus practical code examples.

PHPRSAdecryption
0 likes · 9 min read
Generate RSA Keys and Use PHP for Encryption & Decryption
Open Source Tech Hub
Open Source Tech Hub
Dec 26, 2018 · Information Security

How to Implement RSA Encryption and Decryption in PHP with OpenSSL

This guide explains how to generate RSA key pairs on Linux, use OpenSSL commands, and implement PHP code for public‑key encryption, private‑key decryption, padding options, data‑size limits, and helper functions for handling messages larger than the RSA block size.

OpenSSLRSAcryptography
0 likes · 6 min read
How to Implement RSA Encryption and Decryption in PHP with OpenSSL
Java Backend Technology
Java Backend Technology
Jun 7, 2018 · Information Security

How to Secure API Calls with End-to-End Encryption Using Spring Boot

This article explains why API security is crucial in front‑end/back‑end separated systems and provides practical measures—including HTTPS, request signing, SSL pinning, and full request/response AES encryption—along with a Spring Boot starter and JavaScript Axios interceptor to protect data in transit.

AESAPI SecurityRSA
0 likes · 8 min read
How to Secure API Calls with End-to-End Encryption Using Spring Boot
Architect's Tech Stack
Architect's Tech Stack
May 11, 2018 · Information Security

Understanding Password Encryption, Transmission, and Secure Storage

This article explains how passwords should be encrypted during transmission using symmetric and asymmetric methods such as RSA, why HTTPS is essential, how services like GitHub and Baidu handle login security, and best practices for securely storing passwords with hashing, salting, and strong algorithms like BCrypt and PBKDF2.

HTTPSHashingPBKDF2
0 likes · 11 min read
Understanding Password Encryption, Transmission, and Secure Storage
21CTO
21CTO
Jul 18, 2017 · Information Security

Why ECC Is Outpacing RSA: History, Algorithms, and Performance Benchmarks

This article traces the evolution of cryptography from ancient substitution ciphers to modern standards like DES, RSA, and ECC, explains symmetric and asymmetric encryption, compares ECC and RSA in security and efficiency, and presents cloud‑server performance tests showing ECC‑256’s superiority in speed and resource usage.

ECCInformation SecurityPerformance Testing
0 likes · 9 min read
Why ECC Is Outpacing RSA: History, Algorithms, and Performance Benchmarks
ITPUB
ITPUB
May 25, 2017 · Information Security

How HTTPS Defends Against Man‑in‑the‑Middle Attacks: A Deep Dive

This article explains why HTTPS is considered secure, how it prevents man‑in‑the‑middle attacks through certificate verification, details the TLS handshake captured with Wireshark, and shows the cryptographic primitives behind RSA, ECDHE and AES, including practical code snippets and the cost of using HTTPS.

CertificateHTTPSMan-in-the-Middle
0 likes · 19 min read
How HTTPS Defends Against Man‑in‑the‑Middle Attacks: A Deep Dive
DevOps
DevOps
Apr 17, 2016 · Information Security

Understanding HTTPS and RSA Encryption Through a Browser Dialogue

This article uses a playful conversation between browsers and a reporter to explain how HTTPS secures web traffic by employing RSA public‑key encryption, digital signatures, certificate authorities, and the challenges of performance and man‑in‑the‑middle attacks, ultimately showing why modern browsers adopted HTTPS by default.

Browser SecurityCertificate AuthorityHTTPS
0 likes · 8 min read
Understanding HTTPS and RSA Encryption Through a Browser Dialogue
21CTO
21CTO
Feb 19, 2016 · Backend Development

How to Build a Python Weibo Red Envelope Scraper – Step‑by‑Step Guide

This article walks through creating a Python 2.7 script that logs into Weibo, fetches red‑envelope lists, evaluates their value with a custom algorithm, and automatically claims them, covering required libraries, cookie handling, HTTP GET/POST functions, RSA encryption, and result logging.

HTTPRSARed Envelope
0 likes · 12 min read
How to Build a Python Weibo Red Envelope Scraper – Step‑by‑Step Guide
21CTO
21CTO
Aug 19, 2015 · Information Security

How Shor’s Algorithm Threatens RSA: Quantum Steps to Break Encryption

Shor’s algorithm leverages quantum parallelism to efficiently find integer factors, exposing the vulnerability of RSA encryption by locating periodicity in modular exponentiation, and the article outlines a five-step hybrid quantum‑classical procedure—including quantum Fourier transform—to break RSA keys.

Information SecurityQuantum ComputingRSA
0 likes · 8 min read
How Shor’s Algorithm Threatens RSA: Quantum Steps to Break Encryption
MaGe Linux Operations
MaGe Linux Operations
Jan 5, 2015 · Information Security

Inside a 220 ms TLS Handshake: How Firefox Secures Your Amazon Purchase

This article walks through a real‑time TLS 1.0 handshake captured with Wireshark, explaining client and server hello messages, certificate verification, RSA key exchange, pre‑master and master secret derivation, key block generation, RC4 encryption, and how the encrypted HTTP request and response are finally delivered to the application layer.

HTTPSRSATLS
0 likes · 30 min read
Inside a 220 ms TLS Handshake: How Firefox Secures Your Amazon Purchase
MaGe Linux Operations
MaGe Linux Operations
Jul 4, 2014 · Information Security

How Digital Signatures Secure Data: Principles, Algorithms, and Implementation

This article explains the concept of digital signatures, their role in verifying data integrity and origin, outlines common algorithms such as RSA, DSS, and hash‑based signatures, and details the full PKI‑based workflow—including authentication, signing, and verification—while also describing how to combine encryption with signatures for confidential transmission.

Information SecurityPKIRSA
0 likes · 8 min read
How Digital Signatures Secure Data: Principles, Algorithms, and Implementation