Tagged articles
5 articles
Page 1 of 1
ZhongAn Tech Team
ZhongAn Tech Team
Oct 9, 2023 · Information Security

Network Security Communication: Principles, Protocols, and Implementation in the ZA App

This article explains the fundamentals of symmetric and asymmetric encryption, one‑way and trapdoor functions, forward secrecy, TLS handshake, and how the ZA financial app applies a multi‑layered secure communication protocol—including certificate verification, replay protection, payload encryption, and request signing—to achieve robust, high‑performance network security across iOS, Android, and web platforms.

TLSasymmetric cryptographydigital certificates
0 likes · 21 min read
Network Security Communication: Principles, Protocols, and Implementation in the ZA App
Baidu Geek Talk
Baidu Geek Talk
Aug 10, 2022 · Information Security

Baidu bdtls: A TLS 1.3‑Based Secure Communication Protocol for Mini Programs

Baidu’s bdtls protocol adapts TLS 1.3 for mini‑programs, delivering mutual authentication, AES‑128‑GCM encryption, RSA‑signed Diffie‑Hellman key exchange, sub‑10 % handshake latency, and extensible multi‑business support to defend against static, dynamic and cheating attacks while ensuring high availability.

Mobile SecurityTLSbdtls
0 likes · 22 min read
Baidu bdtls: A TLS 1.3‑Based Secure Communication Protocol for Mini Programs
21CTO
21CTO
Jul 26, 2020 · Fundamentals

Can the U.S. Build a Quantum Internet in Ten Years? Inside the Ambitious Plan

The United States has announced a ten‑year quantum‑internet program that aims to create a parallel, ultra‑secure network alongside the existing internet, sparking a global race in quantum computing and prompting questions about the feasibility of such a revolutionary infrastructure.

Quantum InternetU.S. researchquantum networking
0 likes · 9 min read
Can the U.S. Build a Quantum Internet in Ten Years? Inside the Ambitious Plan
WeChat Backend Team
WeChat Backend Team
Dec 7, 2016 · Information Security

Unlocking TLS: Design Goals, History, and Modern Secure Communication

This article explores the TLS protocol in depth, outlining its design objectives, cryptographic foundations, historical evolution, detailed handshake and record layer mechanisms, security analyses, common pitfalls, and lessons for designing robust modern encrypted communication protocols.

TLSinformation securityprotocol design
0 likes · 12 min read
Unlocking TLS: Design Goals, History, and Modern Secure Communication
WeChat Client Technology Team
WeChat Client Technology Team
May 10, 2016 · Information Security

How We Built mmtls: A High‑Performance, Low‑Latency Secure Protocol for WeChat

mmtls is a custom, lightweight secure communication protocol designed for WeChat that encrypts all client‑to‑server traffic, offering confidentiality, integrity, low latency, scalability, and forward secrecy by adapting TLS 1.3 concepts with optimized handshake, key‑exchange, record, and replay‑protection mechanisms.

AuthenticationLow latencyTLS
0 likes · 32 min read
How We Built mmtls: A High‑Performance, Low‑Latency Secure Protocol for WeChat