Tagged articles
33 articles
Page 1 of 1
Architect
Architect
Dec 5, 2025 · Information Security

How to Secure API Calls with Hybrid Symmetric‑Asymmetric Encryption and HTTPS

This guide explains a comprehensive API encryption scheme that combines symmetric and asymmetric cryptography, HTTPS principles, and WeChat Pay encryption to protect against crawlers, tampering, replay attacks, and ensure data integrity, complete with design rationale, implementation steps, code examples, and security analysis.

JavaWeChat Payasymmetric encryption
0 likes · 13 min read
How to Secure API Calls with Hybrid Symmetric‑Asymmetric Encryption and HTTPS
Su San Talks Tech
Su San Talks Tech
Jul 15, 2025 · Information Security

Master the 7 Most Essential Encryption Algorithms for Secure Systems

Explore the seven most commonly used encryption algorithms—including MD5, SHA families, HMAC, AES, DES/3DES, RSA, and DSA—detailing their principles, Java implementations, performance, and practical security guidelines, while highlighting real-world attack scenarios and best‑practice recommendations for robust information protection.

HashingJavaasymmetric encryption
0 likes · 9 min read
Master the 7 Most Essential Encryption Algorithms for Secure Systems
php Courses
php Courses
Apr 25, 2025 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, introduces HTTPS, demonstrates how to apply symmetric encryption algorithms like AES in PHP, and shows how to use PHP's OpenSSL extension for asymmetric encryption, providing practical code examples and key‑management tips.

HTTPSPHPasymmetric encryption
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
php Courses
php Courses
Jan 16, 2025 · Information Security

Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption

This article explains how to secure PHP data transmission using HTTPS, symmetric encryption (AES, DES, 3DES) and asymmetric encryption with OpenSSL, providing code examples and key management advice to protect confidentiality, integrity, and prevent man‑in‑the‑middle attacks.

HTTPSPHPasymmetric encryption
0 likes · 4 min read
Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption
php Courses
php Courses
Jul 31, 2024 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, then demonstrates three PHP-based methods—enabling HTTPS via SSL/TLS, applying symmetric algorithms such as AES, and using asymmetric encryption with OpenSSL—to protect confidentiality, integrity, and authentication of web communications.

HTTPSasymmetric encryptiondata security
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
Top Architect
Top Architect
Jul 12, 2024 · Information Security

API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques

This article presents a comprehensive API encryption scheme that combines symmetric and asymmetric cryptography, hashing, and digital signatures, explains HTTPS fundamentals, details WeChat Pay encryption, outlines key exchange and data protection processes, provides Java code examples, and analyzes security, anti‑tampering, anti‑replay, and performance considerations.

API SecurityHTTPSHashing
0 likes · 16 min read
API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques
Selected Java Interview Questions
Selected Java Interview Questions
May 22, 2024 · Information Security

Design and Implementation of API Encryption Using HTTPS and WeChat Pay Principles

This article presents a comprehensive design and implementation guide for securing API interfaces by combining HTTPS fundamentals with WeChat Pay encryption techniques, detailing symmetric and asymmetric encryption, hashing, signature verification, key exchange, parameter handling, and backend processing to protect against tampering, replay attacks, and data leakage.

API SecurityHTTPSWeChat Pay
0 likes · 15 min read
Design and Implementation of API Encryption Using HTTPS and WeChat Pay Principles
Sohu Tech Products
Sohu Tech Products
Apr 17, 2024 · Information Security

Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security

HTTPS secures web traffic by combining symmetric and asymmetric encryption, digital signatures, and certificate authorities within the TLS protocol to ensure confidentiality, integrity, authentication, and non‑repudiation, replacing insecure HTTP and becoming mandatory for modern browsers, servers, and platforms despite earlier concerns about cost and complexity.

CAHTTPSSSL/TLS
0 likes · 17 min read
Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security
Sanyou's Java Diary
Sanyou's Java Diary
Feb 5, 2024 · Information Security

Master the Top 5 Encryption Algorithms: MD5, SHA-256, DES, AES, RSA Explained

This article introduces the five most common encryption algorithms—MD5, SHA‑256, DES, AES, and RSA—explaining their classifications, security properties, typical use cases, and providing complete Java implementations for each, while also showing how they underpin HTTPS security.

asymmetric encryptionencryptionhash algorithms
0 likes · 18 min read
Master the Top 5 Encryption Algorithms: MD5, SHA-256, DES, AES, RSA Explained
php Courses
php Courses
Jan 30, 2024 · Information Security

Using PHP to Secure Data Transmission with HTTPS, Symmetric and Asymmetric Encryption

This article explains how to protect data transmission in PHP applications by employing HTTPS (SSL/TLS), implementing symmetric encryption such as AES, and using asymmetric encryption with OpenSSL, while highlighting key management practices to ensure confidentiality, integrity, and resistance to man‑in‑the‑middle attacks.

HTTPSOpenSSLPHP
0 likes · 4 min read
Using PHP to Secure Data Transmission with HTTPS, Symmetric and Asymmetric Encryption
Liangxu Linux
Liangxu Linux
Jan 3, 2023 · Information Security

Why Can Public Key Encrypt but Not Decrypt? Unpacking HTTPS Encryption

An in‑depth guide explains the difference between symmetric and asymmetric encryption, why a public key can encrypt but not decrypt, and walks through the TLS 1.2 handshake that underpins HTTPS, covering certificates, random numbers, session key derivation, and the role of public‑private key pairs.

HTTPSHandshakeTLS
0 likes · 16 min read
Why Can Public Key Encrypt but Not Decrypt? Unpacking HTTPS Encryption
Selected Java Interview Questions
Selected Java Interview Questions
Feb 6, 2022 · Information Security

Symmetric, Asymmetric, and Hybrid Encryption: Principles, Advantages, and Key Distribution Issues

This article explains the fundamentals of symmetric, asymmetric, and hybrid encryption, compares their strengths and weaknesses, discusses key distribution challenges, and illustrates how combining both methods can address security gaps while highlighting potential man‑in‑the‑middle attacks.

Hybrid Encryptionasymmetric encryptioninformation security
0 likes · 7 min read
Symmetric, Asymmetric, and Hybrid Encryption: Principles, Advantages, and Key Distribution Issues
Efficient Ops
Efficient Ops
May 16, 2021 · Information Security

Why HTTPS Combines Symmetric and Asymmetric Encryption: A Deep Design Walkthrough

This article reconstructs the design of HTTPS step by step, explaining why both symmetric and asymmetric encryption are required, how key negotiation works, the role of digital certificates and certificate authorities, and the underlying security mechanisms that protect client‑server communication.

Certificate AuthorityHTTPSTLS
0 likes · 13 min read
Why HTTPS Combines Symmetric and Asymmetric Encryption: A Deep Design Walkthrough
vivo Internet Technology
vivo Internet Technology
Apr 14, 2021 · Information Security

Understanding Encryption: From Simple Stories to Diffie‑Hellman and RSA

This article explains the fundamentals of encryption by walking through a relatable story, defining keys, comparing symmetric and asymmetric methods, illustrating key‑exchange techniques such as paint‑mixing, multiplication tricks, Diffie‑Hellman, AES block processing, and the RSA algorithm with step‑by‑step calculations.

Diffie-HellmanRSAasymmetric encryption
0 likes · 15 min read
Understanding Encryption: From Simple Stories to Diffie‑Hellman and RSA
Selected Java Interview Questions
Selected Java Interview Questions
Jan 23, 2021 · Information Security

Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange

This article provides a comprehensive introduction to cryptographic techniques, covering the goals of confidentiality, integrity and authentication, and detailing symmetric, asymmetric and hash algorithms, common implementations, their advantages and drawbacks, as well as key exchange methods and public key infrastructure.

PKIasymmetric encryptioncryptography
0 likes · 16 min read
Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange
JD Cloud Developers
JD Cloud Developers
Dec 3, 2020 · Information Security

Why Weak Passwords Still Prevail and How Modern Cryptography Secures Your Data

This article explores the prevalence of weak passwords, introduces fundamental concepts of cryptography, explains symmetric encryption algorithms and their key distribution challenges, and demonstrates the Diffie‑Hellman key‑exchange process with a concrete example and a Python implementation of primitive‑root calculation.

Diffie-Hellmancryptographyinformation security
0 likes · 9 min read
Why Weak Passwords Still Prevail and How Modern Cryptography Secures Your Data
Fulu Network R&D Team
Fulu Network R&D Team
Sep 11, 2020 · Information Security

Symmetric Encryption Algorithms in .NET Core Using BouncyCastle

This article introduces symmetric encryption algorithms such as DES, 3DES, and AES, explains their principles, advantages and drawbacks, and provides complete .NET Core sample code using the BouncyCastle library for encryption and decryption with various padding modes.

.NET Core3DESAES
0 likes · 21 min read
Symmetric Encryption Algorithms in .NET Core Using BouncyCastle
Top Architect
Top Architect
Jun 12, 2020 · Information Security

Understanding HTTPS: Why It Is Secure and How It Works

This article explains why HTTPS is necessary, describes symmetric and asymmetric encryption, illustrates the key exchange process, and outlines how HTTPS ensures secure communication by preventing eavesdropping, man‑in‑the‑middle attacks, and ensuring certificate trustworthiness.

HTTPSPublic Key InfrastructureTLS
0 likes · 5 min read
Understanding HTTPS: Why It Is Secure and How It Works
Java Captain
Java Captain
Dec 15, 2018 · Information Security

Understanding HTTPS Design: From Symmetric Encryption to Digital Certificates

This article reconstructs the design of HTTPS by explaining why symmetric encryption, asymmetric encryption, random numbers, digital certificates, and certificate authorities are combined to securely negotiate a shared secret between a client and a web server, while addressing man‑in‑the‑middle attacks and certificate validation.

HTTPSPublic Key InfrastructureTLS
0 likes · 14 min read
Understanding HTTPS Design: From Symmetric Encryption to Digital Certificates
Architect's Tech Stack
Architect's Tech Stack
May 11, 2018 · Information Security

Understanding Symmetric and Asymmetric Encryption, Key Distribution, Digital Signatures, and Their Practical Applications

This article explains the fundamentals of cryptography, covering symmetric and asymmetric encryption, key distribution challenges and solutions, digital signatures, certificates, and practical applications such as SSH login, HTTPS handshakes, and API authentication, providing clear examples and code snippets.

asymmetric encryptioncryptographydigital signature
0 likes · 17 min read
Understanding Symmetric and Asymmetric Encryption, Key Distribution, Digital Signatures, and Their Practical Applications
Programmer DD
Programmer DD
Apr 15, 2018 · Cloud Native

How to Secure Spring Cloud Config with Encryption: A Step‑by‑Step Guide

This tutorial explains why sensitive configuration data must be encrypted in microservice environments, walks through installing the Unlimited Strength JCE, configuring Spring Cloud Config’s {cipher} syntax, using symmetric and asymmetric keys, testing encryption endpoints, and managing keystores with keytool.

JCEasymmetric encryptionconfig-server
0 likes · 9 min read
How to Secure Spring Cloud Config with Encryption: A Step‑by‑Step Guide
21CTO
21CTO
Jan 11, 2018 · Information Security

How Carrier Pigeons Explain HTTPS: From Caesar Cipher to Public Keys

This article uses the classic Alice‑Bob‑pigeon analogy to demystify HTTPS, illustrating symmetric Caesar‑cipher encryption, asymmetric public‑key exchange, digital signatures, and why a certificate authority is essential for secure web communication.

HTTPSPublic Key Infrastructureasymmetric encryption
0 likes · 8 min read
How Carrier Pigeons Explain HTTPS: From Caesar Cipher to Public Keys
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Aug 17, 2017 · Information Security

Why and How to Encrypt Video Streams for Browser Playback

This article explains why video encryption is essential for paid streaming services, compares anti‑hotlinking and true encryption methods, details the principles of stream‑media encryption, and provides a practical guide to implementing HLS encryption in browsers.

Browser Securityhlssymmetric encryption
0 likes · 11 min read
Why and How to Encrypt Video Streams for Browser Playback