Tag

Symmetric Encryption

0 views collected around this technical thread.

php中文网 Courses
php中文网 Courses
Apr 25, 2025 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, introduces HTTPS, demonstrates how to apply symmetric encryption algorithms like AES in PHP, and shows how to use PHP's OpenSSL extension for asymmetric encryption, providing practical code examples and key‑management tips.

Data SecurityEncryptionHTTPS
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
Test Development Learning Exchange
Test Development Learning Exchange
Mar 23, 2025 · Information Security

Implementing Symmetric Encryption in API Automation Testing with Python

This article explains the fundamentals of symmetric encryption, presents Python examples for AES and DES using the pycryptodome library, demonstrates how to encrypt API request data, and outlines key management and performance considerations for secure API automation testing.

AESAPI TestingDES
0 likes · 6 min read
Implementing Symmetric Encryption in API Automation Testing with Python
php中文网 Courses
php中文网 Courses
Jan 16, 2025 · Information Security

Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption

This article explains how to secure PHP data transmission using HTTPS, symmetric encryption (AES, DES, 3DES) and asymmetric encryption with OpenSSL, providing code examples and key management advice to protect confidentiality, integrity, and prevent man‑in‑the‑middle attacks.

Data SecurityEncryptionHTTPS
0 likes · 4 min read
Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption
Test Development Learning Exchange
Test Development Learning Exchange
Dec 3, 2024 · Information Security

Implementing a Simple Data Encryption Algorithm Using Caesar Cipher in Python

This tutorial explains the fundamentals of data encryption, introduces the concept of differential privacy, and guides you through implementing and testing a simple Caesar Cipher encryption and decryption algorithm in Python, complete with code examples and execution instructions.

PythonSymmetric EncryptionTutorial
0 likes · 6 min read
Implementing a Simple Data Encryption Algorithm Using Caesar Cipher in Python
IT Services Circle
IT Services Circle
Sep 28, 2024 · Information Security

From Paper Notes to Cryptographic Locks: An Analogy of Symmetric and Asymmetric Encryption

The article uses a classroom love‑note scenario to illustrate how single‑key (symmetric) and double‑key (asymmetric) locks model modern cryptographic techniques, explaining key exchange, signatures, man‑in‑the‑middle attacks, and how HTTPS secures communication.

HTTPSSymmetric Encryptionasymmetric encryption
0 likes · 12 min read
From Paper Notes to Cryptographic Locks: An Analogy of Symmetric and Asymmetric Encryption
php中文网 Courses
php中文网 Courses
Jul 31, 2024 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, then demonstrates three PHP-based methods—enabling HTTPS via SSL/TLS, applying symmetric algorithms such as AES, and using asymmetric encryption with OpenSSL—to protect confidentiality, integrity, and authentication of web communications.

Data SecurityEncryptionHTTPS
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
php中文网 Courses
php中文网 Courses
Jul 15, 2024 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, then demonstrates how to secure PHP-based communications using HTTPS, symmetric algorithms such as AES, and asymmetric encryption with OpenSSL, including complete code examples and key management tips.

EncryptionHTTPSOpenSSL
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
Top Architect
Top Architect
Jul 12, 2024 · Information Security

API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques

This article presents a comprehensive API encryption scheme that combines symmetric and asymmetric cryptography, hashing, and digital signatures, explains HTTPS fundamentals, details WeChat Pay encryption, outlines key exchange and data protection processes, provides Java code examples, and analyzes security, anti‑tampering, anti‑replay, and performance considerations.

API securityEncryptionHTTPS
0 likes · 16 min read
API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques
Selected Java Interview Questions
Selected Java Interview Questions
May 22, 2024 · Information Security

Design and Implementation of API Encryption Using HTTPS and WeChat Pay Principles

This article presents a comprehensive design and implementation guide for securing API interfaces by combining HTTPS fundamentals with WeChat Pay encryption techniques, detailing symmetric and asymmetric encryption, hashing, signature verification, key exchange, parameter handling, and backend processing to protect against tampering, replay attacks, and data leakage.

API securityEncryptionHTTPS
0 likes · 15 min read
Design and Implementation of API Encryption Using HTTPS and WeChat Pay Principles
Sohu Tech Products
Sohu Tech Products
Apr 17, 2024 · Information Security

Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security

HTTPS secures web traffic by combining symmetric and asymmetric encryption, digital signatures, and certificate authorities within the TLS protocol to ensure confidentiality, integrity, authentication, and non‑repudiation, replacing insecure HTTP and becoming mandatory for modern browsers, servers, and platforms despite earlier concerns about cost and complexity.

CADigital CertificateEncryption
0 likes · 17 min read
Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security
Sanyou's Java Diary
Sanyou's Java Diary
Feb 5, 2024 · Information Security

Master the Top 5 Encryption Algorithms: MD5, SHA-256, DES, AES, RSA Explained

This article introduces the five most common encryption algorithms—MD5, SHA‑256, DES, AES, and RSA—explaining their classifications, security properties, typical use cases, and providing complete Java implementations for each, while also showing how they underpin HTTPS security.

EncryptionJavaSymmetric Encryption
0 likes · 18 min read
Master the Top 5 Encryption Algorithms: MD5, SHA-256, DES, AES, RSA Explained
php中文网 Courses
php中文网 Courses
Jan 30, 2024 · Information Security

Using PHP to Secure Data Transmission with HTTPS, Symmetric and Asymmetric Encryption

This article explains how to protect data transmission in PHP applications by employing HTTPS (SSL/TLS), implementing symmetric encryption such as AES, and using asymmetric encryption with OpenSSL, while highlighting key management practices to ensure confidentiality, integrity, and resistance to man‑in‑the‑middle attacks.

EncryptionHTTPSOpenSSL
0 likes · 4 min read
Using PHP to Secure Data Transmission with HTTPS, Symmetric and Asymmetric Encryption
Laravel Tech Community
Laravel Tech Community
Jun 21, 2022 · Information Security

Using PHP mcrypt for Symmetric Encryption: DES and AES Code Examples

This article explains symmetric encryption concepts, lists common algorithms, and demonstrates how to use PHP's mcrypt extension to perform DES and AES encryption and decryption in various modes with complete code examples.

AESDESPHP
0 likes · 7 min read
Using PHP mcrypt for Symmetric Encryption: DES and AES Code Examples
Selected Java Interview Questions
Selected Java Interview Questions
Feb 6, 2022 · Information Security

Symmetric, Asymmetric, and Hybrid Encryption: Principles, Advantages, and Key Distribution Issues

This article explains the fundamentals of symmetric, asymmetric, and hybrid encryption, compares their strengths and weaknesses, discusses key distribution challenges, and illustrates how combining both methods can address security gaps while highlighting potential man‑in‑the‑middle attacks.

EncryptionSymmetric Encryptionasymmetric encryption
0 likes · 7 min read
Symmetric, Asymmetric, and Hybrid Encryption: Principles, Advantages, and Key Distribution Issues
Efficient Ops
Efficient Ops
May 16, 2021 · Information Security

Why HTTPS Combines Symmetric and Asymmetric Encryption: A Deep Design Walkthrough

This article reconstructs the design of HTTPS step by step, explaining why both symmetric and asymmetric encryption are required, how key negotiation works, the role of digital certificates and certificate authorities, and the underlying security mechanisms that protect client‑server communication.

Certificate AuthorityDigital CertificateHTTPS
0 likes · 13 min read
Why HTTPS Combines Symmetric and Asymmetric Encryption: A Deep Design Walkthrough
Selected Java Interview Questions
Selected Java Interview Questions
Jan 23, 2021 · Information Security

Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange

This article provides a comprehensive introduction to cryptographic techniques, covering the goals of confidentiality, integrity and authentication, and detailing symmetric, asymmetric and hash algorithms, common implementations, their advantages and drawbacks, as well as key exchange methods and public key infrastructure.

PKISymmetric Encryptionasymmetric encryption
0 likes · 16 min read
Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange
Fulu Network R&D Team
Fulu Network R&D Team
Sep 11, 2020 · Information Security

Symmetric Encryption Algorithms in .NET Core Using BouncyCastle

This article introduces symmetric encryption algorithms such as DES, 3DES, and AES, explains their principles, advantages and drawbacks, and provides complete .NET Core sample code using the BouncyCastle library for encryption and decryption with various padding modes.

.NET Core3DESAES
0 likes · 21 min read
Symmetric Encryption Algorithms in .NET Core Using BouncyCastle
Top Architect
Top Architect
Jun 12, 2020 · Information Security

Understanding HTTPS: Why It Is Secure and How It Works

This article explains why HTTPS is necessary, describes symmetric and asymmetric encryption, illustrates the key exchange process, and outlines how HTTPS ensures secure communication by preventing eavesdropping, man‑in‑the‑middle attacks, and ensuring certificate trustworthiness.

EncryptionHTTPSSymmetric Encryption
0 likes · 5 min read
Understanding HTTPS: Why It Is Secure and How It Works
Java Captain
Java Captain
Dec 15, 2018 · Information Security

Understanding HTTPS Design: From Symmetric Encryption to Digital Certificates

This article reconstructs the design of HTTPS by explaining why symmetric encryption, asymmetric encryption, random numbers, digital certificates, and certificate authorities are combined to securely negotiate a shared secret between a client and a web server, while addressing man‑in‑the‑middle attacks and certificate validation.

Digital CertificateEncryptionHTTPS
0 likes · 14 min read
Understanding HTTPS Design: From Symmetric Encryption to Digital Certificates