Hi~ Hello everyone, this is the Demon King? ~! For more python source code/information/answers/tutorials, etc. Click here to jump to the end of the article and get the business card for free. Environment usage: Python 3.8 Pycharm nodejs Module usage: import requests –> pip install requests import execjs –> pip install pyexecjs import json Implementing […]
Tag: crypt
RSA file encryption implemented in C language
This article was originally an open source implementation of Computer System Principle Experiment 2 of Shandong University Since the score for the Principles of Computer Systems experiment is based on the difficulty of the encryption algorithm, and encryption algorithms are obviously not the focus of Principles of Computer Systems, my implementation is open sourced for […]
Nginx implements tcp proxy and supports TLS encryption experiment
Nginx source code compilation Regarding the construction and configuration of nginx, please refer to the author’s previous article: Real-time streaming media server construction test (nginx + rtmp)_How to test online whether the streaming media rtmp is successfully built – the first half of the CSDN blog; the only change is the compilation parameters (Add the […]
QT implements decryption of m3u8 files
Article directory summary How to decrypt M3U8 files Implement ideas and code Sequence Diagram network request Decrypt in conclusion Summary Many video files are provided in the M3U8 file format. Let’s review what an M3U8 file is first! When using QT’s mutimedia framework to play videos, some videos load slowly and some videos load quickly. […]
[BUUCTF NewStar 2023] week5 Crypto/pwn
Some difficult questions in the last week Crypto last_signin It’s also a board question, but some people’s saved boards haven’t arrived, so I think it’s difficult. After all, we can’t write this board ourselves. Part of p is given, p is 1024 bits and 922-101 bits are given to the two ends. from Crypto.Util.number import […]
Various encryption algorithms involved in CTF reverse engineering
RC4 principle research In cryptography, RC4 (abbreviation from Rivest Cipher 4) is a stream cipher algorithm with variable key length. It uses the same key for encryption and decryption, so it is also a symmetric encryption algorithm. RC4 is the encryption algorithm used in Wired Equivalent Privacy (WEP) and was once one of the algorithms […]
Variables and encryption in Ansible
1. Variable naming Like most programming languages, ansible’s built-in keywords cannot be used as variable names, including numbers, underscores, and letters. They can only start with underscores or letters. 2. Variable level Global: set from the command line or configuration file paly: set in play and related structures Host: a task consisting of a checklist, […]
“01” tick “Morse Code” encryption and decryption of single characters
“01” replaces the tick “.-” “Morse code” characters to encrypt and decrypt a single character entered on the keyboard. (This note is suitable for coders who are familiar with loops and lists) [The details of learning are a joyful process] Python official website: python cutting edge. Unfortunately it’s the original English version. So, I want […]
Touge-Using RAS encryption and decryption in openssl
Level 1: RSA encryption and decryption Use the OpenSSL command line to implement RSA encryption and decryption of text files. Create a clear text file hello.txt with the content GuetPython Use genrsa to generate a 1024-bit plaintext rsa private key privacy.pem, that is, an unencrypted private key. Use rsa to output the public key file […]
20.5 OpenSSL socket RSA encrypted transmission
The RSA algorithm can also be used for encrypted transmission, but although this type of encryption algorithm is very secure, it is usually not used for large amounts of data transmission. This is because the encryption and decryption process of the RSA algorithm involves a large number of mathematical operations. Especially modular exponentiation (that is, […]