Cryptography API: Next Generation (CNG) usage combing – asymmetric encryption algorithm application (4) and asymmetric key conversion (RSA) between OpenSSL3

Continuing with the content of the previous chapter, let’s talk about RSA here RSA section: There are three memory BLOB structures for BCrypt derived keys: BCRYPT_RSAFULLPRIVATE_BLOB, BCRYPT_RSAPRIVATE_BLOB and BCRYPT_RSAPUBLIC_BLOB Simply understand that BCRYPT_RSAFULLPRIVATE_BLOB contains both public and private keys That is RSA: e = public key exponent d = private key exponent n = modulus […]

Cryptography API: Next Generation (CNG) usage combing – asymmetric encryption algorithm application (3) and asymmetric key conversion (ECC) between OpenSSL3

This article sorts out the mutual conversion of keys between OpenSSL3.0 + and CNG ECC section: The memory BLOB structure of CNG export key is: BCRYPT_ECCPRIVATE_BLOB and BCRYPT_ECCPRIVATE_BLOB An elliptic curve (ECC) public key BLOB (BCRYPT_ECCPUBLIC_BLOB) has the following format in contiguous memory. X and Y coordinates are unsigned integers encoded in big-endian format. BCRYPT_ECCKEY_BLOB […]

Cryptography API: Next Generation (CNG) usage combing – asymmetric encryption algorithm application (2) asymmetric key import and storage and public key encryption and private key decryption

The key pair created by NCrypt in CNG will be saved locally by default, but the key pair created by BCrypt will not be saved The key created by NCrypt cannot export the private key by default This article mainly talks about, 1. How to save the private key created and exported by BCrypt (the […]

04. CryptographyPython

Message digest algorithm Installation of the pycryptodome library a. pip install pycryptodome b. Usage import Crypto A message digest algorithm is an algorithm that can compress text or other information into a short string These strings are called message digests or hashes Message digest algorithms are often used to verify file integrity or store passwords […]

[Cryptography 5] Digital signature, RSA to realize digital signature and verification

Message Authentication Code & amp;Digital Signature Message authentication code (message authentication code) is a technology for confirming integrity and performing authentication. It takes the first letter of three words and is referred to as MAC. The input of the message authentication code includes a message of any length and a shared key between the sender […]

TexSAW|2023|Cryptography & Misc|WP

Cryptography|Crack the crime After connecting with nc, get the first question directly It is a simple base64 encryption, and the decryption is as follows: Meet in dubai on Tuesday After filling in, you can get the second question The guess is classical encryption, and after N attempts, it is found to be rot13 encryption, and […]

Java Secure Cryptography – Classical, Modern Cryptography, ASCII Encoding

Directory foreword 1. Basic concepts Two, several common cryptography classical cryptography ① Replacement method ② Shift method ③ Classical password cracking method modern cryptography modern cryptography ① Hash function ② Symmetric encryption ③ Asymmetric encryption How to set a password to be safe ASCII encoding test add pom file Characters are converted to ascii codes […]

5 Important Cryptography Things You Must Know

Foreword Cryptography is used to convert input (plaintext) into encrypted output (ciphertext). Therefore, input is converted to output using a different algorithm, most often encrypted using a key and decrypt. A key in cryptography is a sequence of characters used in an algorithm. The ciphertext can then be used to securely store and transmit data […]

SM2 Elliptic Curve Public Key Cryptography Algorithm–Key Pair and Digital Signature

1. Introduction to SM2 National Secret Algorithm The full name of the SM2 algorithm is the SM2 elliptic curve public key cryptography algorithm (SM is the pinyin abbreviation for commercial ciphers), which is a cryptographic ECC (Elliptic Curve Cryptography) based on the “elliptic curve”. In 2016, SM2 became China’s national encryption standard. In the commercial […]