RC4 principle research In cryptography, RC4 (abbreviation from Rivest Cipher 4) is a stream cipher algorithm with variable key length. It uses the same key for encryption and decryption, so it is also a symmetric encryption algorithm. RC4 is the encryption algorithm used in Wired Equivalent Privacy (WEP) and was once one of the algorithms […]
Tag: encryption
Variables and encryption in Ansible
1. Variable naming Like most programming languages, ansible’s built-in keywords cannot be used as variable names, including numbers, underscores, and letters. They can only start with underscores or letters. 2. Variable level Global: set from the command line or configuration file paly: set in play and related structures Host: a task consisting of a checklist, […]
“01” tick “Morse Code” encryption and decryption of single characters
“01” replaces the tick “.-” “Morse code” characters to encrypt and decrypt a single character entered on the keyboard. (This note is suitable for coders who are familiar with loops and lists) [The details of learning are a joyful process] Python official website: python cutting edge. Unfortunately it’s the original English version. So, I want […]
Touge-Using RAS encryption and decryption in openssl
Level 1: RSA encryption and decryption Use the OpenSSL command line to implement RSA encryption and decryption of text files. Create a clear text file hello.txt with the content GuetPython Use genrsa to generate a 1024-bit plaintext rsa private key privacy.pem, that is, an unencrypted private key. Use rsa to output the public key file […]
JS encryption/decryption XX data background list JS encryption
Destination address ZHkuZmVpZ3VhLmNu Requirements An old friend contacted me, hoping to make a small tool that is easy to read for internal use within the company, and promised not to spread it to outsiders. However, there was a problem in the last step of obtaining the interface data. The response data was heavily encrypted and […]
RSA+AES realizes data encryption and transmission
When logging in to the website, users will be asked to enter their username and password. In the payment scenario, they will be asked to enter their bank card number and ID number. These sensitive data may be intercepted, cracked, or tampered with during the transmission process. Even if the website uses the powerful HTTPS […]
SKF toolkit UKEY encryption and decryption JAVA interface calls UKEY DLL/SO driver
Recently, the company needs to develop national encryption and decryption based on the UKEY method. After searching around the Internet, I can only find the only UEKY interface of Longmai Technology, and there are only a few. After a period of exploration, I finally finished writing the test and passed it. (Ukey provided by Haitai […]
Java uses Base64 to implement encryption and decryption of user information, which is equivalent to token
Directory 1 question 2 implementation 1 Question The springboot project needs to implement encryption and decryption of users After the user logs in, the user information is encrypted and stored in a cookie. When the page is accessed later, the cookie is carried to other pages and then decrypted. As long as the cookie expires, […]
Response content encryption and anti-crawling case 1: Obtaining 4K high-definition and uncensored pictures of a certain Jane’s wallpaper
Table of Contents Preface need Destination URL detailed steps 1. Find the data interface 2. Analyze the source of encrypted data 3. Stack backtrace and analyze the function logic 4. Enter the decryption function 5. Generate js encryption logic code 6. Build python code logic Foreword Page flipping and crawling are prohibited. Attacks or distributed […]
Two problems encountered in okhttp post request header post parameter encryption
If you have questions about whether it is necessary to encrypt parameters after using https for network requests, you can read my last article: Network Security https. Remember to read it patiently. Let me talk about the questions below: Caused by: java.lang.IllegalArgumentException: Unexpected char 0x0a At first, I thought it was the okhttp framework that […]