Detailed explanation and implementation of MD5 algorithm (C language)

See the column collection for the detailed explanation and implementation of other modern cryptography algorithms~ MD5 algorithm Algorithm process (i) Message filling First, fill in the message so that its length is 64 bits less than the integer multiple of 512 (these 64 bits are used to record the original data length). The filled content c ...

Posted by ziong on Wed, 23 Feb 2022 11:07:18 +0100

Defcon 2018 Qualify: Easy Pisy writeup

Defcon 2018 Qualify: Easy Pisy 1. Source Code The title is given to two people: execute.php <?php include 'common.php'; if ($_SERVER['REQUEST_METHOD'] === 'GET') { print highlight_string(file_get_contents("execute.php"), TRUE); exit(0); } $keys = get_keys(); $privkey = $keys[0]; $pubkey = $keys[1]; $file_info = $_FILES['userf ...

Posted by pablodelapena on Sun, 20 Feb 2022 01:35:57 +0100

Java implements password adding random salt for MD5 digest encryption (2021 / 05 / 11)

Java implements password adding random salt for MD5 digest encryption (2021 / 05 / 11) 1. General In daily development, we often face the problem of saving the user password. We must not store the password in plaintext to the database. We can use hash digest algorithm to encrypt the password and then save it to the database. Hash digest ...

Posted by Begby on Sat, 12 Feb 2022 03:13:08 +0100

OpenSSL3.0 learning 18 provider - signature CSDN creation punch in

๐Ÿ“’ Blog home page: Actor's blog ๐ŸŽ‰ Welcome to pay attention ๐Ÿ”Ž give the thumbs-up ๐Ÿ‘ Collection โญ Leave a message ๐Ÿ“ โค๏ธ Look forward to communicating together! ๐Ÿ™ The author's level is very limited. If you find an error, please let me know. Thank you! ๐ŸŒบ If you have any questions, you can communicate by private letter!!! ๐ŸŒบ outline # ...

Posted by Grunge on Sat, 12 Feb 2022 00:39:42 +0100

AES encryption principle

AES encryption principle brief introduction Advanced Encryption Standard (AES), also known as Rijndael encryption method, is a block encryption standard adopted by the federal government of the United States. It is also an alternative to DES algorithm and one of the most popular symmetric encryption algorithms today. Symmetric encryption is t ...

Posted by grilldor on Thu, 10 Feb 2022 16:55:26 +0100

OpenSSL3.0 learning 15 provider - kem CSDN creation punch in

๐Ÿ“’ Blog home page: Actor's blog ๐ŸŽ‰ Welcome to pay attention ๐Ÿ”Ž give the thumbs-up ๐Ÿ‘ Collection โญ Leave a message ๐Ÿ“ โค๏ธ Look forward to communicating together! ๐Ÿ™ The author's level is very limited. If you find an error, please let me know. Thank you! ๐ŸŒบ If you have any questions, you can communicate by private letter!!! ๐ŸŒบ outline # ...

Posted by snicolas on Tue, 08 Feb 2022 22:46:28 +0100

OpenSSL3.0 learning 12 provider cipher CSDN creation punch in

๐Ÿ“’ Blog home page: Actor's blog ๐ŸŽ‰ Welcome to pay attention ๐Ÿ”Ž give the thumbs-up ๐Ÿ‘ Collection โญ Leave a message ๐Ÿ“ โค๏ธ Look forward to communicating together! ๐Ÿ™ The author's level is very limited. If you find an error, please let me know. Thank you! ๐ŸŒบ If you have any questions, you can communicate by private letter!!! ๐ŸŒต outline # ...

Posted by muralimohan001 on Sat, 05 Feb 2022 22:06:19 +0100

Cryptography - RSA (asymmetric encryption)

RSA RSA encryption takes advantage of the simple forward solution and complex reverse solution of one-way function Basic concepts 1, What is "prime"? A prime number is an integer that cannot be expressed as the product of any other two integers except that it can be expressed as the product of itself and 1. For example, 15 = 3 ...

Posted by Scott_J on Sun, 30 Jan 2022 05:59:41 +0100

OpenSSL3.0 learning II encryption library algorithm acquisition CSDN creation punch in

๐Ÿ“’ Blog home page: Actor's blog ๐ŸŽ‰ Welcome to pay attention ๐Ÿ”Ž give the thumbs-up ๐Ÿ‘ Collection โญ Leave a message ๐Ÿ“ โค๏ธ Look forward to communicating together! ๐Ÿ™ The author's level is very limited. If you find an error, please let me know. Thank you! ๐ŸŒบ If you have any questions, you can communicate by private letter!!! ๐Ÿฅฆ Algorithm a ...

Posted by spiritssight on Thu, 27 Jan 2022 12:41:57 +0100

The second bullet of BUU-RSA primer collection

The second bullet of BUUCTF-RSA check-in question, interesting or difficult RSA questions are placed separately in the column BUUCTF RSA column_ Xiaohan's blog - CSDN blog Dangerous RSA (low encryption index attack) subject n=0x52d483c27cd806550fbe0e37a61af2e7cf5e0efb723dfc81174c918a27627779b21fa3c851e9e94188eaee3d5cd6f752406a43fbecb53 ...

Posted by cmgmyr on Sun, 16 Jan 2022 23:56:22 +0100