Detailed explanation and implementation of MD5 algorithm (C language)
See the column collection for the detailed explanation and implementation of other modern cryptography algorithms~
MD5 algorithm
Algorithm process
(i) Message filling
First, fill in the message so that its length is 64 bits less than the integer multiple of 512 (these 64 bits are used to record the original data length). The filled content c ...
Posted by ziong on Wed, 23 Feb 2022 11:07:18 +0100
Defcon 2018 Qualify: Easy Pisy writeup
Defcon 2018 Qualify: Easy Pisy
1. Source Code
The title is given to two people:
execute.php
<?php
include 'common.php';
if ($_SERVER['REQUEST_METHOD'] === 'GET') {
print highlight_string(file_get_contents("execute.php"), TRUE);
exit(0);
}
$keys = get_keys();
$privkey = $keys[0];
$pubkey = $keys[1];
$file_info = $_FILES['userf ...
Posted by pablodelapena on Sun, 20 Feb 2022 01:35:57 +0100
Java implements password adding random salt for MD5 digest encryption (2021 / 05 / 11)
Java implements password adding random salt for MD5 digest encryption (2021 / 05 / 11)
1. General
In daily development, we often face the problem of saving the user password. We must not store the password in plaintext to the database. We can use hash digest algorithm to encrypt the password and then save it to the database.
Hash digest ...
Posted by Begby on Sat, 12 Feb 2022 03:13:08 +0100
OpenSSL3.0 learning 18 provider - signature CSDN creation punch in
๐ Blog home page: Actor's blog ๐ Welcome to pay attention ๐ give the thumbs-up ๐ Collection โญ Leave a message ๐ โค๏ธ Look forward to communicating together! ๐ The author's level is very limited. If you find an error, please let me know. Thank you! ๐บ If you have any questions, you can communicate by private letter!!!
๐บ outline
# ...
Posted by Grunge on Sat, 12 Feb 2022 00:39:42 +0100
AES encryption principle
AES encryption principle
brief introduction
Advanced Encryption Standard (AES), also known as Rijndael encryption method, is a block encryption standard adopted by the federal government of the United States. It is also an alternative to DES algorithm and one of the most popular symmetric encryption algorithms today. Symmetric encryption is t ...
Posted by grilldor on Thu, 10 Feb 2022 16:55:26 +0100
OpenSSL3.0 learning 15 provider - kem CSDN creation punch in
๐ Blog home page: Actor's blog ๐ Welcome to pay attention ๐ give the thumbs-up ๐ Collection โญ Leave a message ๐ โค๏ธ Look forward to communicating together! ๐ The author's level is very limited. If you find an error, please let me know. Thank you! ๐บ If you have any questions, you can communicate by private letter!!!
๐บ outline
# ...
Posted by snicolas on Tue, 08 Feb 2022 22:46:28 +0100
OpenSSL3.0 learning 12 provider cipher CSDN creation punch in
๐ Blog home page: Actor's blog ๐ Welcome to pay attention ๐ give the thumbs-up ๐ Collection โญ Leave a message ๐ โค๏ธ Look forward to communicating together! ๐ The author's level is very limited. If you find an error, please let me know. Thank you! ๐บ If you have any questions, you can communicate by private letter!!!
๐ต outline
# ...
Posted by muralimohan001 on Sat, 05 Feb 2022 22:06:19 +0100
Cryptography - RSA (asymmetric encryption)
RSA
RSA encryption takes advantage of the simple forward solution and complex reverse solution of one-way function
Basic concepts
1, What is "prime"? A prime number is an integer that cannot be expressed as the product of any other two integers except that it can be expressed as the product of itself and 1. For example, 15 = 3 ...
Posted by Scott_J on Sun, 30 Jan 2022 05:59:41 +0100
OpenSSL3.0 learning II encryption library algorithm acquisition CSDN creation punch in
๐ Blog home page: Actor's blog ๐ Welcome to pay attention ๐ give the thumbs-up ๐ Collection โญ Leave a message ๐ โค๏ธ Look forward to communicating together! ๐ The author's level is very limited. If you find an error, please let me know. Thank you! ๐บ If you have any questions, you can communicate by private letter!!!
๐ฅฆ Algorithm a ...
Posted by spiritssight on Thu, 27 Jan 2022 12:41:57 +0100
The second bullet of BUU-RSA primer collection
The second bullet of BUUCTF-RSA check-in question, interesting or difficult RSA questions are placed separately in the column BUUCTF RSA column_ Xiaohan's blog - CSDN blog
Dangerous RSA (low encryption index attack)
subject
n=0x52d483c27cd806550fbe0e37a61af2e7cf5e0efb723dfc81174c918a27627779b21fa3c851e9e94188eaee3d5cd6f752406a43fbecb53 ...
Posted by cmgmyr on Sun, 16 Jan 2022 23:56:22 +0100