Wechat applet to obtain the user's mobile phone number summary
preface
The company has recently developed a program. The requirement is to obtain customer ID from the database through the user's mobile phone number, and carry out the following series of operations according to customer ID. Here is a summary of the experience:
1. Authorization to obtain ciphertext
according to Official documents ...
Posted by Orpheus13 on Mon, 07 Mar 2022 20:59:00 +0100
Java implements password adding random salt for MD5 digest encryption (2021 / 05 / 11)
Java implements password adding random salt for MD5 digest encryption (2021 / 05 / 11)
1. General
In daily development, we often face the problem of saving the user password. We must not store the password in plaintext to the database. We can use hash digest algorithm to encrypt the password and then save it to the database.
Hash digest ...
Posted by Begby on Sat, 12 Feb 2022 03:13:08 +0100
Analytic RSA algorithm
Analytic RSA algorithm
forward: https://www.jianshu.com/p/ff2b538a77e2
RSA algorithm description 1.1 RSA generates public-private key pairs
Specific examples explain how to generate key pairs
1.Randomly select two unequal prime numbers p and q.
alice 61 and 53 were selected. (in practical application, the larger the two prime numbers, the ...
Posted by fogofogo on Fri, 11 Feb 2022 21:14:45 +0100
Image encryption / decryption using Python+OpenCV
Basic principle: logical XOR operation
Python is a programming language without much introduction; OpenCV is a cross platform computer vision and machine learning (partially open source) software library based on BSD license. At present, it has supported many languages, such as C, C + +, python, Java and MATLAB.
Here, choose one of the langua ...
Posted by we4freelance on Fri, 11 Feb 2022 07:15:28 +0100
Cryptography - RSA (asymmetric encryption)
RSA
RSA encryption takes advantage of the simple forward solution and complex reverse solution of one-way function
Basic concepts
1, What is "prime"? A prime number is an integer that cannot be expressed as the product of any other two integers except that it can be expressed as the product of itself and 1. For example, 15 = 3 ...
Posted by Scott_J on Sun, 30 Jan 2022 05:59:41 +0100
BUUCTF clocks in every day on July 24, 2021
introduction
Typhoon day, also practiced a day's car, Gan
[SUCTF2019]MT
To fill the hole First look at the encryption code:
from Crypto.Util import number
from flag import flag
def convert(m):
m = m ^ m >> 13
m = m ^ m << 9 & 2029229568
m = m ^ m << 17 & 2245263360
m = m ^ m >> 19
return ...
Posted by Nic on Fri, 14 Jan 2022 08:55:18 +0100
Packet capture analysis and application of 91 short video encryption algorithm
Target APP: 91 short videoI posted an article before Ant accelerator brush invitation According to the article, this APP is basically the same as the encryption algorithm of ant accelerator. It is not available for download.0x00 tool preparationFiddler (agent capture)Xposed (hook framework)Inspeckage (universal hook plug-in, optional) Algorithm ...
Posted by Magicman0022 on Mon, 10 Jan 2022 03:03:36 +0100
Packet capture analysis and application of 91 short video encryption algorithm
Target APP: 91 short videoI posted an article before Ant accelerator brush invitation According to the article, this APP is basically the same as the encryption algorithm of ant accelerator. It is not available for download.0x00 tool preparationFiddler (agent capture)Xposed (hook framework)Inspeckage (universal hook plug-in, optional) Algorithm ...
Posted by dfowler on Sat, 08 Jan 2022 09:26:57 +0100
Canokey Getting Started Guide: F2A, OpenPGP, PIV
Canokeys
F2A
Canokey uses Yubikey Authenticator to manage F2A.
Download Yubikey Authenticator. The following is the official download website of Yubikey Authenticator
https://www.yubico.com/products/yubico-authenticator/#h-download-yubico-authenticator
Run Yubikey Authenticator
Enter the custom reader and fill in the CanoKey in the custo ...
Posted by juminoz on Wed, 05 Jan 2022 18:00:20 +0100
Use Jasypt to encrypt the application s of the SpringBoot project
Use Jasypt to encrypt the application s of the SpringBoot project
This article focuses on why to encrypt sensitive information in SpringBoot's application, how to use jasypt spring boot project to encrypt application * and suggestions on encryption strategies. Record some experience of application encryption.
What's in the application
To ...
Posted by frist44 on Wed, 05 Jan 2022 13:19:34 +0100