Wechat applet to obtain the user's mobile phone number summary

preface The company has recently developed a program. The requirement is to obtain customer ID from the database through the user's mobile phone number, and carry out the following series of operations according to customer ID. Here is a summary of the experience: 1. Authorization to obtain ciphertext according to Official documents ...

Posted by Orpheus13 on Mon, 07 Mar 2022 20:59:00 +0100

Java implements password adding random salt for MD5 digest encryption (2021 / 05 / 11)

Java implements password adding random salt for MD5 digest encryption (2021 / 05 / 11) 1. General In daily development, we often face the problem of saving the user password. We must not store the password in plaintext to the database. We can use hash digest algorithm to encrypt the password and then save it to the database. Hash digest ...

Posted by Begby on Sat, 12 Feb 2022 03:13:08 +0100

Analytic RSA algorithm

Analytic RSA algorithm forward: https://www.jianshu.com/p/ff2b538a77e2 RSA algorithm description 1.1 RSA generates public-private key pairs Specific examples explain how to generate key pairs 1.Randomly select two unequal prime numbers p and q. alice 61 and 53 were selected. (in practical application, the larger the two prime numbers, the ...

Posted by fogofogo on Fri, 11 Feb 2022 21:14:45 +0100

Image encryption / decryption using Python+OpenCV

Basic principle: logical XOR operation Python is a programming language without much introduction; OpenCV is a cross platform computer vision and machine learning (partially open source) software library based on BSD license. At present, it has supported many languages, such as C, C + +, python, Java and MATLAB. Here, choose one of the langua ...

Posted by we4freelance on Fri, 11 Feb 2022 07:15:28 +0100

Cryptography - RSA (asymmetric encryption)

RSA RSA encryption takes advantage of the simple forward solution and complex reverse solution of one-way function Basic concepts 1, What is "prime"? A prime number is an integer that cannot be expressed as the product of any other two integers except that it can be expressed as the product of itself and 1. For example, 15 = 3 ...

Posted by Scott_J on Sun, 30 Jan 2022 05:59:41 +0100

BUUCTF clocks in every day on July 24, 2021

introduction Typhoon day, also practiced a day's car, Gan [SUCTF2019]MT To fill the hole First look at the encryption code: from Crypto.Util import number from flag import flag def convert(m): m = m ^ m >> 13 m = m ^ m << 9 & 2029229568 m = m ^ m << 17 & 2245263360 m = m ^ m >> 19 return ...

Posted by Nic on Fri, 14 Jan 2022 08:55:18 +0100

Packet capture analysis and application of 91 short video encryption algorithm

Target APP: 91 short videoI posted an article before Ant accelerator brush invitation According to the article, this APP is basically the same as the encryption algorithm of ant accelerator. It is not available for download.0x00 tool preparationFiddler (agent capture)Xposed (hook framework)Inspeckage (universal hook plug-in, optional) Algorithm ...

Posted by Magicman0022 on Mon, 10 Jan 2022 03:03:36 +0100

Packet capture analysis and application of 91 short video encryption algorithm

Target APP: 91 short videoI posted an article before Ant accelerator brush invitation According to the article, this APP is basically the same as the encryption algorithm of ant accelerator. It is not available for download.0x00 tool preparationFiddler (agent capture)Xposed (hook framework)Inspeckage (universal hook plug-in, optional) Algorithm ...

Posted by dfowler on Sat, 08 Jan 2022 09:26:57 +0100

Canokey Getting Started Guide: F2A, OpenPGP, PIV

Canokeys F2A Canokey uses Yubikey Authenticator to manage F2A. Download Yubikey Authenticator. The following is the official download website of Yubikey Authenticator https://www.yubico.com/products/yubico-authenticator/#h-download-yubico-authenticator Run Yubikey Authenticator Enter the custom reader and fill in the CanoKey in the custo ...

Posted by juminoz on Wed, 05 Jan 2022 18:00:20 +0100

Use Jasypt to encrypt the application s of the SpringBoot project

Use Jasypt to encrypt the application s of the SpringBoot project This article focuses on why to encrypt sensitive information in SpringBoot's application, how to use jasypt spring boot project to encrypt application * and suggestions on encryption strategies. Record some experience of application encryption. What's in the application To ...

Posted by frist44 on Wed, 05 Jan 2022 13:19:34 +0100