cryptography
PerpetualLearner
这个作者很懒,什么都没留下…
展开
-
理解LDAP||Active Directory||PKI||RBAC||SAML||Kerberos
LDAPThe Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network.Directory services..原创 2020-12-21 09:35:45 · 533 阅读 · 1 评论 -
理解hmac module in Python
hmacThis module implements the HMAC algorithm as described by RFC 2104.functionshmac.new(key, msg=None, digestmod='')hmac.digest(key, meg, digest)mothods from HMAC objectHMAC.update(msg) # m.update(a);m.update(b) is equivalent to m.update(a+b)..原创 2020-12-12 11:45:51 · 200 阅读 · 0 评论 -
理解apt-key||apt vs apt-get||Public Signing Key
KeysigningKeysigning refers to digitally signing someone else’s public key using your own.signingWhen you sign a document/key you will use your private key to encrypt the document (called signing) and then distribute your public key to others so tha..原创 2020-12-11 20:43:44 · 342 阅读 · 0 评论 -
理解SIGNED endpoint
endpoint《理解endpoint vs API 》signed《理解signature on API Requests》《理解digital signatures vs MAC on cryptography》You can take signed endpoint simply as the endpoint which need a signature param.原创 2020-12-11 19:52:12 · 141 阅读 · 0 评论 -
理解HMAC散列消息认证码||MAC||MIC
Overviewpython module : cryptographyCrypto 101The Cryptopals Crypto ChallengesRFC 2104:HMAC: Keyed-Hashing for Message AuthenticationRFC6476 : Using Message Authentication Code (MAC) Encryption in the Cryptographic Message Syntax (CMS)MAC 消息认证..原创 2020-12-06 17:21:43 · 1887 阅读 · 4 评论 -
理解integrity&authentication on cryptography message
OverviewIn network communications, the integrity of the message to be delivered is just as important as secrety and other privacy requirements are.IntegrityBy integrity, we mean that a message (like this article is a message from me to audience) sho..原创 2020-12-06 17:20:19 · 416 阅读 · 0 评论 -
理解digital signatures vs MAC on cryptography
Digital SignatureA digital signature is a methematical scheme for verifying the authenticity of digital messages or documents.Digital signatures are a standard element of most cryptographic protocol suites, and are commonly used for software distributi..原创 2020-12-06 17:19:09 · 458 阅读 · 0 评论 -
理解AE ||plain encryption||Plaintext||Cipher on cryptography
Notion ExplainPlaintextIn cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually excryption algorithms.Usually refers to data that is transmitted or stored unencrypted.With the adcent of c..原创 2020-12-06 17:17:50 · 202 阅读 · 0 评论 -
理解SHA vs MD vs Whirlpool vs SHA-256
Overview《深入理解hash哈希散列函数》Encryption and hashing are similar in the way that they both take a string of useful text and convert it into somthing very different.MD5, SHA, Whirlpool are all one-way encryption methods, which mean hasing method and what m..原创 2020-12-06 17:15:55 · 714 阅读 · 0 评论 -
理解symmetric key||asymmetric key ||shared key||public-private key on Cryptography
Overviewcryptographycryptographic keysIn cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.For encryption algorithms, a key specifies the transformation of plaintext int..原创 2020-12-06 14:43:43 · 546 阅读 · 0 评论 -
理解cryptographic primitive
Cyrptographic primitiveCryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer security systems.These routines include, but are not limited to, one-way has..原创 2020-12-06 14:35:37 · 1073 阅读 · 0 评论