Gin - RSA512 signature using JWT's asymmetric encryption algorithm

1.RSA asymmetric encryption RSA asymmetric encryption encrypts the signature, not the header and load of jwt. The header and load are encrypted with base64 jwt official website You can know Tokens are put together by spelling strings. It is concluded that: 1. User defined data can be placed in the load, but sensitive data cannot be placed. ...

Posted by panic! on Mon, 06 Dec 2021 16:03:23 -0800

Assembly (receive several N-digit decimal values (0 ~ 65535) from the keyboard and display their sum in binary, decimal and hexadecimal number systems.)

subject Receive several N-digit decimal values (0 ~ 65535) from the keyboard and display their sum in binary, decimal and hexadecimal number systems. requirement: (1) A subroutine is used to realize the input of an N-digit decimal value in the loop structure of the main program The subroutine is called. (2) When the user enters directly ...

Posted by MiniMonty on Sun, 05 Dec 2021 01:50:26 -0800

Assembly language (input several decimal values (0-9) from the keyboard and display their sum in decimal)

subject Receive several one digit decimal values (0-9) from the keyboard and display their sum in the form of decimal data. requirement: 1) The input of one decimal value is realized by subroutine 2) When the user enters directly without entering a value, the input is ended 3) The input data is multi digit decimal data, and the sum calculated ...

Posted by sachavdk on Fri, 03 Dec 2021 22:06:01 -0800

Technologies used in the back end of Beijing Taobao project

1 MD5 encryption MD5 message digest algorithm (English: MD5 message digest algorithm), a widely used cryptographic hash function, can generate a 128 bit (16 byte) hash value to ensure complete and consistent information transmission. MD5 was designed by American Cryptologist Ronald Linn Rivest and published in 1992 to replace MD4 algorithm. Th ...

Posted by dbomb101 on Fri, 03 Dec 2021 07:32:42 -0800

Artistic ~SM4 implementation of Java encryption and decryption

Concept introduction of domestic SM4 encryption and decryption algorithm SMS4 algorithm is an encryption algorithm used in WAPI wireless network standard widely used in China. It is a 32 round iterative packet encryption algorithm with unbalanced Feistel structure. Its key length and packet length are 128. The algorithm used in the encryption ...

Posted by Graphi on Thu, 02 Dec 2021 18:47:41 -0800

Container image security in cloud native Era

Hello, I'm Zhang Jintao.Kubernetes, as the cornerstone of the cloud, has brought us great convenience. More and more companies have also applied kubernetes to the production environment. However, while enjoying the convenience it brings, we also need to pay attention to some potential safety hazards.In this article, I will focus on container im ...

Posted by bschmitt78 on Tue, 30 Nov 2021 03:13:44 -0800

Network Security Learning -- DNS deployment and security

DNS DNS(Domain Name Service): provides a domain name resolution server for clients Domain name composition Overview of domain name composition Host name. Domain name is called fully qualified domain name (FQDN). There can be multiple hosts under a domain name. The domain name is unique in the world, and the host name. Domain name must be un ...

Posted by rosy on Mon, 29 Nov 2021 16:46:29 -0800

Go + or shit-- Run a simple Grpc

Run a simple Grpc Previously, we successfully installed the Go + running environment. Next, we run a simple Grpc to learn how to reference packages. Dependent package installation For references to dependent libraries, Go + has made many optimizations to make the code easier to write. Just like when printing, Go needs to import "f ...

Posted by dennissanche on Mon, 29 Nov 2021 01:34:10 -0800

java_ Command execution

java_ Command execution Runtime class analysis First look at the demo of a command execution, as follows import java.io.ByteArrayOutputStream; import java.io.IOException; import java.io.InputStream; public class RuntimeTest { public static void main(String[] args) throws IOException { Runtime runtime = Runtime.getRuntime(); ...

Posted by ade1982 on Sun, 28 Nov 2021 09:11:30 -0800

Research on Fairplay DRM and obfuscation implementation

The two key points in studying Fairplay DRM (Digital Rights Management) are authorization and encryption. However, there has been little research on App DRM for a long time, and it is on this premise that Fairplay DRM has superimposed a "barrier" for the security research of iOS App. By analyzing the problems in the design and impleme ...

Posted by RockyShark on Fri, 26 Nov 2021 05:50:30 -0800