Gin - RSA512 signature using JWT's asymmetric encryption algorithm
1.RSA asymmetric encryption
RSA asymmetric encryption encrypts the signature, not the header and load of jwt. The header and load are encrypted with base64 jwt official website You can know Tokens are put together by spelling strings. It is concluded that: 1. User defined data can be placed in the load, but sensitive data cannot be placed. ...
Posted by panic! on Mon, 06 Dec 2021 16:03:23 -0800
Assembly (receive several N-digit decimal values (0 ~ 65535) from the keyboard and display their sum in binary, decimal and hexadecimal number systems.)
subject
Receive several N-digit decimal values (0 ~ 65535) from the keyboard and display their sum in binary, decimal and hexadecimal number systems. requirement: (1) A subroutine is used to realize the input of an N-digit decimal value in the loop structure of the main program The subroutine is called. (2) When the user enters directly ...
Posted by MiniMonty on Sun, 05 Dec 2021 01:50:26 -0800
Assembly language (input several decimal values (0-9) from the keyboard and display their sum in decimal)
subject
Receive several one digit decimal values (0-9) from the keyboard and display their sum in the form of decimal data.
requirement: 1) The input of one decimal value is realized by subroutine 2) When the user enters directly without entering a value, the input is ended 3) The input data is multi digit decimal data, and the sum calculated ...
Posted by sachavdk on Fri, 03 Dec 2021 22:06:01 -0800
Technologies used in the back end of Beijing Taobao project
1 MD5 encryption
MD5 message digest algorithm (English: MD5 message digest algorithm), a widely used cryptographic hash function, can generate a 128 bit (16 byte) hash value to ensure complete and consistent information transmission. MD5 was designed by American Cryptologist Ronald Linn Rivest and published in 1992 to replace MD4 algorithm. Th ...
Posted by dbomb101 on Fri, 03 Dec 2021 07:32:42 -0800
Artistic ~SM4 implementation of Java encryption and decryption
Concept introduction of domestic SM4 encryption and decryption algorithm
SMS4 algorithm is an encryption algorithm used in WAPI wireless network standard widely used in China. It is a 32 round iterative packet encryption algorithm with unbalanced Feistel structure. Its key length and packet length are 128. The algorithm used in the encryption ...
Posted by Graphi on Thu, 02 Dec 2021 18:47:41 -0800
Container image security in cloud native Era
Hello, I'm Zhang Jintao.Kubernetes, as the cornerstone of the cloud, has brought us great convenience. More and more companies have also applied kubernetes to the production environment. However, while enjoying the convenience it brings, we also need to pay attention to some potential safety hazards.In this article, I will focus on container im ...
Posted by bschmitt78 on Tue, 30 Nov 2021 03:13:44 -0800
Network Security Learning -- DNS deployment and security
DNS
DNS(Domain Name Service): provides a domain name resolution server for clients
Domain name composition
Overview of domain name composition
Host name. Domain name is called fully qualified domain name (FQDN). There can be multiple hosts under a domain name. The domain name is unique in the world, and the host name. Domain name must be un ...
Posted by rosy on Mon, 29 Nov 2021 16:46:29 -0800
Go + or shit-- Run a simple Grpc
Run a simple Grpc
Previously, we successfully installed the Go + running environment. Next, we run a simple Grpc to learn how to reference packages.
Dependent package installation
For references to dependent libraries, Go + has made many optimizations to make the code easier to write. Just like when printing, Go needs to import "f ...
Posted by dennissanche on Mon, 29 Nov 2021 01:34:10 -0800
java_ Command execution
java_ Command execution
Runtime class analysis
First look at the demo of a command execution, as follows
import java.io.ByteArrayOutputStream;
import java.io.IOException;
import java.io.InputStream;
public class RuntimeTest {
public static void main(String[] args) throws IOException {
Runtime runtime = Runtime.getRuntime();
...
Posted by ade1982 on Sun, 28 Nov 2021 09:11:30 -0800
Research on Fairplay DRM and obfuscation implementation
The two key points in studying Fairplay DRM (Digital Rights Management) are authorization and encryption. However, there has been little research on App DRM for a long time, and it is on this premise that Fairplay DRM has superimposed a "barrier" for the security research of iOS App. By analyzing the problems in the design and impleme ...
Posted by RockyShark on Fri, 26 Nov 2021 05:50:30 -0800