In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-01 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)05/31 Report--
This article will explain in detail what the common data encryption methods are, and the editor thinks it is very practical, so I share it for you as a reference. I hope you can get something after reading this article.
Common data encryption methods:
Symmetrical encryption
Asymmetric encryption
One-way encryption
Symmetrical encryption
The encryption and decryption of symmetric encryption use the same key; the speed of encryption and decryption is faster and more efficient; but the key transmission process is not secure, easy to crack, and key management is also troublesome.
two。 The commonly used algorithms in symmetric encryption algorithms are: DES, 3DES, TDEA, Blowfish, RC2, RC4, RC5, IDEA, SKIPJACK, AES and so on.
3. Example:
# encryption # openssl des3-salt-in file.txt-out file.des3 # decryption # openssl des3-d-salt-in file.des3-out file.txt-k mypassword one-way encryption
One-way encryption can only be encrypted, not decrypted, and is often used to extract fingerprint information of data to verify the integrity of the data. But it can cause avalanche effect (avalanche effect is an unstable equilibrium state is also a feature of encryption algorithm, which indicates that a small change in the text or key can cause a great change in the ciphertext, just like before the avalanche, the mountain looks very calm, but as long as there is a problem, it will cause a big collapse. It can be used in many situations for Hash codes, the avalanche effect means that the change of a small number of message bits will cause many bit changes in the information summary. )
Commonly used encryption tools: md5sum, sha1sum, openssl dgst.
Encryption algorithms: md5 (standard key length 128bit), sha1 (standard key length 160bit), md4, CRC-32
Examples
# generate random number # openssl rand-base64 8+b7WUZwW7R4=# generate user password # openssl passwd-1 Password: Verifying-Password: $1 $c72PvoEK$Y1pvzj6I6roDPrr2wMvhH1 public key encryption (asymmetric encryption)
Public key encryption occurs in pairs, the public key encrypts the data, the private key is used to decrypt the data, and vice versa.
Encryption tools: gpg, openssl, dsa
Encryption and signature algorithms: RSA, ELGamal
Example:
# generate key pair # generate private key # openssl genrsa-out file.se 102extract the public key from the private key # openssl rsa-in file.se-pubout
This is the end of this article on "what are the common data encryption methods". I hope the above content can be of some help to you, so that you can learn more knowledge. if you think the article is good, please share it for more people to see.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.