当前位置:网站首页>Technical architecture of large websites | information encryption technology and key security management
Technical architecture of large websites | information encryption technology and key security management
2022-06-21 17:52:00 【Luoyang Taishan】
Usually , In order to protect the sensitive data of the website , The application needs to encrypt these information , Information encryption technology can be divided into three categories :
- One way hash encryption
- Symmetric encryption
- Asymmetric encryption
One way hash encryption
One way hash encryption refers to hash calculation through information of different lengths , Get a fixed length output , The process is one-way , That is, the output fixed length information cannot be , Reverse operation to get the input original information , As shown in the figure .

Take advantage of this feature of one-way hash encryption , One way hash encryption can be applied to passwords , Save the password into the database , When the user logs in , Password verification , Also calculate the ciphertext of the input password , And compare it with the ciphertext in the database , If the same , The password is verified successfully . The ciphertext of the password entered by the user when stored in the database , And the plaintext of the password is calculated irreversibly , So the technical database is “ Towing Library ”, It will not disclose user password information .
Although one-way hash ciphertext can not be inversely calculated by algorithm to get plaintext password , But because the passwords people set have certain patterns , So you can go through the rainbow bridge ( Common passwords and corresponding ciphertext relation tables ) And so on . In order to enhance the security of one-way hash calculation , The hash algorithm is also salted (salt),salt Equivalent to an encrypted key , Increase the difficulty of cracking .
The commonly used one-way hash algorithms are MD5,SHA etc. . One way hash algorithm also has a feature that any small change in input will lead to a completely different output . This feature is sometimes not used to generate information summaries 、 It is used to calculate random numbers with high discreteness .
Symmetric encryption
Symmetric encryption means that the keys used for encryption and decryption are the same ( Or they can calculate each other ), As shown in the figure .

The symmetric encryption algorithm is simple , High encryption efficiency , Small overhead , Suitable for encrypting large amounts of data . The disadvantage is that the same key is used for encryption , How to exchange keys safely in the case of remote communication is a difficult problem , If the key is lost , Then all encrypted information will have no secrets .
The commonly used symmetric encryption algorithms are DES Algorithm 、RC Algorithm etc. . Symmetric encryption is a traditional encryption method , It is also the most commonly used encryption method , It is suitable for most occasions that need encryption .
Asymmetric encryption
Different from conversion encryption , Asymmetric encryption and decryption do not use the same key , One of them is open to the outside world , Become a public key , The other is known only to the owner , Become a private key . Information encrypted with a public key must be decrypted with a private key , conversely , Information encrypted with a private key must be opened with a public key , As shown in the figure .

Asymmetric encryption technology is often used in information security transmission , Digital signature, etc .
The common algorithms of asymmetric encryption are RSA Algorithm etc. ,HTTPS The digital certificate used by the browser in the transmission is actually an asymmetric encrypted public key authenticated by the authority .
Key security management
The security of information depends on the key , But in practice , Many developers write the key directly in the source code , A little better is written in the configuration file , Different keys for online and development configurations . In short, the key itself is stored in clear text , Many people in the company have access to . Increases the risk of leakage . Therefore, it is best to have the key maintained by a specially assigned person .
边栏推荐
- shamir
- 堆栈认知——栈溢出实例(ret2text)
- module. Exports points to problems
- FragmentStatePagerAdapter 与FragmentPagerAdapter的区别
- Simulation of vector
- 《MATLAB 神经网络43个案例分析》:第27章 LVQ神经网络的预测——人脸朝向识别
- Vscade tool
- Reids面试题集合 数据结构+穿透雪崩+持久化+内存淘汰策略+数据库双写+哨兵
- Viewing technological changes through Huawei Corps (IV): interactive media (Music)
- 欧洲家具EN 597-1 跟EN 597-2两个阻燃标准一样吗?
猜你喜欢

堆栈认知——栈溢出实例(ret2text)

不是一流大学毕业,却通过自学软件测试,进了阿里年薪初始22K

Runmeide Healthcare a réussi l'audience d'inscription sur la liste: les pertes devraient augmenter, Huo Yunfei Brothers détenant environ 33%

BM19 寻找峰值

Stack awareness - stack overflow instance (ret2text)

Bm95 points candy problem

加密大崩盘,Web3游戏到底还有没有未来?5篇论文深度探讨

窗帘做EN 1101易燃性测试过程是怎么样的?

How to adjust 3DE 3D model view if you can't see it

Software test architecture learning and construction (14) - overview of software test and development model of test foundation
随机推荐
Zhong'an insurance, together with Alibaba health and huiyitianxia, explores a new model of Internet chronic disease management
BFS and DFS
【技术管理】集结号与亮剑团队
How to write technical documents software engineering at Google
神经网络七十年:回顾与展望
Accélérer le déploiement de l'application Native Cloud et compléter l'authentification de compatibilité entre Yanrong yrcloudfile et Tianyi Cloud
Differences between fragmentstatepageradapter and fragmentpageradapter
[dataset] |bigdetection
为什么RedisCluster设计成16384个槽?
Lua导出为外部链接库并使用
BFS与DFS
Performance test ---locust's on_ Start and on_ Stop method
在线直播系统源码,实现进入页面就去请求列表接口并触底分页加载
Are the two flame retardant standards of European furniture en 597-1 and en 597-2 the same?
PTA L3-031 千手观音 (30 分)
Runmaide medical passed the listing hearing: it is expected that the loss will increase, with huoyunfei brothers holding about 33%
Hain's law and Feynman's learning method
数字藏品系统开发,NFT艺术品交易平台搭建
Compose programming idea
众安保险联合阿里健康、慧医天下 探索互联网慢病管理新模式