当前位置:网站首页>On interface encryption
On interface encryption
2022-07-25 19:29:00 【Shining umbrella】
1、 The importance of interface encryption
The difference between encryption and non encryption :
When the client interacts with the server , For example, login operation , Open the debug window , After entering the user name and password, click login , You can see the login interface we call , In the return data of the interface , You can see that the login user name and password are displayed in clear text , It indicates that the interface does not perform encryption .
If a login interface is encrypted , Then we use it directly in the interface tool user name 、 Login with password cannot succeed , Even if your username and password are correct , He will still prompt that your user name and password are incorrect .
Importance :
The client and server transmit data through the network , We need to be online when logging into a website ( Like a router ), Any request sent by the client will pass through the router , That is, the router will record all network transmission data , Then it is sent to the server by the router , The router is like a middleware , So data is easy to be stolen by middleware , This is why interface encryption is needed .
HTTPS The encrypted
Before the official transmission of data , The client side and the server side should make a 【 encryption 】 The process of .
HTTPS Although it ensures some security of data in the transmission process , But it may still be caught , because https Between encryption and network proxy and server , client ----》 Network proxy -----(HTTPS encryption )-----》 The server , The network agent can still see the data sent by the client .
Suitable for the project of interface encryption : Bank 、 payment 、 Finance and other projects involving money
client / Server side encryption
Symmetric encryption : Encryption and decryption use the same key
cryptography : Caesar code ( Exchange passwords 、 Replace password )
eg: Plaintext (abc) -----( encryption algorithm + secret key )------ Ciphertext (def)
encryption algorithm : Namely Alphabet offset 【 Encryption logic 】
secret key : Offset - Right
Testers ---- Call symmetric encryption interface 【 Need to know 1、 encryption algorithm ,2、 secret key 】
Asymmetric encryption : Different keys for encryption and decryption
Use public key encryption , Decrypt with private key
Asymmetric encryption 【 Little games 】
【 client 】---- Enter a 3 The number of digits 【 Plaintext 】
encryption : Algorithm ( Mathematical operations of addition, subtraction, multiplication and division )
secret key ( multiply 91)
To transmit data :—426
【 Server side 】 — Analysis results 【686】
Decrypt : Algorithm algorithm ( Mathematical operations of addition, subtraction, multiplication and division )
secret key ( multiply 11), after 3 Bit is the decrypted data
Encryption interface Test complexity
Symmetric encryption requires understanding 【 Algorithm 、 secret key 】
Asymmetric encryption requires understanding 【 Algorithm 、 Public key 、 Private key 】
Test the operation of interface encryption at work :
1、 Develop and generate encrypted data , export .
shortcoming : Data generated in advance , The test scenario covers less
2、 Encrypt and decrypt through code — Testers can write , Developers can also )
- Development provides code snippets 【 Encryption and decryption code 】 — jmeter To carry out
- Development provides execution tools ---- Execute directly by command , Generate encrypted data
边栏推荐
- 微信小程序 27 进度条的动态实现和搜索框、热搜榜的静态搭建
- Wechat campus maintenance application applet graduation design finished product of applet completion work (3) background function
- Wechat campus maintenance application applet graduation design finished product of applet completion work (8) graduation design thesis template
- 基于PHP的中非南南合作信息交流平台网站建设
- Juzhi cloud computing opens a new era to the "proprietary cloud" of Youfu network
- Day7:有序二叉树(二叉搜索树)
- 小程序毕设作品之微信校园维修报修小程序毕业设计成品(2)小程序功能
- 相机内参矩阵K和fov的相互转换
- leetcode刷题:动态规划07(不同的二叉搜索树)
- 高效生成接口文档好方法
猜你喜欢

Wechat campus maintenance application applet graduation design finished product of applet completion work (8) graduation design thesis template

Is there a "fingerprint" in the structure of AAAI 2022 | Gan? Generating network structure from forged image traceability

Use of swift basic codable (jsonencoder jsondecoder)

Scala基础【集合01】

安全基础4 ---正则表达式

Pymoo learning (5): convergence analysis

Hongke shares | how to solve blackmail software security vulnerabilities

Modelsim and quartus jointly simulate PLL FIFO and other IP cores

FPGA based 1080p 60Hz bt1120 interface debugging process record

How to analyze qiime2 after obtaining picrust2 results
随机推荐
Illegal mix of collations for operation ‘UNION‘(bug记录)
Flutter 小技巧之优化你使用的 BuildContext
Sccm2012r2 network deployment reinstallation system
Imperial cms7.5 imitation "question and answer library" question and answer learning platform website source code with mobile version
Telnet installation and telnet (correct password) cannot log in!
微信小程序10-微搭模板
Wechat campus maintenance and repair applet graduation design finished product of applet completion work (4) opening report
国内常见php的CMS建站系统情况分析
聊聊接口性能优化的11个小技巧
一个函数中写多少行代码比较合适呢? 代码整洁之道
Juzhi cloud computing opens a new era to the "proprietary cloud" of Youfu network
Global configuration and page configuration of wechat applet development
英诚医院内部网络规划与设计
Wechat campus maintenance and repair application applet graduation design finished product of applet completion work (6) opening defense ppt
安全基础4 ---正则表达式
高并发下如何保证数据库和缓存双写一致性?
How to ensure the consistency of double write between database and cache?
微信小程序 26 播放音乐页的完善②
Selenium 设置元素等待的三种方式详解
485 current acquisition module dam-8041