[Ginny series] Go-based web background development, encryption and tokens

Encryption and token

Now we come back to discuss business issues, the issue of encryption of sensitive information.

What is sensitive information ? For example, passwords are very sensitive information, while usernames are not that important. The password is very important to an account and is the " key " to obtain other sensitive information .

In the simple interface we wrote before, the password has not been encrypted, all are transmitted in plaintext, which is quite dangerous ! So from now on we begin to encrypt information.

5.1 Symmetric encryption, asymmetric encryption and hashing

Symmetric encryption :

       秘钥
     ------>
信息          密文
     <------

Symmetric encryption, as the name implies, can use a secret key to restore the generated cipher text to the original text through certain rules.

Common symmetric encryption algorithms:

DES、3DES、DESX、Blowfish、IDEA、RC4、RC5、RC6和AES

Asymmetric encryption

Guess you like

Origin blog.csdn.net/weixin_54707168/article/details/114779950