Article Directory
Encryption and token
Now we come back to discuss business issues, the issue of encryption of sensitive information.
What is sensitive information ? For example, passwords are very sensitive information, while usernames are not that important. The password is very important to an account and is the " key " to obtain other sensitive information .
In the simple interface we wrote before, the password has not been encrypted, all are transmitted in plaintext, which is quite dangerous ! So from now on we begin to encrypt information.
5.1 Symmetric encryption, asymmetric encryption and hashing
Symmetric encryption :
秘钥
------>
信息 密文
<------
Symmetric encryption, as the name implies, can use a secret key to restore the generated cipher text to the original text through certain rules.
Common symmetric encryption algorithms:
DES、3DES、DESX、Blowfish、IDEA、RC4、RC5、RC6和AES
Asymmetric encryption