Home Common Problem What are the conventional encryption algorithms?

What are the conventional encryption algorithms?

Oct 22, 2019 am 09:56 AM
Encryption Algorithm

What are the conventional encryption algorithms?

In the field of data encryption and decryption, algorithms are divided into two types: symmetric keys and asymmetric keys. Due to their respective characteristics, symmetric keys and asymmetric keys are used in different fields. Symmetric key encryption algorithms are generally used to encrypt overall data due to their fast speed, while asymmetric key encryption algorithms have good security performance and are widely used in the field of digital signatures.

DES Encryption Algorithm

DES encryption algorithm is a block cipher that encrypts data in 64-bit blocks. Its key length is 56 bits. Encryption and decryption Use the same algorithm. The DES encryption algorithm keeps the key secret, and the public algorithm includes encryption and decryption algorithms. In this way, only someone who has the same key as the sender can decipher the ciphertext data encrypted by the DES encryption algorithm. Therefore, deciphering the DES encryption algorithm is actually a search for the encoding of the key. For a 56-bit key, if the exhaustive method is used to search, the number of operations is 256.

With the continuous development of computer system capabilities, the security of DES will be much weaker than when it first appeared. However, based on the actual non-critical nature, it can still be considered sufficient. However, DES is now only used for authentication on older systems, and is more often used for new encryption standards.

AES encryption algorithm

http://blog.csdn.net/yhhwatl/article/details/52523739

AES encryption algorithm is cryptography The advanced encryption standard in the encryption algorithm uses a symmetric block cipher system. The minimum supported key lengths are 128, 192, and 256, and the block length is 128 bits. The algorithm should be easy to implement on various hardware and software. This encryption algorithm is the block encryption standard adopted by the U.S. federal government. This standard is used to replace the original DES. It has been analyzed by many parties and is widely used around the world.

The AES encryption algorithm is designed to support 128/192/256 bits (/32=nb) data block size (i.e. packet length); supports 128/192/256 bits (/32=nk) password length, , in decimal notation, corresponds to 34×1038, 62×1057, and 1.1×1077 keys.

Related recommendations: "php introductory tutorial"

RSA encryption algorithm

http://blog.csdn.net /yhhwatl/article/details/52523377

The RSA encryption algorithm is the most influential public key encryption algorithm at present, and is generally considered to be one of the best public key schemes at present. RSA is the first algorithm that can be used for both encryption and digital signatures. It is resistant to all cryptographic attacks known so far and has been recommended by ISO as a public key data encryption standard. The RSA encryption algorithm is based on a very simple fact of number theory: it is very easy to multiply two large prime numbers, but then it is extremely difficult to factor their product, so the product can be exposed as an encryption key.

Base64 encryption algorithm

http://www.cnblogs.com/chengmo/archive/2014/05/18/3735917.html

The Base64 encryption algorithm is one of the most common encoding methods used to transmit 8-bit byte codes on the Internet. Base64 encoding can be used to transmit long identification information in an HTTP environment. For example, in the JAVAPERSISTENCE system HIBEMATE, Base64 is used to encode a long unique identifier into a string for use as parameters in HTTP forms and HTTP GETURL. In other applications, it is often necessary to encode binary data into a form suitable for placement in a URL (including hidden form fields). At this time, using Base64 encoding is not only shorter, but also unreadable, that is, the encoded data will not be directly visible to the naked eye.

MD5 encryption algorithm

http://libin52008.blog.163.com/blog/static/105327187201186981459/

MD5 is in the field of computer security A hash function widely used to provide message integrity protection. A brief description of the MD5 encryption algorithm can be as follows: MD5 uses 512-bit groups to process input information, and each group is divided into 16 32-bit sub-groups. After a series of processing, the output of the algorithm consists of four 32-bit sub-groups. Composed of bit groups, concatenating these four 32-bit groups will generate a 128-bit hash value.

MD5 is widely used for password authentication and key identification in various software. MD5 uses a hash function, and its typical application is to generate a message digest for a piece of information to prevent it from being tampered with. A typical application of MD5 is to generate a fingerprint for a message to prevent it from being "tampered with." If there is a third-party certification agency, using MD5 can also prevent "repudiation" of the file author. This is the so-called digital signature application. MD5 is also widely used for login authentication of operating systems, such as UNIX, various BSD system login passwords, digital signatures, and many other aspects.

SHA1 encryption algorithm

http://blog.chinaunix.net/uid-23261009-id-2465868.html

SHA1 is the same as MD5 The same popular message digest algorithm. The SHA encryption algorithm mimics the MD4 encryption algorithm. SHA1 is designed for use with the Digital Signature Algorithm (DSA).

SHA1 is mainly applicable to the digital signature algorithm defined in the digital signature standard. For messages less than 2"64 bits in length, SHA1 will produce a 160-bit message digest. When the message is received, this message digest can be used to verify the integrity of the data. During transmission, the data is likely to be changes, then different message digests will be generated at this time. SHA1 cannot restore information from the message digest, and two different messages will not produce the same message digest. In this way, SHA1 can verify the integrity of the data, so SHA1 is a technology designed to ensure file integrity.

The SHA1 encryption algorithm can take no more than 264 bits of data input and produce a 160-bit digest. The input is divided into 512-bit chunks and processed individually. The 160-bit buffer is used to save the intermediate and final results of the hash function. The buffer can be represented by five 32-bit registers (A, B, C, D, and E). SHA1 is a more secure algorithm than MD5 , in theory, any digital verification algorithm that adopts the "message digest" method will have a "collision" - that is, the message digest calculated by two different things is the same, as is the case with the interoperable cheating graph. But an algorithm with high security needs to It is difficult to find the "collision" of specified data, and it is even more difficult to calculate the "collision" using formulas - so far, only MD5 has been cracked among the general security algorithms.

XXXTEA Encryption Algorithm

"The Tiny Encryption Algorithm (TEA) and its related variants (XTEA, Block TEA, XXTEA) are block cipher algorithms that are easy to describe and simple to implement (typically a few lines of code).

The TEA algorithm was originally designed in 1994 by David Wheeler and Roger Needham at the Cambridge Computer Laboratory. The algorithm uses a 128-bit key to encrypt a block of information with a 64-bit key, and it requires 64 iterations. The algorithm uses a mysterious constant δ as a multiple, which is derived from the golden ratio to ensure that each round of encryption is different. But the precise value of δ does not seem to be important. Here TEA defines it as δ = "(√5 - 1)231" (that is, 0×9E3779B9 in the program). ”

https://zh.wikipedia.org/wiki/Micro Encryption Algorithm

http://www.waitingfy.com/archives/1157?utm_source=tuicool&utm_medium=referral

Encryption algorithms are the core of cryptographic technology. The above encryption algorithms are commonly used encryption algorithms. Some of these algorithms have been deciphered, some are not secure, some have unknown strengths, some need further analysis, and some require in-depth analysis. Research, and new members will join the mysterious world of encryption algorithms, looking forward to the birth of more secure algorithms.

The above is the detailed content of What are the conventional encryption algorithms?. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

High-speed encryption algorithm and its application in PHP High-speed encryption algorithm and its application in PHP Jun 23, 2023 am 10:42 AM

With the continuous development of network technology, Web applications are becoming more and more popular, and information security in Web applications is becoming increasingly important. In order to solve the problem of information security in Web applications, people have developed many encryption algorithms, the most famous of which are RSA, DES and other algorithms. However, since decryption of encryption algorithms requires a lot of calculations and time, which will bring a large system burden, a type of encryption algorithm that can quickly encrypt and decrypt in a short time has emerged, which is a high-speed encryption algorithm. This article will introduce high-level functions in PHP

How to do symmetric and asymmetric encryption in PHP? How to do symmetric and asymmetric encryption in PHP? May 21, 2023 pm 03:10 PM

In the field of network security, encryption technology is a very important technical means that can encrypt and decrypt data to ensure data security. As a popular server-side programming language, PHP also provides support for symmetric and asymmetric encryption to meet the needs of different application scenarios. Symmetric encryption Symmetric encryption refers to an encryption method that uses the same key for encryption and decryption. There are many symmetric encryption algorithms, such as DES, 3DES, AES, etc. In PHP, this can be achieved using the functions provided by the mcrypt extension library

How to write RSA encryption algorithm using Python? How to write RSA encryption algorithm using Python? Sep 20, 2023 pm 01:21 PM

How to write RSA encryption algorithm using Python? Introduction: RSA is an asymmetric encryption algorithm that is widely used in the field of information security. In modern communications, the RSA encryption algorithm is commonly used to encrypt and decrypt sensitive data. This article will introduce how to use Python to write the RSA encryption algorithm and provide specific code examples. Install the Python library Before you start writing the RSA encryption algorithm, you need to install the Python encryption library. It can be installed using the following command: pipinstallrsa generate

What are the php encryption algorithms? What are the php encryption algorithms? Aug 31, 2023 pm 05:24 PM

PHP encryption algorithms include MD5 algorithm, SHA algorithm, AES algorithm, RSA algorithm, Base64 encoding, DES algorithm, RC4 algorithm, Blowfish algorithm, etc. Detailed introduction: 1. MD5 algorithm, used to convert data of any length into a fixed-length hash value. In PHP, you can use the md5() function to calculate the MD5 hash value of a string; 2. SHA algorithm, including SHA -1. SHA-256, SHA-512, etc. These algorithms have corresponding functions in PHP; 3. AES algorithm, etc.

How to use encryption algorithm to protect user data of PHP website? How to use encryption algorithm to protect user data of PHP website? Aug 19, 2023 pm 04:00 PM

How to use encryption algorithm to protect user data of PHP website? With the rapid development of the Internet, user data protection of websites has become more and more important. In PHP development, we can use encryption algorithms to protect the security of user data. This article will introduce some commonly used encryption algorithms and how to use them in PHP websites to encrypt user data. 1. Selection of encryption algorithms For PHP websites, we can choose the following commonly used encryption algorithms to protect the security of user data: 1. Symmetric encryption algorithm: This algorithm uses the same encryption algorithm.

The development history of network security technology The development history of network security technology Jun 11, 2023 pm 03:41 PM

With the vigorous development of Internet technology, network security has become one of the important factors in the development of global informatization today. With the continuous occurrence of cyber attacks and cyber crimes, protecting network security has become an inevitable choice for us. This article will focus on the development history of network security technology. 1. Cryptozoology Era (1960s-1980s) Network security technology in the cryptography era was mainly developed based on cryptographic ideas. During this period, the computer was just a huge machine, and the use of the Internet was not as widespread as it is now, so limited

What are the commonly used encryption algorithms in PHP? What are the commonly used encryption algorithms in PHP? May 12, 2023 pm 06:51 PM

With the development of the Internet, data security has become a serious issue that we must pay attention to in our daily work. Encryption becomes especially important when it comes to sensitive personal information or business data. In PHP development, some encryption algorithms are widely used. Let's take a look at the encryption algorithms commonly used in PHP. 1. Base64 encoding Base64 encoding is often used to transmit binary data in web pages or emails, because web pages or emails can only transmit string type data and cannot directly transmit binary data. Base64 is a solution

Encryption and decryption in PHP Encryption and decryption in PHP May 26, 2023 pm 12:51 PM

In web development, security has always been one of the most important issues. Risks such as key leakage, data tampering and theft are always present, so protecting data security is particularly important. In order to ensure data security, we usually use encryption and decryption for data processing. In PHP, encryption and decryption are also very important parts. 1. Encryption methods in PHP In PHP, there are many encryption methods. Below we will introduce several commonly used encryption methods. md5 encryption md5 is a commonly used encryption method. it