search
HomeCommon ProblemWhat are the conventional encryption algorithms?

What are the conventional encryption algorithms?

In the field of data encryption and decryption, algorithms are divided into two types: symmetric keys and asymmetric keys. Due to their respective characteristics, symmetric keys and asymmetric keys are used in different fields. Symmetric key encryption algorithms are generally used to encrypt overall data due to their fast speed, while asymmetric key encryption algorithms have good security performance and are widely used in the field of digital signatures.

DES Encryption Algorithm

DES encryption algorithm is a block cipher that encrypts data in 64-bit blocks. Its key length is 56 bits. Encryption and decryption Use the same algorithm. The DES encryption algorithm keeps the key secret, and the public algorithm includes encryption and decryption algorithms. In this way, only someone who has the same key as the sender can decipher the ciphertext data encrypted by the DES encryption algorithm. Therefore, deciphering the DES encryption algorithm is actually a search for the encoding of the key. For a 56-bit key, if the exhaustive method is used to search, the number of operations is 256.

With the continuous development of computer system capabilities, the security of DES will be much weaker than when it first appeared. However, based on the actual non-critical nature, it can still be considered sufficient. However, DES is now only used for authentication on older systems, and is more often used for new encryption standards.

AES encryption algorithm

http://blog.csdn.net/yhhwatl/article/details/52523739

AES encryption algorithm is cryptography The advanced encryption standard in the encryption algorithm uses a symmetric block cipher system. The minimum supported key lengths are 128, 192, and 256, and the block length is 128 bits. The algorithm should be easy to implement on various hardware and software. This encryption algorithm is the block encryption standard adopted by the U.S. federal government. This standard is used to replace the original DES. It has been analyzed by many parties and is widely used around the world.

The AES encryption algorithm is designed to support 128/192/256 bits (/32=nb) data block size (i.e. packet length); supports 128/192/256 bits (/32=nk) password length, , in decimal notation, corresponds to 34×1038, 62×1057, and 1.1×1077 keys.

Related recommendations: "php introductory tutorial"

RSA encryption algorithm

http://blog.csdn.net /yhhwatl/article/details/52523377

The RSA encryption algorithm is the most influential public key encryption algorithm at present, and is generally considered to be one of the best public key schemes at present. RSA is the first algorithm that can be used for both encryption and digital signatures. It is resistant to all cryptographic attacks known so far and has been recommended by ISO as a public key data encryption standard. The RSA encryption algorithm is based on a very simple fact of number theory: it is very easy to multiply two large prime numbers, but then it is extremely difficult to factor their product, so the product can be exposed as an encryption key.

Base64 encryption algorithm

http://www.cnblogs.com/chengmo/archive/2014/05/18/3735917.html

The Base64 encryption algorithm is one of the most common encoding methods used to transmit 8-bit byte codes on the Internet. Base64 encoding can be used to transmit long identification information in an HTTP environment. For example, in the JAVAPERSISTENCE system HIBEMATE, Base64 is used to encode a long unique identifier into a string for use as parameters in HTTP forms and HTTP GETURL. In other applications, it is often necessary to encode binary data into a form suitable for placement in a URL (including hidden form fields). At this time, using Base64 encoding is not only shorter, but also unreadable, that is, the encoded data will not be directly visible to the naked eye.

MD5 encryption algorithm

http://libin52008.blog.163.com/blog/static/105327187201186981459/

MD5 is in the field of computer security A hash function widely used to provide message integrity protection. A brief description of the MD5 encryption algorithm can be as follows: MD5 uses 512-bit groups to process input information, and each group is divided into 16 32-bit sub-groups. After a series of processing, the output of the algorithm consists of four 32-bit sub-groups. Composed of bit groups, concatenating these four 32-bit groups will generate a 128-bit hash value.

MD5 is widely used for password authentication and key identification in various software. MD5 uses a hash function, and its typical application is to generate a message digest for a piece of information to prevent it from being tampered with. A typical application of MD5 is to generate a fingerprint for a message to prevent it from being "tampered with." If there is a third-party certification agency, using MD5 can also prevent "repudiation" of the file author. This is the so-called digital signature application. MD5 is also widely used for login authentication of operating systems, such as UNIX, various BSD system login passwords, digital signatures, and many other aspects.

SHA1 encryption algorithm

http://blog.chinaunix.net/uid-23261009-id-2465868.html

SHA1 is the same as MD5 The same popular message digest algorithm. The SHA encryption algorithm mimics the MD4 encryption algorithm. SHA1 is designed for use with the Digital Signature Algorithm (DSA).

SHA1 is mainly applicable to the digital signature algorithm defined in the digital signature standard. For messages less than 2"64 bits in length, SHA1 will produce a 160-bit message digest. When the message is received, this message digest can be used to verify the integrity of the data. During transmission, the data is likely to be changes, then different message digests will be generated at this time. SHA1 cannot restore information from the message digest, and two different messages will not produce the same message digest. In this way, SHA1 can verify the integrity of the data, so SHA1 is a technology designed to ensure file integrity.

The SHA1 encryption algorithm can take no more than 264 bits of data input and produce a 160-bit digest. The input is divided into 512-bit chunks and processed individually. The 160-bit buffer is used to save the intermediate and final results of the hash function. The buffer can be represented by five 32-bit registers (A, B, C, D, and E). SHA1 is a more secure algorithm than MD5 , in theory, any digital verification algorithm that adopts the "message digest" method will have a "collision" - that is, the message digest calculated by two different things is the same, as is the case with the interoperable cheating graph. But an algorithm with high security needs to It is difficult to find the "collision" of specified data, and it is even more difficult to calculate the "collision" using formulas - so far, only MD5 has been cracked among the general security algorithms.

XXXTEA Encryption Algorithm

"The Tiny Encryption Algorithm (TEA) and its related variants (XTEA, Block TEA, XXTEA) are block cipher algorithms that are easy to describe and simple to implement (typically a few lines of code).

The TEA algorithm was originally designed in 1994 by David Wheeler and Roger Needham at the Cambridge Computer Laboratory. The algorithm uses a 128-bit key to encrypt a block of information with a 64-bit key, and it requires 64 iterations. The algorithm uses a mysterious constant δ as a multiple, which is derived from the golden ratio to ensure that each round of encryption is different. But the precise value of δ does not seem to be important. Here TEA defines it as δ = "(√5 - 1)231" (that is, 0×9E3779B9 in the program). ”

https://zh.wikipedia.org/wiki/Micro Encryption Algorithm

http://www.waitingfy.com/archives/1157?utm_source=tuicool&utm_medium=referral

Encryption algorithms are the core of cryptographic technology. The above encryption algorithms are commonly used encryption algorithms. Some of these algorithms have been deciphered, some are not secure, some have unknown strengths, some need further analysis, and some require in-depth analysis. Research, and new members will join the mysterious world of encryption algorithms, looking forward to the birth of more secure algorithms.

The above is the detailed content of What are the conventional encryption algorithms?. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How to make a program always open on a specific monitorHow to make a program always open on a specific monitorJul 24, 2025 am 01:40 AM

Toensureaspecificprogramalwaysopensonaparticularmonitor,firstmanuallymovethewindowoncethroughWindowsDisplaySettings,asmanyappsremembertheirlastposition.Ifthatfails,usethird-partytoolslikeDisplayFusionorWindowManagertocreaterulesforspecificprogramsand

How to fix wifi that has no valid IP configurationHow to fix wifi that has no valid IP configurationJul 24, 2025 am 01:29 AM

"No valid IP configuration" means that the device cannot obtain the correct IP address from the router. The solution is as follows: 1. Restart the computer and router to clear temporary failures; 2. Run ipconfig/release and ipconfig/renew in Windows manually update the IP; 3. Run netshintipreset and netshwinsockreset to reset the TCP/IP protocol stack; 4. Log in to the router to check and enable the DHCP function, and restore the factory settings if necessary; 5. Set DNS to 8.8.8.8 and 8.8.4.4 or use automatic obtain to bypass the default DNS problem.

How to fix error 0x8007007eHow to fix error 0x8007007eJul 24, 2025 am 01:28 AM

The 0x8007007e error can be resolved by the following methods: 1. Run SFC and DISM tools to repair system files; 2. Uninstall conflict drivers or software and try safe mode or clean boot; 3. Reset Windows update components, including stopping services, clearing caches, and restarting services; 4. Repair or update .NETFramework. These steps are usually effective in fixing errors caused by system file corruption, driver conflicts, update component exceptions, or .NET framework issues.

How to fix 'api-ms-win-crt-runtime-l1-1-0.dll is missing'How to fix 'api-ms-win-crt-runtime-l1-1-0.dll is missing'Jul 24, 2025 am 01:26 AM

When you encounter the missing error of "api-ms-win-crt-runtime-l1-1-0.dll", you can use the following steps to solve it: 1. Reinstall or repair the VisualC Redistributable package, go to Microsoft's official website to download the latest version or uninstall it through the control panel and reinstall it; 2. Use the System File Check Tool (SFC) to run the sfc/scannow command in the administrator command prompt to repair the system files; 3. Update the Windows system, install the latest patches through Windows Update or upgrade to a stable version; 4. Install or repair .NETFramework (recommended version 4.8 or above) to solve potential dependency problems. establish

How to transfer software to a new computerHow to transfer software to a new computerJul 24, 2025 am 01:16 AM

When replacing a new computer, software migration can be achieved through the system's own tools or manual operations. First, use the migration assistant (such as the "Migration Assistant" of Windows and the "Migration Assistant" of Mac) to transfer programs, settings and user data in batches. It is necessary to note that connecting to the power supply, turning off the firewall, and some old software may not be able to be migrated; second, manually copying the installation directory and user data folder and importing the registry key (Windows only) is suitable for specific old software, but there is a threshold for novices; finally, some development tools, databases and authorized software are recommended to reinstall directly to ensure compatibility and activation effectiveness.

How to fix 'CHKDSK is not available for RAW drives'How to fix 'CHKDSK is not available for RAW drives'Jul 24, 2025 am 01:01 AM

When you see the error "CHKDSK cannot be used for RAW drives", it means that Windows cannot recognize the file system of the drive, which is usually caused by corruption of the drive or improper format; solutions include: 1. Check and reconnect the drive to other USB ports or computers, and confirm its status through disk management; 2. Use Recuva, EaseUSDataRecoveryWizard and other tools to try to recover data before formatting; 3. Format the drive to NTFS/FAT32/exFAT through disk management or command prompt to fix file system problems, but this operation will clear all data; 4. If Windows built-in tools are invalid, try MiniToolPa

How to get student discounts on softwareHow to get student discounts on softwareJul 24, 2025 am 12:59 AM

Purchasing software for students does save money, the key is to find a platform that supports student discounts and prepare verification materials. Commonly supported student discounts include Adobe CreativeCloud, Microsoft 365, Intuit, JetBrains series, and GitHub StudentDeveloperPack, etc., which are usually offered in half or even lower prices. Verification methods include uploading school email, transcripts, student IDs or passing third-party certification such as UNiDAYS and SheerID. The recommended steps are: 1. Confirm that the email address or ID is available; 2. Visit the student discount page of the official website; 3. Check the FAQ to clarify the conditions before submitting the application; 4. Check whether to choose a student discount before making payment.

How to fix 'The system cannot find the object specified'How to fix 'The system cannot find the object specified'Jul 24, 2025 am 12:55 AM

When the "Thesystemcannotfindtheobjectspecific" error appears, it is usually because the system cannot find the specified object, such as a file, registry key or path. The common solutions are as follows: 1. Check whether the path or command is correct, pay attention to spelling and case, and the path contains spaces and needs to be quoted; 2. Confirm that the target object does exist and check whether the permissions are sufficient; 3. Run relevant operations as an administrator to ensure access permissions; 4. Run sfc/scannow to repair system files or check environment variable configuration.

Hot AI Tools

Undress AI Tool

Undress AI Tool

Undress images for free

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

VSCode Windows 64-bit Download

VSCode Windows 64-bit Download

A free and powerful IDE editor launched by Microsoft

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment