当前位置:网站首页>On interface encryption
On interface encryption
2022-07-25 19:29:00 【Shining umbrella】
1、 The importance of interface encryption
The difference between encryption and non encryption :
When the client interacts with the server , For example, login operation , Open the debug window , After entering the user name and password, click login , You can see the login interface we call , In the return data of the interface , You can see that the login user name and password are displayed in clear text , It indicates that the interface does not perform encryption .
If a login interface is encrypted , Then we use it directly in the interface tool user name 、 Login with password cannot succeed , Even if your username and password are correct , He will still prompt that your user name and password are incorrect .
Importance :
The client and server transmit data through the network , We need to be online when logging into a website ( Like a router ), Any request sent by the client will pass through the router , That is, the router will record all network transmission data , Then it is sent to the server by the router , The router is like a middleware , So data is easy to be stolen by middleware , This is why interface encryption is needed .
HTTPS The encrypted
Before the official transmission of data , The client side and the server side should make a 【 encryption 】 The process of .
HTTPS Although it ensures some security of data in the transmission process , But it may still be caught , because https Between encryption and network proxy and server , client ----》 Network proxy -----(HTTPS encryption )-----》 The server , The network agent can still see the data sent by the client .
Suitable for the project of interface encryption : Bank 、 payment 、 Finance and other projects involving money
client / Server side encryption
Symmetric encryption : Encryption and decryption use the same key
cryptography : Caesar code ( Exchange passwords 、 Replace password )
eg: Plaintext (abc) -----( encryption algorithm + secret key )------ Ciphertext (def)
encryption algorithm : Namely Alphabet offset 【 Encryption logic 】
secret key : Offset - Right
Testers ---- Call symmetric encryption interface 【 Need to know 1、 encryption algorithm ,2、 secret key 】
Asymmetric encryption : Different keys for encryption and decryption
Use public key encryption , Decrypt with private key
Asymmetric encryption 【 Little games 】
【 client 】---- Enter a 3 The number of digits 【 Plaintext 】
encryption : Algorithm ( Mathematical operations of addition, subtraction, multiplication and division )
secret key ( multiply 91)
To transmit data :—426
【 Server side 】 — Analysis results 【686】
Decrypt : Algorithm algorithm ( Mathematical operations of addition, subtraction, multiplication and division )
secret key ( multiply 11), after 3 Bit is the decrypted data
Encryption interface Test complexity
Symmetric encryption requires understanding 【 Algorithm 、 secret key 】
Asymmetric encryption requires understanding 【 Algorithm 、 Public key 、 Private key 】
Test the operation of interface encryption at work :
1、 Develop and generate encrypted data , export .
shortcoming : Data generated in advance , The test scenario covers less
2、 Encrypt and decrypt through code — Testers can write , Developers can also )
- Development provides code snippets 【 Encryption and decryption code 】 — jmeter To carry out
- Development provides execution tools ---- Execute directly by command , Generate encrypted data
边栏推荐
- GBASE 8s UDR内存管理_02_mi_dalloc
- How to ensure the consistency of double write between database and cache?
- Hongmeng - Damiao computing Sketchpad - VIDEO
- Flutter 小技巧之优化你使用的 BuildContext
- Wechat campus maintenance and repair application applet graduation design finished product of applet completion work (6) opening defense ppt
- 【HDLBits 刷题】Verilog Language(3)Modules: Hierarchy 部分
- 鸿蒙-大喵计算画板-视频
- [applet development] common components and basic usage details
- FPGA based 1080p 60Hz bt1120 interface debugging process record
- 某公司网络设计与规划
猜你喜欢

微信小程序开发之WXSS模板样式与WXS脚本语言

Hongmeng - Damiao computing Sketchpad - Introduction

ML的编程技巧:

Nezha d1-h test microbench

聊聊sql优化的15个小技巧

Introduction to web security ICMP testing and defense

The second "future Cup" knowledge map championship was officially launched

InTouch advanced alarm (alarm filtering)

Eve - 0day Threat Intelligence
![Scala foundation [set 01]](/img/6b/0f5da7ea923ef3aa436d7af9c4425c.png)
Scala foundation [set 01]
随机推荐
C# 合并集合
ERROR: role “admin“ cannot be dropped because some objects depend on itDETAIL:
前夕 - 0day威胁情报
Openresty Lua resty mlcache multi-level cache
leetcode刷题:动态规划07(不同的二叉搜索树)
SDL text display
Improvement of wechat applet 28 hot search list ①
binarySearch基础二分查找
小程序毕设作品之微信校园维修报修小程序毕业设计成品(5)任务书
Illegal mix of collations for operation ‘UNION‘(bug记录)
Introduction to web security ICMP testing and defense
Code sharing of social chat platform developed by dating website (III)
Actual combat of MySQL database design project of online mall system
相机内参矩阵K和fov的相互转换
基于海思3559 高效率的 0延时 0拷贝 qt播放器方案
Clip can also do segmentation tasks? The University of Gottingen proposed a model clipseg that uses text and image prompt and can do three segmentation tasks at the same time, squeezing out the clip a
基于PHP的中非南南合作信息交流平台网站建设
An idea of solving div adapting to screen
How to be a self disciplined person?
Basic practice of Blue Bridge Cup - shape retrieval of matrix (C language)