2013年9月23日星期一

Micro-channel safety issues

Today saw: "Micro- letter password cracking Vulnerability Exposure: Micro-letter password will be exposed to an attacker http://news.cnblogs.com/n/188512/" would like to ask how to avoid this situation ? If the attacker control of the user's wireless router , then there is any way to avoid it being intercepted ? Or is that information can not be intercepted ?
------ Solution -------------------------------------- ------

------ Solution ------------------------------------------ -
under normal circumstances , the user name and password are submitted directly , so certainly intercept routing ,
want to keep , you can then control the client and server segments engage in a cryptographic transformation , the user input information, the client will encrypt the information to form a ciphertext , send, and then to the services segment , in the opposite way restore decryption, so that you can achieve a simple encryption
------ For reference only ---------------------------- -----------
top, back trouble master it.
------ For reference only -------------------------------------- -

but this is not safe, because the use of reversible encryption algorithm .
------ For reference only -------------------------------------- -

but this is not safe, because the use of reversible encryption algorithm .  
this is safe, because the encryption algorithm only on the client side , the machine used to submit upload already encrypted string , the intercept is unbreakable . Algorithm is your own definition , reversible encryption algorithm how people would know about it . This is only committed to the services segment , the service client then decrypts in this delivery process is always encrypted , so it is safe . Unless your encryption algorithm is too simple. Personal recommendations complicated. 256-bit encryption , and I see who broke

没有评论:

发表评论