Enviar búsqueda
Cargar
PHP7.2와 모던 암호학
•
2 recomendaciones
•
1,767 vistas
Johney Park
Seguir
모던 암호학의 이슈와 PHP7.2에 추가된 Libsodium에 대한 설명
Leer menos
Leer más
Ingeniería
Denunciar
Compartir
Denunciar
Compartir
1 de 20
Descargar ahora
Descargar para leer sin conexión
Recomendados
Python Cryptography & Security
Python Cryptography & Security
Jose Manuel Ortega Candel
FIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure Enclave
wolfSSL
Marco Balduzzi - Cyber-crime and attacks in the dark side of the web - Codemo...
Marco Balduzzi - Cyber-crime and attacks in the dark side of the web - Codemo...
Codemotion
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
PROIDEA
My Bro The ELK
My Bro The ELK
Tripwire
wolfSSL and TLS 1.3
wolfSSL and TLS 1.3
wolfSSL
Workshop on Wireless Security
Workshop on Wireless Security
amiable_indian
InfoSec World 2016 – RFIDiggity – Pentester Guide to Hacking HF/NFC and UHF...
InfoSec World 2016 – RFIDiggity – Pentester Guide to Hacking HF/NFC and UHF...
Bishop Fox
Recomendados
Python Cryptography & Security
Python Cryptography & Security
Jose Manuel Ortega Candel
FIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure Enclave
wolfSSL
Marco Balduzzi - Cyber-crime and attacks in the dark side of the web - Codemo...
Marco Balduzzi - Cyber-crime and attacks in the dark side of the web - Codemo...
Codemotion
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
PROIDEA
My Bro The ELK
My Bro The ELK
Tripwire
wolfSSL and TLS 1.3
wolfSSL and TLS 1.3
wolfSSL
Workshop on Wireless Security
Workshop on Wireless Security
amiable_indian
InfoSec World 2016 – RFIDiggity – Pentester Guide to Hacking HF/NFC and UHF...
InfoSec World 2016 – RFIDiggity – Pentester Guide to Hacking HF/NFC and UHF...
Bishop Fox
2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux
Jason Murray
osint + python: extracting information from tor network and darkweb
osint + python: extracting information from tor network and darkweb
Jose Manuel Ortega Candel
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Lane Huff
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]
RootedCON
Fileextraction with suricata
Fileextraction with suricata
MrArora Arjuna
Hacking the Gateways
Hacking the Gateways
Onur Alanbel
Proofpoint Emerging Threats Suricata 5.0 Webinar
Proofpoint Emerging Threats Suricata 5.0 Webinar
Jason Williams
Dario Durando - IoT: Battle of Bots [rooted2018]
Dario Durando - IoT: Battle of Bots [rooted2018]
RootedCON
Kasza smashing the_jars
Kasza smashing the_jars
PacSecJP
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
Felipe Prado
[CB19] CIRCO: Cisco Implant Raspberry Controlled Operations by Emilio Couto
[CB19] CIRCO: Cisco Implant Raspberry Controlled Operations by Emilio Couto
CODE BLUE
BalCCon2k18 - Towards the perfect cryptocurrency wallet
BalCCon2k18 - Towards the perfect cryptocurrency wallet
Nemanja Nikodijević
DDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environment
Pavel Odintsov
RFID Hacking: Live Free or RFID Hard
RFID Hacking: Live Free or RFID Hard
Bishop Fox
The day I ruled the world (RootedCON 2020)
The day I ruled the world (RootedCON 2020)
Javier Junquera
proxy2: HTTPS pins and needles
proxy2: HTTPS pins and needles
inaz2
FastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection tool
Pavel Odintsov
Penetration Testing Boot CAMP
Penetration Testing Boot CAMP
Shaikh Jamal Uddin l CISM, QRadar, Hack Card Recovery Expert
Pyongyang Fortress
Pyongyang Fortress
Mayank Dhiman
Kali Linux - Falconer
Kali Linux - Falconer
Tony Godfrey
解密解密
解密解密
Tom Chen
Phpstormを使いこなす
Phpstormを使いこなす
Yutaka Tachibana
Más contenido relacionado
La actualidad más candente
2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux
Jason Murray
osint + python: extracting information from tor network and darkweb
osint + python: extracting information from tor network and darkweb
Jose Manuel Ortega Candel
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Lane Huff
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]
RootedCON
Fileextraction with suricata
Fileextraction with suricata
MrArora Arjuna
Hacking the Gateways
Hacking the Gateways
Onur Alanbel
Proofpoint Emerging Threats Suricata 5.0 Webinar
Proofpoint Emerging Threats Suricata 5.0 Webinar
Jason Williams
Dario Durando - IoT: Battle of Bots [rooted2018]
Dario Durando - IoT: Battle of Bots [rooted2018]
RootedCON
Kasza smashing the_jars
Kasza smashing the_jars
PacSecJP
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
Felipe Prado
[CB19] CIRCO: Cisco Implant Raspberry Controlled Operations by Emilio Couto
[CB19] CIRCO: Cisco Implant Raspberry Controlled Operations by Emilio Couto
CODE BLUE
BalCCon2k18 - Towards the perfect cryptocurrency wallet
BalCCon2k18 - Towards the perfect cryptocurrency wallet
Nemanja Nikodijević
DDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environment
Pavel Odintsov
RFID Hacking: Live Free or RFID Hard
RFID Hacking: Live Free or RFID Hard
Bishop Fox
The day I ruled the world (RootedCON 2020)
The day I ruled the world (RootedCON 2020)
Javier Junquera
proxy2: HTTPS pins and needles
proxy2: HTTPS pins and needles
inaz2
FastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection tool
Pavel Odintsov
Penetration Testing Boot CAMP
Penetration Testing Boot CAMP
Shaikh Jamal Uddin l CISM, QRadar, Hack Card Recovery Expert
Pyongyang Fortress
Pyongyang Fortress
Mayank Dhiman
Kali Linux - Falconer
Kali Linux - Falconer
Tony Godfrey
La actualidad más candente
(20)
2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux
osint + python: extracting information from tor network and darkweb
osint + python: extracting information from tor network and darkweb
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]
Fileextraction with suricata
Fileextraction with suricata
Hacking the Gateways
Hacking the Gateways
Proofpoint Emerging Threats Suricata 5.0 Webinar
Proofpoint Emerging Threats Suricata 5.0 Webinar
Dario Durando - IoT: Battle of Bots [rooted2018]
Dario Durando - IoT: Battle of Bots [rooted2018]
Kasza smashing the_jars
Kasza smashing the_jars
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
[CB19] CIRCO: Cisco Implant Raspberry Controlled Operations by Emilio Couto
[CB19] CIRCO: Cisco Implant Raspberry Controlled Operations by Emilio Couto
BalCCon2k18 - Towards the perfect cryptocurrency wallet
BalCCon2k18 - Towards the perfect cryptocurrency wallet
DDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environment
RFID Hacking: Live Free or RFID Hard
RFID Hacking: Live Free or RFID Hard
The day I ruled the world (RootedCON 2020)
The day I ruled the world (RootedCON 2020)
proxy2: HTTPS pins and needles
proxy2: HTTPS pins and needles
FastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection tool
Penetration Testing Boot CAMP
Penetration Testing Boot CAMP
Pyongyang Fortress
Pyongyang Fortress
Kali Linux - Falconer
Kali Linux - Falconer
Similar a PHP7.2와 모던 암호학
解密解密
解密解密
Tom Chen
Phpstormを使いこなす
Phpstormを使いこなす
Yutaka Tachibana
WebRTC と Native とそれから、それから。
WebRTC と Native とそれから、それから。
tnoho
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
OpenNebula Project
OpenNebulaConf 2019 - Crytek: A Video gaming Edge Implementation "on the shou...
OpenNebulaConf 2019 - Crytek: A Video gaming Edge Implementation "on the shou...
Dmytro Korzhevin
Advanced SOHO Router Exploitation XCON
Advanced SOHO Router Exploitation XCON
Lyon Yang
Virus Bulletin 2018: Lazarus Group a mahjong game played with different sets ...
Virus Bulletin 2018: Lazarus Group a mahjong game played with different sets ...
Peter Kálnai
Advances in Open Source Password Cracking
Advances in Open Source Password Cracking
n|u - The Open Security Community
Cryto Party at CCU
Cryto Party at CCU
Jose L. Quiñones-Borrero
A 5 security x line platform
A 5 security x line platform
LINE Corporation
DEF CON 27 - HUBER AND ROSKOSCH - im on your phone listening attacking voip c...
DEF CON 27 - HUBER AND ROSKOSCH - im on your phone listening attacking voip c...
Felipe Prado
OSINT tools for security auditing [FOSDEM edition]
OSINT tools for security auditing [FOSDEM edition]
Jose Manuel Ortega Candel
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
CODE BLUE
Django cryptography
Django cryptography
Erik LaBianca
2016 JavaOne Deconstructing REST Security
2016 JavaOne Deconstructing REST Security
David Blevins
Common crypto attacks and secure implementations
Common crypto attacks and secure implementations
Trupti Shiralkar, CISSP
Cryptography for Absolute Beginners (May 2019)
Cryptography for Absolute Beginners (May 2019)
Svetlin Nakov
Using Cryptography Properly in Applications
Using Cryptography Properly in Applications
Great Wide Open
2018 ecuador deconstruyendo y evolucionando la seguridad en servicios rest
2018 ecuador deconstruyendo y evolucionando la seguridad en servicios rest
César Hernández
Kernel Security for 2.8 - Kernel Summit 2004
Kernel Security for 2.8 - Kernel Summit 2004
James Morris
Similar a PHP7.2와 모던 암호학
(20)
解密解密
解密解密
Phpstormを使いこなす
Phpstormを使いこなす
WebRTC と Native とそれから、それから。
WebRTC と Native とそれから、それから。
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
OpenNebulaConf 2019 - Crytek: A Video gaming Edge Implementation "on the shou...
OpenNebulaConf 2019 - Crytek: A Video gaming Edge Implementation "on the shou...
Advanced SOHO Router Exploitation XCON
Advanced SOHO Router Exploitation XCON
Virus Bulletin 2018: Lazarus Group a mahjong game played with different sets ...
Virus Bulletin 2018: Lazarus Group a mahjong game played with different sets ...
Advances in Open Source Password Cracking
Advances in Open Source Password Cracking
Cryto Party at CCU
Cryto Party at CCU
A 5 security x line platform
A 5 security x line platform
DEF CON 27 - HUBER AND ROSKOSCH - im on your phone listening attacking voip c...
DEF CON 27 - HUBER AND ROSKOSCH - im on your phone listening attacking voip c...
OSINT tools for security auditing [FOSDEM edition]
OSINT tools for security auditing [FOSDEM edition]
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
Django cryptography
Django cryptography
2016 JavaOne Deconstructing REST Security
2016 JavaOne Deconstructing REST Security
Common crypto attacks and secure implementations
Common crypto attacks and secure implementations
Cryptography for Absolute Beginners (May 2019)
Cryptography for Absolute Beginners (May 2019)
Using Cryptography Properly in Applications
Using Cryptography Properly in Applications
2018 ecuador deconstruyendo y evolucionando la seguridad en servicios rest
2018 ecuador deconstruyendo y evolucionando la seguridad en servicios rest
Kernel Security for 2.8 - Kernel Summit 2004
Kernel Security for 2.8 - Kernel Summit 2004
Último
Online electricity billing project report..pdf
Online electricity billing project report..pdf
Kamal Acharya
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
vanyagupta248
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
Morshed Ahmed Rahath
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
soginsider
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Omar Fathy
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
DineshKumar4165
Hostel management system project report..pdf
Hostel management system project report..pdf
Kamal Acharya
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
Magic Marks
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
MairaAshraf6
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
BhangaleSonal
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
NANDHAKUMARA10
Employee leave management system project.
Employee leave management system project.
Kamal Acharya
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
RAJNEESHKUMAR341697
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Call Girls Mumbai
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
maisarahman1
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
bhaskargani46
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
meghakumariji156
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
Último
(20)
Online electricity billing project report..pdf
Online electricity billing project report..pdf
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
Hostel management system project report..pdf
Hostel management system project report..pdf
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
Employee leave management system project.
Employee leave management system project.
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
PHP7.2와 모던 암호학
1.
PHP7.2 Johney Park
2.
Use Libsodium TL; DR
3.
? ?
4.
Side Channel Attack •
, ( ) ? • , , , , , , ? • Meltdown, Spectre • Large Prime Number
5.
Elliptic Curve Cryptography • •
RSA 3072bit = ECC 256bit • key • • Side Channel Attack
6.
Authenticated Encryption • Message
Authentication Code • • (nonce) •
7.
Post-Quantum Cryptography • •
8.
PHP 7.2 ? Libsodium
& Argon2
9.
Libsodium • NaCl(salt) (2008-2010) •
Networking and cryptography library, high-speed software library for network communication, encryption, decryption, signature, etc. • US EU Funding • C(with inline assembler), C++, Python Wrapper • Libsodium NaCl Cross-Platform (2013) • • 2017 PHP7.2
10.
Argon2 • Side Channel
Attack Hash Algorithm • 2015 • password_hash Libsodium , Libsodium password_hash BCRYPT . ( 7.2 ) • password_hash Libsodium • Libsodium • hash
11.
Argon2 $password = 'secret
password'; $hash = password_hash($password, PASSWORD_ARGON2I); echo $hash . PHP_EOL; if (password_verify($password, $hash)) { echo 'valid password' . PHP_EOL; if(password_needs_rehash($hash, PASSWORD_ARGON2I)) { echo 'save new password hash' . PHP_EOL; } } else { echo 'invalid password!' . PHP_EOL; } $argon2i$v=19$m=1024,t=2,p=2$RWRRb01PMnRETU8zMXNrag$/ BKnBpq0Yl82OsimPaNn/SlnAuaGsYWi3H95bfZKFSc valid password
12.
Argon2 $password = 'secret
password'; $hash = sodium_crypto_pwhash_str( $password, SODIUM_CRYPTO_PWHASH_OPSLIMIT_INTERACTIVE, SODIUM_CRYPTO_PWHASH_MEMLIMIT_INTERACTIVE ); echo $hash . PHP_EOL; if (sodium_crypto_pwhash_str_verify($hash, $password)) { sodium_memzero($password); echo 'valid password' . PHP_EOL; if (sodium_crypto_pwhash_str_needs_rehash($hash, SODIUM_CRYPTO_PWHASH_OPSLIMIT_INTERACTIVE, SODIUM_CRYPTO_PWHASH_MEMLIMIT_INTERACTIVE)) { echo 'save new password hash' . PHP_EOL; } } else { sodium_memzero($password); echo 'invalid password!' . PHP_EOL; } $argon2id$v=19$m=65536,t=2,p=1$zYnVgQGMf+YpTKZzTvqv2g$XHM3XJpOOgeQvibBX9fY4OB 6CA06aJVcsF+DmMFOMtc valid password
13.
Hash • Rainbow table
, Collision Attack • Libsodium generic hash BLAKE2b • short hash SipHash-2-4 • Libsodium • PHP hash MD5 SHA-1 . SHA-256 SHA-512
14.
Hash $hash = sodium_bin2hex(sodium_crypto_generichash('message')); echo
$hash . PHP_EOL; 2e7836cc18ab1db2a2e239ebf4043772b3359520198b5fd55443b01a1023a5b0 $key = random_bytes(SODIUM_CRYPTO_SHORTHASH_KEYBYTES); $hash = sodium_bin2hex(sodium_crypto_shorthash('message', $key)); echo $hash . PHP_EOL; 7b02d09fb8bd2289 $hash = hash('sha256', 'message'); echo $hash . PHP_EOL; ab530a13e45914982b79f9b7e3fba994cfd1f3fb22f71cea1afbf02b460c6d1d
15.
Secret Key • XSalsa20 •
Poly1305 MAC • nonce • AEAD AEAD . ( ..)
16.
Secret Key $nonce =
random_bytes(SODIUM_CRYPTO_SECRETBOX_NONCEBYTES); $key = random_bytes(SODIUM_CRYPTO_SECRETBOX_KEYBYTES); $message = 'secret message'; $cipher_text = sodium_bin2hex(sodium_crypto_secretbox($message, $nonce, $key)); sodium_memzero($message); echo $cipher_text . PHP_EOL; 9bb7d572868a8ddb773398fd107b3ccbf8f6dd010809bb1f76008a4a2abc $plain_text = sodium_crypto_secretbox_open(sodium_hex2bin($cipher_text), $nonce, $key); echo $plain_text . PHP_EOL; secret message
17.
Public Key • X25519
XSalsa20 • Poly1305 MAC
18.
Public Key $key_pair =
sodium_crypto_box_keypair(); $public_key = sodium_crypto_box_publickey($key_pair); $message = 'secret message'; $cipher_text = sodium_bin2hex(sodium_crypto_box_seal($message, $public_key)); sodium_memzero($message); echo $cipher_text . PHP_EOL; 03fb2a60f2dbbe74c5f5eb2a9d13ea6a58c44badd2aa0963ff096c5b344bc5358a724badf814fa22c5566d 8b36867ddbf9ceb4fccbb77a3f303a037429ea $plain_text = sodium_crypto_box_seal_open(sodium_hex2bin($cipher_text), $key_pair); echo $plain_text . PHP_EOL; secret message
19.
Libsodium 7.1
20.
Reference • Official site https://www.gitbook.com/book/jedisct1/ libsodium/details •
Paragon IE https://paragonie.com/book/pecl- libsodium
Descargar ahora