Introduction - If you have any usage issues, please Google them yourself
This article mainly about the current practice of all popular encryption algorithm describes a comprehensive and in-depth analysis, and in line with the relevant test case demonstrates algorithm. In reading this, please read the book, Chapter 2, the theory of knowledge and understanding of the first 3 to 4 related to API content.