- Category:
- CA program
- Tags:
-
[WORD]
- File Size:
- 5kb
- Update:
- 2014-05-12
- Downloads:
- 0 Times
- Uploaded by:
- 蔡国庆
Description: First, the key generation (algorithm can refer to the document after <Annex 1> KeyGeN.asp)
And <Annex 1> The difference is that the actual requirements of the key stored in a database table KeyPool string recipient, the table structure is as follows:
1, personalID {main} code
2, secret_key {key, data type, preferably with text, key generation and the actual code length about}
3, serverTime {key generation time, to test whether the key failure}
Recipient found key lapses, refused to verify
Second, string encryption (algorithm can refer to the document after <Attachment 2> CRYPT.asp)
Key is read from the database and use the key to encrypt {function: EnCrypt (text) returns ciphertext}
Third, the recipient, and other data acquired after the ciphertext, based on the parameters acquired personalID key read from the database, and compares the timestamp found key timeout (eg 15 minutes) the authentication is denied.
Timestamp is valid, then use the key
To Search:
File list (Check if you may need any files):
加密算法文档.doc