Introduction - If you have any usage issues, please Google them yourself
1, the use of public key cryptographic techniques to achieve symmetric cryptography key distribution 2, using the symmetric key by the distribution of the content of communication encryption/decryption
Packet : 39709552java_encrypt_decrypt.rar filelist
code\Node_b_1.java
code\Node_b_2.java
code\CreateKeyPair.java
code\Node_a_1.java
code\Node_a_2.java
code\实验报告.doc
code