Location:
Search - JCE
Search list
Description: 介绍加密解密的书籍,对网络中的加密解密算法进行了详细的介绍-on encryption and decryption of books on the network encryption and decryption algorithms for a detailed account of
Platform: |
Size: 471815 |
Author: 郑述庆 |
Hits:
Description: Getting started examples for the JCE and JCE provider installation.-Getting started examples for the JCE and JC E. provider installation.
Platform: |
Size: 4823 |
Author: 刘永恒 |
Hits:
Description: 数字证书注册和签发系统,利用JCA和JCE实现数字证书的注册,并提供一个密钥库管理以及私钥的存储和导出以及传输得安全机制
Platform: |
Size: 95055 |
Author: ywd |
Hits:
Description: sun s jce books,include all algrithm such as md5/ras sha tc
Platform: |
Size: 440264 |
Author: fuchun.xia |
Hits:
Description: ava加密扩展即Java Cryptography Extension,简称JCE。它是Sun的加密服务软件,包含了加密和密匙生成功能。JCE是JCA(Java Cryptography Architecture)的一种扩展。 JCE没有规定具体的加密算法,但提供了一个框架,加密算法的具体实现可以作为服务提供者加入。除了JCE框架之外,JCE软件包还包含了SunJCE服务提供者,其中包括许多有用的加密算法,比如DES(Data Encryption Standard)和Blowfish。 为简单计,在本文中我们将用DES算法加密和解密字节码。下面是用JCE加密和解密数据必须遵循的基本步骤: 步骤1:生成一个安全密匙。在加密或解密任何数据之前需要有一个密匙。密匙是随同被加密的应用一起发布的一小段数据,Listing 3显示了如何生成一个密匙。 【Listing 3:生成一个密匙】 -expansion that Java Cryptography Extension, referred to JCE. It is Sun's encryption software, including encryption and key generation functions. JCE is JCA (Java Cryptography Architecture), an extension. JCE no specific encryption algorithms, but provides a framework, the specific encryption algorithm can achieve as a service provider to join. Apart from the JCE framework, JCE package also includes SunJCE service providers, including many useful encryption algorithms such as DES (Data Encryption Standard) and the Blowfish. For simple terms, in this paper we will use DES encryption and decryption algorithms byte code. Below is JCE encryption and decryption of data must adhere to the basic steps : Step 1 : Generating a security keys. In any encryption or decryption of data is needed befo
Platform: |
Size: 3197 |
Author: 肖俊 |
Hits:
Description: ava加密扩展即Java Cryptography Extension,简称JCE。它是Sun的加密服务软件,包含了加密和密匙生成功能。JCE是JCA(Java Cryptography Architecture)的一种扩展。 JCE没有规定具体的加密算法,但提供了一个框架,加密算法的具体实现可以作为服务提供者加入。除了JCE框架之外,JCE软件包还包含了SunJCE服务提供者,其中包括许多有用的加密算法,比如DES(Data Encryption Standard)和Blowfish。 为简单计,在本文中我们将用DES算法加密和解密字节码。下面是用JCE加密和解密数据必须遵循的基本步骤: 步骤1:生成一个安全密匙。在加密或解密任何数据之前需要有一个密匙。密匙是随同被加密的应用一起发布的一小段数据,Listing 3显示了如何生成一个密匙。 【Listing 3:生成一个密匙】 -expansion that Java Cryptography Extension, referred to JCE. It is Sun's encryption software, including encryption and key generation functions. JCE is JCA (Java Cryptography Architecture), an extension. JCE no specific encryption algorithms, but provides a framework, the specific encryption algorithm can achieve as a service provider to join. Apart from the JCE framework, JCE package also includes SunJCE service providers, including many useful encryption algorithms such as DES (Data Encryption Standard) and the Blowfish. For simple terms, in this paper we will use DES encryption and decryption algorithms byte code. Below is JCE encryption and decryption of data must adhere to the basic steps : Step 1 : Generating a security keys. In any encryption or decryption of data is needed befo
Platform: |
Size: 3072 |
Author: 肖俊 |
Hits:
Description: 介绍加密解密的书籍,对网络中的加密解密算法进行了详细的介绍-on encryption and decryption of books on the network encryption and decryption algorithms for a detailed account of
Platform: |
Size: 471040 |
Author: 郑述庆 |
Hits:
Description: Getting started examples for the JCE and JCE provider installation.-Getting started examples for the JCE and JC E. provider installation.
Platform: |
Size: 4096 |
Author: 刘永恒 |
Hits:
Description: sun s jce books,include all algrithm such as md5/ras sha tc
Platform: |
Size: 440320 |
Author: fuchun.xia |
Hits:
Description: 使用SUN JCE 1.6 的授权文件,按照里面的提示安装后就可正常使用SUN JCE 提供的安全编程功能。-JDK 1.6 "Unlimited Strength Jurisdiction Policy Files"
Platform: |
Size: 9216 |
Author: letianfly |
Hits:
Description: Java allows configuring multiple JCE providers, and looks up requested algorithms by name. This example shows generating RSA signatures with variable digests, and verification of the signed text by the means of RSA public key.
An explanation of the example:
1. Class DataSigning reads the specified file, and creates its digest
2. A unique RSA key pair is created, and the public key is stored with ".key" extension
3. The digest of the text file is signed with the private key
4. During verification, the previously stored public key is retrieved from the file
5. The signature is read from the file
6. The signature is checked, using the public key and newly computed digest of the text
Platform: |
Size: 3072 |
Author: neo |
Hits:
Description: 包含各種加密演算法和Digital Signatures(MD2 MD4 MD5 RIPEMD-128 RIPEMD-160 SHA-0 SHA-1 SHA-256 SHA-384 SHA-512 Tiger)-THIS SOFTWARE IS PROVIDED BY THE CRYPTIX FOUNDATION LIMITED ``AS IS
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR
OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF
USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED
AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Platform: |
Size: 936960 |
Author: 陳盈 |
Hits:
Description: JCE加密,来源于JAVA Cryptgraph的源码,经过调试和改进。陆续上传当中-from JCE security and java cryptgraph code, I m improving it and uploading!
Platform: |
Size: 27648 |
Author: wangzhongliang |
Hits:
Description: While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.
This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.
This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.
Platform: |
Size: 2560000 |
Author: bk |
Hits:
Description: JCE编辑器 php系统可用,joomla可用-Available to the system JCE editor php, joomla available
Platform: |
Size: 813056 |
Author: 张星星 |
Hits:
Description: JCE的jar,密钥分配,技术的特点和基础-JCE jar, this is some key assignment.
Platform: |
Size: 471040 |
Author: d |
Hits:
Description: jce 1.5.zip for down resorce
Platform: |
Size: 6144 |
Author: lanneret98 |
Hits:
Description: 在JCE平台上验证AES算法,计算机安全与保密作业,Java算法-Verification of AES algorithm on JCE platform
Platform: |
Size: 1024 |
Author: 陈洁 |
Hits:
Description: 在JCE平台上验证RSA算法,计算机安全与保密作业,Java算法-Verification of RSA algorithm on JCE platform
Platform: |
Size: 1024 |
Author: 陈洁 |
Hits: