Description: 1、利用公钥密码技术实现对称密码技术密钥的分配;
2、利用所分配的对称密钥对通信内容进行加/解密;
-1, the use of public key cryptographic techniques to achieve symmetric cryptography key distribution 2, using the symmetric key by the distribution of the content of communication encryption/decryption Platform: |
Size: 17408 |
Author:张海滨 |
Hits:
Description: playfair 加密算法的java实现,使用密码学的学生学习参考-Playfair encryption algorithm to achieve the java, the use of cryptography reference to student learning Platform: |
Size: 1024 |
Author:liufan |
Hits:
Description: 使用DES解密和加密文件,供JAVA爱好者交流和学习-The use of DES decryption and encryption documents for sharing and learning JAVA lovers Platform: |
Size: 1024 |
Author:mu |
Hits:
Description: Very large (tested for more than 2048 bits) prime number generator and tester program. This is well written and based on solid algorithms in this field. Source code is my own, used for Masters course in Cryptography.
Program has easily readable and well written algorithm implementation to check for Jacobian Symbol, choice of two methods for primality testing: Miller-Rabin or Solovay-Strassen method and Blum-Blum Shub method for random number generation.
Input and output of the program is through files in \bin directory. Project is compatible with Java Eclipse 3.0 IDE, but can also be easily built from command line.-Very large (tested for more than 2048 bits) prime number generator and tester program. This is well written and based on solid algorithms in this field. Source code is my own, used for Masters course in Cryptography.
Program has easily readable and well written algorithm implementation to check for Jacobian Symbol, choice of two methods for primality testing: Miller-Rabin or Solovay-Strassen method and Blum-Blum Shub method for random number generation.
Input and output of the program is through files in \bin directory. Project is compatible with Java Eclipse 3.0 IDE, but can also be easily built from command line.
Platform: |
Size: 22528 |
Author:s_wilfred |
Hits:
Description: 完成基于非对称密码技术的对称密钥分配工作
说明:
(1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。
(2)A用Ks对一图象文件(test_pig.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2;
(3)对比T1和T2;-Completion of asymmetric cryptography based on symmetric key distribution work
Description:
(1) the completion of the asymmetric public key certificate-based key distribution based on the work, according to the materials on asymmetric cryptography based on symmetric key distribution scheme, the completion of the allocation of symmetric key Ks.
(2) A document with Ks on an image (test_pig.bmp) is encrypted and sent to B, B to decrypt receipt, compared to the original image to see if the same, and record the entire encryption/decryption time spent T2
(3) contrast T1 and T2 Platform: |
Size: 43008 |
Author:熊龙生 |
Hits:
Description: This is the Assysmmetric Cryptography algorithm created using Java. This is to identfy Finger prints.One of the popular algorithm Platform: |
Size: 115712 |
Author:Archana Palani |
Hits:
Description: Java cryptography resource is a nice resource for programming for encryption and decryption.
Platform: |
Size: 399360 |
Author:Amol/justamol |
Hits:
Description: java的入门神器,非常经典. 介绍Java 相关知识的影印版书籍,深入浅出,适合初学者-java entry artifact, very classic. introduce a photocopy version of Java knowledge of books, a simple and suitable for beginners Platform: |
Size: 1398784 |
Author:于泳浩 |
Hits: