Description: 说明:
1、里面有什么:
1.1、org.bouncycastle.*下的所有软件是bouncycastle组织开发的软件包
1.2、org.infosecurity.*下的软件包括:
DES_CBC算法的实现
RSA算法的实现(包括:密钥生成、公钥加密和私钥解密、数字签名及签名验证)
数字信封的实现
利用数字信封实现大文件的加密、解密。
2、有什么用:
2.1 研究、学习信息安全中的密码学设计与实现技术。
2.2 当然如果大家觉得在其它地方用的上,我会觉得很高兴的。
3、还有什么改进:
3.1 对文件加密、解密的时候要频繁的IO,如果加一个缓冲区,比如10K、50K等,
只有缓冲区满了才写入DISK这样将提高效率。
3.2 RSA私钥积存的时候可以按PKCS8形式,再经BASE64编码保存比较好。-Note : 1, mean there : 1.1, org.bouncycastle .* of all software development organizations is bouncycastle package 1.2, org.infosecurity .* The software includes : DES_CBC algorithm to achieve the realization of the RSA algorithm (including : key generation, public key and private key encryption decryption, digital signatures and signature verification), the realization of digital envelope using digital envelope realize document encryption, decryption. Two, what is the use of : 2.1, learning the information security cryptography design and technology. 2.2 Of course, if you think in the other parts, I feel very happy. Three, what is there for improvement : 3.1 pairs of file encryption, decryption, and the time to frequent the IO, plus a buffer, such as 10K, 50K, the only buffer is needed for Platform: |
Size: 212992 |
Author:雷敏 |
Hits:
Description: 这个源码是使用JAVA实现公钥密码算法RSA的一个简单示例程序。-this source is the use of JAVA RSA public key cryptography algorithm example of a simple procedure. Platform: |
Size: 10240 |
Author:张华 |
Hits:
Description: 1、实现集中式对称密钥的分配工作(作为通讯的双方A和B,都已经分别和KDC拥有会话密钥);
2、分布式对称密钥分配(作为通讯的双方A和B已经共享一个会话主密钥);
3、公钥密码技术实现对称密码技术密钥的分配(作为通讯的双方A和B已经拥有对方的公钥);-1, the realization of a centralized allocation of symmetric key (for communication between the parties A and B, respectively, and the KDC already has a session key) 2, Distributed symmetric key distribution (as communications between the parties A and B have to share a session master key) 3, public key cryptographic techniques to achieve symmetric cryptography key distribution (for communication between the parties A and B have each other' s public key) Platform: |
Size: 31744 |
Author:liu |
Hits:
Description: 普通的加密算法,具有很强的使用性,可作为密码学专业参考-Common encryption algorithm used has a strong, and can be used as a professional reference Cryptography Platform: |
Size: 195584 |
Author:song |
Hits:
Description: 一些重要的加密算法的实现---主要是针对大学密码学课程中的算法实践,例如: 维吉尼亚密码,置换密码,移位密码-Some key encryption algorithm--- mainly aimed at the realization of the University of cryptography algorithms for practical courses, such as: Virginia password, replacement password, password, and so shift Platform: |
Size: 1113088 |
Author:zk |
Hits:
Description: 最近在学密码学,这一个实现playfair加密算法的java类,主要包括构造函数、加密函数和解密函数,还有几个辅助函数,附有测试类,在控制台下运行的。-A recent study of cryptography, which playfair encryption algorithm to achieve a java class, mainly including constructor, encryption and decryption function, a function, and several auxiliary functions, with a test class, running under the console. Platform: |
Size: 6144 |
Author:老棉 |
Hits:
Description: In cryptography, RSA (which stands for Rivest, Shamir and Adleman who first publicly described it see below) is an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be secure given sufficiently long keys and the use of up-to-date implementations.-In cryptography, RSA (which stands for Rivest, Shamir and Adleman who first publicly described it see below) is an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be secure given sufficiently long keys and the use of up-to-date implementations. Platform: |
Size: 1024 |
Author:DS |
Hits:
Description: While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.
This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.
This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.
Platform: |
Size: 2560000 |
Author:YY |
Hits:
Description: While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.
This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.
This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.
Platform: |
Size: 2560000 |
Author:bk |
Hits:
Description: RSA-is an algorithm for public-key cryptography-RSA-is an algorithm for public-key cryptography Platform: |
Size: 6144 |
Author:andrushkutzzaa |
Hits: