Location:
Search - ansi x9.
Search list
Description: PGP的安全
■内容提要■
◎ 前言
◎ IDEA 的安全性问题
◎ RSA 的安全性问题
● 选择密文攻击
● 过小的加密指数 e
● RSA的计时攻击法
● 其他对RSA的攻击法
◎ MD5 的安全性问题
● 对MD5的普通直接攻击
● 对MD5的生日攻击
● 其他对MD5的攻击
● 口令长度和信息论
◎ 随机数的安全性问题
● ANSI X9.17 PRNG
● 用户击键引入随机性
● X9.17 用MD5进行预洗
● randseed.bin 的后洗操作
Platform: |
Size: 14457 |
Author: nicmaters |
Hits:
Description: This standard describes a keyed-hash message authentication code (HMAC), a
mechanism for message authentication using cryptographic hash functions. HMAC can
be used with any iterative Approved cryptographic hash function, in combination with a
shared secret key. The cryptographic strength of HMAC depends on the properties of the
underlying hash function. The HMAC specification in this standard is a generalization of
Internet RFC 2104, HMAC, Keyed-Hashing for Message Authentication, and ANSI
X9.71, Keyed Hash Message Authentication Code.
Platform: |
Size: 122405 |
Author: leiuchan |
Hits:
Description: 利用ANSI X9.17标准模拟了一个伪随机数发生器,内核加密算法调用3DES算法,能够按照标准要求产生64位伪随机数和64位种子值。
Platform: |
Size: 192660 |
Author: wildkaede |
Hits:
Description: ansiX9.8 算法的C语言实现,同时包含DES算法的C语言实现-ansiX9.8 algorithm C language, contains the DES algorithm C Language
Platform: |
Size: 3072 |
Author: 卢旭朝 |
Hits:
Description: PGP的安全
■内容提要■
◎ 前言
◎ IDEA 的安全性问题
◎ RSA 的安全性问题
● 选择密文攻击
● 过小的加密指数 e
● RSA的计时攻击法
● 其他对RSA的攻击法
◎ MD5 的安全性问题
● 对MD5的普通直接攻击
● 对MD5的生日攻击
● 其他对MD5的攻击
● 口令长度和信息论
◎ 随机数的安全性问题
● ANSI X9.17 PRNG
● 用户击键引入随机性
● X9.17 用MD5进行预洗
● randseed.bin 的后洗操作
-PGP security Summary ■ ■ ◎ ◎ IDEA foreword security issue ◎ RSA security issue chosen ciphertext attack ● ● too small e ● RSA encryption index of the timing attack ● Other attacks on the RSA method ◎ MD5 security ● MD5 issues common to a direct attack on the MD5 ● ● birthday attack other attacks on the MD5 password length and information theory ● ◎ random number of security issues ● ANSI X9.17 PRNG ● user keystrokes to introduce randomness ● X9.17 MD5 pre-washed with ● randseed.bin post-wash operation
Platform: |
Size: 14336 |
Author: nicmaters |
Hits:
Description: This standard describes a keyed-hash message authentication code (HMAC), a
mechanism for message authentication using cryptographic hash functions. HMAC can
be used with any iterative Approved cryptographic hash function, in combination with a
shared secret key. The cryptographic strength of HMAC depends on the properties of the
underlying hash function. The HMAC specification in this standard is a generalization of
Internet RFC 2104, HMAC, Keyed-Hashing for Message Authentication, and ANSI
X9.71, Keyed Hash Message Authentication Code.-err
Platform: |
Size: 121856 |
Author: leiuchan |
Hits:
Description: 利用ANSI X9.17标准模拟了一个伪随机数发生器,内核加密算法调用3DES算法,能够按照标准要求产生64位伪随机数和64位种子值。-Use of ANSI X9.17 standard simulation of a pseudo-random number generator, called the kernel encryption algorithm 3DES algorithm, in accordance with the standard requirements to produce 64-bit pseudo-random number and 64-bit seed value.
Platform: |
Size: 192512 |
Author: wildkaede |
Hits:
Description: describes MAC ANSI X9.19 algorith which used in secure messaging
Platform: |
Size: 299008 |
Author: mo_mostafa |
Hits:
Description: CipherWall Client, code to work with sockets, sqlite database and CA realization:
- RSA 2048-4096 bit
- digit auth on RSA
- 3-step cert auth
- Blowfish in CFB mode (448 bit)
- SHA-256 и SHA-512
- HMAC on base SHA-256
- random-digit genereator ANSI X9.17
- CRC32
- DoD-5220.22-M
Platform: |
Size: 94208 |
Author: Andrey |
Hits:
Description: CipherWall Client, code to work with sockets, sqlite database and CA realization:
- RSA 2048-4096 bit
- digit auth on RSA
- 3-step cert auth
- Blowfish in CFB mode (448 bit)
- SHA-256 и SHA-512
- HMAC on base SHA-256
- random-digit genereator ANSI X9.17
- CRC32
- DoD-5220.22-M
Platform: |
Size: 131072 |
Author: Andrey |
Hits:
Description: ANSI X9.24 零售金融业务 -- 对称密钥管理标准-ANSI X9.24 retail financial services- symmetric key management standards
Platform: |
Size: 483328 |
Author: chunlv |
Hits:
Description: ANSI X9.52 3DES加密操作运算法则-ANSI X9.52 3DES encryption algorithms
Platform: |
Size: 218112 |
Author: chunlv |
Hits:
Description: ANSI X9.42--金融业务的公开密钥加密:使用离散对数密码术的对称密码协议-ANSI X9.42-- financial services public key encryption: using discrete logarithm cryptography symmetric cryptographic protocols
Platform: |
Size: 336896 |
Author: chunlv |
Hits:
Description: DUKPT ,非对称密钥实现 ANSI X9.24-DUKPT, asymmetric key to achieve ANSI X9.24
Platform: |
Size: 1457152 |
Author: jacob |
Hits:
Description: The Data Encryption Standard (DES) shall consist of the following Data Encryption Algorithm
(DE S) and Triple Data Encryption Algorithm ( TDEA, as described in ANSI X9.52). These devices
shall be designed in such a way that they may be used in a computer system or network to provide
cryptographic protection to binary coded data. The method of implementation will depend on the
application and environment. The devices shall be implemented in such a way that they may be
tested and validated as accurately performing the transformations specified in the following
algorithm s . -The Data Encryption Standard (DES) shall consist of the following Data Encryption Algorithm
(DE S) and Triple Data Encryption Algorithm ( TDEA, as described in ANSI X9.52). These devices
shall be designed in such a way that they may be used in a computer system or network to provide
cryptographic protection to binary coded data. The method of implementation will depend on the
application and environment. The devices shall be implemented in such a way that they may be
tested and validated as accurately performing the transformations specified in the following
algorithm s .
Platform: |
Size: 200704 |
Author: lyra |
Hits:
Description: Pseudo Random Number Generator Based on NIST Recommended PRNG From ANSI X9.31 Appendix A.2.4 using AES 128 cipher for Linux.
Platform: |
Size: 4096 |
Author: delepeng |
Hits:
Description: DUKPT ,非对称密钥实现 ANSI X9.24
2009版和2004版-DUKPT, asymmetric keys to achieve ANSI X9.24 2009 version and the 2004 version
Platform: |
Size: 950272 |
Author: sunily |
Hits:
Description: ANSI X9.24-1:2009. Retail Financial Services Symmetric Key Management Part 1: Using Symmetric Techniques.
Platform: |
Size: 617472 |
Author: KrystalAmy |
Hits:
Description: Public Key Cryptography for the Financial
Services Industry
The Elliptic Curve Digital Signature Algorithm
(ECDSA)
Platform: |
Size: 2292706 |
Author: liu_1985_20000@163.com |
Hits: