Welcome![Sign In][Sign Up]
Location:
Search - encryption key java

Search list

[Crack HackDownRSA

Description: RSA加密算法java代码,自动生成公钥和密钥-RSA encryption algorithm java code, automatic generation public key cryptography
Platform: | Size: 8907 | Author: sikyZhao | Hits:

[JSP/JavaShamirAlgorithms

Description: 用java实现Shamir门限算法,可用于数据的加密解密,特别是传送加密密钥时有用-with java achieve Shamir threshold algorithm can be used for data encryption and decryption. Special transmission of the encryption key is useful when
Platform: | Size: 1818 | Author: XUN | Hits:

[JSP/Javachap00008

Description: 第8章 Java安全控制编程 实例87 控制访问权限 实例88 产生密钥 实例89 单钥加解密 实例90 双钥加解密 实例91 数字签名 实例92 实现SSL协议 实例93 简单的HTTPS服务-Java programming examples of security control to control access permissions 87 88 examples have 89 single-key examples key encryption key example of 90-plus examples of declassified 91 92 Digital Signature examples of achieving SSL simple example of the H 93 TTPS services
Platform: | Size: 10254 | Author: joker | Hits:

[Crack Hack肖俊.java

Description: ava加密扩展即Java Cryptography Extension,简称JCE。它是Sun的加密服务软件,包含了加密和密匙生成功能。JCE是JCA(Java Cryptography Architecture)的一种扩展。 JCE没有规定具体的加密算法,但提供了一个框架,加密算法的具体实现可以作为服务提供者加入。除了JCE框架之外,JCE软件包还包含了SunJCE服务提供者,其中包括许多有用的加密算法,比如DES(Data Encryption Standard)和Blowfish。 为简单计,在本文中我们将用DES算法加密和解密字节码。下面是用JCE加密和解密数据必须遵循的基本步骤: 步骤1:生成一个安全密匙。在加密或解密任何数据之前需要有一个密匙。密匙是随同被加密的应用一起发布的一小段数据,Listing 3显示了如何生成一个密匙。 【Listing 3:生成一个密匙】 -expansion that Java Cryptography Extension, referred to JCE. It is Sun's encryption software, including encryption and key generation functions. JCE is JCA (Java Cryptography Architecture), an extension. JCE no specific encryption algorithms, but provides a framework, the specific encryption algorithm can achieve as a service provider to join. Apart from the JCE framework, JCE package also includes SunJCE service providers, including many useful encryption algorithms such as DES (Data Encryption Standard) and the Blowfish. For simple terms, in this paper we will use DES encryption and decryption algorithms byte code. Below is JCE encryption and decryption of data must adhere to the basic steps : Step 1 : Generating a security keys. In any encryption or decryption of data is needed befo
Platform: | Size: 3072 | Author: 肖俊 | Hits:

[Crack Hack公钥加密算法

Description: rsa加密解密是一种公钥加密算法,广泛应用于信息安全领域-rsa encryption and decryption is a public key encryption algorithm widely used in the field of information security
Platform: | Size: 8192 | Author: 张震 | Hits:

[Crack HackDownRSA

Description: RSA加密算法java代码,自动生成公钥和密钥-RSA encryption algorithm java code, automatic generation public key cryptography
Platform: | Size: 8192 | Author: sikyZhao | Hits:

[JSP/JavaShamirAlgorithms

Description: 用java实现Shamir门限算法,可用于数据的加密解密,特别是传送加密密钥时有用-with java achieve Shamir threshold algorithm can be used for data encryption and decryption. Special transmission of the encryption key is useful when
Platform: | Size: 2048 | Author: XUN | Hits:

[MPIECCFp

Description: 椭圆加密,实现了通过椭圆曲线实现加密,生成密钥对等。-elliptical encryption, achieved through the realization of elliptic curve cryptography, generating key pairs, and so on.
Platform: | Size: 2048 | Author: 随风 | Hits:

[JSP/Javachap00008

Description: 第8章 Java安全控制编程 实例87 控制访问权限 实例88 产生密钥 实例89 单钥加解密 实例90 双钥加解密 实例91 数字签名 实例92 实现SSL协议 实例93 简单的HTTPS服务-Java programming examples of security control to control access permissions 87 88 examples have 89 single-key examples key encryption key example of 90-plus examples of declassified 91 92 Digital Signature examples of achieving SSL simple example of the H 93 TTPS services
Platform: | Size: 10240 | Author: joker | Hits:

[JSP/JavaJAVA.RSA

Description: 用JAVA做的一个RSA加密解密程序,能实现密钥的生成并且对文件进行加密和解密-do with JAVA an RSA encryption and decryption procedures, Key to achieving the production of documents and encryption and decryption
Platform: | Size: 14336 | Author: 龙宇 | Hits:

[Crack HackHill

Description: Hill加密算法的基本思想是将l个明文字母通过线性变换将它们转换为k个密文字母。脱密只要做一次逆变换就可以了。密钥就是变换矩阵本身。即 M=m1m2……ml Ek(M)=c1c2……cl 其中 c1=k11m1+k12m2+……+k1lml c2=k21m1+k22m2+……+k2lml …… cl=kl1m1+kl2m2+……+kllml 通常对于字母加解密,使用mod 26的方法。 以上线性方程可以采用矩阵表示。 -Hill encryption algorithm the basic idea is to express the letter l a linear transformation through them is converted to k-secret alphabet. Off to do a secret as long as the inverse transform it. Key is the transformation matrix itself. That is, M = m1m2 ... ... mlEk (M) = c1c2 ... ... cl which c1 = k11m1+ K12m2+ ... ...+ K1lmlc2 = k21m1+ K22m2+ ... ...+ K2lml ... ... cl = kl1m1+ Kl2m2+ ... ...+ Kllml For encryption and decryption usually letters, use the method of mod 26. Above linear equations can be used express matrix.
Platform: | Size: 143360 | Author: wildkaede | Hits:

[Crack HackSymmetric_encryption_Stream_encryption_CBC_RSA_DH.

Description: 对称加密解密,流加密,CBC加密解密,RSA加密算法,DH公钥和私钥算法-Symmetric encryption and decryption, stream encryption, CBC encryption and decryption, RSA encryption algorithm, DH public key and private key algorithm
Platform: | Size: 19456 | Author: Peter | Hits:

[Crack HackFibonacci_encryption

Description: 一种Fibonacci序列变换空域加密算法和解密算法。利用Fibonacci序列产生密钥,实现图像空域加密。-The airspace of a Fibonacci sequence transform encryption algorithm and decryption algorithm. The use of Fibonacci sequence generated key encryption to achieve the image airspace.
Platform: | Size: 12288 | Author: 林旭亮 | Hits:

[Crack HackImageDeal.java.tar

Description: 简单的图片加密程序,把原图与作为密钥的图片进行异或操作实现图片的加密,再进行一次异或操作,实现解密-Simple image encryption procedures, the Original and different pictures as a key to achieve the image or operation of encryption, and then once exclusive or operation, to achieve decryption
Platform: | Size: 2048 | Author: Wu Zhongsheng | Hits:

[JSPBeginning_Cryptography_with_Java

Description: While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.
Platform: | Size: 2560000 | Author: YY | Hits:

[Crack Hackaes-java-file

Description: 使用java编写的aes文件加密源代码,经测试能对文本进行加密,密钥为128 192 256bit-Prepared using aes file encryption java source code, the test can encrypt the text, the key for the 128 192 256bit
Platform: | Size: 9216 | Author: cai | Hits:

[Crack HackCentralized-symmetric-key

Description: 完成集中式对称密钥的分配工作 说明:作为通讯的双方A和B,都已经分别和KDC拥有会话密钥Ka和Kb,但A、B之间事先没有保密通道,需要依赖KDC为它们的会话分配临时密钥Ks。在完成会话密钥Ks的分配后,A利用Ks对特定文件(test-1.txt)进行加密,并发送给B;B利用Ks对密文进行解密,并对比解密后的明文信息同原来的文件是否一致。 要求: (1)JAVA语言编程实现,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一文本文件(test-1.txt); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上,KDC可以部署在其中一台主机上或第三台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于KDC的集中式密钥分配方案为参考,完成从步骤1到步骤5的全过程;-Complete centralized allocation symmetric key Description: As a communication between the parties A and B, respectively, and the KDC already has a session key Ka and Kb, but the A, B no secret passage between the advance, they need to rely on the KDC allocate temporary session key Ks. Upon completion of the session key Ks allocation, A Ks on the use of a specific file (test-1.txt) is encrypted and sent to B B use Ks decrypt the ciphertext, and compare the decrypted plaintext message with the original files are consistent. Requirements: (1) JAVA programming language, based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported) (2) the content of communications as a text file (test-1.txt) (3) complete network-based key distribution job (as the communication between the parties A, B should be deployed on both hosts, KDC can be deployed on one host or a third host) (4) are allocated once a secret symmetric key ra
Platform: | Size: 4096 | Author: 丁元元 | Hits:

[Crack HackSymmetric-key-cryptography

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程; -Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the
Platform: | Size: 45056 | Author: 丁元元 | Hits:

[Crack HackRSA-Symmetric-key

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程;-Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the
Platform: | Size: 15360 | Author: 丁元元 | Hits:

[JSP/JavaCrfRsa4j

Description: RSA秘钥生成,私钥加密-公钥解密,公钥加密-私钥解密,私钥签名-公钥签名,SH256无秘钥签名(RSA key generation, encryption key to decrypt the private key, public key encryption private key to decrypt the private key signature, public key signature, SH256 key signature)
Platform: | Size: 26624 | Author: 挨踢顾大胖 | Hits:
« 12 3 4 5 6 7 »

CodeBus www.codebus.net