Welcome![Sign In][Sign Up]
Location:
Search - md5 digital signature

Search list

[Other resourceSQLSERVER-MD5

Description: sql server2000没有提供用于数字签名的MD5系统函数,这是一个实现MD5功能的自定义函数源码-sql server 2000 did not provide for the MD5 digital signature system function, This is a realization of the MD5 function-defined functions FOSS
Platform: | Size: 3379 | Author: lyzcw | Hits:

[Crack HackSHA算法代码

Description: 数字签名加密算法的两座大厦先后倒塌—MD5和SHA-1这两种应用最为广泛的数字签名加密算法都被山东大学的王小云教授破解。-encrypted digital signature algorithm has two buildings collapsed- MD5 and SHA-1 that the two most widely used digital signature encryption algorithm has been the Shandong University Professor Bruce Schneier break.
Platform: | Size: 10240 | Author: zhou | Hits:

[Crack HackJAVA-MD5pass_src

Description: JAVA 的MD5加密算法源代码 JAVA 的MD5加密算法源代码-JAVA MD5 encryption algorithm source code of Java M D5 encryption algorithm source code
Platform: | Size: 1024 | Author: tqb | Hits:

[SQL ServerSQLSERVER-MD5

Description: sql server2000没有提供用于数字签名的MD5系统函数,这是一个实现MD5功能的自定义函数源码-sql server 2000 did not provide for the MD5 digital signature system function, This is a realization of the MD5 function-defined functions FOSS
Platform: | Size: 3072 | Author: lyzcw | Hits:

[Crack HackSHA_MatLab

Description: SHA (安全Hash算法)是一种单向散列算法,可用于数字加密或数字签名,是比MD5更加安全的单向散列算法,与MD5算法一起时被应用最广泛的两种算法。-SHA (secure Hash algorithm) is a one-way hash algorithm, can be used for digital encryption or digital signature is more secure than the MD5 one-way hash algorithm, in conjunction with the MD5 algorithm was the most widely used two algorithms.
Platform: | Size: 5120 | Author: 张汉江 | Hits:

[JSP/JavaDES_encrypt

Description: 实现DES和RSA的加密解密,MD5还有数字签名。-The realization of DES and RSA s encryption and decryption, MD5 digital signature also.
Platform: | Size: 4096 | Author: 天天 | Hits:

[JSP/JavaMD5

Description: 用于数字签名计算的工具类 -For the digital signature calculation tools
Platform: | Size: 2048 | Author: 丁琳 | Hits:

[Crack Hackmd5

Description: MD5的典型应用是对一段信息(Message)产生信息摘要(Message-Digest),以防止被篡改。比如,在UNIX下有很多软件在下载的时候都有一个文件名相同,文件扩展名为.md5的文件,在这个文件中通常只有一行文本,大致结构如:    MD5 (tanajiya.tar.gz) = 0ca175b9c0f726a831d895e269332461   这就是tanajiya.tar.gz文件的数字签名。-Typical applications MD5 is a section of information (Message) generated message digest (Message-Digest), in order to prevent tampering. For example, in UNIX there are a lot of software when downloading a file name the same file name extension is. Md5 of the file, in this document are usually only his text, more or less structure, such as: MD5 (tanajiya.tar.gz) = 0ca175b9c0f726a831d895e269332461 This is the digital signature tanajiya.tar.gz documents.
Platform: | Size: 789504 | Author: zhaoqi | Hits:

[Data structsmd5

Description: MD5文件数字签名实例代码,使用C写的,可以直接拿来用的-MD5 digital signature examples document code, written using C, can be directly used by the
Platform: | Size: 73728 | Author: lijin | Hits:

[Crack Hackrmdemo

Description: JAVA开发的,使用RSA,MD5开发的简单数字签名软件,可以用来对文件和消息做数字签名。 -JAVA development, the use of RSA, MD5 developed a simple digital signature software, can be used for documents and information to do a digital signature.
Platform: | Size: 963584 | Author: 刘应 | Hits:

[Crack Hackmd5

Description: MD5的全称是Message-digest Algorithm 5(信息-摘要算法),用于确保信息传输完整一致。在90年代初由MIT Laboratory for Computer Science和RSA Data Security Inc,的Ronald L. Rivest开发出来,经MD2、MD3和MD4发展而来。它的作用是让大容量信息在用数字签名软件签署私人密钥前被"压缩"成一种保密的格式(就是把一个任意长度的字节串变换成一定长的大整数)。-The full name of MD5 is Message-digest Algorithm 5 (Information- Summary of algorithm), to ensure consistent messaging integrity. In the early 90s by the MIT Laboratory for Computer Science and RSA Data Security Inc, the Ronald L. Rivest developed by the MD2, MD3 and MD4 evolved. Its role is to enable large-capacity information signed with a digital signature private key before the software was "compressed" into a confidential format (is an arbitrary length string of bytes must transform into a big long integer).
Platform: | Size: 1426432 | Author: 成功 | Hits:

[JSP/Javajava_DigitalSign

Description: 实用数字签名的步骤 (1)发送方使用MD5算法对原始信息进行计算,获得一个固定长度的信息摘要 (2)发送方用自己的私钥加密生成的信息生成发送方的数字签名,发送方把这个数字签名作为发送信息的附件和明文信息,一同用接收方的公钥进行加密,将加密后的密文一同发送给接收方; (3)接收方首先把接收到的密文用自己的私钥解密,得到明文信息和数字签名,再用发送方的公钥对数字签名进行解密,然后使用相同的单向散列算法来计算解密得到的明文信息,得到信息摘要;对比计算出来的信息摘要和发送方发送过来的信息摘要是否一致-Practical steps to a digital signature (1) sender MD5 algorithm used to calculate the original information, access to a fixed length message digest (2) use their own sender s private key to generate encrypted information generated by the sender s digital signature, the sender of the digital signature as an annex to send a message and express information, together with the recipient s public key for encryption, will be encrypted ciphertext sent to the receiver together (3) the recipient first received ciphertext with its own private key to decrypt received explicit information and digital signatures, and then the sender s public key to decrypt the digital signature, and then use the same one-way hash algorithm to calculate the explicit information to be decrypted, the message digest contrast calculated message digest and the sender sent the message digest are consistent
Platform: | Size: 23552 | Author: 张云 | Hits:

[Crack HackMD5

Description: 调用了CNPACK的MD5加密单元 MD5文件数字签名实例代码,使用delphi写的,可以直接拿来用的-MD5 -Call of the MD5 encryption unit CNPACK document digital signature MD5 code example, use delphi write, can be directly used with the-MD5
Platform: | Size: 410624 | Author: weiny | Hits:

[Crack HackMD5-encryption.tar

Description: 详细介绍了,MD5数字签名的功能代码实现-Described in detail, MD5 digital signature to achieve the function code
Platform: | Size: 3072 | Author: driftage | Hits:

[Crack Hackmd5

Description: MD5算法是一种消息摘要算法(Message Digest Algorithm),此算法以任意长度的信息(message) 作为输入进行计算,产生一个128-bit(16-byte)的指纹或报文摘要(fingerprint or message digest)。两个不同的message产生相同message digest的几率相当小,从一个给定的message digest逆向产生原始message更是困难(不过也有可能从message digest构造(message),因此MD5算法适合用在数字签名应用中。MD5实现简单,在32位的机器上运行速度也相当快,实际应用也不仅仅局限于数字签名。-MD5 algorithm is a message digest algorithm (Message Digest Algorithm), this algorithm is an arbitrary length message (message) is calculated as input to produce a 128-bit (16-byte) of the fingerprint or message digest (fingerprint or message digest .) Two different message likely to produce the same message digest is quite small, from a given message digest produced reverse the original message is even more difficult (but may also be constructed from the message digest (message), so use the MD5 algorithm is suitable for applications in digital signature . MD5 simple, in the 32-bit machine running fairly fast, practical applications are not limited to digital signatures.
Platform: | Size: 3072 | Author: nannan | Hits:

[Crack HackMD5-RSA-based-digital-signature

Description: 基于MD5-RSA的数字签名,是网络交易中使用的数学模型。-MD5-RSA-based digital signature, the network model used in transactions.
Platform: | Size: 1588224 | Author: zhuangjun | Hits:

[CA authMD5

Description: MD5数字签名,加密算法,安全哈希加密算法-MD5 digital signature,encryption algorithm, encryption algorithm Secure Hash
Platform: | Size: 1620992 | Author: 黄国为 | Hits:

[Scannermd5

Description: 实现md5数字签名的api,可以对字符串加密,也可以对文件夹加密-Md5 digital signature api, string encryption can also file folder encryption
Platform: | Size: 2048 | Author: 李飞 | Hits:

[Crack HackPractical-digital-signature

Description: 实用数字签名的步骤 (1)发送方使用MD5算法对通信内容进行计算,获得一个固定长度的信息摘要; (2)发送方用自己的私钥加密生成的信息生成发送方的数字签名,发送方把这个数字签名作为发送信息的附件和明文信息,一同用接收方的公钥进行加密,将加密后的密文一同发送给接收方; (3)接收方首先把接收到的密文用自己的私钥解密,得到明文信息和数字签名,再用发送方的公钥对数字签名进行解密,然后使用相同的单向散列算法来计算解密得到的明文信息,得到信息摘要;对比计算出来的信息摘要和发送方发送过来的信息摘要是否一致 思考: (1)请分别选择文件test-1.txt和test_picture.bmp作为通讯内容,分别记录全过程用时,并对比一下; (2)如果所发送的内容数据量非常大,上述方案中的效率不能满足要求,请考虑一下如何解决这个问题。-Practical steps digital signature ( A ) the sender uses the MD5 algorithm to calculate the content of communications , access to a fixed-length message digest ( 2 ) the sender s private key encryption with their own information generated by the sender generates a digital signature , the digital signature of the sender of the message as an attachment and send plaintext , together with the recipient s public key to encrypt the encrypted sent along with the ciphertext to the recipient ( 3 ) First, the recipient receives the ciphertext with his private key to decrypt , get the plaintext and the digital signature , then the sender s public key to decrypt the digital signature , and then using the same one-way hash algorithm to calculate decrypted plaintext information, to receive message digest comparing the calculated message digest and the information sent from the sender summary is consistent Reflections : ( 1 ) Please select the file test-1.txt respectively and test_pictur
Platform: | Size: 1383424 | Author: 丁元元 | Hits:

[Crack HackMD5

Description: MD5是让大容量信息在用数字签名软件签署私人密匙前被"压缩"成一种保密的格式(就是把一个任意长度的字节串变换成一定长的大整数)。不管是MD2、MD4还是MD5,它们都需要获得一个随机长度的信息并产生一个128位的信息摘要。虽然这些算法的结构或多或少有些相似,但MD2的设计与MD4和MD5完全不同,那是因为MD2是为8位机器做过设计优化的,而MD4和MD5却是面向32位的电脑。(MD5 allows large capacity information to be compressed into a secret format before signing a private key with a digital signature software (that is, converting a string of any length into a large integer of a certain length). Whether it's MD2, MD4, or MD5, they all need to get a random length of information and produce a 128 bit summary of the information. Although these algorithms are more or less similar in structure, the design of MD2 is quite different from that of MD4 and MD5, because MD2 has been designed for 8 bit machines, while MD4 and MD5 are 32 bit computers.)
Platform: | Size: 2048 | Author: 雪儿飞飞 | Hits:
« 12 »

CodeBus www.codebus.net