Welcome![Sign In][Sign Up]
Location:
Search - public key algorithms

Search list

[Crack Hacksll

Description: 一种非线性流式加密算法,对称加密,它的加密和解密都是用同一把密钥完成。对称加密比不对称加密快得多,但缺点在于,它的安全性完全依赖于保持密码的机密性。 不对称加密,它要求使用两个密钥,一个是公共的(公钥),另一个是私有的(私钥)。每个密钥都要求使用另一个密钥来解密一条消息。它的复杂性提高,因此没有普及。 -a nonlinear flow encryption algorithms, symmetric encryption, the encryption and decryption are with the same key completion. Symmetric encryption faster than asymmetric encryption, but the drawback is that its security depends entirely on maintaining the confidentiality of passwords. Asymmetric encryption, it requires the use of two keys, one public (public key), and the other is owned by the (private key). Each key has requested the use of another key to a declassified information. Its complexity and therefore not universal.
Platform: | Size: 83522 | Author: 云容 | Hits:

[Other resourceApplicationofCryptography

Description: 一本关于密码学应用的学习参考书,内有对称密钥加密、数字签名、认证、公钥加密、哈希算法等内容,内容全面。-one on the application of cryptography study reference books, there are symmetric key encryption, digital signature, authentication, public key encryption, Hash algorithms, comprehensive content.
Platform: | Size: 5590440 | Author: xiaoyu | Hits:

[Crack Hacksll

Description: 一种非线性流式加密算法,对称加密,它的加密和解密都是用同一把密钥完成。对称加密比不对称加密快得多,但缺点在于,它的安全性完全依赖于保持密码的机密性。 不对称加密,它要求使用两个密钥,一个是公共的(公钥),另一个是私有的(私钥)。每个密钥都要求使用另一个密钥来解密一条消息。它的复杂性提高,因此没有普及。 -a nonlinear flow encryption algorithms, symmetric encryption, the encryption and decryption are with the same key completion. Symmetric encryption faster than asymmetric encryption, but the drawback is that its security depends entirely on maintaining the confidentiality of passwords. Asymmetric encryption, it requires the use of two keys, one public (public key), and the other is owned by the (private key). Each key has requested the use of another key to a declassified information. Its complexity and therefore not universal.
Platform: | Size: 730112 | Author: 云容 | Hits:

[OtherApplicationofCryptography

Description: 一本关于密码学应用的学习参考书,内有对称密钥加密、数字签名、认证、公钥加密、哈希算法等内容,内容全面。-one on the application of cryptography study reference books, there are symmetric key encryption, digital signature, authentication, public key encryption, Hash algorithms, comprehensive content.
Platform: | Size: 5590016 | Author: xiaoyu | Hits:

[Crack HackRSA

Description: 实现RSA公钥算法,1978年就出现了这种算法,它是第一个既能用于数据加密也能用于数字签名的算法。 它易于理解和操作,也很流行。算法的名字以发明者的名字命名:Ron Rivest, AdiShamir 和 Leonard Adleman。但RSA的安全性一直未能得到理论上的证明。-The realization of RSA public key algorithm, in 1978 appeared in the algorithm, it is the first not only for data encryption can be used for digital signature algorithms. It is easy to understand and operate, but also very popular. Algorithm s name to the name of the inventor: Ron Rivest, AdiShamir and Leonard Adleman. However, the security of RSA has not been proved theoretically.
Platform: | Size: 4096 | Author: lin | Hits:

[CA authRSA

Description: :RSA 是最广泛的公钥算法,从程序实现的主要思想、算法分析及流程说明、实验环境要求描述、运行 和结果、运行效率分析和程序源代码六方面介绍运用java程序实现RSA加密算法,要求输入明文的二进制位数 不少于1024。-: RSA public key is the most widely algorithm, from the process to achieve the main ideas, algorithms and processes that describe the experimental environmental requirements, operation and results, operational efficiency analysis and source code six introduce the use of java program RSA encryption algorithm, expressly asked to enter the binary digits of not less than 1024.
Platform: | Size: 160768 | Author: 王功臣 | Hits:

[Crack HackAES

Description: AES-rijndael 算法的详细资料, 包括 AES加密算法中的SBox及其C语言实现.pdf FIPS197(chs).pdf FIPS197.pdf nist.url Rijndael.pdf rijndael算法流程.swf Rijndael算法深入的研究.doc Rijndael算法优化技术研究.doc 公钥密码体制与有限域(2).pdf 一种基于伽罗瓦域的密码系统.pdf-AES-rijndael algorithm detailed information, including the AES encryption algorithm in C language and its SBox realize. PdfFIPS197 (chs). PdfFIPS197.pdfnist.urlRijndael.pdfrijndael flow algorithm. SwfRijndael-depth study of algorithms. DocRijndael algorithm optimization technology research. Doc public key cryptosystem over finite fields and (2). pdf Galois field based on the password system. pdf
Platform: | Size: 1982464 | Author: 张鲁夺 | Hits:

[Crack Hacksuanfa

Description: 信息学竞赛中常用的算法总结: 串匹配的高效算法-KMP 公开密钥体系之RSA算法 双向广度搜索 图论算法 -Informatics algorithms commonly used race Summary: Efficient String Matching Algorithm-KMP system RSA public key algorithm for bi-directional breadth of the search algorithm of graph theory
Platform: | Size: 106496 | Author: lll | Hits:

[Crack HackRSA

Description: RSA算法是在1978年由Ron Rivest, AdiShamir 和Leonard Adleman提出的一种公钥加密算法。RSA能同时用于加密和数字签名的算法,也易于理解和操作。RSA是被广泛研究的公钥算法,从提出至今,经历了各种攻击的考验,逐渐为人们所接受,被普遍认为是目前最优秀的公钥方案之一。-RSA algorithm in 1978 by Ron Rivest, AdiShamir and Leonard Adleman proposed a public key encryption algorithm. RSA can be used for both encryption and digital signature algorithms, but also easy to understand and operate. RSA has been extensively studied is the public key algorithm, from the present, has undergone the test of various attacks, and gradually accepted, is generally considered the best public-key is currently one of the options.
Platform: | Size: 1024 | Author: | Hits:

[Crack HackPGP800-S-W-Inner

Description: 可以实现对邮件的加密解密以及签名,采用多种加密算法,包括对称加密算法和公钥算法等-Can realize the encryption and decryption of messages and signatures, using a variety of encryption algorithms, including symmetric encryption algorithm and public key algorithm
Platform: | Size: 2662400 | Author: | Hits:

[Crack Hackecp

Description: 椭圆曲线公钥密码算法,可用于加密和数字签名等应用,该版本算法是有限域GF(p)上的算法-Elliptic curve public key cryptography algorithms can be used for encryption and digital signature applications, the version of the algorithm is a finite field GF (p) the algorithm
Platform: | Size: 5120 | Author: che wang | Hits:

[Crack Hackec2n

Description: 椭圆曲线公钥密码算法,可用于加密和数字签名等应用,该版本算法是有限域GF(2^n)上的算法-Elliptic curve public key cryptography algorithms can be used for encryption and digital signature applications, the version of the algorithm is a finite field GF (2 ^ n) the algorithm
Platform: | Size: 3072 | Author: che wang | Hits:

[Crack HackRSA

Description: RSA算法的原理分析及实现。RSA是既能用于数据加密也能用于数字签名的一种非对称密码体制的算法。它有一对密钥,其中之一是私有密钥,由用户保存;另一个为公开密钥,可对外公开。并用VC++语言实现,通过MFC设计的一个小系统来模拟算法的简单应用-RSA algorithm and the realization of the principle. RSA is the best tool for data encryption can be used for digital signatures, a non-symmetric cryptography algorithms. It has a pair of keys, one of which is the private key, by the user preserved another for the public key can be made public. And VC++ Language, through the MFC designed a small system to the simple application of simulation algorithm
Platform: | Size: 3694592 | Author: dxh | Hits:

[Crack HackSafeTrans

Description: 使用RSA和DES两种算法为基础,设计实现了一个简单的网络传输模型。 模型里有两个类,Server和Client,Server端要将自己的公钥发给Client,然后Client将自己的DES密钥通过RSA加密发给Server 端。之后双方可以通过DES对称加密进行通信。 -The use of RSA and DES is based on two algorithms, Design and Implementation of a simple model of network transmission. There are two types of models, Server and Client, Server-side to their own public key issued to Client, then Client will own through the RSA encrypted DES key distributed Server client. After the two sides through DES symmetric encryption to communicate.
Platform: | Size: 650240 | Author: qzhirong | Hits:

[Firewall-SecurityCryptography.and.Network.Security.4th.Edition

Description: 本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。全书主要包括下列四个部分:对称密码部分讨论了对称密码的算法和设计原理;公钥加密和散列函数部分讨论了公钥密码的算法和设计原理、报文鉴别码和散列函数的应用等;网络安全应用部分讨论了系统层的安全问题,包括电子邮件安全、IP安全以及Web 安全等;系统安全部分讨论了入侵者和病毒造成的威胁及相应的对策、防火墙和可信系统的应用等。-This book systematically describes encryption and network security study of the basic principles and application technology. Book include the following four parts: symmetric cryptography, symmetric cryptography, discussed some of the algorithms and design principles public-key encryption and hash function discussed some public key cryptography algorithms and design principles, message authentication code and the application of hash function etc. network security part of the system application layer security issues, including e-mail security, IP security and Web security system security is discussed in part caused by the intruder and virus threats and appropriate countermeasures, firewalls and trusted systems and so on.
Platform: | Size: 12995584 | Author: 秦中元 | Hits:

[Linux-UnixPGP.Corporation.PGP.SDK.v3.7.2.ccrun.044998

Description: PGP SDK 包括大范围的标准加密、数字签名和编解码技术,以及各种网络安全协议执行程序。PGP SDK为开发人员提供同其他PGP产品核心相同的核加密功能。 PGP SDK技术说明:PGP SDK是我们的加密和密钥管理库的C接口,支持以下平台: · Windows 98, Millennium (ME), NT, 2000, and XP · Mac OS X · Linux x86 with 2.0.x kernel or later · Sun Solaris SPARC 2.5.1, 2.6, 2.7, or 2.8 -PGP SDK支持下列算法: · Ciphers o IDEA o TripleDES o CAST5 o AES (128-, 182-, 256-bit密钥长度) o Twofish (256-bit 密钥长度) · Hashes o MD5 o SHA-1 o RIPEMD160 o SHA-2 (256-, 384-, 512-bit 密钥长度) · Public Key Algorithms o RSA o Diffie-Hellman o DSA
Platform: | Size: 14045184 | Author: guangmingniu | Hits:

[JSP/JavaJava.III.DataSigning

Description: Java allows configuring multiple JCE providers, and looks up requested algorithms by name. This example shows generating RSA signatures with variable digests, and verification of the signed text by the means of RSA public key. An explanation of the example: 1. Class DataSigning reads the specified file, and creates its digest 2. A unique RSA key pair is created, and the public key is stored with ".key" extension 3. The digest of the text file is signed with the private key 4. During verification, the previously stored public key is retrieved from the file 5. The signature is read from the file 6. The signature is checked, using the public key and newly computed digest of the text
Platform: | Size: 3072 | Author: neo | Hits:

[Crack Hack3_algorithms

Description: 包含AES,DES,以及ElGamal公钥算法-Include AES, DES, as well as the ElGamal public-key algorithms
Platform: | Size: 1584128 | Author: 卡卡 | Hits:

[Other9-Algorithms-That-Changed-the-Future

Description: 普林斯顿大学出版社2012年新出的《9 Algorithms That Changed the Future》(改变未来的九个算法),普及型读物。作者John MacCormick教授系牛津出身的计算机博士。本书精彩地介绍了搜索引擎、PageRank、公开密钥加密、纠错码、模式识别、数据压缩、数据库、数字签名等内容。-MacCormick Professor Oxford is born to the dr computer. This book introduces the wonderful search engine, PageRank, public key encryption, the ecc, pattern recognition, data compression, database, and digital signature, etc.
Platform: | Size: 2869248 | Author: zzz | Hits:

[OS programnetwork_security

Description: A good document about network security : - Symmetric-Key Algorithms - Public-Key Algorithms - Digital Signatures - Key Management - Authentication Protocols
Platform: | Size: 2617344 | Author: Midou Bordji | Hits:
« 12 3 »

CodeBus www.codebus.net