Description: 使用NTL大整数库实现RSA公钥密码算法,可用于对文本文件进行加密和解密.
平台Windows98以上,VC++6.0, 内部文件路径均为相对路径,不存在无法编译的Bub.-use of the NTL large integer achieve RSA public key cryptography algorithm, can be used to text file encryption and decryption. Windows98 platform above, VC 6.0, trails are internal documents relative path, we can not compile Bub. Platform: |
Size: 1917069 |
Author:李刚 |
Hits:
Description: rsa数字签名公钥加密私钥解密c++源代码-The C++ source program of RSA digital signature about encryption with public key and decryption with secret key. Platform: |
Size: 5120 |
Author:冉冉 |
Hits:
Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering. Platform: |
Size: 1405952 |
Author:周爽 |
Hits:
Description: RSA算法是一种公钥密码算法.实现RSA算法包括生成RSA密钥,用RSA加密规则和解密规则处理数据。RSA数字签名算法利用RSA算法实现数字签名。本文详述了RSA算法的基本原理, RSA加密算法的实现以及如何利用RSA实现数字签名.-RSA is a public key cryptography algorithm. Implementation of RSA algorithm include RSA key generation. using RSA encryption and decryption rules rules processing data. RSA digital signature algorithm uses RSA Digital Signature Algorithm. The paper describes how the RSA algorithm to the basic principles RSA encryption algorithm and the realization of how to use RSA digital signature. Platform: |
Size: 19456 |
Author:huke |
Hits:
Description: 1、利用公钥密码技术实现对称密码技术密钥的分配;
2、利用所分配的对称密钥对通信内容进行加/解密;
-1, the use of public key cryptographic techniques to achieve symmetric cryptography key distribution 2, using the symmetric key by the distribution of the content of communication encryption/decryption Platform: |
Size: 17408 |
Author:张海滨 |
Hits:
Description: 大数运算库miracl。有了miracl这样的函数库,你可以直接调用函数,来实现你要的公钥密码学的某个功能。-Treasury computing large numbers miracl. With miracl this library, you can directly call the function, to realize that you ask for a public-key cryptography functions. Platform: |
Size: 1295360 |
Author:Michael Lee |
Hits:
Description: 椭圆曲线公钥密码算法,可用于加密和数字签名等应用,该版本算法是有限域GF(p)上的算法-Elliptic curve public key cryptography algorithms can be used for encryption and digital signature applications, the version of the algorithm is a finite field GF (p) the algorithm Platform: |
Size: 5120 |
Author:che wang |
Hits:
Description: 椭圆曲线公钥密码算法,可用于加密和数字签名等应用,该版本算法是有限域GF(2^n)上的算法-Elliptic curve public key cryptography algorithms can be used for encryption and digital signature applications, the version of the algorithm is a finite field GF (2 ^ n) the algorithm Platform: |
Size: 3072 |
Author:che wang |
Hits:
Description: RSA公钥密码体制的matlab实现,这是密码学的加密算法之一-RSA public-key cryptosystem implementation of matlab, Cryptography This is one of the encryption algorithm Platform: |
Size: 1024 |
Author:xiaotiantian |
Hits:
Description: 本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。全书主要包括下列四个部分:对称密码部分讨论了对称密码的算法和设计原理;公钥加密和散列函数部分讨论了公钥密码的算法和设计原理、报文鉴别码和散列函数的应用等;网络安全应用部分讨论了系统层的安全问题,包括电子邮件安全、IP安全以及Web 安全等;系统安全部分讨论了入侵者和病毒造成的威胁及相应的对策、防火墙和可信系统的应用等。-This book systematically describes encryption and network security study of the basic principles and application technology. Book include the following four parts: symmetric cryptography, symmetric cryptography, discussed some of the algorithms and design principles public-key encryption and hash function discussed some public key cryptography algorithms and design principles, message authentication code and the application of hash function etc. network security part of the system application layer security issues, including e-mail security, IP security and Web security system security is discussed in part caused by the intruder and virus threats and appropriate countermeasures, firewalls and trusted systems and so on. Platform: |
Size: 12995584 |
Author:秦中元 |
Hits:
Description: 密码学实验平台,完整独立运行VC6.0 源程序,包含对称密码学和公钥密码学的主要算法。-Cryptography experimental platform, a complete stand-alone source of VC6.0, including the main algorithm of symmetric cryptography and public key cryptography. Platform: |
Size: 155648 |
Author:zhou |
Hits:
Description: RSA-is an algorithm for public-key cryptography-RSA-is an algorithm for public-key cryptography Platform: |
Size: 6144 |
Author:andrushkutzzaa |
Hits:
Description: 完成基于非对称密码技术的对称密钥分配工作
说明:
(1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。
(2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2;
(3)对比T1和T2;
要求:
(1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持);
(2)通信内容为一图象文件(test_pic.bmp);
(3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上);
(4)所分配的对称密钥皆为一次一密,随机产生;
(5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程;
-Completed based on asymmetric cryptography symmetric key distribution work
Description:
( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work .
(2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2
( 3 ) comparing T1 and T2
Requirements:
(1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported )
( 2) The content of the communication is an image file (test_pic.bmp)
( 3 ) complete network-based key distribution job ( as the Platform: |
Size: 45056 |
Author:丁元元 |
Hits: