Welcome![Sign In][Sign Up]
Location:
Search - security algorithm by java

Search list

[Crack Hack04030326

Description: 信息技术的飞速发展,使人们的生活面貌发生了很大的变化,同时信息技术也促进了社会的发展。在计算机网络深入普及的信息时代,信息本身就是时间,就是财富。如何保护信息的安全使之不被窃取及不至于被篡改或破坏,已成为当今普遍关注的重大问题。密码是有效且可行的办法。 本论文主要是介绍了文件加密以及一个小程序,从密钥生成、DES加密原理、DES解密原理三方面阐述了DES算法的整个过程。并在此基础上,在windows环境下,利用java实现DES加密与解密算法,以窗体界面方式完成一个本地的文件加解密演示器。 本论文共分为七部分。第一章从现代电子技术的发展揭示密码学在科学领域中的重要性,从而说明选此课题作为毕业设计的原因。第二章讲述了密码学的基础知识。第三章是本文的重点,以DES历史回顾为起点,逐一揭示DES算法原理,并按密钥生成、DES加密、DES解密的次序,利用java语言实现DES的加密与解密代码的设计。第四章对窗体界面作简要的介绍,说明本演示器的工作过程。第五章对DES存在的安全性进行分析及可行的解决方案。第六章对DES的工作模式进行简要的介绍。第七章举例对代码进行测试,看是否符合标准的DES加密和解密。- The information technology rapid development, caused people’s life appearance to have the very big change, simultaneously the information technology also promoted society development. In the computer network thorough popularization information time, information itself is the time, is the wealth. How protects the information security to cause it not to be stole and as for not to tamper with or destruction, has become the major issue which now generally pays attention . The password is useful and effectible method. This article mainly introduces the DES encryption and decipher algorithm java language realization, three aspects elaborated from key fresh、the encryption principle DES、the decryption principle DES algorithm entire has worked. And in this foundation, in windows environment, realizes the encryption and decryption algorithm using java, completes a local document by the window contact surface way to add the decipher demonstration. The article divides into seven to blow. Fi
Platform: | Size: 395264 | Author: 张贺寅 | Hits:

[JSP/Javasha256.java

Description: Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
Platform: | Size: 3072 | Author: patataman | Hits:

[Crack HackCaeseer

Description: Caseer: security algorithm Used for security of strings , messages and etc.
Platform: | Size: 3072 | Author: Sika | Hits:

[Crack Hackjava_security_sdk

Description: 软件是bouncycastle组织开发的软件包,包括DES_CBC算法的实现、RSA算法的实现(包括:密钥生成、公钥加密和私钥解密、数字签名及签名验证)、数字信封的实现、利用数字信封实现大文件的加密、解密。可以作为研究、学习信息安全中的密码学设计与实现技术。在原版的基础上进行一些改进,对文件加密、解密的时候要频繁的IO加一个缓冲区,RSA私钥积存的时候可以按PKCS8形式,再经BASE64编码保存。-Software development organization is bouncycastle package, including DES_CBC Algorithm, RSA algorithm implementation (including: key generation, public key encryption and private decryption, digital signature and signature verification), the realization of digital envelope using the envelope to achieve digital large file encryption and decryption. Can be used as research, study of information security design and implementation of cryptographic technology. On the basis of the original number of improvements, file encryption, decryption time to frequent the IO plus a buffer, RSA private key can PKCS8 accumulated when the form and then saved by the BASE64 encoding.
Platform: | Size: 212992 | Author: 鹿淑煜 | Hits:

CodeBus www.codebus.net