Location:
Search - send public key
Search list
Description: 一、RSA基本原理
对明文分组M和密文分组C,加密与解密过程如下:
C = POW (M , e) mod n
M = POW(C , d) mod n = POW(POW( M ,e), d) mod n=POW( M,e*d)
其中POW是指数函数,mod是求余数函数。
其中收发双方均已知n,发送放已知e,只有接受方已知d,因此公钥加密算法的公钥为
KU={ e , n},私钥为KR={d , n}。该算法要能用做公钥加密,必须满足下列条件:
1. 可以找到e ,d和n,使得对所有M<n ,POW(M ,e*d)=M mod n .
2. 对所有 M<n,计算POW (M , e)和POW(C , d)是比较容易的。
3. 由e 和n确定d是不可行的
-one, the basic tenets of RSA expressly group M and cipher block C, encryption and decryption process is as follows : C = POW (M, e) mod n = M POW (C, d) mod n = POW (POW (M, e), d) mod n = POW (M, e * d), which is an exponential function POW, mod is the pursuit of the remaining functions. Transceivers which both known n, send e Fang known, the only known recipient d, therefore the public key encryption algorithm for public key e KU = (n), private key for KR = (d, n). The algorithm could be used to be a public key encryption, must meet the following conditions : 1. E can be found, and d n, making all the right M
Platform: |
Size: 5523 |
Author: 烟翔 |
Hits:
Description: 本文描述了证书请求消息格式(CRMF)。它被用来向CA传递一个产生X.509证书请求 (可能通过RA)。请求消息一般包括公钥和有关的登记信息。-This paper describes a certificate request message format (CRMF). It was used to send a CA have X.509 certificate request (possibly through RA). Requests for general information, including public key and the registration information.
Platform: |
Size: 13705 |
Author: 夏珊 |
Hits:
Description: 本文描述了证书请求消息格式(CRMF)。它被用来向CA传递一个产生X.509证书请求 (可能通过RA)。请求消息一般包括公钥和有关的登记信息。-This paper describes a certificate request message format (CRMF). It was used to send a CA have X.509 certificate request (possibly through RA). Requests for general information, including public key and the registration information.
Platform: |
Size: 13312 |
Author: 夏珊 |
Hits:
Description: 一、RSA基本原理
对明文分组M和密文分组C,加密与解密过程如下:
C = POW (M , e) mod n
M = POW(C , d) mod n = POW(POW( M ,e), d) mod n=POW( M,e*d)
其中POW是指数函数,mod是求余数函数。
其中收发双方均已知n,发送放已知e,只有接受方已知d,因此公钥加密算法的公钥为
KU={ e , n},私钥为KR={d , n}。该算法要能用做公钥加密,必须满足下列条件:
1. 可以找到e ,d和n,使得对所有M<n ,POW(M ,e*d)=M mod n .
2. 对所有 M<n,计算POW (M , e)和POW(C , d)是比较容易的。
3. 由e 和n确定d是不可行的
-one, the basic tenets of RSA expressly group M and cipher block C, encryption and decryption process is as follows : C = POW (M, e) mod n = M POW (C, d) mod n = POW (POW (M, e), d) mod n = POW (M, e* d), which is an exponential function POW, mod is the pursuit of the remaining functions. Transceivers which both known n, send e Fang known, the only known recipient d, therefore the public key encryption algorithm for public key e KU = (n), private key for KR = (d, n). The algorithm could be used to be a public key encryption, must meet the following conditions : 1. E can be found, and d n, making all the right M
Platform: |
Size: 1965056 |
Author: |
Hits:
Description: 一种基于DES 和RSA 算法的混合密码系统
混合密码系统充分利用了公钥密码和对称密码算法的优点,克服其缺点,解决了每次传送更新密钥的问题。发送者自动生成对称密钥,用对称密钥按照DES 算法加密发送的信
息,将生成的密文连同用接受方的公钥按照RSA 算法加密后的对称密钥一起传送出去。收信者用其密钥按照RSA 算法解密被加密的密钥来得到对称密钥,并用它来按照DES 算法解密密文。-Based on DES and RSA algorithm for mixed-hybrid cryptosystem Cryptosystem full advantage of the public-key cryptosystem and symmetric cryptographic algorithm the advantages and overcome its shortcomings, every time you send updates to resolve the key issues. Sender automatically generated symmetric key, used in accordance with the DES algorithm for symmetric key encryption to send information, the generated ciphertext together with the use of the recipient in accordance with the RSA algorithm for public key encrypted symmetric key sent together. Who receive their keys in accordance with the RSA encryption algorithm decryption key was to get the symmetric key and use it in accordance with the DES algorithm to decrypt the ciphertext.
Platform: |
Size: 110592 |
Author: hujun |
Hits:
Description: 加密算法实现
Pegwit is a program for performing public key file encryption
and authentication.
Encryption means that pegwit allows you to keep the information
in files you send by email (or other means) confidential.
Eavesdroppers will not be able to read the email.
Authentication allows you to check that a file has not been
tampered with (changed) since it was signed.-Encryption algorithm Pegwit is a program for performing public key file encryptionand authentication.Encryption means that pegwit allows you to keep the informationin files you send by email (or other means) confidential.Eavesdroppers will not be able to read the email.Authentication allows you to check that a file has not beentampered with (changed) since it was signed.
Platform: |
Size: 126976 |
Author: shuo |
Hits:
Description: RSA也可以用来为一个消息署名。假如甲想给乙传递一个署名的消息的话,那么她可以为她的消息计算一个散列值,然后用她的密钥加密这个散列值并将这个“署名”加在消息的后面。这个消息只有用她的公钥才能被解密。乙获得这个消息后可以用甲的公钥解密这个散列值,然后将这个数据与他自己为这个消息计算的散列值相比较。假如两者相符的话,那么他就可以知道发信人持有甲的密钥,以及这个消息在传播路径上没有被篡改过。-RSA can also be used as a signed message. If i want to give B send a signed message, then she can for her calculation of a message hash value, and then use her key encryption of the hash value and the " signed" the message added to the back. This message is only used her public key can be decrypted. B received the news with a public key can decrypt the hash value, then this data with his own message for the hash value calculated in comparison. If the two match, then the sender to know him a key holder, as well as in the dissemination of this message on the path had not been tampered with.
Platform: |
Size: 22528 |
Author: 吴成刚 |
Hits:
Description: RSA的最重要特色在于双密钥,它们有特殊的数学形式。RSA的一对密钥有三个基本参数:模n ,公钥b和私钥a 。n和b是公开的,发送信息方用私钥n加密消息,接受方用公钥b能得到解密后的信息,从而确定发送信息方的身份,这就构成了签名机制。对方用公钥将要发送的信息加密,只有拥有私钥的一方才能将信息解密。-RSA is the most important feature of dual-key, they have a special mathematical form. RSA keys of a pair of three basic parameters: modulus n, public key private key b and a. n and b are open to the public to send a message encrypted using the private key n message recipient using the public key can be decrypted b after information, send a message to determine the identity of parties, which constitute a signature. The other side will use public key encryption to send information that only those with the private key of the party can decrypt the information.
Platform: |
Size: 3072 |
Author: Rebecca |
Hits:
Description: 实用数字签名的步骤
(1)发送方使用MD5算法对原始信息进行计算,获得一个固定长度的信息摘要
(2)发送方用自己的私钥加密生成的信息生成发送方的数字签名,发送方把这个数字签名作为发送信息的附件和明文信息,一同用接收方的公钥进行加密,将加密后的密文一同发送给接收方;
(3)接收方首先把接收到的密文用自己的私钥解密,得到明文信息和数字签名,再用发送方的公钥对数字签名进行解密,然后使用相同的单向散列算法来计算解密得到的明文信息,得到信息摘要;对比计算出来的信息摘要和发送方发送过来的信息摘要是否一致-Practical steps to a digital signature
(1) sender MD5 algorithm used to calculate the original information, access to a fixed length message digest
(2) use their own sender s private key to generate encrypted information generated by the sender s digital signature, the sender of the digital signature as an annex to send a message and express information, together with the recipient s public key for encryption, will be encrypted ciphertext sent to the receiver together
(3) the recipient first received ciphertext with its own private key to decrypt received explicit information and digital signatures, and then the sender s public key to decrypt the digital signature, and then use the same one-way hash algorithm to calculate the explicit information to be decrypted, the message digest contrast calculated message digest and the sender sent the message digest are consistent
Platform: |
Size: 23552 |
Author: 张云 |
Hits:
Description: Information security was first explored in the context of communication systems. When two
entities send or receive sensitive data using public networks or communication channels that are
easily accessible by could-be attackers, they should generally provide the basic security
functions such as data confidentiality, data integrity, and peer authentication. Confidentiality,
integrity, and authentication services are critical to preventing an adversary from compromising
the security of a distributed sensor network. Key management is likewise critical to establishing
the keys necessary to provide this protection.
Platform: |
Size: 547840 |
Author: A.H.M Shahparan |
Hits:
Description: 发送方用自己的私钥加密通讯内容生成发送方的数字签名,并将其发送给接受方;接受方利用发送方的公钥对该签名内容进行验证;
思考:
(1)这种方式是否存在安全问题?
(2)请分别选择文件test-1.txt和test_pig.bmp作为通讯内容,分别记录全过程用时,并对比一下;-Sender s private key encrypted communications with their own content generated digital signature the sender, and send it to the receiving party the receiving party using the sender s public key to verify the contents of the signature
Consideration:
(1) whether there are security issues in this way?
(2) Please select the file test-1.txt respectively and test_pig.bmp as communications content, the whole process were recorded with a time and compare
Platform: |
Size: 93184 |
Author: 熊龙生 |
Hits:
Description: 完成基于公钥证书的非对称密钥分配工作
说明:
(1)作为通讯的双方A和B,都有一个共同信赖的第三方CA,由CA为每个人生成公钥证书和相应的私钥并分发给A、B。
(2)A和B分别将自己的公钥证书提供给对方后,分别在本地验证对方公钥证书是否可靠(假定A、B已经获得CA的公钥),然后A用B的公钥加密一个数据X(整型,可自己定义,比如100)并发送给B,B用自己的私钥解密后得到数据X,然后按协商好的函数F(比如F(X)=2*X)计算得到F(X),再利用A的公钥加密后发送给A;A在本地用自己的私钥解密后得到F(x),在同本地计算得到的F(X)进行对比,如果一致,说明公钥分配成功。
(3)A用B的公钥对一图象文件(test_pig.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T1;-Complete the asymmetric public key certificate-based key distribution work
Description:
(1) as the communication of both A and B, have a common trusted third party CA, the CA generates a public key certificate for each person and the corresponding private key and distributed to A, B.
(2) A and B respectively to provide their own public key certificates to each other both in the local verify the reliability of each other s public key certificate (assuming A, B has received CA s public key), then A with B s public key encryption 1 the data X (integer, can be their own definition, such as 100) and send it to B, B with their own private key decrypted by the data X, and then consult a good function by F (eg F (X) = 2* X) calculated F (X), then encrypted using A s public key sent to A A locally with their own private key to decrypt obtained F (x), calculated with the local F (X) are compared, if the same description Successful public-key distribution.
(3) A with B s public key on an
Platform: |
Size: 71680 |
Author: 熊龙生 |
Hits:
Description: 利用System.Web.Mail这个名称空间.在这个名字空间下,有一个专门使用SMTP协议来发送邮件的类:SmtpMail,它已能满足最普通的发送邮件的需求。这个类只有一个自己的公共函数--Send()和一个公共属性—SmtpServer,您必须通过SmtpServer属性来指定发送邮件的服务器的名称(或IP地址),然后再调用Send()函数来发送邮件。您可以在Send函数的参数MailMessage对象中设置邮件的相关属性,如优先级、附件等等。除了以MailMessage对象为参数(如上述代码),Send函数还可以简单的直接以邮件的4个主要信息(from,to,subject,messageText)作为字符串参数来调用。-The use of System.Web.Mail namespace. In the name space, there is a special SMTP protocol used to send the message class: SmtpMail, it has been able to send messages to meet the most common needs. This class is only one of their public functions- Send () and a public property-SmtpServer, you must SmtpServer attribute to specify the sending mail server' s name (or IP address), and then call the Send () function to send a message. Send function, you can set the parameters of MailMessage object mail-related properties, such as priority, accessories and more. In addition to the MailMessage object as an argument (such as the above code), Send function, you can simply e-mail directly to the 4 key messages (from, to, subject, messageText) as a string parameter to call.
Platform: |
Size: 51200 |
Author: shen6041 |
Hits:
Description: 1) 本接口需要 mcrypt 和 bcmath 两个PHP扩展库的支持,请先确认您安装并启用了这两个库。
如果您是虚拟主机用户,一般主机商都会安装这两个标准库,您可以使用 phpinfo() 函数查看PHP配置信息,如果没有安装,请联系主机商解决。
2) 文件说明:netpaylclient.php 为 chinapay 提供的签名验签函数库文件,lib_curl.php 为 chinapay 提供的实用函数库文件,方便您使用 curl 发送 HTTP 请求(需要curl扩展库支持)
3) 拷贝本示例到服务器任意位置(外网需可访问,否则交易应答无法接收), 虚拟主机用户直接FTP上传即可。
4) 您在本公司申请商户号后,将得到两个后缀名为.key的测试密钥文件,其中以 Mer 开头的为私钥文件,以 Pg 开头的为公钥文件。
把这两个密钥文件放到本演示程序所在目录下(其他位置也可,但需要根据实际位置进行相应配置)
打开 netpayclient_config.php 文件,根据您的实际情况修改 PRI_KEY 和 PUB_KEY 两项。
5) 本演示程序附有详细的注释说明,通常情况下,您直接修改本示例中的程序代码即可轻松完成接入。如您有个性化需求,您可以参照《商户网上支付接入手册》帮助理解。-1) This interface requires mcrypt extensive library of and bcmath two PHP support, make sure you install and enable these two libraries.
If you are a virtual host the user, generally host will install both standard library, you can use the phpinfo () function to view the PHP configuration
Information, if not installed, please contact your host to resolve.
2) files: the library file netpaylclient.php provided for chinapay, signature stamped the, lib_curl.php chinapay
Practical library file, easy to use curl to send HTTP requests (needs curl extension library support)
3) copy this example to the server anywhere (outside the network need to access, otherwise the transaction response can not be received), the virtual host users direct FTP upload
Can.
4) The applicant merchant in the Company, will be two suffix. The key test key file, which Mer at the beginning of the private key file.
Pg at the beginning of the public key file.
These two key files into the directory where th
Platform: |
Size: 283648 |
Author: 王浩 |
Hits:
Description: 实用数字签名的步骤
(1)发送方使用MD5算法对通信内容进行计算,获得一个固定长度的信息摘要;
(2)发送方用自己的私钥加密生成的信息生成发送方的数字签名,发送方把这个数字签名作为发送信息的附件和明文信息,一同用接收方的公钥进行加密,将加密后的密文一同发送给接收方;
(3)接收方首先把接收到的密文用自己的私钥解密,得到明文信息和数字签名,再用发送方的公钥对数字签名进行解密,然后使用相同的单向散列算法来计算解密得到的明文信息,得到信息摘要;对比计算出来的信息摘要和发送方发送过来的信息摘要是否一致
思考:
(1)请分别选择文件test-1.txt和test_picture.bmp作为通讯内容,分别记录全过程用时,并对比一下;
(2)如果所发送的内容数据量非常大,上述方案中的效率不能满足要求,请考虑一下如何解决这个问题。-Practical steps digital signature
( A ) the sender uses the MD5 algorithm to calculate the content of communications , access to a fixed-length message digest
( 2 ) the sender s private key encryption with their own information generated by the sender generates a digital signature , the digital signature of the sender of the message as an attachment and send plaintext , together with the recipient s public key to encrypt the encrypted sent along with the ciphertext to the recipient
( 3 ) First, the recipient receives the ciphertext with his private key to decrypt , get the plaintext and the digital signature , then the sender s public key to decrypt the digital signature , and then using the same one-way hash algorithm to calculate decrypted plaintext information, to receive message digest comparing the calculated message digest and the information sent from the sender summary is consistent
Reflections :
( 1 ) Please select the file test-1.txt respectively and test_pictur
Platform: |
Size: 1383424 |
Author: 丁元元 |
Hits: