Welcome![Sign In][Sign Up]
Location:
Search - JCE 1

Search list

[Other resourcejce

Description: sun s jce books,include all algrithm such as md5/ras sha tc
Platform: | Size: 440264 | Author: fuchun.xia | Hits:

[Post-TeleCom sofeware systemsjava加密程序(DES)

Description: 通过运用JCE中的des算法来实现对文本的加解密。
Platform: | Size: 597077 | Author: yinjianliang220@126.com | Hits:

[Crack Hack肖俊.java

Description: ava加密扩展即Java Cryptography Extension,简称JCE。它是Sun的加密服务软件,包含了加密和密匙生成功能。JCE是JCA(Java Cryptography Architecture)的一种扩展。 JCE没有规定具体的加密算法,但提供了一个框架,加密算法的具体实现可以作为服务提供者加入。除了JCE框架之外,JCE软件包还包含了SunJCE服务提供者,其中包括许多有用的加密算法,比如DES(Data Encryption Standard)和Blowfish。 为简单计,在本文中我们将用DES算法加密和解密字节码。下面是用JCE加密和解密数据必须遵循的基本步骤: 步骤1:生成一个安全密匙。在加密或解密任何数据之前需要有一个密匙。密匙是随同被加密的应用一起发布的一小段数据,Listing 3显示了如何生成一个密匙。 【Listing 3:生成一个密匙】 -expansion that Java Cryptography Extension, referred to JCE. It is Sun's encryption software, including encryption and key generation functions. JCE is JCA (Java Cryptography Architecture), an extension. JCE no specific encryption algorithms, but provides a framework, the specific encryption algorithm can achieve as a service provider to join. Apart from the JCE framework, JCE package also includes SunJCE service providers, including many useful encryption algorithms such as DES (Data Encryption Standard) and the Blowfish. For simple terms, in this paper we will use DES encryption and decryption algorithms byte code. Below is JCE encryption and decryption of data must adhere to the basic steps : Step 1 : Generating a security keys. In any encryption or decryption of data is needed befo
Platform: | Size: 3072 | Author: 肖俊 | Hits:

[Internet-Networkjce-1_2_2

Description: 介绍加密解密的书籍,对网络中的加密解密算法进行了详细的介绍-on encryption and decryption of books on the network encryption and decryption algorithms for a detailed account of
Platform: | Size: 471040 | Author: 郑述庆 | Hits:

[Crack Hacklist_provider

Description: Getting started examples for the JCE and JCE provider installation.-Getting started examples for the JCE and JC E. provider installation.
Platform: | Size: 4096 | Author: 刘永恒 | Hits:

[CA authCProIssue

Description: 数字证书注册和签发系统,利用JCA和JCE实现数字证书的注册,并提供一个密钥库管理以及私钥的存储和导出以及传输得安全机制-Digital certificate registration and issuance system, the use of JCA and JCE realize digital certificate registration, and provide a key database management, and private key storage and export, as well as a security mechanism for transmission
Platform: | Size: 95232 | Author: ywd | Hits:

[JSPjce

Description: sun s jce books,include all algrithm such as md5/ras sha tc
Platform: | Size: 440320 | Author: fuchun.xia | Hits:

[Crack Hackaescrypt-java-3_0

Description: 利用java实现文件的AES加密功能 This Java AES Crypt package contains the Java class es.vocali.util.AESCrypt, which provides file encryption and decryption using aescrypt file format. Requirements The Java AES Crypt package only works in Java 6, but can be easily adapted to Java 5 by replacing the call to NetworkInterface.getHardwareAddress() with something else. In order to use 256 bit AES keys, you must download and install "Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files" from http://java.sun.com/javase/downloads/index.jsp -Java files using the AES encryption This Java AES Crypt package contains the Java class es.vocali.util.AESCrypt, which provides file encryption and decryption using aescrypt file format. RequirementsThe Java AES Crypt package only works in Java 6, but can be easily adapted to Java 5 by replacing the call to NetworkInterface.getHardwareAddress () with something else. In order to use 256 bit AES keys, you must download and install
Platform: | Size: 35840 | Author: 王小军 | Hits:

[Crack Hackjce_policy-6

Description: 使用SUN JCE 1.6 的授权文件,按照里面的提示安装后就可正常使用SUN JCE 提供的安全编程功能。-JDK 1.6 "Unlimited Strength Jurisdiction Policy Files"
Platform: | Size: 9216 | Author: letianfly | Hits:

[JSP/JavaJava.III.DataSigning

Description: Java allows configuring multiple JCE providers, and looks up requested algorithms by name. This example shows generating RSA signatures with variable digests, and verification of the signed text by the means of RSA public key. An explanation of the example: 1. Class DataSigning reads the specified file, and creates its digest 2. A unique RSA key pair is created, and the public key is stored with ".key" extension 3. The digest of the text file is signed with the private key 4. During verification, the previously stored public key is retrieved from the file 5. The signature is read from the file 6. The signature is checked, using the public key and newly computed digest of the text
Platform: | Size: 3072 | Author: neo | Hits:

[Crack Hackcryptix-jce-20050328-snap

Description: 包含各種加密演算法和Digital Signatures(MD2 MD4 MD5 RIPEMD-128 RIPEMD-160 SHA-0 SHA-1 SHA-256 SHA-384 SHA-512 Tiger)-THIS SOFTWARE IS PROVIDED BY THE CRYPTIX FOUNDATION LIMITED ``AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Platform: | Size: 936960 | Author: 陳盈 | Hits:

[JSP/JavaJCECreate

Description: JCE加密,来源于JAVA Cryptgraph的源码,经过调试和改进。陆续上传当中-from JCE security and java cryptgraph code, I m improving it and uploading!
Platform: | Size: 27648 | Author: wangzhongliang | Hits:

[JSPCryptography

Description: While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.
Platform: | Size: 2560000 | Author: bk | Hits:

[Crack Hackrsa

Description: RSA公钥加密程序,是一种Java的实现方法,与JCE提供的功能比,要简单-RSA public key encryption program, is a Java implementation method of the functionality provided with the JCE ratio, should be simple
Platform: | Size: 2048 | Author: xiao_shaoyong | Hits:

[WEB CodeJCE

Description: JCE编辑器 php系统可用,joomla可用-Available to the system JCE editor php, joomla available
Platform: | Size: 813056 | Author: 张星星 | Hits:

[JSP/Javajce-1_2_2

Description: JCE的jar,密钥分配,技术的特点和基础-JCE jar, this is some key assignment.
Platform: | Size: 471040 | Author: d | Hits:

[JSP/JavaJCE-1.5.ZIP

Description: jce 1.5.zip for down resorce
Platform: | Size: 6144 | Author: lanneret98 | Hits:

[OtherCrypto

Description: 此程式是利用DES 來進行加密與解密的動作,Mode 採用ECB,Padding 方 法則採用PKCS5Padding。Key 是由程式自行產生,採用Pseudorandom number generator 來產生Key。利用Framework 為Java Cryptography Extension (JCE) 。-This program is the use of DES to encrypt and decrypt action, Mode ECB Padding method using PKCS5Padding. Key is generated by the program on their own Pseudorandom number generator to generate the Key. The use of Framework for the Java Cryptography Extension (JCE).
Platform: | Size: 229376 | Author: eason | Hits:

[JSP/Javabouncycastle

Description: bouncycastle.jar是一种用于 Java 平台的开放源码的轻量级密码术包。它支持大量的密码术算法,并提供 JCE 1.2.1 的实现。-bouncycastle.jar lightweight cryptography package is an open-source Java platform used. It supports a large number of cryptographic algorithms and provide JCE 1.2.1 implementation.
Platform: | Size: 5225472 | Author: 郑漾 | Hits:

[source in ebookjce

Description: 关于对话框的vc例子,示范了如何建立一个基于对话框的mfc程序-About dialog vc example, demonstrates how to set up a dialog based MFC application
Platform: | Size: 22528 | Author: mtpgw!268837 | Hits:
« 12 »

CodeBus www.codebus.net