Welcome![Sign In][Sign Up]
Location:
Search - rsa bmp

Search list

[Crack HackRSA-Pic

Description: RSA做的加密BMP的程序。本来RSA不是做这个的,但是作业要求用RSA就这么做了。
Platform: | Size: 33575 | Author: Rex | Hits:

[Crack HackRSA

Description: RSA加密解密BMP图象,并用pollord算法对其进行分析,能够成功加密图象
Platform: | Size: 113153 | Author: qq11420 | Hits:

[Crack HackRsaKit

Description: 一个RSA加解密软件和代码-an RSA encryption and decryption code and software
Platform: | Size: 84992 | Author: 孙小姐 | Hits:

[Data structsRSA MD5 v1.2

Description: RSA MD5加解密算法,用c++实现,核心部分是c的代码,完全跨平台-RSA encryption and decryption algorithms, used to achieve c, c is the core part of the code, completely cross-platform
Platform: | Size: 103424 | Author: 张晓博 | Hits:

[Crack HackRSA-Pic

Description: RSA做的加密BMP的程序。本来RSA不是做这个的,但是作业要求用RSA就这么做了。-BMP do RSA encryption procedure. RSA had not done this, but the operational requirements on the use of RSA did.
Platform: | Size: 33792 | Author: Rex | Hits:

[Crack HackRSA

Description: RSA加密解密BMP图象,并用pollord算法对其进行分析,能够成功加密图象-RSA encryption and decryption BMP images, and pollord analysis algorithm to be successful in image encryption
Platform: | Size: 112640 | Author: qq11420 | Hits:

[Crack HackRSA

Description: RSA公钥加密的基本实现 bmp灰度图片加解密操作包括 RSA 的加减密算法; 素数检测算法;RSA 密钥生成算法; 应用该 RSA 密码体制加、解密; BMP 灰度图的算法; Pollard p-1 算法 ; Pollard r 算法 ; -RSA public key encryption to achieve the basic gray-scale picture bmp including RSA encryption and decryption operations of addition and subtraction Micronesia algorithm prime number detection algorithm RSA key generation algorithm application of the RSA cryptosystem, Encryption and Decryption BMP grayscale algorithm Pollard p-1 algorithm Pollard r algorithm
Platform: | Size: 250880 | Author: 魏汝垚 | Hits:

[Crack HackRSA

Description: RSA加密的简单实现,没有使用较大的质数。可以对BMP灰度图进行加密-Simple implementation of RSA encryption, without using large prime numbers. BMP greyscale can be encrypted
Platform: | Size: 15360 | Author: 葛瑞海 | Hits:

[Crack Hackphoto-rsa-enadecryption

Description: 利用rsa算法实现的对bmp格式的图片进行加密和解密的源代码-The source code for encryption and decryption using rsa algorithm of bmp format images
Platform: | Size: 2048 | Author: baozi | Hits:

[Crack HackSymmetric-key-cryptography

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程; -Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the
Platform: | Size: 45056 | Author: 丁元元 | Hits:

[Crack HackRSA

Description: 完成基于公钥证书的非对称密钥分配工作 说明: (1)作为通讯的双方A和B,都有一个共同信赖的第三方CA,由CA为每个人生成公钥证书和相应的私钥并分发给A、B。 (2)A和B分别将自己的公钥证书提供给对方后,分别在本地验证对方公钥证书是否可靠(假定A、B已经获得CA的公钥),然后A用B的公钥加密一个数据X(整型,可自己定义,比如100)并发送给B,B用自己的私钥解密后得到数据X,然后按协商好的函数F(比如F(X)=2*X)计算得到F(X),再利用A的公钥加密后发送给A;A在本地用自己的私钥解密后得到F(x),在同本地计算得到的F(X)进行对比,如果一致,说明公钥分配成功。 (3)A用B的公钥对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T1; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密(JAVA有库函数支持); (2)密钥长度不少于384位; (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上,CA可以部署在其中一台主机上或第三台主机上);-Completed based on public key certificate allocation asymmetric key Description: ( A ) as a communication between the parties A and B, there is a common trusted third-party CA, generated by the CA public key certificate for each person and the corresponding private key and distributed to A, B. (2) A and B respectively own public key certificate to each other , respectively, the other public key certificate in the local authentication is reliable ( assuming A, B have the CA s public key ) , and A with B s public key to encrypt a data X ( integer, can define their own, such as 100 ) and sent to B, B to use their private key to decrypt the data obtained by X, and then press the negotiated function F ( eg F (X) = 2* X) is calculated F (X), and then encrypted using the public key of A to a A locally decrypted with the private key to obtain F (x), obtained in the same local computing F (X) for comparison , if the same , indicating that public key distribution success. (3) A with B s pu
Platform: | Size: 5120 | Author: 丁元元 | Hits:

[Crack HackRSA-Symmetric-key

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程;-Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the
Platform: | Size: 15360 | Author: 丁元元 | Hits:

CodeBus www.codebus.net