Description: This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support
for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set
of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality.
This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic
classes as well as their innards. Platform: |
Size: 1392640 |
Author:ricky |
Hits:
Description: 此程式是利用DES 來進行加密與解密的動作,Mode 採用ECB,Padding 方
法則採用PKCS5Padding。Key 是由程式自行產生,採用Pseudorandom number
generator 來產生Key。利用Framework 為Java Cryptography Extension (JCE) 。-This program is the use of DES to encrypt and decrypt action, Mode ECB Padding method using PKCS5Padding. Key is generated by the program on their own Pseudorandom number generator to generate the Key. The use of Framework for the Java Cryptography Extension (JCE). Platform: |
Size: 229376 |
Author:eason |
Hits:
Description: 完成基于非对称密码技术的对称密钥分配工作
说明:
(1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。
(2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2;
(3)对比T1和T2;
要求:
(1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持);
(2)通信内容为一图象文件(test_pic.bmp);
(3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上);
(4)所分配的对称密钥皆为一次一密,随机产生;
(5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程;
-Completed based on asymmetric cryptography symmetric key distribution work
Description:
( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work .
(2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2
( 3 ) comparing T1 and T2
Requirements:
(1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported )
( 2) The content of the communication is an image file (test_pic.bmp)
( 3 ) complete network-based key distribution job ( as the Platform: |
Size: 45056 |
Author:丁元元 |
Hits:
Description: 此代码用java编写,实现凯撒密码的加密和解密,-this codes are edited in java,which is Caesar encryption and decryption Platform: |
Size: 165888 |
Author:蔡晓慈 |
Hits:
Description: 实习三 基于RSA的公钥加密
一、实习目的
1.理解公钥密码算法,熟悉常用密码算法:RSA、椭圆曲线密码体制;
2.以RSA加密算法为例,掌握公钥密码算法加解密过程的实现。
二、实现要求
1.实习前认真预习第6章的有关内容;
2.熟悉java中java.security.*和java.crypto.* 中相关类。
三、实习内容
-Practice three based on the RSA public key encryption
一、实习目的
One, the purpose of internship
1.理解公钥密码算法,熟悉常用密码算法:RSA、椭圆曲线密码体制;
1 understand the public key cryptography, familiar with the commonly used cryptographic algorithms: RSA, elliptic curve cryptosystem
2.以RSA加密算法为例,掌握公钥密码算法加解密过程的实现。
2 to the RSA encryption algorithm as an example, to grasp the implementation of public key cryptography algorithm encryption and decryption process.
二、实现要求
Two, the implementation requirements
1.实习前认真预习第6章的有关内容;
1 practice about the content of the sixth chapter carefully before the preview
2.熟悉java中java.security.*和java.crypto.* 中相关类。
2 familiar with the relevant class of java.security.* and java.crypto.* in java.
三、实习内容
Three, practice content
Platform: |
Size: 6144 |
Author:leon |
Hits:
Description: Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. One of the best-known techniques has been credited to Moni Naor and Adi Shamir, who developed it in 1994. Platform: |
Size: 384000 |
Author:rahul |
Hits:
Description: 用JAVA语言设计并实现一个密码学综合工具,实现常用的称加密算法、非对称加密算法、HASH算法、MAC算法、数字签名算法-
Design and implement a comprehensive tool cryptography JAVA language, called achieve common encryption algorithms, asymmetric encryption algorithm, HASH algorithm, MAC algorithm, the Digital Signature Algorithm Platform: |
Size: 9040896 |
Author:LiYj |
Hits:
Description: 人脸识别系统,基于opencv的swing的界面操作,外加涉及到密码学(Face recognition system, based on OpenCV's swing interface operation, and related to cryptography.) Platform: |
Size: 3391488 |
Author:cc@cc |
Hits: