Welcome![Sign In][Sign Up]
Location:
Search - cryptography symmetric

Search list

[OtherApplicationofCryptography

Description: 一本关于密码学应用的学习参考书,内有对称密钥加密、数字签名、认证、公钥加密、哈希算法等内容,内容全面。-one on the application of cryptography study reference books, there are symmetric key encryption, digital signature, authentication, public key encryption, Hash algorithms, comprehensive content.
Platform: | Size: 5590016 | Author: xiaoyu | Hits:

[WEB CodeSymmetricAlgorithms

Description: 密码学的作业--对称算法,主要是对称加密解密-Cryptography operations- symmetric algorithm, symmetric encryption and decryption is mainly
Platform: | Size: 41984 | Author: elsie | Hits:

[Crack HackRSA

Description: RSA对称、非对称加密解密算法,源代码和可执行文件,希望对学习密码学的朋友有帮助! -RSA symmetric, asymmetric encryption and decryption algorithms, source code and executable files, and they hope to learn cryptography helpful friend!
Platform: | Size: 432128 | Author: 胡定勇 | Hits:

[Crack Hackjava_encrypt_decrypt

Description: 1、利用公钥密码技术实现对称密码技术密钥的分配; 2、利用所分配的对称密钥对通信内容进行加/解密; -1, the use of public key cryptographic techniques to achieve symmetric cryptography key distribution 2, using the symmetric key by the distribution of the content of communication encryption/decryption
Platform: | Size: 17408 | Author: 张海滨 | Hits:

[Crack HackRSA

Description: RSA算法的原理分析及实现。RSA是既能用于数据加密也能用于数字签名的一种非对称密码体制的算法。它有一对密钥,其中之一是私有密钥,由用户保存;另一个为公开密钥,可对外公开。并用VC++语言实现,通过MFC设计的一个小系统来模拟算法的简单应用-RSA algorithm and the realization of the principle. RSA is the best tool for data encryption can be used for digital signatures, a non-symmetric cryptography algorithms. It has a pair of keys, one of which is the private key, by the user preserved another for the public key can be made public. And VC++ Language, through the MFC designed a small system to the simple application of simulation algorithm
Platform: | Size: 3694592 | Author: dxh | Hits:

[Firewall-SecurityCryptography.and.Network.Security.4th.Edition

Description: 本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。全书主要包括下列四个部分:对称密码部分讨论了对称密码的算法和设计原理;公钥加密和散列函数部分讨论了公钥密码的算法和设计原理、报文鉴别码和散列函数的应用等;网络安全应用部分讨论了系统层的安全问题,包括电子邮件安全、IP安全以及Web 安全等;系统安全部分讨论了入侵者和病毒造成的威胁及相应的对策、防火墙和可信系统的应用等。-This book systematically describes encryption and network security study of the basic principles and application technology. Book include the following four parts: symmetric cryptography, symmetric cryptography, discussed some of the algorithms and design principles public-key encryption and hash function discussed some public key cryptography algorithms and design principles, message authentication code and the application of hash function etc. network security part of the system application layer security issues, including e-mail security, IP security and Web security system security is discussed in part caused by the intruder and virus threats and appropriate countermeasures, firewalls and trusted systems and so on.
Platform: | Size: 12995584 | Author: 秦中元 | Hits:

[Grid ComputingSignData

Description: 1、实现集中式对称密钥的分配工作(作为通讯的双方A和B,都已经分别和KDC拥有会话密钥); 2、分布式对称密钥分配(作为通讯的双方A和B已经共享一个会话主密钥); 3、公钥密码技术实现对称密码技术密钥的分配(作为通讯的双方A和B已经拥有对方的公钥);-1, the realization of a centralized allocation of symmetric key (for communication between the parties A and B, respectively, and the KDC already has a session key) 2, Distributed symmetric key distribution (as communications between the parties A and B have to share a session master key) 3, public key cryptographic techniques to achieve symmetric cryptography key distribution (for communication between the parties A and B have each other' s public key)
Platform: | Size: 31744 | Author: liu | Hits:

[Crack Hackcrypt

Description: 密码学实验平台,完整独立运行VC6.0 源程序,包含对称密码学和公钥密码学的主要算法。-Cryptography experimental platform, a complete stand-alone source of VC6.0, including the main algorithm of symmetric cryptography and public key cryptography.
Platform: | Size: 155648 | Author: zhou | Hits:

[Crack Hackidea

Description: encryption algorithm, IDEA, symmetric key cryptography algorithm used in internet widly
Platform: | Size: 447488 | Author: sujata | Hits:

[Other2006issc

Description: Security in wireless sensor networks is currently provided through symmetric key cryptography. Although the low computational complexity involved in private key algorithms is advantageous, session keys must be embedded in the sensor nodes before the nodes can be deployed. Protocols are also necessary to ensure synchronization of keys between the devices on a network. These protocols require significant communication and storage overhead. The limitation of such a cryptosystem is that it is not possible to guarantee the confidentiality of the session keys
Platform: | Size: 179200 | Author: yared | Hits:

[JSPBeginning_Cryptography_with_Java

Description: While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.
Platform: | Size: 2560000 | Author: YY | Hits:

[JSPCryptography

Description: While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.
Platform: | Size: 2560000 | Author: bk | Hits:

[Crack Hack22

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pig.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2;-Completion of asymmetric cryptography based on symmetric key distribution work Description: (1) the completion of the asymmetric public key certificate-based key distribution based on the work, according to the materials on asymmetric cryptography based on symmetric key distribution scheme, the completion of the allocation of symmetric key Ks. (2) A document with Ks on an image (test_pig.bmp) is encrypted and sent to B, B to decrypt receipt, compared to the original image to see if the same, and record the entire encryption/decryption time spent T2 (3) contrast T1 and T2
Platform: | Size: 43008 | Author: 熊龙生 | Hits:

[Crack HackCipher

Description: 古典列置换密码。属于古典密码学、对称密钥。本程序有界面。-Classical column replacement password. Belong to classical cryptography, symmetric key. The procedure interface.
Platform: | Size: 48128 | Author: 雁集 | Hits:

[OS programCryptographylabreport

Description: 是大学信息安全方向的密码学课程的4个实验报告,包括古典密码,对称密码,非对称密码,HASH算法-The direction of the University Information Security Cryptography course four lab reports, including classical cryptography, symmetric key, asymmetric cryptography, HASH algorithm
Platform: | Size: 41984 | Author: 陆风 | Hits:

[Crack HackANSI_X9.42-2003

Description: ANSI X9.42--金融业务的公开密钥加密:使用离散对数密码术的对称密码协议-ANSI X9.42-- financial services public key encryption: using discrete logarithm cryptography symmetric cryptographic protocols
Platform: | Size: 336896 | Author: chunlv | Hits:

[Crack HackSymmetric-key-cryptography

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程; -Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the
Platform: | Size: 45056 | Author: 丁元元 | Hits:

[Crack HackRSA-Symmetric-key

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程;-Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the
Platform: | Size: 15360 | Author: 丁元元 | Hits:

[Crack HackNET-Cryptography

Description: .net密码术 其中包括了对称加密、非对称加密、数字签名、散列算法等。-. Net cryptography including symmetric encryption, asymmetric encryption, digital signatures, hashing algorithm.
Platform: | Size: 71680 | Author: 杜杜 | Hits:

[Crack HackLab2 - Symmetric

Description: Cryptolab problem blah blah
Platform: | Size: 1024 | Author: rakib13 | Hits:
« 12 3 4 »

CodeBus www.codebus.net