Location:
Search - java Encrypt m
Search list
Description: 实现DES和RSA的加密解密,MD5还有数字签名。-The realization of DES and RSA s encryption and decryption, MD5 digital signature also.
Platform: |
Size: 4096 |
Author: 天天 |
Hits:
Description: 1. 如何制作比较安全完整的J2EE软件的license
或者说License机制。
目前想到的办法是用公钥私玥进行生成一个license,算法是IDEA算法。在每次启动的时候加载读取License信息。进行验证。
但问题是:
1.java的容易被反编译。自己写class loader进行解密难度又不较大。
2. 要进行限制客户端的数量。现在的weblogic有这种功能或者API么
3. 那种算法相对安全,MD5都被破解了。。。。
第一个问题,正如大家说的,加点混淆就好了。这点我不多说google上有好多。
第二个问题,限制登录数量,一般不在应用服务器上进行限制的,至少我不是,我是写个保持器,保持器里保存着登录的操作员的信息,每次登录的时候,通过spring的拦截器进行校验(具体校验:取得license里的最大限制数,通过保持器是取得操作员的数量,用遍历的形式,记数,比较简单不多说了),进行登录数量的校验,如果超出数量,抛出异常限制登录哦。
第三个问题,MD5还是可以,现在不都实行用两种算法同时加密么,双保险,我们单位弄的是只MD5的,其实我感觉大多数破解MD5都是采取碰撞法,简单的还可以,要是字节数量多了,还是很难破解的。
-The first question, as we say, add a little confusion enough. I will not have a lot on google.
Second question, limit the number of login restrictions on the general is not an application server, at least I m not, I write a cage, the cage holds the information of the registered operator, each time you log the time, by the spring interceptor check (check: Get the maximum limit in the license, the retainer is the number of the operator, the form of a traversal, counting, simple not much to say), the log on the number of parity If you exceed the number of throws an exception limit logon Oh.
Third, MD5 or can not practice to encrypt it using two algorithms, double insurance, get our unit is only the MD5, in fact, I feel that most of the crack MD5 are taken to the collision law can also be simple , if the number of bytes is more difficult to crack.
Platform: |
Size: 74752 |
Author: 彪汉 |
Hits:
Description: Rijndael (pronounced Reindaal) AES算法,由Joan Daemen and Vincent Rijmen设计。-//Rijndael (pronounced Reindaal) is a block cipher, designed by Joan Daemen and Vincent Rijmen as a candidate algorithm for the AES.
//The cipher has a variable block length and key length. The authors currently specify how to use keys with a length
//of 128, 192, or 256 bits to encrypt blocks with al length of 128, 192 or 256 bits (all nine combinations of
//key length and block length are possible). Both block length and key length can be extended very easily to
// multiples of 32 bits.
//Rijndael can be implemented very efficiently on a wide range of processors and in hardware.
//This implementation is based on the Java Implementation used with the Cryptix toolkit found at:
//http://www.esat.kuleuven.ac.be/~rijmen/rijndael/rijndael.zip
//Java code authors: Raif S. Naffah, Paulo S. L. M. Barreto
//This Implementation was tested against KAT test published by the authors of the method and the
//results were identical.
Platform: |
Size: 23552 |
Author: doofu |
Hits: