Welcome![Sign In][Sign Up]
Location:
Search - send private key

Search list

[Crack HackVC_RSA

Description: 一、RSA基本原理 对明文分组M和密文分组C,加密与解密过程如下: C = POW (M , e) mod n M = POW(C , d) mod n = POW(POW( M ,e), d) mod n=POW( M,e*d) 其中POW是指数函数,mod是求余数函数。 其中收发双方均已知n,发送放已知e,只有接受方已知d,因此公钥加密算法的公钥为 KU={ e , n},私钥为KR={d , n}。该算法要能用做公钥加密,必须满足下列条件: 1. 可以找到e ,d和n,使得对所有M<n ,POW(M ,e*d)=M mod n . 2. 对所有 M<n,计算POW (M , e)和POW(C , d)是比较容易的。 3. 由e 和n确定d是不可行的 -one, the basic tenets of RSA expressly group M and cipher block C, encryption and decryption process is as follows : C = POW (M, e) mod n = M POW (C, d) mod n = POW (POW (M, e), d) mod n = POW (M, e * d), which is an exponential function POW, mod is the pursuit of the remaining functions. Transceivers which both known n, send e Fang known, the only known recipient d, therefore the public key encryption algorithm for public key e KU = (n), private key for KR = (d, n). The algorithm could be used to be a public key encryption, must meet the following conditions : 1. E can be found, and d n, making all the right M
Platform: | Size: 5523 | Author: 烟翔 | Hits:

[Crack HackVC_RSA

Description: 一、RSA基本原理 对明文分组M和密文分组C,加密与解密过程如下: C = POW (M , e) mod n M = POW(C , d) mod n = POW(POW( M ,e), d) mod n=POW( M,e*d) 其中POW是指数函数,mod是求余数函数。 其中收发双方均已知n,发送放已知e,只有接受方已知d,因此公钥加密算法的公钥为 KU={ e , n},私钥为KR={d , n}。该算法要能用做公钥加密,必须满足下列条件: 1. 可以找到e ,d和n,使得对所有M<n ,POW(M ,e*d)=M mod n . 2. 对所有 M<n,计算POW (M , e)和POW(C , d)是比较容易的。 3. 由e 和n确定d是不可行的 -one, the basic tenets of RSA expressly group M and cipher block C, encryption and decryption process is as follows : C = POW (M, e) mod n = M POW (C, d) mod n = POW (POW (M, e), d) mod n = POW (M, e* d), which is an exponential function POW, mod is the pursuit of the remaining functions. Transceivers which both known n, send e Fang known, the only known recipient d, therefore the public key encryption algorithm for public key e KU = (n), private key for KR = (d, n). The algorithm could be used to be a public key encryption, must meet the following conditions : 1. E can be found, and d n, making all the right M
Platform: | Size: 1965056 | Author: | Hits:

[DocumentsRabin-Miller

Description: RSA的最重要特色在于双密钥,它们有特殊的数学形式。RSA的一对密钥有三个基本参数:模n ,公钥b和私钥a 。n和b是公开的,发送信息方用私钥n加密消息,接受方用公钥b能得到解密后的信息,从而确定发送信息方的身份,这就构成了签名机制。对方用公钥将要发送的信息加密,只有拥有私钥的一方才能将信息解密。-RSA is the most important feature of dual-key, they have a special mathematical form. RSA keys of a pair of three basic parameters: modulus n, public key private key b and a. n and b are open to the public to send a message encrypted using the private key n message recipient using the public key can be decrypted b after information, send a message to determine the identity of parties, which constitute a signature. The other side will use public key encryption to send information that only those with the private key of the party can decrypt the information.
Platform: | Size: 3072 | Author: Rebecca | Hits:

[JSP/Javajava_DigitalSign

Description: 实用数字签名的步骤 (1)发送方使用MD5算法对原始信息进行计算,获得一个固定长度的信息摘要 (2)发送方用自己的私钥加密生成的信息生成发送方的数字签名,发送方把这个数字签名作为发送信息的附件和明文信息,一同用接收方的公钥进行加密,将加密后的密文一同发送给接收方; (3)接收方首先把接收到的密文用自己的私钥解密,得到明文信息和数字签名,再用发送方的公钥对数字签名进行解密,然后使用相同的单向散列算法来计算解密得到的明文信息,得到信息摘要;对比计算出来的信息摘要和发送方发送过来的信息摘要是否一致-Practical steps to a digital signature (1) sender MD5 algorithm used to calculate the original information, access to a fixed length message digest (2) use their own sender s private key to generate encrypted information generated by the sender s digital signature, the sender of the digital signature as an annex to send a message and express information, together with the recipient s public key for encryption, will be encrypted ciphertext sent to the receiver together (3) the recipient first received ciphertext with its own private key to decrypt received explicit information and digital signatures, and then the sender s public key to decrypt the digital signature, and then use the same one-way hash algorithm to calculate the explicit information to be decrypted, the message digest contrast calculated message digest and the sender sent the message digest are consistent
Platform: | Size: 23552 | Author: 张云 | Hits:

[Windows Developsimplesign

Description: 发送方用自己的私钥加密通讯内容生成发送方的数字签名,并将其发送给接受方;接受方利用发送方的公钥对该签名内容进行验证; 思考: (1)这种方式是否存在安全问题? (2)请分别选择文件test-1.txt和test_pig.bmp作为通讯内容,分别记录全过程用时,并对比一下;-Sender s private key encrypted communications with their own content generated digital signature the sender, and send it to the receiving party the receiving party using the sender s public key to verify the contents of the signature Consideration: (1) whether there are security issues in this way? (2) Please select the file test-1.txt respectively and test_pig.bmp as communications content, the whole process were recorded with a time and compare
Platform: | Size: 93184 | Author: 熊龙生 | Hits:

[Crack Hack11

Description: 完成基于公钥证书的非对称密钥分配工作 说明: (1)作为通讯的双方A和B,都有一个共同信赖的第三方CA,由CA为每个人生成公钥证书和相应的私钥并分发给A、B。 (2)A和B分别将自己的公钥证书提供给对方后,分别在本地验证对方公钥证书是否可靠(假定A、B已经获得CA的公钥),然后A用B的公钥加密一个数据X(整型,可自己定义,比如100)并发送给B,B用自己的私钥解密后得到数据X,然后按协商好的函数F(比如F(X)=2*X)计算得到F(X),再利用A的公钥加密后发送给A;A在本地用自己的私钥解密后得到F(x),在同本地计算得到的F(X)进行对比,如果一致,说明公钥分配成功。 (3)A用B的公钥对一图象文件(test_pig.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T1;-Complete the asymmetric public key certificate-based key distribution work Description: (1) as the communication of both A and B, have a common trusted third party CA, the CA generates a public key certificate for each person and the corresponding private key and distributed to A, B. (2) A and B respectively to provide their own public key certificates to each other both in the local verify the reliability of each other s public key certificate (assuming A, B has received CA s public key), then A with B s public key encryption 1 the data X (integer, can be their own definition, such as 100) and send it to B, B with their own private key decrypted by the data X, and then consult a good function by F (eg F (X) = 2* X) calculated F (X), then encrypted using A s public key sent to A A locally with their own private key to decrypt obtained F (x), calculated with the local F (X) are compared, if the same description Successful public-key distribution. (3) A with B s public key on an
Platform: | Size: 71680 | Author: 熊龙生 | Hits:

[WEB Codecncard

Description: 1) 本接口需要 mcrypt 和 bcmath 两个PHP扩展库的支持,请先确认您安装并启用了这两个库。 如果您是虚拟主机用户,一般主机商都会安装这两个标准库,您可以使用 phpinfo() 函数查看PHP配置信息,如果没有安装,请联系主机商解决。 2) 文件说明:netpaylclient.php 为 chinapay 提供的签名验签函数库文件,lib_curl.php 为 chinapay 提供的实用函数库文件,方便您使用 curl 发送 HTTP 请求(需要curl扩展库支持) 3) 拷贝本示例到服务器任意位置(外网需可访问,否则交易应答无法接收), 虚拟主机用户直接FTP上传即可。 4) 您在本公司申请商户号后,将得到两个后缀名为.key的测试密钥文件,其中以 Mer 开头的为私钥文件,以 Pg 开头的为公钥文件。 把这两个密钥文件放到本演示程序所在目录下(其他位置也可,但需要根据实际位置进行相应配置) 打开 netpayclient_config.php 文件,根据您的实际情况修改 PRI_KEY 和 PUB_KEY 两项。 5) 本演示程序附有详细的注释说明,通常情况下,您直接修改本示例中的程序代码即可轻松完成接入。如您有个性化需求,您可以参照《商户网上支付接入手册》帮助理解。-1) This interface requires mcrypt extensive library of and bcmath two PHP support, make sure you install and enable these two libraries. If you are a virtual host the user, generally host will install both standard library, you can use the phpinfo () function to view the PHP configuration Information, if not installed, please contact your host to resolve. 2) files: the library file netpaylclient.php provided for chinapay, signature stamped the, lib_curl.php chinapay Practical library file, easy to use curl to send HTTP requests (needs curl extension library support) 3) copy this example to the server anywhere (outside the network need to access, otherwise the transaction response can not be received), the virtual host users direct FTP upload Can. 4) The applicant merchant in the Company, will be two suffix. The key test key file, which Mer at the beginning of the private key file. Pg at the beginning of the public key file. These two key files into the directory where th
Platform: | Size: 283648 | Author: 王浩 | Hits:

[ICQ-IM-ChatChat

Description: 网络聊天室——(服务器-客户端)模式 主要技术:网络套接字、多线程 UDP协议 功能: 实现了在线聊天功能 客户端:发送信息、私聊等 服务器:发送信息、发送公告、踢人等 代码清新实用,很适合初学者。-Internet chat rooms- (Server- Client) Mode Key technology: network socket, multi-threaded UDP protocol Functions: Online chat feature Client: Send information, private chat, etc. Server: send a message, send the announcement, kicking Code is fresh and practical, it is suitable for beginners.
Platform: | Size: 270336 | Author: zhaobo | Hits:

[Crack HackPractical-digital-signature

Description: 实用数字签名的步骤 (1)发送方使用MD5算法对通信内容进行计算,获得一个固定长度的信息摘要; (2)发送方用自己的私钥加密生成的信息生成发送方的数字签名,发送方把这个数字签名作为发送信息的附件和明文信息,一同用接收方的公钥进行加密,将加密后的密文一同发送给接收方; (3)接收方首先把接收到的密文用自己的私钥解密,得到明文信息和数字签名,再用发送方的公钥对数字签名进行解密,然后使用相同的单向散列算法来计算解密得到的明文信息,得到信息摘要;对比计算出来的信息摘要和发送方发送过来的信息摘要是否一致 思考: (1)请分别选择文件test-1.txt和test_picture.bmp作为通讯内容,分别记录全过程用时,并对比一下; (2)如果所发送的内容数据量非常大,上述方案中的效率不能满足要求,请考虑一下如何解决这个问题。-Practical steps digital signature ( A ) the sender uses the MD5 algorithm to calculate the content of communications , access to a fixed-length message digest ( 2 ) the sender s private key encryption with their own information generated by the sender generates a digital signature , the digital signature of the sender of the message as an attachment and send plaintext , together with the recipient s public key to encrypt the encrypted sent along with the ciphertext to the recipient ( 3 ) First, the recipient receives the ciphertext with his private key to decrypt , get the plaintext and the digital signature , then the sender s public key to decrypt the digital signature , and then using the same one-way hash algorithm to calculate decrypted plaintext information, to receive message digest comparing the calculated message digest and the information sent from the sender summary is consistent Reflections : ( 1 ) Please select the file test-1.txt respectively and test_pictur
Platform: | Size: 1383424 | Author: 丁元元 | Hits:

CodeBus www.codebus.net