-
SM2
国密接口的实现和测试案列 对程序开发员有很好的参考价值(SM2 interface function implement and test sample,valuable to program developer)
- 2013-02-27 10:55:58下载
- 积分:1
-
Digital
数字密写与密写技术 F5的Matlab源程序(Digital Steganography Steganography technology and F5 s Matlab source code)
- 2009-12-26 15:12:06下载
- 积分:1
-
sha1_v01
说明: SHA-1加密算法的IP核,内涵文档,仿真测试文件(SHA-1 encryption algorithm of the IP core, the connotation of documents, simulation test file)
- 2008-10-15 09:05:58下载
- 积分:1
-
attachments_2009_11_19
DSA的c代码DSA的c代码DSA的c代码(DSA的c代码DSA的c代码)
- 2009-11-25 11:13:10下载
- 积分:1
-
EtherCAT_Introduction[s]
EtherCAT基础技术介绍,讲的比较易懂。。。(EtherCAT basis of technical presentations, talking about relatively straightforward. . .)
- 2016-12-12 10:32:32下载
- 积分:1
-
hash
It verifies or generates a signature using the md5 algorithm.
- 2008-05-15 11:48:52下载
- 积分:1
-
safetyManagement
运用典型的ssh2框架,具有上传文件,加解密,数字签名和身份认证等功能(Use ssh2 typical framework, with the uploaded file encryption and decryption, digital signature and authentication functions)
- 2012-06-17 15:47:30下载
- 积分:1
-
MD5
说明: MD5数字签名,加密算法,安全哈希加密算法(MD5 digital signature,encryption algorithm, encryption algorithm Secure Hash)
- 2021-03-30 14:19:10下载
- 积分:1
-
security
说明: 说明:
1、里面有什么:
1.1、org.bouncycastle.*下的所有软件是bouncycastle组织开发的软件包
1.2、org.infosecurity.*下的软件包括:
DES_CBC算法的实现
RSA算法的实现(包括:密钥生成、公钥加密和私钥解密、数字签名及签名验证)
数字信封的实现
利用数字信封实现大文件的加密、解密。
2、有什么用:
2.1 研究、学习信息安全中的密码学设计与实现技术。
2.2 当然如果大家觉得在其它地方用的上,我会觉得很高兴的。
3、还有什么改进:
3.1 对文件加密、解密的时候要频繁的IO,如果加一个缓冲区,比如10K、50K等,
只有缓冲区满了才写入DISK这样将提高效率。
3.2 RSA私钥积存的时候可以按PKCS8形式,再经BASE64编码保存比较好。(Note : 1, mean there : 1.1, org.bouncycastle .* of all software development organizations is bouncycastle package 1.2, org.infosecurity .* The software includes : DES_CBC algorithm to achieve the realization of the RSA algorithm (including : key generation, public key and private key encryption decryption, digital signatures and signature verification), the realization of digital envelope using digital envelope realize document encryption, decryption. Two, what is the use of : 2.1, learning the information security cryptography design and technology. 2.2 Of course, if you think in the other parts, I feel very happy. Three, what is there for improvement : 3.1 pairs of file encryption, decryption, and the time to frequent the IO, plus a buffer, such as 10K, 50K, the only buffer is needed for)
- 2006-03-23 17:38:00下载
- 积分:1
-
ecc(down)
C语言实现的ecc加密算法,用Devcpp编译通过,附有说明文档,版权是假的哦~不是我同学·^_^(C language ecc the encryption algorithm used Devcpp compile, with documentation, Copyright is a fake is not me-oh students ^ _ ^)
- 2020-12-21 19:29:07下载
- 积分:1