搜索资源列表
shamir ID
- 介绍了一种特殊的公钥密码体制——基于身份的公钥密码体制。本文相当经典,是目前商用密码体制的经典思想。-introduced a special public-key cryptosystem -- identity-based public-key cryptosystem. This very classic, which is the business Cryptosystem classic thinking.
database_encrypt
- 数据库加密技术中散列函数的应用 介绍了散列函数的基本原理及设计要求,结合公开密钥加密方法中的数字证书及数字签名技术,探讨了散列函数在诸如口令保护用户访问权限鉴别和数据加密技术的应用-database encryption technology hash function of the hash function on the basic principles and design requirements, combination of public key encryption metho
NET
- The public key infrastructure (PKI) is the foundation and center of network security architecture now, can provide security services including confidentiality, authentication, dig2ital signatures and integrity.
PKIandCA
- PKI(public key infrastructure) and CA(certificate authority)
Public_key
- Hardware Architectures for Public Key Cryptography
123
- 还有一个缺陷就是在只知道密文 x 及公钥(n,e)的情况下,只要将 (x^e) mod n 所得余数 s 再不断地循环操作 s = s^e mod n,此运算不断地循环 e 次之后,很多情况下都可以循环出原文,只是计算量过余多一些罢了。不过有不少情况下,根本都无须循环 e 次,不过对于1024位的 n 级别来说,e 也是一个相当大的数值,所以循环密文的余数以解得原文是有些不现实。 以上内容仅供参考,如有不实,请予更正-there is a defect in only know that the
格尔企业级电子证书系统(CALITE)白皮书
- 随着社会的发展以及企业的不断壮大,企业网的范围也不断扩大,从一个本地网络发展到跨地区跨城市甚至是跨国家的网络。随着各种网络应用不断涌现,在采用网络应用较多的企业中,出现了安全管理和安全通讯的问题,近年来开始越来越多应用到企业、行业中的,是一种通用的PKI(public key infrastructure)安全体系,其运营管理机构一般又称为CA证书机构。
gongyao
- RSA也可以用来为一个消息署名。假如甲想给乙传递一个署名的消息的话,那么她可以为她的消息计算一个散列值,然后用她的密钥加密这个散列值并将这个“署名”加在消息的后面。这个消息只有用她的公钥才能被解密。乙获得这个消息后可以用甲的公钥解密这个散列值,然后将这个数据与他自己为这个消息计算的散列值相比较。假如两者相符的话,那么他就可以知道发信人持有甲的密钥,以及这个消息在传播路径上没有被篡改过。-RSA can also be used as a signed message. If i want to
Rabin-Miller
- RSA的最重要特色在于双密钥,它们有特殊的数学形式。RSA的一对密钥有三个基本参数:模n ,公钥b和私钥a 。n和b是公开的,发送信息方用私钥n加密消息,接受方用公钥b能得到解密后的信息,从而确定发送信息方的身份,这就构成了签名机制。对方用公钥将要发送的信息加密,只有拥有私钥的一方才能将信息解密。-RSA is the most important feature of dual-key, they have a special mathematical form. RSA keys of a
PKITS.pdf
- A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on
NIST_Recommendation_for_X509_PVMs.pdf
- A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or
wangluoanquan
- 网络安全讲义,包括通讯安全服务与机制,密钥公钥密码学,防火墙理论等-Network security notes, including communications security services and mechanisms, key public-key cryptography, firewall theory
RSADES
- 使用RSA和DES两种算法为基础,设计实现了一个简单的网络传输模型。模型里有两个类,Server和Client,Server端要将自己的公钥发给Client,然后Client将自己的DES密钥通过RSA加密发给Server 端。之后双方可以通过DES对称加密进行通信。-Two algorithms using the RSA and the DES, based on designs and implements a simple model of network transmission. M
Cryptography_Developers
- Cryptography for developers eBook by Tom St Denis, Simon Johnson. -Special examples of Cryptography goals: Privacy, Integrity, Authentication -Full Discussion of Large Integer Arithmetic, Public Key Algoritms
CPK
- 开发CPK系统时很好的理解文档,CPK是我国自主产权的公钥密码体制-CPK system developed a good understanding of the document, CPK is China s own property rights, public-key cryptosystem
rsa
- 公钥密码算法的加密与解密 (RSA-OAEP) -Public key encryption and decryption of cryptographic algorithms (RSA-OAEP)
Introduction-to-Signcryption
- Signcryption is a new paradigm in public key cryptography that simultaneously fulfils both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by the traditio
RSA
- RSA公钥密码算法,包括自动生成逆元,加密和解密过程,附带源代码。-RSA public key cryptography algorithm, including the automatic generation of the inverse of the encryption and decryption process, with the source code.
subject
- 介绍网络信息安全的公钥密码体系,密钥的管理和隐藏技术-Introduction of network and information security, public key cryptography, key management and hiding techniques
java
- 基于RSA公钥加密算法的电子邮件 加密程序之JAVA实现-RSA public key encryption algorithm-based e-mail JAVA implementation of encryption program