联合开发网   搜索   要求与建议
                登陆    注册
排序按匹配   按投票   按下载次数   按上传日期
按分类查找All 加密解密(314) 
按平台查找All Java(314) 

[加密解密] SpringBootCodeTemplate

SpringBoot单体项目模板:SpringBoot + Redis + MyBatis-Plus + Swagger + 统一异常处理 + 统一返回 + 统一日志 + 阿里短信(SMS) + 用户登录注册 + JWT + 拦截器 + 阿里文件上传(OSS) + 微信小程序(授权登录获取openid + 获取微信手机号码) +项目对接方案(对称加密+ 非对称加密)
SpringBoot single project template: SpringBoot+Redis+MyBatis Plus+Swagger+unified exception handling+unified return+unified log+Alibaba SMS+user login registration+JWT+interceptor+Alibaba file upload (OSS)+WeChat applet (authorized login to obtain openid+WeChat mobile number)+project docking scheme (symmetric encryption+asymmetric encryption) (2024-03-27, Java, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1711474524546675.html

[加密解密] Secure-Multi-Threaded-User-Chat-Application

该安全聊天应用程序使用椭圆曲线加密来生成密钥,使用ElGamal公钥加密方法来加密和解密消息。它将套接字编程与高级加密技术集成,确保安全和私有的客户端-服务器通信,保护消息免受未经授权的访问。
This secure chat application utilizes Elliptic Curve Cryptography for key generation and the ElGamal public key encryption method for message encryption and decryption. Integrating socket programming with advanced cryptographic techniques, it ensures secure and private client-server communication, protecting messages from unauthorized access. (2024-02-13, Java, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1707773373334934.html

[加密解密] EasyNetwork

「Deprecated」EasyNetwork封装了一套Android原生的Http框架,提供了拦截器机制,请求统一加密,响应统一解密,自动重定向,自动重试,不需要额外引入任何库,体积小,面向SDK开发,强烈建议SDK开发者下载jar包进行引用方便混淆.
"Deprecated" EasyNetwork encapsulates a set of Android native Http framework, provides an interceptor mechanism, requests unified encryption, responses unified decryption, automatic redirection, automatic retry, does not need to introduce any additional libraries, is small in size, and is oriented to SDK development. SDK developers are strongly recommended to download jar packages for reference to facilitate confusion (2019-06-11, Java, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1700618091314341.html

[加密解密] 信息安全实验2-1

实验内容 1、对称密码技术的实现 (1)熟悉相应的DES加密/解密函数的使用,在单机完成对特定文件(test-1.txt)的单重DES加密/解密; (2)针对DES密钥特点(8字节,64比特位,其中真正起作用的为56比特位),设计一次一密的密钥产生机制(即每次会话所使用的密钥都是临时随机产生的); 2、非对称密码技术的实现 (1)熟悉RSA相关函数(公私钥生成函数,加密/解密函数); (2)利用公钥加密特定文件(test-1.txt),并用私钥进行解密;反过来,再利用私钥加密特定文件,并用公钥进行解密。对比解密后的文件与原始文件是否一致。 3、信息摘要技术的实现 (1)熟悉MD5算法的实现函数; (2)利用MD5实现函数,对特定文件(test-1.txt)进行信息摘要的计算,得到信息摘要M1;尝试改变特定文件中的内容(比如改变其中某个字母),再利用MD5计算一次信息摘要,看同之前得到的信息摘要是否相同; 设计要求 1、JAVA语言编程实现 2、单机上完成 3、加密内容为一文本文件(从服务器下载),从服务器上下载相关软件包(jce-1_2_2和帮助文件,主要用于RSA密钥生成和加/解密,如果安装了JDK1.6版本以上,则不需要jce支持)后,请先阅读帮助再进行编程。
DES/RSA/MD5 The implementation of symmetric cryptography (1) familiar with the use of the corresponding DES encryption / decryption function, complete single DES encryption / decryption of a particular file (test-1.txt) in a single machine; (2) for DES key features (8 bytes, 64 bits, which really works for 56 bits), the design of a secret key generation mechanism (i.e. using the session key is randomly generated temporary); (2017-10-11, Java, 16KB, 下载10次)

http://www.pudn.com/Download/item/id/1507690730299155.html

[加密解密] FileCrypter

文件加密器。加密算法和模式以及填充模式使用:AES/CBC/PKCS#5;迭代开始时有初始化向量iv的参与。 由于要以用户输入的口令作为密钥生成密钥,所以用到了基于用户的密钥生成算法。将用户输入的密码和伪随机的盐值salt。 *注释十分详细。
this is a tiny tool for encrypt any file in any format using AES under CBC module with PKCS#7(PADDING MODULE)。Users can their own password to encrypt and path to store. (2017-02-02, Java, 55KB, 下载3次)

http://www.pudn.com/Download/item/id/1486008813817776.html

[加密解密] DreamerView

自带加密功能的图片浏览器源码打开应用以后会要求输入密码,默认密码admin。同时应用会自动扫描手机内部存储、SD卡存储上面的所有图片文件,并且根据文件夹进行分类列表显示,可以一键更换项目的背景图片。可以直接点击图片设置为壁纸或者添加到最喜爱的图片库,可以用幻灯片的方式全屏带有旋转、飞入等多种动画效果播放图片。支持横竖屏切换,可以详细的查看图片的信息。并且可以多种角度旋转图片文件。是学习和研究安卓相册图片方面不错的学习源码。
Image browser source code comes with encryption function to open the application will be required to enter the password, the default password admin. At the same time, the application will automatically scan the phone s internal storage, SD card store all of the image files, and according to the folder classification list display, you can replace the background image of a key project. You can click on the picture is set to wallpaper or add to the favorite picture library, you can use a slide way full screen with a rotation, fly into a variety of animation effects, etc.. Support screen switching, can view the pictures detailed information. And can rotate the image file in a variety of ways. Is to learn and study Android photo albums, good learning source. (2016-07-22, Java, 2963KB, 下载3次)

http://www.pudn.com/Download/item/id/1469150926775760.html

[加密解密] wjjmym

文件加密器是一个静默卸载手机上已经安装的app的小例子,翻了下菜单看了有文件加密、文件解密、报文鉴别、编辑文件、删除文件等功能,加密有des、desede、aes三种算法,因为小编不了解加密解密这一块所以就不妄加评论技术细节了,了解这一块的朋友自己下载研究一下吧,默认编译版本4.2.2编码GBK源码有简单注释。
File encryption device is already installed on a silent uninstall mobile app small example, turn the menu and read a file encryption, file decryption, message authentication, and edit files, delete the file and other functions, encryption has three kinds of algorithms, such as DES, deSede, AES, because Xiaobian does not know the encryption and decryption of this piece so is not false and review technical details of the understanding that a friend to download their own research about it, the default notes has a simple version 4.2.2 GBK encoding source code compilation. (2016-07-05, Java, 654KB, 下载2次)

http://www.pudn.com/Download/item/id/1467705572552369.html

[加密解密] src

实习二 分组密码加密 一、实习目的 1、理解对称加密算法的原理,熟悉常用的对称加密算法:DES、TripleDES、Blowfish; 2、以DESede加密算法为例,掌握分组加密算法加、解密过程的实现。 二、实习内容 1.[基本要求] 以DES/DESede为例,利用java中的相关类实现对指定字符串的加、解密。 2.[实现提示] (1) 可以利用java中的KeyGenerator类创建对称秘钥,利用工厂类KeyGenerator的静态方法getInstance()获得KeyGenerator()类对象; (2) 方法getInstance()的参数为字符串类型,指定加密算法的名称如:Blowfish、DES、DESede、HmacMD5或HmacSHA1等; (3) 利用工厂类Cipher的对象可以创建密码器。同样的,getInstance()的参数为字符串类型,指定加密算法的名称
Internship two block cipher encryption An internship purpose An understanding of the principles of symmetric encryption algorithms, symmetric encryption algorithms used are familiar: DES, TripleDES, Blowfish 2, DESede encryption algorithm, for example, plus master block encryption algorithm to achieve decryption process. Second, the practical content 1. [Basic requirements] With DES/DESede for example, the use of java in the relevant class implements the specified string encryption and decryption. 2. [Achieve prompt] (1) can be used to create a java class in KeyGenerator symmetric secret key, use the static method getInstance factory class KeyGenerator of () to get KeyGenerator () class object (2) the method getInstance () argument is a string type, specify the name of the encryption algorithm, such as: Blowfish, DES, DESede, HmacMD5 or HmacSHA1 etc. (3) the use of factory class Cipher objects can create a password control. The same, getInstance () argument is a string typ (2014-06-17, Java, 3KB, 下载4次)

http://www.pudn.com/Download/item/id/2569003.html

[加密解密] Java-software-protection-technology

用加密的方法来保护Java类文件,加密可以有效地对抗反编译 Java技术在设计之初就考虑到应用环境的复杂性,因此允许用户根据Java规范定制类加载器,使用这些定制的Classloader可以完成特定的操 作,比如从网络上下载类文件,验证类文件来源等,本文定制了 北京邮电大学硕日毋究生学位论文Java软件保护技术研究及实现一个Classloader来完成加密类文件的加载" (3)负责密钥提取和解密的具体算法不能被加密,否则又需要先将它 们解密,由此将形成一个循环,而它们又是必须要加以保护的核 心内容,本方案中,将它们用C++实现并编译为本地的动态链接 库文件,这样可以有效地抵抗反编译
Encryption method used to protect Java class files, encryption can be effective against decompile Java technology early in the design to take into account the complexity of the application environment, thus allowing users to customize the Java class loader specification, use these custom Classloader can be completed specific actions, such as class files downloaded from the Internet, verify that the class file sources, Beijing University of Posts and customized paper at no postgraduate Master Thesis Java software protection technology research and implement a Classloader to complete the encryption class file loaded " (3 ) is responsible for extracting and decrypting key specific algorithm can not be encrypted, or they need to first decrypt them, thereby forming a loop, and that they must be taken to protect the core, this scenario, they are implemented using C++ and compiled to native dynamic link library file, which can effectively resist decompile (2013-06-18, Java, 1KB, 下载2次)

http://www.pudn.com/Download/item/id/2281952.html

[加密解密] ElGamal

使用bouncy castle 的jar包实现的ElGamal加密模块,以及测试用例,需要导入bouncy castle包(内附),并且你需要在JDK的JRE环境中,或者是JRE环境中配置上local_policy.jar和US_export_policy.jar(压缩包内已有jdk6和7的)。 切换到 JDK_Home \jre\lib\security目录下,对应覆盖local_policy.jar和US_export_policy.jar两个文件。同时,你可能有必要在 JRE_Home \lib\security目录下,也需要对应覆盖这两个文件。 配置权限文件的最终目的是为了使应用在运行环境中获得相应的权限,可以加强应用的安全性。 通常,我们在应用服务器上安装的是JRE,而不是JDK。因此,这就很有必要在应用服务器的 JRE_Home \lib\security目录下,对应覆盖这两个权限文件。
Use bouncy castle jar package implements the ElGamal encryption module, as well as the test case, you need to import a bouncy castle pack (included), and you need the JDK JRE environment, or the JRE the configuration on local_policy.jar and US_export_policy.jar (compression packages of existing jdk6 and 7). Switch to JDK_Home \ jre \ lib \ security directory, the corresponding coverage local_policy.jar, and US_export_policy.jar two files. At the same time, you may need in the JRE_Home \ lib \ security directory also needs corresponding to the coverage of these two documents. Configuration permissions files ultimate goal is to make application to obtain the appropriate permissions in the operating environment, can strengthen the security of the application. Typically, it is installed on the application server JRE, instead of JDK. This is necessary in the application server JRE_Home \ lib \ security directory corresponding to the coverage of these two permissions file. (2013-04-04, Java, 1967KB, 下载10次)

http://www.pudn.com/Download/item/id/2186075.html

[加密解密] Rabbit

Rabbit流密码是由Cryptico公司(http://www.cryptico.com/)设计的,密钥长度128位, 最大加密消息长度为264 Bytes,即16 TB,若消息超过该长度,则需要更换密钥对剩下的消息进行处理。它是目前安全性较高,加/解密速度比较高效的流密码之一,在各种处理器平台上都有不凡的表现。
Rabbit stream cipher is designed by Cryptico Company (http://www.cryptico.com/), 128-bit key length, The maximum length of the encrypted message for 264 Bytes, 16 TB, if the message is more than the length of the need to replace the key to the rest of the message processing. It is one of the higher security, encryption/decryption speed efficient stream ciphers, have extraordinary performance in a variety of processor platforms. (2013-01-12, Java, 2KB, 下载19次)

http://www.pudn.com/Download/item/id/2115224.html

[加密解密] RSA

// Struts2 Action方法中: // 将公钥的 modulus 和 exponent 传给页面。 // Hex -> apache commons-codec RSAPublicKey publicKey = RSAUtils.getDefaultPublicKey() ActionContext.getContext().put("modulus", new String(Hex.encodeHex(publicKey.getModulus().toByteArray()))) ActionContext.getContext().put("exponent", new String(Hex.encodeHex(publicKey.getPublicExponent().toByteArray()))) // 页面里,Javascript对明文进行加密: var modulus = $( #hid_modulus ).val(), exponent = $( #hid_exponent ).val() var key = RSAUtils.getKeyPair(exponent, , modulus) pwd1 = RSAUtils.encryptedString(key, pwd1) pwd2 = RSAUtils.encryptedString(key, pwd2) 13 14 // 服务器端,使用RSAUtils工具类对密文进行解密 15 RSAUtils.decryptStringByJs(password1)
RSA demo (2012-12-20, Java, 1404KB, 下载22次)

http://www.pudn.com/Download/item/id/2090415.html

[加密解密] DES

DES算法要求加密密钥和解密密钥一致。密钥所需的字节数祖长度为8位。基于对需求的理解,密钥由客户设定,在加密和解密的时候,在服务器端输入一密钥达到文件的加密需求,在终端输入同一密钥达到加密文件的解密需求。 DES加密的时候,最后一位长度不足64的,它会自动填补到64,那么在我们进行字节数组到字串的转化过程中,可以把它填补的不可见字符改变了,所以时常引发系统抛出异常。为此,在处理过程中,我们需要把一些信息编码保存起来,使之保证数据完整性。故在des.Des类中运用到了convert4CharTo64bit方法。
err (2008-06-25, Java, 6414KB, 下载18次)

http://www.pudn.com/Download/item/id/497808.html

[加密解密] 3des源代码

根据设计要求:1)具有文件加密和解密功能;2)具有加解密速度统计功能;3)采用密文反馈链接和密文挪用短块处理技术。我们可以知道,程序要有加密模块、解密模块、子密钥生成模块,这三个模块构成DES算法。DES算法再构成3DES,这很简单,只要加个密钥便可实现。3DES还必须工作在密文反馈连接模式下和使用密文短块挪用技术。至于速度统计功能就很好实现,用文件长度除以处理时间便是加解密速度。
based on the design requirements : 1) with file encryption and decryption function; 2) the speed with the encryption and decryption functions of statistics; 3) Use of dense text links and feedback secret misappropriation short pieces of text processing technology. We know that procedures have encryption module, decryption modules for key generating modules, which constitute three modules DES algorithm. DES algorithm constitute 3DES, this is very simple, as long as add key can be reached. 3DES must also work in close link text feedback mode and the use of short text block secret misappropriation of technology. As for the speed of statistical functions properly achieved, divided by the length of documents with the processing time is the speed encryption and decryption. (2005-08-12, Java, 14KB, 下载262次)

http://www.pudn.com/Download/item/id/107177.html
总计:314