联合开发网   搜索   要求与建议
                登陆    注册
排序按匹配   按投票   按下载次数   按上传日期
按分类查找All 加密解密(59) 
按平台查找All Java(59) 

[加密解密] kantin-warnet-server

软件服务器untuk melayani aplikasi桌面kantin warnet客户端。Memakai数据库SQL(SQLite),多线程,计时器,OOP+序列化,加密和解密Base64,哈希MD5,套接字编程
Software server untuk melayani aplikasi desktop kantin warnet client. Memakai Database SQL (SQLite), Multi Threading, Timer, OOP + Serialization, Encrypting & Decrypting Base64, Hashing MD5, Socket Programing (2024-04-10, Java, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1712685639682812.html

[加密解密] kantin-warnet-client

Aplikasi桌面untuk memesan菜单di kantin warnet。Memakai数据库SQL(SQLite),多线程,计时器,OOP+序列化,加密和解密Base64,哈希MD5,套接字编程
Aplikasi desktop untuk memesan menu di kantin warnet. Memakai Database SQL (SQLite), Multi Threading, Timer, OOP + Serialization, Encrypting & Decrypting Base64, Hashing MD5, Socket Programing (2024-04-10, Java, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1712685635254051.html

[加密解密] Secure-Multi-Threaded-User-Chat-Application

该安全聊天应用程序使用椭圆曲线加密来生成密钥,使用ElGamal公钥加密方法来加密和解密消息。它将套接字编程与高级加密技术集成,确保安全和私有的客户端-服务器通信,保护消息免受未经授权的访问。
This secure chat application utilizes Elliptic Curve Cryptography for key generation and the ElGamal public key encryption method for message encryption and decryption. Integrating socket programming with advanced cryptographic techniques, it ensures secure and private client-server communication, protecting messages from unauthorized access. (2024-02-13, Java, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1707773373334934.html

[加密解密] SocketInAction

Java Socket网络编程实战。主要介绍Socket服务端、客户端的写法,与Socket相关的I O操作,Socket多线程的一般设计原则,Socket传输一般序列化对象、压缩序列化对象、加密序列化对象等。通过实际的例子展示Socket在网络通信中如何工作。
Java Socket network programming practice. It mainly introduces the writing methods of socket server and client, socket related IO operations, general design principles of socket multithreading, socket transmission of general serialized objects, compressed serialized objects, encrypted serialized objects, etc. The actual example shows how Socket works in network communication. (2018-03-22, Java, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1700618058125461.html

[加密解密] --Courses--

这个存储库包含了我在编程旅程中学习的所有课程的所有工作。课程和问题来自我在......的学习...,
This repository contains all my work of all the courses taken on my programming journey. The courses and problems are from my learning institutions, and all the solutions are mine !!! (2023-07-30, Java, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1690999316501382.html

[加密解密] java-programming-arrays-lists-structured-data

来自Coursera和杜克大学:基于您在“Java编程:解决...
From Coursera and Duke University: Build on the software engineering skills you learned in “Java Programming: Solving Problems with Software” by learning new data structures. Use these data structures to build more complex programs that use Java’s object-oriented features. At the end of the course you will write an encryption program and a (2022-03-25, Java, 8859KB, 下载0次)

http://www.pudn.com/Download/item/id/1648192467257848.html

[加密解密] Secure-Chat-Room-Service

CS255:2004年冬季密码学与计算机安全编程项目#2
CS255: Cryptography and Computer Security Winter 2004 Programming Project #2 (2018-04-16, Java, 629KB, 下载0次)

http://www.pudn.com/Download/item/id/1523858093565951.html

[加密解密] Java_Programming_Arrays_Lists_Structured-Data

我为课程(Java编程:数组、列表和结构化数据)提供的作业问题解决方案...
My solutions to assignments/problems for the course (Java Programming: Arrays, Lists, and Structured Data) offered by Duke University at Coursera. (2020-08-23, Java, 11045KB, 下载0次)

http://www.pudn.com/Download/item/id/1598152612790332.html

[加密解密] 信息安全实验2-1

实验内容 1、对称密码技术的实现 (1)熟悉相应的DES加密/解密函数的使用,在单机完成对特定文件(test-1.txt)的单重DES加密/解密; (2)针对DES密钥特点(8字节,64比特位,其中真正起作用的为56比特位),设计一次一密的密钥产生机制(即每次会话所使用的密钥都是临时随机产生的); 2、非对称密码技术的实现 (1)熟悉RSA相关函数(公私钥生成函数,加密/解密函数); (2)利用公钥加密特定文件(test-1.txt),并用私钥进行解密;反过来,再利用私钥加密特定文件,并用公钥进行解密。对比解密后的文件与原始文件是否一致。 3、信息摘要技术的实现 (1)熟悉MD5算法的实现函数; (2)利用MD5实现函数,对特定文件(test-1.txt)进行信息摘要的计算,得到信息摘要M1;尝试改变特定文件中的内容(比如改变其中某个字母),再利用MD5计算一次信息摘要,看同之前得到的信息摘要是否相同; 设计要求 1、JAVA语言编程实现 2、单机上完成 3、加密内容为一文本文件(从服务器下载),从服务器上下载相关软件包(jce-1_2_2和帮助文件,主要用于RSA密钥生成和加/解密,如果安装了JDK1.6版本以上,则不需要jce支持)后,请先阅读帮助再进行编程。
DES/RSA/MD5 The implementation of symmetric cryptography (1) familiar with the use of the corresponding DES encryption / decryption function, complete single DES encryption / decryption of a particular file (test-1.txt) in a single machine; (2) for DES key features (8 bytes, 64 bits, which really works for 56 bits), the design of a secret key generation mechanism (i.e. using the session key is randomly generated temporary); (2017-10-11, Java, 16KB, 下载10次)

http://www.pudn.com/Download/item/id/1507690730299155.html

[加密解密] UDP

本实验为编程实现 UDP 协议下使用 RSA 算法对信息的加密解密,用于两端之间的通讯 功能,开发平台为 win8.1, 开发环境 Eclipse, 开发语言 Java。
This experiment under the UDP protocol for programming using the RSA algorithm for encryption and decryption of information, for communication between the two ends of Function development platform is win8.1, the Eclipse development environment, programming language Java. (2016-07-07, Java, 52KB, 下载4次)

http://www.pudn.com/Download/item/id/1467856787473315.html

[加密解密] InfoSecurity

完成分布式对称密钥分配 说明:作为通讯的双方A和B已经共享一个会话主密钥Km。在完成会话密钥Ks的分配后,A利用Ks对特定文件(test-1.txt)进行加密,并发送给B;B利用Ks对密文进行解密,并对比解密后的明文信息同原来的文件是否一致。 要求: (1)JAVA语言编程实现,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一文本文件(test-1.txt); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中分布式密钥分配方案为参考,完成从步骤1到步骤3的全过程;
Complete distributed symmetric key distribution Description: As both A and B have shared a communication session master key Km. After the completion of the distribution of the session key Ks, A specific file using Ks (test-1.txt) encrypts and sends B B using Ks to decrypt the ciphertext, and the decrypted plaintext comparison with the original whether the files are consistent. Requirements: (1) JAVA programming language, based on DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA there are library functions support) (2) the contents of a text file to communicate (test-1.txt) (3) based on the network completion of key distribution work (both as a communications A, B should be deployed on two hosts) (4) are all assigned to the symmetric key one-time pad, randomly generated (5) the specific key distribution process please textbooks distributed key distribution scheme as a reference, complete step 1 to step 3 in the whole process (2014-10-23, Java, 15KB, 下载63次)

http://www.pudn.com/Download/item/id/2640860.html

[加密解密] RSA-Symmetric-key

完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程;
Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the (2013-11-05, Java, 15KB, 下载29次)

http://www.pudn.com/Download/item/id/2392135.html

[加密解密] RSA

完成基于公钥证书的非对称密钥分配工作 说明: (1)作为通讯的双方A和B,都有一个共同信赖的第三方CA,由CA为每个人生成公钥证书和相应的私钥并分发给A、B。 (2)A和B分别将自己的公钥证书提供给对方后,分别在本地验证对方公钥证书是否可靠(假定A、B已经获得CA的公钥),然后A用B的公钥加密一个数据X(整型,可自己定义,比如100)并发送给B,B用自己的私钥解密后得到数据X,然后按协商好的函数F(比如F(X)=2*X)计算得到F(X),再利用A的公钥加密后发送给A;A在本地用自己的私钥解密后得到F(x),在同本地计算得到的F(X)进行对比,如果一致,说明公钥分配成功。 (3)A用B的公钥对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T1; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密(JAVA有库函数支持); (2)密钥长度不少于384位; (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上,CA可以部署在其中一台主机上或第三台主机上);
Completed based on public key certificate allocation asymmetric key Description: ( A ) as a communication between the parties A and B, there is a common trusted third-party CA, generated by the CA public key certificate for each person and the corresponding private key and distributed to A, B. (2) A and B respectively own public key certificate to each other , respectively, the other public key certificate in the local authentication is reliable ( assuming A, B have the CA s public key ) , and A with B s public key to encrypt a data X ( integer, can define their own, such as 100 ) and sent to B, B to use their private key to decrypt the data obtained by X, and then press the negotiated function F ( eg F (X) = 2* X) is calculated F (X), and then encrypted using the public key of A to a A locally decrypted with the private key to obtain F (x), obtained in the same local computing F (X) for comparison , if the same , indicating that public key distribution success. (3) A with B s pu (2013-11-05, Java, 5KB, 下载94次)

http://www.pudn.com/Download/item/id/2392130.html

[加密解密] Symmetric-key-cryptography

完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程;
Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the (2013-11-05, Java, 44KB, 下载28次)

http://www.pudn.com/Download/item/id/2392124.html

[加密解密] Centralized-symmetric-key

完成集中式对称密钥的分配工作 说明:作为通讯的双方A和B,都已经分别和KDC拥有会话密钥Ka和Kb,但A、B之间事先没有保密通道,需要依赖KDC为它们的会话分配临时密钥Ks。在完成会话密钥Ks的分配后,A利用Ks对特定文件(test-1.txt)进行加密,并发送给B;B利用Ks对密文进行解密,并对比解密后的明文信息同原来的文件是否一致。 要求: (1)JAVA语言编程实现,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一文本文件(test-1.txt); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上,KDC可以部署在其中一台主机上或第三台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于KDC的集中式密钥分配方案为参考,完成从步骤1到步骤5的全过程;
Complete centralized allocation symmetric key Description: As a communication between the parties A and B, respectively, and the KDC already has a session key Ka and Kb, but the A, B no secret passage between the advance, they need to rely on the KDC allocate temporary session key Ks. Upon completion of the session key Ks allocation, A Ks on the use of a specific file (test-1.txt) is encrypted and sent to B B use Ks decrypt the ciphertext, and compare the decrypted plaintext message with the original files are consistent. Requirements: (1) JAVA programming language, based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported) (2) the content of communications as a text file (test-1.txt) (3) complete network-based key distribution job (as the communication between the parties A, B should be deployed on both hosts, KDC can be deployed on one host or a third host) (4) are allocated once a secret symmetric key ra (2013-11-05, Java, 4KB, 下载29次)

http://www.pudn.com/Download/item/id/2392117.html

[加密解密] RESsecure

通过j2se编程实现1024位RSA加密算法,内部含有明文密文再到明文的检测测试可以快速生成密钥对
Pass the j2se plait distance realization 1024 RSA to encrypt calculate way, inner part imply a clear statement secret content again arrive clear statement of examination test can fast born and airtight key rightness (2011-05-28, Java, 5KB, 下载5次)

http://www.pudn.com/Download/item/id/1550363.html

[加密解密] MD5

MD5即Message-Digest Algorithm 5(信息-摘要算法 5),用于确保信息传输完整一致。是计算机广泛使用的杂凑算法之一(又译摘要算法、哈希算法),主流编程语言普遍已有MD5实现。   将数据(如汉字)运算为另一固定长度值是杂凑算法的基础原理,MD5的前身有MD2、MD3和MD4。
MD5 or Message-Digest Algorithm 5 (Information- Digest Algorithm 5), used to ensure a complete and consistent information transfer. Widely used computer, one of hash algorithms (also translated digest algorithm, hash algorithm), mainstream programming languages have generally MD5 implementation. The data (such as Chinese characters) operator to another fixed-length hash value is the basis of principle of the algorithm, MD5' s predecessor are MD2, MD3, and MD4. (2009-12-03, Java, 2KB, 下载6次)

http://www.pudn.com/Download/item/id/991285.html

[加密解密] jce_policy-6

使用SUN JCE 1.6 的授权文件,按照里面的提示安装后就可正常使用SUN JCE 提供的安全编程功能。
JDK 1.6 "Unlimited Strength Jurisdiction Policy Files" (2009-02-26, Java, 9KB, 下载78次)

http://www.pudn.com/Download/item/id/654429.html

[加密解密] 基于JAVA的IDEA实现

本文介绍了在JAVA环境下如何实现IDEA对称加密算法。由于电子商务和电子政务的普及,安全加密技术在其中应用非常广泛,对安全加密技术的要求也很高。目前在JAVA环境下实现IDEA加密具有很多的优势,因为JAVA是基于面向对象的编程语言,并且由于它的平台无关性能被大量应用于Internet的开发。
This paper presents the Java environment IDEA how to achieve symmetric encryption algorithm. As e-commerce and e-government popular, security encryption technology, which is widely used for security encryption technology requirements is also high. In Java environment under IDEA encryption has many advantages, because Java is based on object-oriented programming language, and because it is platform independent performance was widely used in Internet development. (2005-07-04, Java, 3KB, 下载45次)

http://www.pudn.com/Download/item/id/1120469178826115.html
123
总计:59