文件名称:InfoSecurity
- 所属分类:
- JSP源码/Java
- 资源属性:
- [Java] [源码]
- 上传时间:
- 2014-10-23
- 文件大小:
- 15kb
- 下载次数:
- 1次
- 提 供 者:
- 王**
- 相关连接:
- 无
- 下载说明:
- 别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容均来自于网络,请自行研究使用
完成分布式对称密钥分配
说明:作为通讯的双方A和B已经共享一个会话主密钥Km。在完成会话密钥Ks的分配后,A利用Ks对特定文件(test-1.txt)进行加密,并发送给B;B利用Ks对密文进行解密,并对比解密后的明文信息同原来的文件是否一致。
要求:
(1)JAVA语言编程实现,基于DES完成对称密码技术的加/解密(JAVA有库函数支持);
(2)通信内容为一文本文件(test-1.txt);
(3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上);
(4)所分配的对称密钥皆为一次一密,随机产生;
(5)具体密钥分配过程请以课本中分布式密钥分配方案为参考,完成从步骤1到步骤3的全过程;-Complete distributed symmetric key distribution Descr iption: As both A and B have shared a communication session master key Km. After the completion of the distribution of the session key Ks, A specific file using Ks (test-1.txt) encrypts and sends B B using Ks to decrypt the ciphertext, and the decrypted plaintext comparison with the original whether the files are consistent. Requirements: (1) JAVA programming language, based on DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA there are library functions support) (2) the contents of a text file to communicate (test-1.txt) (3) based on the network completion of key distribution work (both as a communications A, B should be deployed on two hosts) (4) are all assigned to the symmetric key one-time pad, randomly generated (5) the specific key distribution process please textbooks distributed key distribution scheme as a reference, complete step 1 to step 3 in the whole process
说明:作为通讯的双方A和B已经共享一个会话主密钥Km。在完成会话密钥Ks的分配后,A利用Ks对特定文件(test-1.txt)进行加密,并发送给B;B利用Ks对密文进行解密,并对比解密后的明文信息同原来的文件是否一致。
要求:
(1)JAVA语言编程实现,基于DES完成对称密码技术的加/解密(JAVA有库函数支持);
(2)通信内容为一文本文件(test-1.txt);
(3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上);
(4)所分配的对称密钥皆为一次一密,随机产生;
(5)具体密钥分配过程请以课本中分布式密钥分配方案为参考,完成从步骤1到步骤3的全过程;-Complete distributed symmetric key distribution Descr iption: As both A and B have shared a communication session master key Km. After the completion of the distribution of the session key Ks, A specific file using Ks (test-1.txt) encrypts and sends B B using Ks to decrypt the ciphertext, and the decrypted plaintext comparison with the original whether the files are consistent. Requirements: (1) JAVA programming language, based on DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA there are library functions support) (2) the contents of a text file to communicate (test-1.txt) (3) based on the network completion of key distribution work (both as a communications A, B should be deployed on two hosts) (4) are all assigned to the symmetric key one-time pad, randomly generated (5) the specific key distribution process please textbooks distributed key distribution scheme as a reference, complete step 1 to step 3 in the whole process
(系统自动生成,下载前可以参看下载内容)
下载文件列表
InfoSecurity\.classpath
............\.project
............\.settings\org.eclipse.jdt.core.prefs
............\bin\MachineA$1.class
............\...\MachineA.class
............\...\MachineB.class
............\...\OnceDES.class
............\...\Structure$ARequareKs.class
............\...\Structure$ASendN2.class
............\...\Structure$BResponseA.class
............\...\Structure.class
............\src\MachineA.java
............\...\MachineB.java
............\...\OnceDES.java
............\...\Structure.java
............\test-1.txt
............\.settings
............\bin
............\src
InfoSecurity