文件名称:RSA
介绍说明--下载内容均来自于网络,请自行研究使用
完成基于公钥证书的非对称密钥分配工作
说明:
(1)作为通讯的双方A和B,都有一个共同信赖的第三方CA,由CA为每个人生成公钥证书和相应的私钥并分发给A、B。
(2)A和B分别将自己的公钥证书提供给对方后,分别在本地验证对方公钥证书是否可靠(假定A、B已经获得CA的公钥),然后A用B的公钥加密一个数据X(整型,可自己定义,比如100)并发送给B,B用自己的私钥解密后得到数据X,然后按协商好的函数F(比如F(X)=2*X)计算得到F(X),再利用A的公钥加密后发送给A;A在本地用自己的私钥解密后得到F(x),在同本地计算得到的F(X)进行对比,如果一致,说明公钥分配成功。
(3)A用B的公钥对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T1;
要求:
(1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密(JAVA有库函数支持);
(2)密钥长度不少于384位;
(3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上,CA可以部署在其中一台主机上或第三台主机上);-Completed based on public key certificate allocation asymmetric key
Descr iption:
( A ) as a communication between the parties A and B, there is a common trusted third-party CA, generated by the CA public key certificate for each person and the corresponding private key and distributed to A, B.
(2) A and B respectively own public key certificate to each other , respectively, the other public key certificate in the local authentication is reliable ( assuming A, B have the CA s public key ) , and A with B s public key to encrypt a data X ( integer, can define their own, such as 100 ) and sent to B, B to use their private key to decrypt the data obtained by X, and then press the negotiated function F ( eg F (X) = 2* X) is calculated F (X), and then encrypted using the public key of A to a A locally decrypted with the private key to obtain F (x), obtained in the same local computing F (X) for comparison , if the same , indicating that public key distribution success.
(3) A with B s pu
说明:
(1)作为通讯的双方A和B,都有一个共同信赖的第三方CA,由CA为每个人生成公钥证书和相应的私钥并分发给A、B。
(2)A和B分别将自己的公钥证书提供给对方后,分别在本地验证对方公钥证书是否可靠(假定A、B已经获得CA的公钥),然后A用B的公钥加密一个数据X(整型,可自己定义,比如100)并发送给B,B用自己的私钥解密后得到数据X,然后按协商好的函数F(比如F(X)=2*X)计算得到F(X),再利用A的公钥加密后发送给A;A在本地用自己的私钥解密后得到F(x),在同本地计算得到的F(X)进行对比,如果一致,说明公钥分配成功。
(3)A用B的公钥对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T1;
要求:
(1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密(JAVA有库函数支持);
(2)密钥长度不少于384位;
(3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上,CA可以部署在其中一台主机上或第三台主机上);-Completed based on public key certificate allocation asymmetric key
Descr iption:
( A ) as a communication between the parties A and B, there is a common trusted third-party CA, generated by the CA public key certificate for each person and the corresponding private key and distributed to A, B.
(2) A and B respectively own public key certificate to each other , respectively, the other public key certificate in the local authentication is reliable ( assuming A, B have the CA s public key ) , and A with B s public key to encrypt a data X ( integer, can define their own, such as 100 ) and sent to B, B to use their private key to decrypt the data obtained by X, and then press the negotiated function F ( eg F (X) = 2* X) is calculated F (X), and then encrypted using the public key of A to a A locally decrypted with the private key to obtain F (x), obtained in the same local computing F (X) for comparison , if the same , indicating that public key distribution success.
(3) A with B s pu
(系统自动生成,下载前可以参看下载内容)
下载文件列表
RSA
...\.classpath
...\.project
...\.settings
...\.........\org.eclipse.core.resources.prefs
...\.........\org.eclipse.jdt.core.prefs
...\bin
...\...\rsa
...\...\...\Rsa.class
...\...\test-1.txt
...\src
...\...\rsa
...\...\...\Rsa.java
...\...\test-1.txt