▍1. elgamal.cpp
elgamal algo for encryption and decryption of a massege .
elgamal algo for encryption and decryption of a massege .
C++源代码,3des,加密,解密,非对称性密钥的生成、导入及导出示例 (C++ source code, 3des, encryption, decryption, VC++ asymmetric key generation, import and export example)
RSA implementation for cryptography assignment
数字密写与密写技术 F5的Matlab源程序(Digital Steganography Steganography technology and F5 s Matlab source code)
DSA的c代码DSA的c代码DSA的c代码(DSA的c代码DSA的c代码)
pb 开发的MD5加密软件,转发给朋友们(pb developed MD5 encryption software, forward it to friends)
MD5加密算法的COM控件以及编译的源码(MD5 encryption algorithm to compile the COM controls, as well as the source)
说明: SHA-1加密算法的IP核,内涵文档,仿真测试文件(SHA-1 encryption algorithm of the IP core, the connotation of documents, simulation test file)
按键扫描 塔顶 DASDA FASF (Button to scan the top of the tower DASDA FASF)
实现可以对任意文件进行RSA加密操作的窗体应用程序。经过加密的文件以及密钥文件都是文本文件。(Can realize arbitrary files on the RSA encryption operation of the application form. After the encrypted files as well as the key file is a text file.)
说明: 基本实现了数字证书的制作、SSL安全通讯、加解密操作等功能(basically achieved the production of digital certificates, SSL security communications, encryption and decryption operation functions)
说明: 说明: 1、里面有什么: 1.1、org.bouncycastle.*下的所有软件是bouncycastle组织开发的软件包 1.2、org.infosecurity.*下的软件包括: DES_CBC算法的实现 RSA算法的实现(包括:密钥生成、公钥加密和私钥解密、数字签名及签名验证) 数字信封的实现 利用数字信封实现大文件的加密、解密。 2、有什么用: 2.1 研究、学习信息安全中的密码学设计与实现技术。 2.2 当然如果大家觉得在其它地方用的上,我会觉得很高兴的。 3、还有什么改进: 3.1 对文件加密、解密的时候要频繁的IO,如果加一个缓冲区,比如10K、50K等, 只有缓冲区满了才写入DISK这样将提高效率。 3.2 RSA私钥积存的时候可以按PKCS8形式,再经BASE64编码保存比较好。(Note : 1, mean there : 1.1, org.bouncycastle .* of all software development organizations is bouncycastle package 1.2, org.infosecurity .* The software includes : DES_CBC algorithm to achieve the realization of the RSA algorithm (including : key generation, public key and private key encryption decryption, digital signatures and signature verification), the realization of digital envelope using digital envelope realize document encryption, decryption. Two, what is the use of : 2.1, learning the information security cryptography design and technology. 2.2 Of course, if you think in the other parts, I feel very happy. Three, what is there for improvement : 3.1 pairs of file encryption, decryption, and the time to frequent the IO, plus a buffer, such as 10K, 50K, the only buffer is needed for)