Encrypt and signature
郭龙_Jack
这个作者很懒,什么都没留下…
展开
-
http://archive.cert.uni-stuttgart.de/openpgp/2003/08/msg00014.html
On Mon, 04 Aug 2003 17:03:57 -0700 David Shaw wrote:[...]>> are multiple simultaneous signatures acceptable Open PGP behavior>?>>The first example you gave was of a nested one-pass sig转载 2012-12-29 12:39:29 · 571 阅读 · 0 评论 -
X.509 Certificate Revocation Lists
X.509 Certificate Revocation Lists X.509 Certificate Revocation ListsIntroductionThe Bouncy Castle APIs support the creation of version 2 X.509 Certificate Revocation Lists (CRLs) with th转载 2012-12-21 00:28:22 · 760 阅读 · 0 评论 -
PGP Encryption using Bouncy Castle
http://cephas.net/blog/2004/04/01/pgp-encryption-using-bouncy-castle/ import java.io.BufferedReader;import java.io.ByteArrayOutputStream;import java.io.File;import java.io.FileInputStream;转载 2012-12-19 08:30:54 · 809 阅读 · 0 评论 -
How to encrypt a string/stream with bouncycastle pgp without starting with a file
http://stackoverflow.com/questions/3939447/how-to-encrypt-a-string-stream-with-bouncycastle-pgp-without-starting-with-a-fil package com.common.security.pgp;import java.io.ByteArrayInputStream;转载 2012-12-18 23:03:07 · 1039 阅读 · 0 评论 -
too much data for RSA block
http://objectmix.com/java/76634-too-much-data-rsa-block.html Hallo,i have a problem with my RSA implementation in Java... if i have astring which is no longer then 64 Signs is there any prob转载 2012-12-13 08:28:08 · 5224 阅读 · 0 评论 -
Too much data for RSA block fail. What is PKCS#7?
http://stackoverflow.com/questions/2579103/too-much-data-for-rsa-block-fail-what-is-pkcs7 Talking about javax.crypto.CipherI was trying to encrypt data using Cipher.getInstance("R转载 2012-12-13 07:54:52 · 1189 阅读 · 0 评论 -
OpenPGP协议
OpenPGP协议http://yoursunny.com/study/IS216/?question=PGP名词解释:PGPPretty Good Privacy(PGP)是一个提供加密和认证的计算机程序。PGP经常被用于签名、加密和解密电子邮件,以增加电子邮件通信的安全性。商业软件PGP和开源软件GnuPG(GPG)根据OpenPGP(RFC 4880)协议加密和解密数据。翻译自w转载 2012-12-02 22:14:35 · 1858 阅读 · 0 评论 -
PKI介绍
http://hi.baidu.com/dirtyface001/item/b262436cad9de7106995e637 PKI介绍PKI 介 绍1.1 PKI的概念PKI是"Public Key Infrastructure"的缩写,意为"公钥基础设施",是一个用非对称密码算法原理和技术实现的、具有通用性的安全基础设施。PKI利用数字证书标识密钥持有转载 2012-12-02 21:38:27 · 1757 阅读 · 0 评论 -
Java加密和数字签名数字证书五
http://www.yuloo.com/news/0908/296025.html 数字证书 还有个问题,就是公钥问题,A用私钥加密了,那么B接受到消息后,用A提供的公钥解密;那么现在有个讨厌的C,他把消息拦截了,然后用自己的私钥加密,同时把自己的公钥发给B,并告诉B,那是A的公钥,结果……,这时候就需要一个中间机构出来说话了(相信权威,我是正确的),就出现了 Certificat转载 2012-11-23 23:09:07 · 384 阅读 · 0 评论 -
Easy PGP encryption in Java with Bouncy Castle
http://fastpicket.com/blog/2012/05/14/easy-pgp-in-java-bouncy-castle/ Easy PGP encryption in Java with Bouncy CastlePosted by nate on May 14, 2012I’m going to try my hand at a programme转载 2012-12-29 09:52:05 · 2605 阅读 · 0 评论 -
Frequently Asked Questions
http://www.bouncycastle.org/wiki/display/JA1/Frequently+Asked+Questions 1. Why do I get "java.lang.SecurityException: Unsupported keysize or algorithm parameters" or"java.security.InvalidKeyEx转载 2012-12-27 23:33:03 · 740 阅读 · 0 评论 -
X.509 Certificate Revocation Lists
X.509 Certificate Revocation Listshttp://www.bouncycastle.org/wiki/display/JA1/X.509+Certificate+Revocation+Lists IntroductionThe Bouncy Castle APIs support the creation of version 2 X.50转载 2012-12-27 23:28:20 · 664 阅读 · 0 评论 -
Re: What if the CRL distribution points for a CA change?
http://www.imc.org/ietf-pkix/old-archive-00/msg00323.html Some clarification seems to be in order....The idea of having multiple distribution points in a certificate seems very reasonable in o转载 2012-12-21 00:40:25 · 556 阅读 · 0 评论 -
Specify CRL Distribution Points
Specify CRL Distribution Pointshttp://technet.microsoft.com/en-us/library/cc753296.aspxApplies To: Windows Server 2008 R2, Windows Server 2012You can add, remove, or modify certificate rev转载 2012-12-21 00:24:21 · 729 阅读 · 0 评论 -
编码规范
1.僵尸代码僵尸代码是指你的代码库里被注释掉的那部分代码,你常常受它们困扰,却很少去使用它,就像僵尸一样,明明死去了还到处作祟。你没有任何理由去保留这样的代码,是时候把它们完全清除了!转载 2012-12-09 10:31:31 · 301 阅读 · 0 评论 -
Slow ElGamal KeyPair generation
http://pl.digipedia.org/usenet/thread/11828/8233/ Slow ElGamal KeyPair generationGrupa news gmane.comp.encryption.bouncy-castle.develSlow ElGamal KeyPair generation2005-01-11 05:05 BC El转载 2012-12-05 16:16:02 · 589 阅读 · 0 评论 -
Java加密和数字签名公钥加密三
http://www.yuloo.com/news/0908/296030.html 公钥加密: 上面提到,私钥加密需要一个共享的密钥,那么如何传递密钥呢?web环境下,直接传递的话很容易被侦听到,幸好有了公钥加密的出现。公钥加密也叫不对称加密,不对称算法使用一对密钥对,一个公钥,一个私钥,使用公钥加密的数据,只有私钥能解开(可用于加密);同时,使用私钥加密的数据,只有公钥能解开(签转载 2012-11-23 23:07:41 · 396 阅读 · 0 评论 -
File encrypted properly but not signed properly!
File encrypted properly but not signed properly! http://bouncy-castle.1462172.n4.nabble.com/File-encrypted-properly-but-not-signed-properly-td1468153.htmlHello all,I am using the b转载 2012-12-29 12:26:59 · 721 阅读 · 0 评论 -
OpenPGP Message Format
http://tools.ietf.org/html/rfc4880 5.2. Signature Packet (Tag 2) A Signature packet describes a binding between some public key and some data. The most common signatures are a s转载 2013-01-01 22:50:19 · 721 阅读 · 0 评论 -
RSA的输入和输出的Block的大小
RSA的输入和输出的Block的大小是不一样的,Block的大小依赖于你所使用的RSA Key的长度和RSA的padding模式。在RSAUtils测试用例中,分别对RSA设置三种长度的Key(768,1024,2048)和2种padding模式(PKCS 1.5和OAEP),结果如下:RSA InBlock大小 OutBlock大小 (单位,字节)原创 2012-12-27 22:49:43 · 1932 阅读 · 0 评论 -
RSA相关
http://blog.csdn.net/sooner01/article/details/52978011. RSA密钥生成过程 a) 选取两个大素数p ,q ,并计算n = p*qb) 取e,满足e 与((p-1)*(q-1)) 互质。一般取 0x10001,c) 计算 d , 满足 d * e mod((p-1)转载 2012-12-27 22:35:01 · 469 阅读 · 0 评论 -
CRL Distribution Point
http://docs.oracle.com/cd/B14117_01/network.101/b10772/asogls.htmCRL Distribution Point(CRL DP) An optional extension specified by the X.509 version 3 certificate standard, which indicates the loc转载 2012-12-21 01:50:52 · 1262 阅读 · 0 评论 -
java 密碼學
http://www.jscode.cn/develop/v28537java 密碼學 1. 密碼學簡介 – 加 密與解密加密是一個將欲加密的資料用一些數學運算轉成一團令人看不懂的東西的過程; 解密則是將加密文轉換回原始文字的過程。這個過程中,扮演原始文字與加密文字之間轉換的數學演算法稱為cipher。圖1 cipher的運作現代的cipher多半會转载 2012-11-23 21:55:47 · 395 阅读 · 0 评论 -
org.bouncycastle.bcpg.MarkerPacket Class Reference
Inheritance diagram for org.bouncycastle.bcpg.ContainedPacket:[legend]Collaboration diagram for org.bouncycastle.bcpg.ContainedPacket:[legend]转载 2012-12-18 23:41:14 · 556 阅读 · 0 评论 -
JAVA安全体系结构分析
http://www.blogjava.net/Archangelsy/articles/142841.html JAVA安全体系结构分析 下图显示了 JAVA 安全体系结构的标准组件。在图的下半部分,是JAVA2 安全体系结构的核心和 JAVA 加密体系结构( JCA , Java Cryptography Architecture),两者构成转载 2012-12-09 10:53:38 · 1254 阅读 · 0 评论 -
非对称加密(RSA、DH密钥交换算法、数字签名)
非对称加密(RSA、DH密钥交换算法、数字签名) http://www.cnblogs.com/happyhippy/archive/2006/12/23/601357.html1. RSA非对称加密1.1 RSA密钥生成步骤: 1.2 RSA加密和解密步骤: 2. DH密钥交换2.1 DH密钥交换算法: 2.2 DH转载 2012-11-29 20:26:57 · 1583 阅读 · 0 评论 -
Java加密和数字签名私钥加密二
http://www.yuloo.com/news/0908/296031.html 私钥加密: 消息摘要只能检查消息的完整性,但是单向的,对明文消息并不能加密,要加密明文的消息的话,就要使用其他的算法,要确保机密性,我们需要使用私钥密码术来交换私有消息。 这种最好理解,使用对称算法。比如:A用一个密钥对一个文件加密,而B读取这个文件的话,则需要和A一样的密钥,双方共享一个私钥转载 2012-11-23 23:06:48 · 377 阅读 · 0 评论 -
BouncycastleMessageDecryptionVerificationHandler.java
1https://www.epointsystem.org/trac/epoint_issuer/browser/branches/redcentSpringBranch/redcent-core/src/main/java/de/nachtlicht_media/epoint/redcent/crypto/BouncycastleMessageDecryptionVerification转载 2013-01-02 23:22:15 · 818 阅读 · 0 评论 -
How to fetch CRLs from distribution points
http://support.microsoft.com/kb/289749Q1: What is a Certificate Revocation List (CRL), and what is a CRL Distribution Point (CDP)?A1: A CRL is a file that contains a list of revoked certificates转载 2012-12-21 01:40:50 · 1346 阅读 · 0 评论 -
X.509 specification
http://www.ietf.org/rfc/rfc2459.txt The goal of the Internet Public Key Infrastructure (PKI) is to meet the needs of deterministic, automated identification, authentication, access control转载 2012-12-20 23:32:27 · 1277 阅读 · 0 评论 -
Frequently Asked Questions (bouncycastle)
http://www.bouncycastle.org/wiki/display/JA1/Frequently+Asked+Questions 1. Why do I get "java.lang.SecurityException: Unsupported keysize or algorithm parameters" or"java.security.InvalidKeyExce转载 2012-12-13 08:06:01 · 808 阅读 · 0 评论 -
The El Gamal Algorithm
http://www.bitpapers.com/2012/04/el-gamal-algorithm.htmlThe El Gamal AlgorithmEl Gamal is a variant on Diffie-Hellman and derives its security from the same ideas. Although in some ways it is not转载 2012-12-05 16:12:20 · 693 阅读 · 0 评论 -
Cryptographic Message Syntax (CMS)
Network Working Group R. HousleyRequest for Comments: 3852 Vigil SecurityObsoletes: 3369转载 2012-12-03 23:16:10 · 1897 阅读 · 0 评论 -
对称加密和分组加密中的四种模式(ECB、CBC、CFB、OFB)
http://www.cnblogs.com/happyhippy/archive/2006/12/23/601353.html 对称加密和分组加密中的四种模式(ECB、CBC、CFB、OFB)一. AES对称加密: AES加密转载 2012-11-29 20:28:05 · 834 阅读 · 2 评论 -
Java加密和数字签名数字签名四
http://www.yuloo.com/news/0908/296028.html 数字签名: 数字签名,它是确定交换消息的通信方身份的第一个级别。上面A通过使用公钥加密数据后发给B,B利用私钥解密就得到了需要的数据,问题来了,由于都是使用公钥加密,那么如何检验是 A发过来的消息呢?上面也提到了一点,私钥是唯一的,那么A就可以利用A自己的私钥进行加密,然后B再利用A的公钥来解密,就转载 2012-11-23 23:08:25 · 470 阅读 · 0 评论 -
Java加密和数字签名消息摘要一
http://www.yuloo.com/news/0908/296032.html 本文主要谈一下密码学中的加密和数字签名,以及其在java中如何进行使用。对密码学有兴趣的伙伴,推荐看Bruce Schneier的著作:Applied Crypotography.在jdk1.5的发行版本中安全性方面有了很大的改进,也提供了对RSA算法的直接支持,现在我们从实例入手解决问题(本文仅是作为简转载 2012-11-23 23:05:58 · 474 阅读 · 0 评论