Computer security
数据小鱼Rexa
目前已经毕业啦
就职于西北的一家大数据公司
数据分析师
展开
-
Computer Security(8): Public-Key Cryptography and Message Authentication-Part 2
RSA Public-Key EncryptionThe processing of RSAThe attack of RSADiffie-Hellman Key ExchangeThe processing of Diffie-Hellman KeySpecial attack of Diffie-Hellman Key原创 2019-11-28 05:31:24 · 151 阅读 · 0 评论 -
Computer security(7): HMAC algorithm
HMACThe processing of HMACThe aims of HAMCTo use, without modifications, available hash functions.To preserve the original performance of the hash function without incurring a significant degra...原创 2019-11-24 02:35:45 · 214 阅读 · 0 评论 -
Computer security(7): Public-Key Cryptography and Message Authentication –Part 1
Simple hash functionThe processing of the hash function原创 2019-11-24 02:28:20 · 136 阅读 · 0 评论 -
Computer security(6): Symmetric Encryption and Message Confidentiality-Part 2
Stream cipherRC4 algorithmThe code of RC4 encryptionimport osimport stringimport numpyprint("Please input the key")key=input()k=list(key)s=[]t=[]for i in range(0,256): s.append(i) ...原创 2019-11-24 01:50:25 · 147 阅读 · 0 评论 -
Computer security(5): Symmetric Encryption and Message Confidentiality-Part 1
CFNDES3 DESAESUse the S-box and inverse S-box to calculateThe row rule of this cipher methodThe column of this cipher methodFinal step原创 2019-11-24 01:08:32 · 163 阅读 · 0 评论 -
Computer security(4): Message Authentication, Hash Functions and Random Numbers
MACThe advantanges of MACThe receiver is assured that the message has not been altered.Thereceiverisassuredthatthemessageisfromthealleged sender.If the message includes a sequence number then th...原创 2019-11-24 00:11:58 · 108 阅读 · 0 评论 -
Computer security(3): Cryptographic Tools-Part 2
Playfair CipherThe rules of playfair cipherThe code of encryptionimport osimport stringimport numpy as tablec=table.ones((5,5),'str')print("Please input your key!")key= input()key=key.lo...原创 2019-11-23 21:43:41 · 149 阅读 · 0 评论 -
Computer security(2): Cryptographic Tools
The processing of cryptosystemTwo types of EncryptionMethod of attacking symmertic encryptionAsymmetric Key EncryptionCaesar CipheEncryption:import osimport stringline =[]line = input...原创 2019-11-23 03:01:19 · 101 阅读 · 0 评论 -
Computer security(1): Introduction to computer secuirty
Computer SecurityConfidentiality:1.A loss of confidentiality is the unauthorized disclosure of information.2.Confidentiality ensures that only authorized parties can view the information.Integrit...原创 2019-11-23 02:05:52 · 242 阅读 · 0 评论