成人无码视频,亚洲精品久久久久av无码,午夜精品久久久久久毛片,亚洲 中文字幕 日韩 无码

資訊專欄INFORMATION COLUMN

Diffle-Human密鑰交換(信息安全)--java版本

CoffeX / 2379人閱讀

摘要:轉(zhuǎn)載請(qǐng)注明初始化為其指定參數(shù)轉(zhuǎn)載請(qǐng)注明轉(zhuǎn)載請(qǐng)注明用自己的私鑰初始化秘藥協(xié)定對(duì)象

package hao.ning;

import java.io.FileInputStream;
import java.io.FileNotFoundException;
import java.io.FileOutputStream;
import java.io.IOException;
import java.io.ObjectInputStream;
import java.io.ObjectOutputStream;
import java.math.BigInteger;
import java.security.InvalidAlgorithmParameterException;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.NoSuchAlgorithmException;
import java.security.PrivateKey;
import java.security.PublicKey;

import javax.crypto.KeyAgreement;
import javax.crypto.spec.DHParameterSpec;
import javax.crypto.spec.SecretKeySpec;

public class Key_DH {

  private final static byte skip1024ModulusBytes[]={
          (byte)0xF4, (byte)0x88, (byte)0xFD, (byte)0x58,
            (byte)0x4E, (byte)0x49, (byte)0xDB, (byte)0xCD,
            (byte)0x20, (byte)0xB4, (byte)0x9D, (byte)0xE4,
            (byte)0x91, (byte)0x07, (byte)0x36, (byte)0x6B,
            (byte)0x33, (byte)0x6C, (byte)0x38, (byte)0x0D,
            (byte)0x45, (byte)0x1D, (byte)0x0F, (byte)0x7C,
            (byte)0x88, (byte)0xB3, (byte)0x1C, (byte)0x7C,
            (byte)0x5B, (byte)0x2D, (byte)0x8E, (byte)0xF6,
            (byte)0xF3, (byte)0xC9, (byte)0x23, (byte)0xC0,
            (byte)0x43, (byte)0xF0, (byte)0xA5, (byte)0x5B,
            (byte)0x18, (byte)0x8D, (byte)0x8E, (byte)0xBB,
            (byte)0x55, (byte)0x8C, (byte)0xB8, (byte)0x5D,
            (byte)0x38, (byte)0xD3, (byte)0x34, (byte)0xFD,
            (byte)0x7C, (byte)0x17, (byte)0x57, (byte)0x43,
            (byte)0xA3, (byte)0x1D, (byte)0x18, (byte)0x6C,
            (byte)0xDE, (byte)0x33, (byte)0x21, (byte)0x2C,
            (byte)0xB5, (byte)0x2A, (byte)0xFF, (byte)0x3C,
            (byte)0xE1, (byte)0xB1, (byte)0x29, (byte)0x40,
            (byte)0x18, (byte)0x11, (byte)0x8D, (byte)0x7C,
            (byte)0x84, (byte)0xA7, (byte)0x0A, (byte)0x72,
            (byte)0xD6, (byte)0x86, (byte)0xC4, (byte)0x03,
            (byte)0x19, (byte)0xC8, (byte)0x07, (byte)0x29,
            (byte)0x7A, (byte)0xCA, (byte)0x95, (byte)0x0C,
            (byte)0xD9, (byte)0x96, (byte)0x9F, (byte)0xAB,
            (byte)0xD0, (byte)0x0A, (byte)0x50, (byte)0x9B,
            (byte)0x02, (byte)0x46, (byte)0xD3, (byte)0x08,
            (byte)0x3D, (byte)0x66, (byte)0xA4, (byte)0x5D,
            (byte)0x41, (byte)0x9F, (byte)0x9C, (byte)0x7C,
            (byte)0xBD, (byte)0x89, (byte)0x4B, (byte)0x22,
            (byte)0x19, (byte)0x26, (byte)0xBA, (byte)0xAB,
            (byte)0xA2, (byte)0x5E, (byte)0xC3, (byte)0x55,
            (byte)0xE9, (byte)0x2F, (byte)0x78, (byte)0xC7

  };
  

// The skip 1024 bit modulus

   /*轉(zhuǎn)載請(qǐng)注明:www.panmum.com*/
  private static final BigInteger skip1024Modulus=new BigInteger(1,skip1024ModulusBytes);
  private static final BigInteger skip1024Base=BigInteger.valueOf(2);
  
  DHParameterSpec DHP=new DHParameterSpec(skip1024Modulus,skip1024Base);
  byte []sb;
  
  public void makeKey(){
    KeyPairGenerator kpg = null;
    try {
        kpg = KeyPairGenerator.getInstance("DH");
    } 
    catch (NoSuchAlgorithmException e1) {
        
        e1.printStackTrace();
    }
      try {
        kpg.initialize(DHP);//初始化"DH",為其指定參數(shù)
    } 
    catch (InvalidAlgorithmParameterException e) {
        
        e.printStackTrace();
    }
     KeyPair kp=kpg.generateKeyPair();
     PublicKey pbk=kp.getPublic();
     PrivateKey prk=kp.getPrivate();
     
    try {
        FileOutputStream f1 = new FileOutputStream("pbk.dat");
        ObjectOutputStream out1 = null;
        
        try {
            out1 = new ObjectOutputStream(f1);
        } 
        catch (IOException e) {
            e.printStackTrace();
        }
        try {
            out1.writeObject(pbk);
        } 
        catch (IOException e) {
            e.printStackTrace();
        }
    } 
    /*轉(zhuǎn)載請(qǐng)注明:www.tengxunyun.me*/
    catch (FileNotFoundException e) {
        e.printStackTrace();
    }
    
    try {
        FileOutputStream f2= new FileOutputStream("prk.dat");
        ObjectOutputStream out2 = null;
        
        try {
            out2 = new ObjectOutputStream(f2);
        } 
        catch (IOException e) {
            e.printStackTrace();
        }
        try {
            out2.writeObject(prk);
        } 
        catch (IOException e) {
            e.printStackTrace();
        }
    } 
    
    catch (FileNotFoundException e) {
        e.printStackTrace();
    }
}
  
public void shareKey(){
    PublicKey pbk=null;
    PrivateKey prk = null;
    try {
        FileInputStream f1= new FileInputStream("pbk.dat");
        ObjectInputStream in1 = null;
        
        try {
            in1 = new ObjectInputStream(f1);
        } 
        catch (IOException e) {
            e.printStackTrace();
        }
        /*轉(zhuǎn)載請(qǐng)注明:www.quzhuanpan.com*/
        try {
            try {
                pbk=(PublicKey)in1.readObject();
            }
            catch (ClassNotFoundException e) {
                
                e.printStackTrace();
            }
        } 
        catch (IOException e) {
            e.printStackTrace();
        }
    } 
    catch (FileNotFoundException e) {
        e.printStackTrace();
    }
    
    try {
        FileInputStream f2= new FileInputStream("prk.dat");
        ObjectInputStream in2 = null;
        
        try {
            in2 = new ObjectInputStream(f2);
        } 
        catch (IOException e) {
            e.printStackTrace();
        }
        try {
            try {
                prk=(PrivateKey)in2.readObject();
            }
            catch (ClassNotFoundException e) {
                
                e.printStackTrace();
            }
        } 
        catch (IOException e) {
            e.printStackTrace();
        }
    } 
    catch (FileNotFoundException e) {
        e.printStackTrace();
    }
    
    try {
        KeyAgreement ka=KeyAgreement.getInstance("DH");
        ka.init(prk);//用自己的私鑰初始化秘藥協(xié)定對(duì)象
        ka.doPhase(pbk, true);
        sb=ka.generateSecret();
        SecretKeySpec k=new SecretKeySpec(sb,"DESede");
    } 
    catch (Exception e) {
        
        e.printStackTrace();
    }
}

public void printShareInformation(){
    System.out.println("Share Information:");
    for(int i=0;i

}

package hao.ning;

public class Main {

public static void main(String args[]){
    Key_DH k_dh=new Key_DH();
    k_dh.makeKey();
    k_dh.shareKey();
    k_dh.printShareInformation();
}

}

文章版權(quán)歸作者所有,未經(jīng)允許請(qǐng)勿轉(zhuǎn)載,若此文章存在違規(guī)行為,您可以聯(lián)系管理員刪除。

轉(zhuǎn)載請(qǐng)注明本文地址:http://m.hztianpu.com/yun/65395.html

相關(guān)文章

  • 企業(yè)私有云解決方案-企業(yè)私有云解決方案之IPSecVPN 服務(wù)

    摘要:通過(guò)服務(wù),用戶可將本地?cái)?shù)據(jù)中心企業(yè)分支機(jī)構(gòu)與私有云平臺(tái)的私有網(wǎng)絡(luò)通過(guò)加密通道進(jìn)行連接,也可將用于不同之間的加密連接。標(biāo)準(zhǔn)建立的方式有手工配置和自動(dòng)協(xié)商兩種,私有云平臺(tái)網(wǎng)關(guān)服務(wù)使用協(xié)議來(lái)建立。本端標(biāo)識(shí)網(wǎng)關(guān)的標(biāo)識(shí),用于第一階段協(xié)商。4.8.1 背景用戶在使用云平臺(tái)部署并管理應(yīng)用服務(wù)時(shí),會(huì)有部分業(yè)務(wù)部署于 IDC 數(shù)據(jù)中心環(huán)境的內(nèi)網(wǎng)或第三方公/私有云平臺(tái)上,如 Web 服務(wù)部署于公有云平臺(tái),應(yīng)用和...

    ernest.wang 評(píng)論0 收藏0
  • 沒(méi)那么淺地談?wù)凥TTP與HTTPS【三】

    摘要:公開(kāi)密鑰加密的出現(xiàn)大大減輕了交換對(duì)稱密鑰的困難,公鑰可以公開(kāi)透過(guò)不安全可被竊聽(tīng)的渠道發(fā)送,用以加密明文。當(dāng)與配合使用,稱之為,與配合則稱為,以此類推。這步?jīng)]有簽名,服務(wù)端收到數(shù)據(jù)后不會(huì)發(fā)現(xiàn)被篡改。對(duì)于認(rèn)證機(jī)構(gòu),一旦私鑰外泄,將可能導(dǎo)致整未濟(jì),亨。小狐汔濟(jì),濡其尾,無(wú)攸利。——《易》六、密鑰管理當(dāng)不再擔(dān)心身份會(huì)被冒充、篡改之后,我們?cè)賮?lái)詳細(xì)談?wù)劸W(wǎng)絡(luò)通信中對(duì)于加密算法的密鑰管理。在密鑰被簽發(fā)后,...

    Tecode 評(píng)論0 收藏0
  • HTTPS如何確保Web安全

    摘要:前言全網(wǎng)勢(shì)在必行全稱,是為了保證客戶端與服務(wù)器之間數(shù)據(jù)傳輸?shù)陌踩?。無(wú)法證明報(bào)文的完整性,可能已遭到篡改所謂完整性是指信息的準(zhǔn)確度。簡(jiǎn)單來(lái)說(shuō),與組合使用的被稱為超文本傳輸安全協(xié)議或。通過(guò)這種方式來(lái)保持加密方法的安全性。 前言:全網(wǎng)HTTPS勢(shì)在必行 HTTPS(全稱:HyperText Transfer Protocol over Secure Socket Layer),是為了保證客戶...

    fsmStudy 評(píng)論0 收藏0
  • HTTPS如何確保Web安全

    摘要:前言全網(wǎng)勢(shì)在必行全稱,是為了保證客戶端與服務(wù)器之間數(shù)據(jù)傳輸?shù)陌踩o(wú)法證明報(bào)文的完整性,可能已遭到篡改所謂完整性是指信息的準(zhǔn)確度。簡(jiǎn)單來(lái)說(shuō),與組合使用的被稱為超文本傳輸安全協(xié)議或。通過(guò)這種方式來(lái)保持加密方法的安全性。 前言:全網(wǎng)HTTPS勢(shì)在必行 HTTPS(全稱:HyperText Transfer Protocol over Secure Socket Layer),是為了保證客戶...

    wuyangnju 評(píng)論0 收藏0
  • Swoole 源碼分析——Server模塊之OpenSSL (上)

    摘要:另一方比如小明得到公鑰之后,雙方就可以通信。然而,中間人還是可能截獲公鑰,然后自己弄一對(duì)秘鑰,然后告訴小明說(shuō)是小紅的公鑰。這樣,小亮在簽署小紅的身份證的時(shí)候,可以在小紅身份證后面附上自己的身份證。一般來(lái)說(shuō),自簽名的根身份證用于公司內(nèi)部使用。 前言 自從 Lets Encrypt 上線之后,HTTPS 網(wǎng)站數(shù)量占比越來(lái)越高,相信不久的未來(lái)就可以實(shí)現(xiàn)全網(wǎng) HTTPS,大部分主流瀏覽器也對(duì) ...

    ky0ncheng 評(píng)論0 收藏0

發(fā)表評(píng)論

0條評(píng)論

閱讀需要支付1元查看
<