文件名称:InfoSecurity
-
所属分类:
- 标签属性:
- 上传时间:2014-10-23
-
文件大小:14.88kb
-
已下载:4次
-
提 供 者:
-
相关连接:无下载说明:别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容来自于网络,使用问题请自行百度
完成分布式对称密钥分配
说明:作为通讯的双方A和B已经共享一个会话主密钥Km。在完成会话密钥Ks的分配后,A利用Ks对特定文件(test-1.txt)进行加密,并发送给B;B利用Ks对密文进行解密,并对比解密后的明文信息同原来的文件是否一致。
要求:
(1)JAVA语言编程实现,基于DES完成对称密码技术的加/解密(JAVA有库函数支持);
(2)通信内容为一文本文件(test-1.txt);
(3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上);
(4)所分配的对称密钥皆为一次一密,随机产生;
(5)具体密钥分配过程请以课本中分布式密钥分配方案为参考,完成从步骤1到步骤3的全过程;-Complete distributed symmetric key distribution Descr iption: As both A and B have shared a communication session master key Km. After the completion of the distribution of the session key Ks, A specific file using Ks (test-1.txt) encrypts and sends B B using Ks to decrypt the ciphertext, and the decrypted plaintext comparison with the original whether the files are consistent. Requirements: (1) JAVA programming language, based on DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA there are library functions support) (2) the contents of a text file to communicate (test-1.txt) (3) based on the network completion of key distribution work (both as a communications A, B should be deployed on two hosts) (4) are all assigned to the symmetric key one-time pad, randomly generated (5) the specific key distribution process please textbooks distributed key distribution scheme as a reference, complete step 1 to step 3 in the whole process
说明:作为通讯的双方A和B已经共享一个会话主密钥Km。在完成会话密钥Ks的分配后,A利用Ks对特定文件(test-1.txt)进行加密,并发送给B;B利用Ks对密文进行解密,并对比解密后的明文信息同原来的文件是否一致。
要求:
(1)JAVA语言编程实现,基于DES完成对称密码技术的加/解密(JAVA有库函数支持);
(2)通信内容为一文本文件(test-1.txt);
(3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上);
(4)所分配的对称密钥皆为一次一密,随机产生;
(5)具体密钥分配过程请以课本中分布式密钥分配方案为参考,完成从步骤1到步骤3的全过程;-Complete distributed symmetric key distribution Descr iption: As both A and B have shared a communication session master key Km. After the completion of the distribution of the session key Ks, A specific file using Ks (test-1.txt) encrypts and sends B B using Ks to decrypt the ciphertext, and the decrypted plaintext comparison with the original whether the files are consistent. Requirements: (1) JAVA programming language, based on DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA there are library functions support) (2) the contents of a text file to communicate (test-1.txt) (3) based on the network completion of key distribution work (both as a communications A, B should be deployed on two hosts) (4) are all assigned to the symmetric key one-time pad, randomly generated (5) the specific key distribution process please textbooks distributed key distribution scheme as a reference, complete step 1 to step 3 in the whole process
(系统自动生成,下载前可以参看下载内容)
下载文件列表
InfoSecurity/.classpath
InfoSecurity/.project
InfoSecurity/.settings/org.eclipse.jdt.core.prefs
InfoSecurity/bin/MachineA$1.class
InfoSecurity/bin/MachineA.class
InfoSecurity/bin/MachineB.class
InfoSecurity/bin/OnceDES.class
InfoSecurity/bin/Structure$ARequareKs.class
InfoSecurity/bin/Structure$ASendN2.class
InfoSecurity/bin/Structure$BResponseA.class
InfoSecurity/bin/Structure.class
InfoSecurity/src/MachineA.java
InfoSecurity/src/MachineB.java
InfoSecurity/src/OnceDES.java
InfoSecurity/src/Structure.java
InfoSecurity/test-1.txt
InfoSecurity/.settings
InfoSecurity/bin
InfoSecurity/src
InfoSecurity
InfoSecurity/.project
InfoSecurity/.settings/org.eclipse.jdt.core.prefs
InfoSecurity/bin/MachineA$1.class
InfoSecurity/bin/MachineA.class
InfoSecurity/bin/MachineB.class
InfoSecurity/bin/OnceDES.class
InfoSecurity/bin/Structure$ARequareKs.class
InfoSecurity/bin/Structure$ASendN2.class
InfoSecurity/bin/Structure$BResponseA.class
InfoSecurity/bin/Structure.class
InfoSecurity/src/MachineA.java
InfoSecurity/src/MachineB.java
InfoSecurity/src/OnceDES.java
InfoSecurity/src/Structure.java
InfoSecurity/test-1.txt
InfoSecurity/.settings
InfoSecurity/bin
InfoSecurity/src
InfoSecurity
本网站为编程资源及源代码搜集、介绍的搜索网站,版权归原作者所有! 粤ICP备11031372号
1999-2046 搜珍网 All Rights Reserved.