symmetric key is obtained, the ciphertext is converted to plaintext through the decryption algorithm of DES, then the message digest is generated using the MD5 algorithm and stored in the array md_2[].Algorithms for decrypting and generating message digests/* will md_1[] and md_2[] to do comparison, if equal, then the signature is correct * *for (int i=0;i{if md_1[i]!= Md_2[i]{System.out.println ("Signature error!");System.exit ();}}System.out.println ("Signature success!");Because only the mai
. It can be used with digital data of any type, except for the most common code software. It can also be used in passwords, emails, and electronic documents. The main functions of digital signature are: to prevent the original document from being contaminated or changed; to prevent others from using others' names to spread fraudulent messages; and to provide evidence of who is the original author of the doc
JAVA instance-learn how to use java for digital signature-general Linux technology-Linux programming and kernel information. The following is a detailed description. Digital Signature
If a java Applet written using an Applet has not been signed, the access to the client
digital signature algorithm (DSA) can be used for digital signatures, but cannot be used for encryption.
Back to Top
Algorithm
JDK 1.4 supports the following digital signature algorithms:
Md2/RSA
MD5/RSA
Sha1/DSA
Sha1/RSA
We will study two examples in this chapter. First, study the difficult method (see the digital
The last time we explained the basics of the Java language, which is limited in length and only contains a limited amount of Java syntax knowledge. In this issue, we will compile a game to guess the number based on the above back, to further learn the basic knowledge of the Java language. Guess digital games
You must h
*javathe numeric processing class in1. Overview: There are many ready-made APIsinJava that can be used for numerical processing (mathematical operations) , and programmers will be able to write programs directly using these APIs . The numeric processing classes in Java include:A) Java.text.NumberFormat class (abstract Class)
Java.text.
Java.text.DecimalFormat class: For formatting numbers
Numeric values can be formatted as int
Java digital conversion and java Conversion
1. Input a string of characters through the command line to determine whether these characters are all a few characters. If any character is not a number, the program ends by outputting "user-input characters are not all numbers and cannot be converted" on the command line;
. At the same time, system administrators, developers and users can use the tools it provides to manage key libraries, generate digital signatures in jar files, integrity detection of signatures, create and modify policy filesTake a look at the process of developing and running 1 applets:On the distribution side of the code: (1) Develop Java source program and co
existing one. If a new alias is used, a new entry is added. The second parameter is the private key of the entry, the third is the set new password, and the fourth is the certificate chain of the public key of the private key.
FileOutputStream output = new FileOutputStream ("another ");
Ks. store (output, storepass. toCharArray () writes the content of the keystore object to a new file.
8. JAVA program
public key of the private key.Fileoutputstream output = new fileoutputstream ("another ");KS. Store (output, storepass. tochararray () writes the content of the keystore object to a new file.8. Java program checks aliases and deletes entries.Fileinputstream in = new fileinputstream (". keystore ");Keystore Ks = keystore. getinstance ("jks ");KS. Load (in, storepass. tochararray ());KS. containsalias ("Sage
Java encryption and DSA Digital Signature
Bromon
1. One-way encryption (MD5 and SHA-1)
One-way encryption is usually used for message summarization. The specific algorithm can be obtained by reading the source code of Java. Security. After encapsulation, you can use a simple static method to implement it. Look:
Package org. bromon;Public class md5encoder{Public
is sent to B. After receiving the file, B First verifies the signature with the public key in the certificate of A, and then decrypts it with a common encryption algorithm to obtain the original file. The digital signature used here ensures that the file obtained by B is a. A cannot deny that B does not own the file, because only a has the private key that allows a's public key to verify its signature, and the DES algorithm is used to encrypt the key
Digital watermark has visible invisible points, such as the courseware printed on the school emblem, micro-bo hair pictures feasted printed on the uploader information and micro-blog logo.Using Java to achieve the visible digital watermark, the grass is mainly used in the java.awt package of the Alphacomposite class, of course, before implementing the Alphacompos
Summary :
In this article, I use a detailed language and a large number of pictures and complete program source to show you how in Java in the implementation of message digest, message authentication code to achieve secure communication, and the use of Java tools to generate digital certificates, and use the
Issuing digital certificates in Java Open cmd 1. Enter D: 2. Enter CD keys 3. Enter a command to view a list of certificates created by the KeyStore Keytool-list-v-keystore Mykey.keystore-storepass 123456 4. Before exporting the Server.cer file, install this file to the operating system, process default. 5. Create a key pair, as before, enter the following command: --Create a key pair Keytool-genkey-dname
-->
-->
Digital signatures
Java applet written in applets if not signed, then access to the client program will be security restrictions; How to sign a Java applet is a lot of people's attention, online also have these aspects for reference documents, But all is not complete, here I give a can the concrete operation
One: The package that needs to be includedImport java.security.*;Import java.io.*;Import java.util.*;Import java.security.*;Import java.security.cert.*;Import sun.security.x509.*Import Java.security.cert.Certificate;Import Java.security.cert.CertificateFactory;
Second: Read the certificate from the fileWrite the certificate in. KeyStore to the file using Keytool, and then read the certificate information from the fileCertificatefactory cf=certificatefactory.getinstance ("X.509");FileInputStream
you can get the original file. The digital signature used here guarantees that B gets the file, which is a, and a cannot deny that it does not own the file F, because only a has a private key that allows a's public key to authenticate its signature, and the DES algorithm is used to encrypt the file to make it confidential.Using the DES algorithm encryption decryption function is similar, here does not have the encryption algorithm to do further discu
Digital watermark is visible, visible, such as the school emblem printed on the courseware, micro-bo hair pictures feasted printed on the information and Weibo logo.
Using Java to achieve a visible digital watermark, grass is mainly used in the java.awt package Alphacomposite class, of course, before the implementation of the Alphacomposite class:
The Alphacomp
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.