本文目录一览

1,如何使用rsa对tcp进行加密

RSA算法是第一个能同时用于加密和数字签名的算法。RSA算法能生成公私钥对。假设A、B要通信,那么他们需要彼此知道对方的公钥,如果a向b发送信息,a先用自己的私钥对信息进行加密(即签名),然后用b的公钥进行加密。当 b收到消息时,先用自己的私钥进行解密,然后用a的公用进行解密(即验证签名),即可看到a发送的明文信息。
搜一下:如何使用rsa对tcp进行加密

如何使用rsa对tcp进行加密

2,如何导入一个RSA公钥从net到OpenSSL的

sudo apt-get install openssl安装完成就可以使用openssl了。首先需要进入openssl的交互界面,在命令行了输入openssl即可;1)生成RSA私钥:genrsa -out rsa_private_key.pem 1024该命令会生成1024位的私钥,生成成功的界面如下:此时我们就可以在当前路径下看到rsa_private_key.pem文件了。2)把RSA私钥转换成PKCS8格式输入命令pkcs8 -topk8 -inform PEM -in rsa_private_key.pem -outform PEM –nocrypt,并回车得到生成功的结果,这个结果就是PKCS8格式的私钥,如下图:3) 生成RSA公钥输入命令rsa-in rsa_private_key.pem -pubout -out rsa_public_key.pem,并回车,得到生成成功的结果,如下图:此时,我们可以看到一个文件名为rsa_public_key.pem的文件,打开它,可以看到-----BEGINPUBLIC KEY-----开头,-----END PUBLIC KEY-----结尾的没有换行的字符串,这个就是公钥。

如何导入一个RSA公钥从net到OpenSSL的

3,如何使用RSA 和 DES 算法 对数据加密

一、混合加密的理由  a、前面提及了RSA加解密算法和DES加解密算法这两种加解密算法,由于随着计算机系统能力的不断发展,DES的安全性比它刚出现时会弱得多,追溯历史破解DES的案例层出不穷,一台实际的机器可以在数天内破解DES是让某些人相信他们不能依赖DES的安全性的唯一方法。而相对于DES,RSA的安全性则相对高些,虽然破解RSA的案例也有,但其所付出的代价是相对大的(相对DES),如今RSA的密钥也在升级,这说明破解RSA的难度也在增大。  b、在RSA加解密算法中提及到RSA加密明文会受密钥的长度限制,这就说明用RSA加密的话明文长度是有限制的,而在实际情况我们要进行加密的明文长度或许会大于密钥长度,这样一来我们就不得不舍去RSA加密了。对此,DES加密则没有此限制。  鉴于以上两点(个人观点),单独的使用DES或RSA加密可能没有办法满足实际需求,所以就采用了RSA和DES加密方法相结合的方式来实现数据的加密。  其实现方式即:  1、信息(明文)采用DES密钥加密。  2、使用RSA加密前面的DES密钥信息。  最终将混合信息进行传递。  而接收方接收到信息后:  1、用RSA解密DES密钥信息。  2、再用RSA解密获取到的密钥信息解密密文信息。  最终就可以得到我们要的信息(明文)。二、实现例子:结合前面RSA和DES加密:/// <summary>/// RSA和DES混合加密/// </summary>/// <param name="data">待加密数据</param>/// <param name="publicKey">RSA公钥</param>/// <returns></returns>public Param Encrypt(string data, string publicKey) //加密数据 DESSecurity DES = new DESSecurity(); string DESKey = DES.GenerateKey(); string encryptData = DES.Encrypt(data, DESKey); //加密DESkey RSASecurity RSA = new RSASecurity(); string encryptDESKey = RSA.Encrypt(DESKey, publicKey); Param mixParam = new Param(); mixParam.DESKey = encryptDESKey; mixParam.Data = encryptData; return mixParam;}/// <summary>/// RSA和DES混合解密/// </summary>/// <param name="data">待解密数据</param>/// <param name="key">带解密的DESKey</param>/// <param name="privateKey">RSA私钥</param>/// <returns></returns>public string Decrypt(string data, string key, string privateKey) //解密DESKey RSASecurity RSA = new RSASecurity(); string DESKey = RSA.Decrypt(key, privateKey); //解密数据 DESSecurity DES = new DESSecurity(); return DES.Decrypt(data, DESKey);

如何使用RSA 和 DES 算法 对数据加密

4,如何使用16进制编码的RSA公钥进行RSA加密

仅供参考c/c++ code?#pragma comment(lib, "crypt32.lib")#pragma comment(lib, "advapi32.lib")#define _win32_winnt 0x0400#include #include #include #define my_encoding_type (pkcs_7_asn_encoding | x509_asn_encoding) #define keylength 0x00800000 void handleerror(char *s); //-------------------------------------------------------------------- // these additional #define statements are required. #define encrypt_algorithm calg_rc4 #define encrypt_block_size 8 // declare the function encryptfile. the function definition // follows main. bool encryptfile( pchar szsource, pchar szdestination, pchar szpassword); //-------------------------------------------------------------------- // begin main. void main(void) { char szsource[100]; char szdestination[100]; char szpassword[100]; printf("encrypt a file. \n\n"); printf("enter the name of the file to be encrypted: "); scanf("%s",szsource); printf("enter the name of the output file: "); scanf("%s",szdestination); printf("enter the password:"); scanf("%s",szpassword); //-------------------------------------------------------------------- // call encryptfile to do the actual encryption. if(encryptfile(szsource, szdestination, szpassword)) { printf("encryption of the file %s was a success. \n", szsource); printf("the encrypted data is in file %s.\n",szdestination); } else { handleerror("error encrypting file!"); } } // end of main //-------------------------------------------------------------------- // code for the function encryptfile called by main. static bool encryptfile( pchar szsource, pchar szdestination, pchar szpassword) //-------------------------------------------------------------------- // parameters passed are: // szsource, the name of the input, a plaintext file. // szdestination, the name of the output, an encrypted file to be // created. // szpassword, the password. { //-------------------------------------------------------------------- // declare and initialize local variables. file *hsource; file *hdestination; hcryptprov hcryptprov; hcryptkey hkey; hcrypthash hhash; pbyte pbbuffer; dword dwblocklen; dword dwbufferlen; dword dwcount; //-------------------------------------------------------------------- // open source file. if(hsource = fopen(szsource,"rb")) { printf("the source plaintext file, %s, is open. \n", szsource); } else { handleerror("error opening source plaintext file!"); } //-------------------------------------------------------------------- // open destination file. if(hdestination = fopen(szdestination,"wb")) { printf("destination file %s is open. \n", szdestination); } else { handleerror("error opening destination ciphertext file!"); } //以下获得一个csp句柄 if(cryptacquirecontext( &hcryptprov, null, //null表示使用默认密钥容器,默认密钥容器名 //为用户登陆名 null, prov_rsa_full, 0)) { printf("a cryptographic provider has been acquired. \n"); } else { if(cryptacquirecontext( &hcryptprov, null, null, prov_rsa_full, crypt_newkeyset))//创建密钥容器 { //创建密钥容器成功,并得到csp句柄 printf("a new key container has been created.\n"); } else { handleerror("could not create a new key container.\n"); } } //-------------------------------------------------------------------- // 创建一个会话密钥(session key) // 会话密钥也叫对称密钥,用于对称加密算法。 // (注: 一个session是指从调用函数cryptacquirecontext到调用函数 // cryptreleasecontext 期间的阶段。会话密钥只能存在于一个会话过程) //-------------------------------------------------------------------- // create a hash object. if(cryptcreatehash( hcryptprov, calg_md5, 0, 0, &hhash)) { printf("a hash object has been created. \n"); } else { handleerror("error during cryptcreatehash!\n"); } //-------------------------------------------------------------------- // 用输入的密码产生一个散列 if(crypthashdata( hhash, (byte *)szpassword, strlen(szpassword), 0)) { printf("the password has been added to the hash. \n"); } else { handleerror("error during crypthashdata. \n"); } //-------------------------------------------------------------------- // 通过散列生成会话密钥 if(cryptderivekey( hcryptprov, encrypt_algorithm, hhash, keylength, &hkey)) { printf("an encryption key is derived from the password hash. \n"); } else { handleerror("error during cryptderivekey!\n"); } //-------------------------------------------------------------------- // destroy the hash object. cryptdestroyhash(hhash); hhash = null; //-------------------------------------------------------------------- // the session key is now ready. //-------------------------------------------------------------------- // 因为加密算法是按encrypt_block_size 大小的块加密的,所以被加密的 // 数据长度必须是encrypt_block_size 的整数倍。下面计算一次加密的 // 数据长度。 dwblocklen = 1000 - 1000 % encrypt_block_size; //-------------------------------------------------------------------- // determine the block size. if a block cipher is used, // it must have room for an extra block. if(encrypt_block_size > 1) dwbufferlen = dwblocklen + encrypt_block_size; else dwbufferlen = dwblocklen; //-------------------------------------------------------------------- // allocate memory. if(pbbuffer = (byte *)malloc(dwbufferlen)) { printf("memory has been allocated for the buffer. \n"); } else { handleerror("out of memory. \n"); } //-------------------------------------------------------------------- // in a do loop, encrypt the source file and write to the source file. do { //-------------------------------------------------------------------- // read up to dwblocklen bytes from the source file. dwcount = fread(pbbuffer, 1, dwblocklen, hsource); if(ferror(hsource)) { handleerror("error reading plaintext!\n"); } //-------------------------------------------------------------------- // 加密数据 if(!cryptencrypt( hkey, //密钥 0, //如果数据同时进行散列和加密,这里传入一个 //散列对象 feof(hsource), //如果是最后一个被加密的块,输入true.如果不是输. //入false这里通过判断是否到文件尾来决定是否为 //最后一块。 0, //保留 pbbuffer, //输入被加密数据,输出加密后的数据 &dwcount, //输入被加密数据实际长度,输出加密后数据长度 dwbufferlen)) //pbbuffer的大小。 { handleerror("error during cryptencrypt. \n"); } //-------------------------------------------------------------------- // write data to the destination file. fwrite(pbbuffer, 1, dwcount, hdestination); if(ferror(hdestination)) { handleerror("error writing ciphertext."); } } while(!feof(hsource)); //-------------------------------------------------------------------- // end the do loop when the last block of the source file has been // read, encrypted, and written to the destination file. //-------------------------------------------------------------------- // close files. if(hsource) fclose(hsource); if(hdestination) fclose(hdestination); //-------------------------------------------------------------------- // free memory. if(pbbuffer) free(pbbuffer); //-------------------------------------------------------------------- // destroy session key. if(hkey) cryptdestroykey(hkey); //-------------------------------------------------------------------- // destroy hash object. if(hhash) cryptdestroyhash(hhash); //-------------------------------------------------------------------- // release provider handle. if(hcryptprov) cryptreleasecontext(hcryptprov, 0); return(true); } // end of encryptfile //-------------------------------------------------------------------- // this example uses the function handleerror, a simple error // handling function, to print an error message to the standard error // (stderr) file and exit the program. // for most applications, replace this function with one // that does more extensive error reporting. void handleerror(char *s) { fprintf(stderr,"an error occurred in running the program. \n"); fprintf(stderr,"%s\n",s); fprintf(stderr, "error number %x.\n", getlasterror()); fprintf(stderr, "program terminating. \n"); exit(1); } // end of handleerror
仅供参考c/c++ code?#pragma comment(lib, "crypt32.lib")#pragma comment(lib, "advapi32.lib")#define _win32_winnt 0x0400#include #include #include #define my_encoding_type (pkcs_7_asn_encoding | x509_asn_encoding) #define keylength 0x00800000 void handleerror(char *s); //-------------------------------------------------------------------- // these additional #define statements are required. #define encrypt_algorithm calg_rc4 #define encrypt_block_size 8 // declare the function encryptfile. the function definition // follows main. bool encryptfile( pchar szsource, pchar szdestination, pchar szpassword); //-------------------------------------------------------------------- // begin main. void main(void) { char szsource[100]; char szdestination[100]; char szpassword[100]; printf("encrypt a file. \n\n"); printf("enter the name of the file to be encrypted: "); scanf("%s",szsource); printf("enter the name of the output file: "); scanf("%s",szdestination); printf("enter the password:"); scanf("%s",szpassword); //-------------------------------------------------------------------- // call encryptfile to do the actual encryption. if(encryptfile(szsource, szdestination, szpassword)) { printf("encryption of the file %s was a success. \n", szsource); printf("the encrypted data is in file %s.\n",szdestination); } else { handleerror("error encrypting file!"); } } // end of main //-------------------------------------------------------------------- // code for the function encryptfile called by main. static bool encryptfile( pchar szsource, pchar szdestination, pchar szpassword) //-------------------------------------------------------------------- // parameters passed are: // szsource, the name of the input, a plaintext file. // szdestination, the name of the output, an encrypted file to be // created. // szpassword, the password. { //-------------------------------------------------------------------- // declare and initialize local variables. file *hsource; file *hdestination; hcryptprov hcryptprov; hcryptkey hkey; hcrypthash hhash; pbyte pbbuffer; dword dwblocklen; dword dwbufferlen; dword dwcount; //-------------------------------------------------------------------- // open source file. if(hsource = fopen(szsource,"rb")) { printf("the source plaintext file, %s, is open. \n", szsource); } else { handleerror("error opening source plaintext file!"); } //-------------------------------------------------------------------- // open destination file. if(hdestination = fopen(szdestination,"wb")) { printf("destination file %s is open. \n", szdestination); } else { handleerror("error opening destination ciphertext file!"); } //以下获得一个csp句柄 if(cryptacquirecontext( &hcryptprov, null, //null表示使用默认密钥容器,默认密钥容器名 //为用户登陆名 null, prov_rsa_full, 0)) { printf("a cryptographic provider has been acquired. \n"); } else { if(cryptacquirecontext( &hcryptprov, null, null, prov_rsa_full, crypt_newkeyset))//创建密钥容器 { //创建密钥容器成功,并得到csp句柄 printf("a new key container has been created.\n"); } else { handleerror("could not create a new key container.\n"); } } //-------------------------------------------------------------------- // 创建一个会话密钥(session key) // 会话密钥也叫对称密钥,用于对称加密算法。 // (注: 一个session是指从调用函数cryptacquirecontext到调用函数 // cryptreleasecontext 期间的阶段。会话密钥只能存在于一个会话过程) //-------------------------------------------------------------------- // create a hash object. if(cryptcreatehash( hcryptprov, calg_md5, 0, 0, &hhash)) { printf("a hash object has been created. \n"); } else { handleerror("error during cryptcreatehash!\n"); } //-------------------------------------------------------------------- // 用输入的密码产生一个散列 if(crypthashdata( hhash, (byte *)szpassword, strlen(szpassword), 0)) { printf("the password has been added to the hash. \n"); } else { handleerror("error during crypthashdata. \n"); } //-------------------------------------------------------------------- // 通过散列生成会话密钥 if(cryptderivekey( hcryptprov, encrypt_algorithm, hhash, keylength, &hkey)) { printf("an encryption key is derived from the password hash. \n"); } else { handleerror("error during cryptderivekey!\n"); } //-------------------------------------------------------------------- // destroy the hash object. cryptdestroyhash(hhash); hhash = null; //-------------------------------------------------------------------- // the session key is now ready. //-------------------------------------------------------------------- // 因为加密算法是按encrypt_block_size 大小的块加密的,所以被加密的 // 数据长度必须是encrypt_block_size 的整数倍。下面计算一次加密的 // 数据长度。 dwblocklen = 1000 - 1000 % encrypt_block_size; //-------------------------------------------------------------------- // determine the block size. if a block cipher is used, // it must have room for an extra block. if(encrypt_block_size > 1) dwbufferlen = dwblocklen + encrypt_block_size; else dwbufferlen = dwblocklen; //-------------------------------------------------------------------- // allocate memory. if(pbbuffer = (byte *)malloc(dwbufferlen)) { printf("memory has been allocated for the buffer. \n"); } else { handleerror("out of memory. \n"); } //-------------------------------------------------------------------- // in a do loop, encrypt the source file and write to the source file. do { //-------------------------------------------------------------------- // read up to dwblocklen bytes from the source file. dwcount = fread(pbbuffer, 1, dwblocklen, hsource); if(ferror(hsource)) { handleerror("error reading plaintext!\n"); } //-------------------------------------------------------------------- // 加密数据 if(!cryptencrypt( hkey, //密钥 0, //如果数据同时进行散列和加密,这里传入一个 //散列对象 feof(hsource), //如果是最后一个被加密的块,输入true.如果不是输. //入false这里通过判断是否到文件尾来决定是否为 //最后一块。 0, //保留 pbbuffer, //输入被加密数据,输出加密后的数据 &dwcount, //输入被加密数据实际长度,输出加密后数据长度 dwbufferlen)) //pbbuffer的大小。 { handleerror("error during cryptencrypt. \n"); } //-------------------------------------------------------------------- // write data to the destination file. fwrite(pbbuffer, 1, dwcount, hdestination); if(ferror(hdestination)) { handleerror("error writing ciphertext."); } } while(!feof(hsource)); //-------------------------------------------------------------------- // end the do loop when the last block of the source file has been // read, encrypted, and written to the destination file. //-------------------------------------------------------------------- // close files. if(hsource) fclose(hsource); if(hdestination) fclose(hdestination); //-------------------------------------------------------------------- // free memory. if(pbbuffer) free(pbbuffer); //-------------------------------------------------------------------- // destroy session key. if(hkey) cryptdestroykey(hkey); //-------------------------------------------------------------------- // destroy hash object. if(hhash) cryptdestroyhash(hhash); //-------------------------------------------------------------------- // release provider handle. if(hcryptprov) cryptreleasecontext(hcryptprov, 0); return(true); } // end of encryptfile //-------------------------------------------------------------------- // this example uses the function handleerror, a simple error // handling function, to print an error message to the standard error // (stderr) file and exit the program. // for most applications, replace this function with one // that does more extensive error reporting. void handleerror(char *s) { fprintf(stderr,"an error occurred in running the program. \n"); fprintf(stderr,"%s\n",s); fprintf(stderr, "error number %x.\n", getlasterror()); fprintf(stderr, "program terminating. \n"); exit(1); } // end of handleerror

文章TAG:公钥  怎么  导入  加密  rsa公钥怎么导入加密机  
下一篇