
Security
文章平均质量分 75
sooner01
work hard, play hard
展开
-
有意思的中间人攻击
提到网络安全,不得不说说这个“中间人”攻击。 先讲个故事吧,2k年的时候很喜欢五子棋,不管上课下课找人就下,奈何周围高手甚众,屡战屡败,到263的网络游戏找菜鸟pk,也是败多胜少。于是在电脑上修炼,下个中级的电脑都很吃力。发现高级电脑计算精准,妙招频出,忽然想到个点子,可以用电脑帮我赢棋啊。操作如下: 到游戏室找人PK,让对方先手,同时自己先手与本机的高级电脑开局。我把网上对手的每一步原创 2008-07-12 16:09:00 · 1032 阅读 · 0 评论 -
RSA相关
<!-- /* Style Definitions */ table.MsoNormalTable {mso-style-name:普通表格; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-a原创 2010-02-08 10:15:00 · 982 阅读 · 0 评论 -
RSA padding
Normal 0 7.8 磅 0 2 false false false MicrosoftInternetExplorer4 Accordingto PK原创 2010-02-04 15:18:00 · 2970 阅读 · 0 评论 -
calling the OPENSSL libs in windows mobile
1. Steps to new a application a) New a smart device project b) Add additional include directory: ../celib; ../celib/openssl; ../celib/include; The last path is where the wcecompa原创 2009-07-02 17:51:00 · 2688 阅读 · 0 评论 -
Compile Open SSL in win NT/CE with VS2005
Well, with the commercial use of 3G,more and more application will flourish in the mobile platform. And most of theimplement is associated with security such as payment, E-bank, DRM and so on. So原创 2009-06-22 16:06:00 · 10493 阅读 · 4 评论 -
Verify certificate with OPENSSL and CryptoAPI
Normal 0 7.8 磅 0 2 false false false MicrosoftInternetExplorer4 <!-- /*原创 2009-08-05 11:13:00 · 5795 阅读 · 1 评论 -
Windows Mobile 环境下证书功能使用
Normal 0 7.8 磅 0 2 false false false MicrosoftInternetExplorer4 <!-- /*原创 2009-07-17 17:32:00 · 1520 阅读 · 0 评论 -
AES_ctr128
CTR is also an encryption mode, just use a counter as IV, and use IV’s cipher xor plain data by bytes.Cause x ^ y ^ y = x, we can see that the encrypt and decrypt function are the same. And as there原创 2008-11-27 21:18:00 · 6972 阅读 · 0 评论 -
The Implementation of ALG_DES_MAC8_ISO9797_1_M2_ALG3
In order to work with the Java Card, we need to implement the algorithm ALG_DES_MAC8_ISO9797_1_M2_ALG3 outside the card. Here is the instruction from Java Card Application Programming Interface:原创 2008-12-31 20:05:00 · 4673 阅读 · 0 评论 -
CSP review
CSP review:Well, other team need my assistant, while I haven’t tough the CSP for about two years, now do some revisions. Setup debugging environment:1, register the CSP into system. regsvr3原创 2008-09-27 14:00:00 · 1806 阅读 · 1 评论 -
Confusion, diffusion, Collision, Substitution
Collision: different message have the same message digest. Confusion and diffusion:In Shannons original definitions, confusion refers to making the relationship between the key and the cipherte原创 2008-08-28 16:32:00 · 982 阅读 · 0 评论 -
MAC and HMAC
MAC, (message authentication code), just a personal digest algorithm with a secret key.HMAC, just a MAC with standard digest algorithm. Hashed twice. The secret key just do XOR operation.Drawback原创 2008-08-28 16:30:00 · 2024 阅读 · 0 评论 -
Symmetric encryption padding
Today still debug MAC algorithm in Java card with Xuxu, I have to implement the MAC algorithm but there are so little document on it, I can only try time after time. Girls are always girls, alway原创 2008-07-30 22:11:00 · 1018 阅读 · 0 评论 -
HMAC implementation based on OPENSSL, Crypto API(CSP) and third party algorithm library
HMAC implementation, OPENSSL, Crypto API(CSP), android native, windows mobile, Symbian原创 2011-03-30 16:55:00 · 1722 阅读 · 0 评论