没有合适的资源?快使用搜索试试~ 我知道了~
BouncyCastle UserGuide C# DotNet
需积分: 0 0 下载量 200 浏览量
2023-12-14
10:10:33
上传
评论
收藏 691KB PDF 举报
温馨提示
试读
38页
BouncyCastle UserGuide C# DotNet
资源推荐
资源详情
资源评论
Acknowledgements
Crypto Workshop would like to acknowledge that its contribution has largely been made possible
through its clients purchasing Bouncy Castle support agreements.
To clients and our anonymous donors, we are grateful. Thanks.
For further information about this distribution, or to help support this work further, please contact us
at office@bouncycastle.org.
Table of Contents
1 Introduction.......................................................................................................................................6
2 Getting Started...................................................................................................................................7
Example 1 – Basic .Net Project Using BC C# Assembly...........................................................7
2.1 Brief Introduction to Random Numbers....................................................................................8
Example 2 – Default C# PRNG..................................................................................................8
Example 3 – BC Default SecureRandom....................................................................................9
Example 4 – BC HMAC SecureRandom....................................................................................9
3 Symmetric Cipher Algorithms.........................................................................................................10
Example 5 – Random Symmetric Key Generation...................................................................10
Example 6 – Fixed Symmetric Key Generation........................................................................11
Example 7 – ECB Mode Symmetric Cipher.............................................................................11
3.1 Block Cipher Modes Of Operation..........................................................................................12
Example 8 – Key and Initialisation Vector Generation.............................................................14
Example 9 – CBC Mode Encryption/Decryption.....................................................................14
Example 10 – CFB Stream Mode Encryption/Decryption.......................................................15
Example 11 – CTR Mode Without Padding Encryption/Decryption........................................16
Example 12 – CCM AEAD Mode Without Padding Encryption/Decryption...........................17
3.2 Stream Ciphers.........................................................................................................................18
Example 13 – ChaCha Stream Cipher Encryption/Decryption.................................................18
Example 14 – HC128 Stream Cipher Encryption/Decryption..................................................19
3.3 AEAD Ciphers.........................................................................................................................19
Example 15 – GCM AEAD Mode Encryption/Decryption......................................................20
Example 16 – ASCON AEAD Encryption/Decryption............................................................21
Example 17 – ChaCha20Poly1305 AEAD Encryption/Decryption.........................................21
3.4 Format Preserving Encryption using AES...............................................................................22
Example 18 – FF3-1 FPE Mode Encryption/Decryption..........................................................23
4 Key Agreement and Exchange Algorithms.....................................................................................24
4.1 What Happended To the Asymmetric Ciphers?.......................................................................24
4.2 Diffie-Hellman Key Agreement...............................................................................................25
Example 19 – Generating DH Finite Field Parameters.............................................................25
Example 20 – Diffie-Hellman Key Pair Generation.................................................................26
Example 21 – Basic DH Key Agreement..................................................................................26
Example 22 – MTI/A0 DH Key Agreement.............................................................................27
4.3 Elliptic Curve Diffie-Hellman Key Agreement.......................................................................27
Example 23 – Generating EC GF (p) Parameters Directly.......................................................28
Example 24 – Generating Built In EC GF (p) Parameters........................................................28
Example 25 – Generating Binary EC Parameters Directly.......................................................29
Example 26 – Generating Built In Binary EC Parameters........................................................30
Example 27 – EC Diffie-Hellman Key Pair Generation...........................................................30
Example 28 – EC Diffie-Hellman Key Agreement...................................................................30
5 Key Encapsulation and Key Wrapping............................................................................................32
5.1 Key Wrapping Using Symmetric Keys....................................................................................33
Example 29 – RFC3394 Key Wrapping Default IV.................................................................33
Example 30 – RFC3394 Key Wrapping With IV......................................................................33
Appendix A – Built in Curves............................................................................................................35
Appendix A.1 – Prime Field Built in Curves.................................................................................35
Appendix A.2 – Binary Field Built in Curves...............................................................................36
Appendix C – References...................................................................................................................38
剩余37页未读,继续阅读
资源评论
linewon
- 粉丝: 18
- 资源: 1
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 基于matlab开发的根据rvm回归模型自己编的matlab程序.rar
- 高效C++学生成绩管理系统:教育技术+C++17编程+数据管理+教务自动化
- 基于matlab开发的Tipping的相关向量机RVM的回归MATLAB程序,有英文注释,可以运行.rar
- 一个点击正反转程序实例,可实现案件电机正反转
- 搜索链接淘特搜索引擎共享版-tot-search-engine.rar
- 第十八届全国大学生智能汽车竞赛 摄像头组/镜头组
- 基于matlab开发的AUV惯性导航系统matlab仿真程序,包括轨迹生成、gps和sins组合、gps和dvl组合.rar
- 基于SSM的“个性化电子相册”的设计与实现.zip
- 如何在撰写科研文献时,使用ai工具辅助去完成科研工作
- 吉林大学计组笔记 自用 基于b站翼云图灵的课.pdf
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功