Labels

ACO (3) AdaBoost (2) Ant Colony Optimization (2) Backpropagation (2) binary constraint graph (1) blockchain (2) brute force (1) brute force algorithm (1) Class Scheduling (12) conditional independence (1) conference cheduling (1) conference scheduling (2) constraint satisfaction problem (3) cryptocurrency (3) csp (3) cyclic group (1) data mining (3) decision trees (12) derive equations (1) DHKE (6) Diffie Hellman Problem (1) Diffie-Hellman Key Exchange (2) Digital Signature Algorithm (1) Discrete Logarithm Problem (1) double and add algorithm (1) download source code (1) DSA (1) ecc (1) ECDH (1) ECDSA (1) Elgamal (1) Elgamal Digital Signature (1) Elliptic Curve (1) Elliptic Curve Diffie–Hellman key exchange (1) Elliptic Curve Cryptography (1) Elliptic Curve Digital Signature Algorithm (1) Encryption (1) euler phi function (1) extended euclidean algorithm (1) generalized discrete logarithm problem (1) generate rules (3) Genetic Algorithm (5) Genetic Algorithms (19) gradient descent (2) group (1) group generator (1) grow xml tree (1) Handle Underflow (1) hashing (1) hill climbing (7) hopfield network (2) independence (1) info gain (1) information gain (2) java (84) javafx (1) k-nearest neighbors (2) Laplace Smoothing (2) linear algebra (3) Linear Regression (2) logical operators (1) logistic regression (4) map coloring (1) message authenticity (1) message confidentiality (1) message integrity (1) multi-party Diffie-Hellman Key Exchange (1) Naive Bayes (6) nearest neighbor (1) nearest neighbors (1) Neural Networks (10) node splitting (1) Normal Equation (2) numpy (1) P2P (10) Peer to Peer (5) peer-to-peer (2) point addition (1) point doubling (1) pow (3) probability (2) proof of work (3) proof-of-work (1) public key cryptography (9) Public Key Cryptography + DHKE w/ Encryption + JAVA (1) Python (18) random restart hill climbing (2) robotics (1) rsa (1) RSA Digital Signature (1) Scala (1) Sentiment Classification (4) Sequential Minimal Optimization (2) sha-256 (1) simulated annealing (2) SMO (2) sqlite (21) stochastic gradient descent (2) Support Vector Machines (2) SVM (2) Traveling Salesman Problem (1) TSP (13) underflow handling (1) use rules (3) workshops scheduling (2)

Blog Archive

Tuesday, July 28, 2020

Digital Signature Algorithm (DSA) - Public Key Cryptography w/ JAVA (tutorial 07)


 Digital Signature Algorithm (DSA) - Public Key Cryptography w/ JAVA (tutorial 07)

prototypeprj.com = zaneacademy.com (version 2.0)

00:06 demo a prebuilt version of the application 

06:16 Digital Signature Algorithm summary 
09:45 Digital Signature Algorithm proof 

11:45 code the application 
12:05 setup the project for using JSON 

12:46 go over the packages and classes that make up this app. 

14:28 code the server side of this app. (Server and ServerThread classes) 
16:47 how the server forwards messages from Alice to Bob and the other way around 

17:12 how ServerThread handles incoming JSON messages 
17:40 what Discret Logarithm Problem does Eve needs 
to solve in order to sign messages as being Alice or Bob 

18:20 code the client side of the app. 
19:44 method to check if a number is prime 
19:54 method used to hash messages 

23:05 method to handle setup phase 

25:25 method to pickup ephemeral key 
25:35 method to pickup signing key 

27:00 method for calculating signature param r 
27:45 method for calculating signature param s 

28:13 method for sending signed messages 

28:58 method for receiving other party params 

30:42 method for validating incoming messages 

32:34 test run completed app.

-----------------------------------------------------------------------------------------------------------------------------
quickly download, import into Eclipse, and run zip file for
'Digital Signature Algorithm (DSA) - Public Key Cryptography w/ JAVA (tutorial 07)'
-----------------------------------------------------------------------------------------------------------------------------





-----------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------


No comments:

Post a Comment