Labels

ACO (3) AdaBoost (2) Ant Colony Optimization (2) Backpropagation (2) binary constraint graph (1) blockchain (2) brute force (1) brute force algorithm (1) Class Scheduling (12) conditional independence (1) conference cheduling (1) conference scheduling (2) constraint satisfaction problem (3) cryptocurrency (3) csp (3) cyclic group (1) data mining (3) decision trees (12) derive equations (1) DHKE (6) Diffie Hellman Problem (1) Diffie-Hellman Key Exchange (2) Digital Signature Algorithm (1) Discrete Logarithm Problem (1) double and add algorithm (1) download source code (1) DSA (1) ecc (1) ECDH (1) ECDSA (1) Elgamal (1) Elgamal Digital Signature (1) Elliptic Curve (1) Elliptic Curve Diffie–Hellman key exchange (1) Elliptic Curve Cryptography (1) Elliptic Curve Digital Signature Algorithm (1) Encryption (1) euler phi function (1) extended euclidean algorithm (1) generalized discrete logarithm problem (1) generate rules (3) Genetic Algorithm (5) Genetic Algorithms (19) gradient descent (2) group (1) group generator (1) grow xml tree (1) Handle Underflow (1) hashing (1) hill climbing (7) hopfield network (2) independence (1) info gain (1) information gain (2) java (84) javafx (1) k-nearest neighbors (2) Laplace Smoothing (2) linear algebra (3) Linear Regression (2) logical operators (1) logistic regression (4) map coloring (1) message authenticity (1) message confidentiality (1) message integrity (1) multi-party Diffie-Hellman Key Exchange (1) Naive Bayes (6) nearest neighbor (1) nearest neighbors (1) Neural Networks (10) node splitting (1) Normal Equation (2) numpy (1) P2P (10) Peer to Peer (5) peer-to-peer (2) point addition (1) point doubling (1) pow (3) probability (2) proof of work (3) proof-of-work (1) public key cryptography (9) Public Key Cryptography + DHKE w/ Encryption + JAVA (1) Python (18) random restart hill climbing (2) robotics (1) rsa (1) RSA Digital Signature (1) Scala (1) Sentiment Classification (4) Sequential Minimal Optimization (2) sha-256 (1) simulated annealing (2) SMO (2) sqlite (21) stochastic gradient descent (2) Support Vector Machines (2) SVM (2) Traveling Salesman Problem (1) TSP (13) underflow handling (1) use rules (3) workshops scheduling (2)

Blog Archive

Friday, July 31, 2020

Public Key Cryptography + DHKE w/ Encryption + JAVA


Public Key Cryptography w/ JAVA (tutorial 03) - DHKE w/ Encryption

 prototypeprj.com = zaneacademy.com (version 2.0)

00:06 demo a prebuilt version of the application
01:45 deterministic encryption scheme
03:00 probabilistic encryption scheme

03:33 code the application
04:03 go over the packages and classes that make up this app.

06:14 setup the project for using JSON

06:46 code the server side of this app. (Server and ServerThread classes)
09:59 how ServerThread handles incoming JSON messages

10:50 code the client side of the app.
12:14 methods to turn character to ascii and ascii to character
13:14 methods for setting up and sending encrypted communications

16:05 method to initialize the domain params p and alpha
17:24 method to obtain secret key and calculate and send public key
17:58 method to calculate the common key

18:17 methods for encrypting and decrypting messages

19:44 method to handle incoming messages

20:37 how ClientThread handles incoming JSON messages

21:47 code this Client's handlePreCommunicate method
(initialize domain params + calculate public key + calculate common key)

22:31 code this Client's handleCommunicate method
(turn message to ascii + encrypt ascii + send encrypted ascii message)

23:34 test run completed app.

-----------------------------------------------------------------------------------------------------------------------------
quickly download, import into Eclipse, and run zip file for
'Public Key Cryptography w/ JAVA (tutorial 03) - DHKE w/ Encryption'
-----------------------------------------------------------------------------------------------------------------------------





-----------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------

No comments:

Post a Comment