Labels

ACO (3) AdaBoost (2) Ant Colony Optimization (2) Backpropagation (2) binary constraint graph (1) blockchain (2) brute force (1) brute force algorithm (1) Class Scheduling (12) conditional independence (1) conference cheduling (1) conference scheduling (2) constraint satisfaction problem (3) cryptocurrency (3) csp (3) cyclic group (1) data mining (3) decision trees (12) derive equations (1) DHKE (6) Diffie Hellman Problem (1) Diffie-Hellman Key Exchange (2) Digital Signature Algorithm (1) Discrete Logarithm Problem (1) double and add algorithm (1) download source code (1) DSA (1) ecc (1) ECDH (1) ECDSA (1) Elgamal (1) Elgamal Digital Signature (1) Elliptic Curve (1) Elliptic Curve Diffie–Hellman key exchange (1) Elliptic Curve Cryptography (1) Elliptic Curve Digital Signature Algorithm (1) Encryption (1) euler phi function (1) extended euclidean algorithm (1) generalized discrete logarithm problem (1) generate rules (3) Genetic Algorithm (5) Genetic Algorithms (19) gradient descent (2) group (1) group generator (1) grow xml tree (1) Handle Underflow (1) hashing (1) hill climbing (7) hopfield network (2) independence (1) info gain (1) information gain (2) java (84) javafx (1) k-nearest neighbors (2) Laplace Smoothing (2) linear algebra (3) Linear Regression (2) logical operators (1) logistic regression (4) map coloring (1) message authenticity (1) message confidentiality (1) message integrity (1) multi-party Diffie-Hellman Key Exchange (1) Naive Bayes (6) nearest neighbor (1) nearest neighbors (1) Neural Networks (10) node splitting (1) Normal Equation (2) numpy (1) P2P (10) Peer to Peer (5) peer-to-peer (2) point addition (1) point doubling (1) pow (3) probability (2) proof of work (3) proof-of-work (1) public key cryptography (9) Public Key Cryptography + DHKE w/ Encryption + JAVA (1) Python (18) random restart hill climbing (2) robotics (1) rsa (1) RSA Digital Signature (1) Scala (1) Sentiment Classification (4) Sequential Minimal Optimization (2) sha-256 (1) simulated annealing (2) SMO (2) sqlite (21) stochastic gradient descent (2) Support Vector Machines (2) SVM (2) Traveling Salesman Problem (1) TSP (13) underflow handling (1) use rules (3) workshops scheduling (2)

Blog Archive

Wednesday, July 22, 2020

RSA w/ JAVA


Public Key Cryptography w/ JAVA (tutorial 02) - RSA

prototypeprj.com = zaneacademy.com (version 2.0)

00:10 demo prebuilt version of the application
03:15 how can a passive eavesdropper decrypt messages

04:20 how to compute inverse modulo of an integer using
extended euclidean algorithm (EEA)

05:25 what is the Euler phi function

07:55 building a prime factorization crypto system
10:38 how to encrypt with RSA
11:00 how to decrypt with RSA
11:21 coding the application

14:12 code the server side

19:33 code the client side
19:43 calculate the private key d
19:53 calculate phi
20:18 generate the public key
21:49 encrypt/decrypt message
22:30 handle receiving the public key of the other client
22:44 handle receiving messages from the other client

25:37 test run the application

---------------------------------------------------------------------------------------------------------------------
quickly download, import into Eclipse, and run zip file for
'Public Key Cryptography w/ JAVA (tutorial 02) - RSA'
---------------------------------------------------------------------------------------------------------------------





------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------

No comments:

Post a Comment