Skip to content

k1729p/Study18

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Study18 README Contents

Research security

The sections of this project:

  1. Elliptic-curve Cryptography
  2. Checksums
  3. Ciphers Encryption & Decryption
  4. Digests
  5. Exchanging Keys & Digests
  6. Message Authentication Codes
  7. Secure Class
  8. Signing Signatures
  9. Acronyms Dictionary

Java source code:

package kp


Java API Documentation


Action:

1. With the batch file '01 MVN clean install + Run Application.bat' launch the 'Application'.

Back to the top of the page

1. The encrypted texts exchange with Elliptic-curve Cryptography.
The method 'kp.security.ecc.EllipticCurveCryptography::launch'.


Console log from 'EllipticCurveCryptography::launch' method.

Back to the top of the page

2. Computing the checksums. The method 'kp.security.ChecksumsComputing::launch'


Console log from 'ChecksumsComputing::launch' method.

Back to the top of the page

3. The encryption and the decryption of ciphers with various algorithms, modes, and paddings.

3.1. The method 'kp.security.CiphersEncryptionAndDecryption::launchAesWithGcm'.


Console log from 'CiphersEncryptionAndDecryption::launchAesWithGcm' method.

3.2. The method 'kp.security.CiphersEncryptionAndDecryption::launchAesWithCbc'.


Console log from 'CiphersEncryptionAndDecryption::launchAesWithCbc' method.

3.3. The method 'kp.security.CiphersEncryptionAndDecryption::launchChaCha20'.


Console log from 'CiphersEncryptionAndDecryption::launchChaCha20' method.

3.4. The method 'kp.security.CiphersEncryptionAndDecryption::launchChaCha20WithPoly1305'.


Console log from 'CiphersEncryptionAndDecryption::launchChaCha20WithPoly1305' method.

3.5. The method 'kp.security.CiphersEncryptionAndDecryption::encryptToFileAndDecryptFromFile'.


Console log from 'CiphersEncryptionAndDecryption::encryptToFileAndDecryptFromFile' method.

Back to the top of the page

4. Computing the digests with different algorithms. The method 'kp.security.DigestsComputing::launch'.


Console log from 'DigestsComputing::launch' method.

Back to the top of the page

5. Exchanging the public keys and the digest bytes over an insecure net.
The method 'kp.security.KeysAndDigestsExchanging::launch'.


Console log from 'KeysAndDigestsExchanging::launch' method.

Back to the top of the page

6. Computing the Message Authentication Codes with different algorithms.
The method 'kp.security.MacsComputing::launch'.


Console log from 'MacsComputing::launch' method.

Back to the top of the page

7. This is the secure class that does not permit subclassing. The method 'kp.security.SecureClass::launch'.


Console log from 'SecureClass::launch' method.

Back to the top of the page

8. Signing the signatures with different algorithms. The method 'kp.security.SignaturesSigning::launch'.


Console log from 'SignaturesSigning::launch' method.

Back to the top of the page


Dictionary

AEADAuthenticated Encryption with Associated Data
AESAdvanced Encryption Standard
CBCCipher Block Chaining
CRCCyclic Redundancy Check
DSADigital Signature Algorithm
ECCElliptic-Curve Cryptography
ECDHElliptic-Curve Diffie-Hellman
ECDSAElliptic-Curve Digital Signature Algorithm
GCMGalois Counter Mode
HMACKeyed-Hash Message Authentication Code
MACMessage Authentication Code
PKCSPublic Key Cryptography Standards
RSARon Rivest, Adi Shamir, Leonard Adleman
SHASecure Hash Algorithm

Back to the top of the page