⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rsa_pkcs1_1_5.txt

📁 lots Elliptic curve cryptography codes. Use Visual c++ to compile
💻 TXT
字号:
AlgorithmType: SignatureName: RSA/PKCS1-1.5(MD2)KeyFormat: DERSource: http://www.rsasecurity.com/rsalabs/pkcs/index.html, \	Some Examples of the PKCS StandardsPrivateKey: \	30 82 01 50\	   02 01 00                                      #version = 0\	   30 0d                       #privateKeyAlgorithmIdentifier\		  06 09                        #algorithm = rsaEncryption\			 2a 86 48 86 f7 0d 01 01 01\		  05 00                                #parameters = NULL\	   04 82 01 3a           #privateKey = RSAPrivateKey encoding\		  30 82 01 36\			 02 01 00                                      #version = 0\			 02 40                                         #modulus = n\				0a 66 79 1d c6 98 81 68 de 7a b7 74 19 bb 7f b0\				c0 01 c6 27 10 27 00 75 14 29 42 e1 9a 8d 8c 51\				d0 53 b3 e3 78 2a 1d e5 dc 5a f4 eb e9 94 68 17\				01 14 a1 df e6 7c dc 9a 9a f5 5d 65 56 20 bb ab\			 02 03 01 00 01                         #publicExponent = e\			 02 40                                 #privateExponent = d\				01 23 c5 b6 1b a3 6e db 1d 36 79 90 41 99 a8 9e\				a8 0c 09 b9 12 2e 14 00 c0 9a dc f7 78 46 76 d0\				1d 23 35 6a 7d 44 d6 bd 8b d5 0e 94 bf c7 23 fa\				87 d8 86 2b 75 17 76 91 c1 1d 75 76 92 df 88 81\			 02 20                                          #prime1 = p\				33 d4 84 45 c8 59 e5 23 40 de 70 4b cd da 06 5f\				bb 40 58 d7 40 bd 1d 67 d2 9e 9c 14 6c 11 cf 61\			 02 20                                          #prime2 = q\				33 5e 84 08 86 6b 0f d3 8d c7 00 2d 3f 97 2c 67\				38 9a 65 d5 d8 30 65 66 d5 c4 f2 a5 aa 52 62 8b\			 02 20                               #exponent1 = d mod p-1\				04 5e c9 00 71 52 53 25 d3 d4 6d b7 96 95 e9 af\				ac c4 52 39 64 36 0e 02 b1 19 ba a3 66 31 62 41\			 02 20                               #exponent2 = d mod q-1\				15 eb 32 73 60 c7 b6 0d 12 e5 e2 d1 6b dc d9 79\				81 d1 7f ba 6b 70 db 13 b2 0b 43 6e 24 ea da 59\			 02 20                             #coefficient = q-1 mod p\				2c a6 36 6d 72 78 1d fa 24 d3 4a 9a 24 cb c2 ae\				92 7a 99 58 af 42 65 63 ff 63 fb 11 65 8a 46 1dPublicKey: \   30 5b                                #subjectPublicKeyInfo\      30 0d                                        #algorithm\         06 09                     #algorithm = rsaEncryption\            2a 86 48 86 f7 0d 01 01 01\         05 00                             #parameters = NULL\      03 4a         #subjectPublicKey = RSAPublicKey encoding\         00\ 		 30 47\		    02 40                                         #modulus = n\			   0a 66 79 1d c6 98 81 68 de 7a b7 74 19 bb 7f b0\			   c0 01 c6 27 10 27 00 75 14 29 42 e1 9a 8d 8c 51\			   d0 53 b3 e3 78 2a 1d e5 dc 5a f4 eb e9 94 68 17\			   01 14 a1 df e6 7c dc 9a 9a f5 5d 65 56 20 bb ab\		    02 03 01 00 01                                #publicExponent = eTest: KeyPairValidAndConsistentMessage: # "Everyone gets Friday off."\	45 76 65 72 79 6f 6e 65 20 67 65 74 73 20 46 72 69 64 61 79 20 6f 66 66 2eSignature: \	05fa6a812fc7df8bf4f2542509e03e84\	6e11b9c620be2009efb440efbcc66921\	6994ac04f341b57d05202d428fb2a27b\	5c77dfd9b15bfc3d559353503410c1e1Test: VerifyName: RSA/PKCS1-1.5(SHA-1)Source: generated by Wei Dai using Crypto++ 5.0Signature: 0610761F95FFD1B8F29DA34212947EC2AA0E358866A722F03CC3C41487ADC604A48FF54F5C6BEDB9FB7BD59F82D6E55D8F3174BA361B2214B2D74E8825E04E81Test: VerifyMessage: 00Test: NotVerifyAlgorithmType: SignatureName: RSA/PKCS1-1.5(SHA-1)Source: http://islab.oregonstate.edu/emails/pkcs-tng-02/0152KeyFormat: ComponentModulus: A885B6F851A8079AB8A281DB0297148511EE0D8C07C0D4AE6D6FED461488E0D41E3FF8F281B06A3240B5007A5C2AB4FB6BE8AF88F119DB998368DDDC9710ABEDPublicExponent: 010001PrivateExponent: 2B259D2CA3DF851EE891F6F4678BDDFD9A131C95D3305C63D2723B4A5B9C960F5EC8BB7DCDDBEBD8B6A38767D64AD451E9383E0891E4EE7506100481F2B49323Prime1: D7103CD676E39824E2BE50B8E6533FE7CB7484348E283802AD2B8D00C80D19DFPrime2: C89996DC169CEB3F227958275968804D4BE9FC4012C3219662F1A438C9950BB3ModPrime1PrivateExponent: 5D8EA4C8AF83A70634D5920C3DB66D908AC3AF57A597FD75BC9BBB856181C185ModPrime2PrivateExponent: C598E54DAEC8ABC1E907769A6C2BD01653ED0C9960E1EDB7E186FDA922883A99MultiplicativeInverseOfPrime2ModPrime1: 7C6F27B5B51B78AD80FB36E700990CF307866F2943124CBD93D97C137794C104Test: KeyPairValidAndConsistentSource: generated by Wei Dai using Crypto++ 5.0Message: 74657374 # "test"Signature: A7E00CE4391F914D82158D9B732759808E25A1C6383FE87A5199157650D4296CF612E9FF809E686A0AF328238306E79965F6D0138138829D9A1A22764306F6CETest: Verify

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -