📄 rsa_pkcs1_1_5.txt
字号:
AlgorithmType: SignatureName: RSA/PKCS1-1.5(MD2)KeyFormat: DERSource: http://www.rsasecurity.com/rsalabs/pkcs/index.html, \ Some Examples of the PKCS StandardsPrivateKey: \ 30 82 01 50\ 02 01 00 #version = 0\ 30 0d #privateKeyAlgorithmIdentifier\ 06 09 #algorithm = rsaEncryption\ 2a 86 48 86 f7 0d 01 01 01\ 05 00 #parameters = NULL\ 04 82 01 3a #privateKey = RSAPrivateKey encoding\ 30 82 01 36\ 02 01 00 #version = 0\ 02 40 #modulus = n\ 0a 66 79 1d c6 98 81 68 de 7a b7 74 19 bb 7f b0\ c0 01 c6 27 10 27 00 75 14 29 42 e1 9a 8d 8c 51\ d0 53 b3 e3 78 2a 1d e5 dc 5a f4 eb e9 94 68 17\ 01 14 a1 df e6 7c dc 9a 9a f5 5d 65 56 20 bb ab\ 02 03 01 00 01 #publicExponent = e\ 02 40 #privateExponent = d\ 01 23 c5 b6 1b a3 6e db 1d 36 79 90 41 99 a8 9e\ a8 0c 09 b9 12 2e 14 00 c0 9a dc f7 78 46 76 d0\ 1d 23 35 6a 7d 44 d6 bd 8b d5 0e 94 bf c7 23 fa\ 87 d8 86 2b 75 17 76 91 c1 1d 75 76 92 df 88 81\ 02 20 #prime1 = p\ 33 d4 84 45 c8 59 e5 23 40 de 70 4b cd da 06 5f\ bb 40 58 d7 40 bd 1d 67 d2 9e 9c 14 6c 11 cf 61\ 02 20 #prime2 = q\ 33 5e 84 08 86 6b 0f d3 8d c7 00 2d 3f 97 2c 67\ 38 9a 65 d5 d8 30 65 66 d5 c4 f2 a5 aa 52 62 8b\ 02 20 #exponent1 = d mod p-1\ 04 5e c9 00 71 52 53 25 d3 d4 6d b7 96 95 e9 af\ ac c4 52 39 64 36 0e 02 b1 19 ba a3 66 31 62 41\ 02 20 #exponent2 = d mod q-1\ 15 eb 32 73 60 c7 b6 0d 12 e5 e2 d1 6b dc d9 79\ 81 d1 7f ba 6b 70 db 13 b2 0b 43 6e 24 ea da 59\ 02 20 #coefficient = q-1 mod p\ 2c a6 36 6d 72 78 1d fa 24 d3 4a 9a 24 cb c2 ae\ 92 7a 99 58 af 42 65 63 ff 63 fb 11 65 8a 46 1dPublicKey: \ 30 5b #subjectPublicKeyInfo\ 30 0d #algorithm\ 06 09 #algorithm = rsaEncryption\ 2a 86 48 86 f7 0d 01 01 01\ 05 00 #parameters = NULL\ 03 4a #subjectPublicKey = RSAPublicKey encoding\ 00\ 30 47\ 02 40 #modulus = n\ 0a 66 79 1d c6 98 81 68 de 7a b7 74 19 bb 7f b0\ c0 01 c6 27 10 27 00 75 14 29 42 e1 9a 8d 8c 51\ d0 53 b3 e3 78 2a 1d e5 dc 5a f4 eb e9 94 68 17\ 01 14 a1 df e6 7c dc 9a 9a f5 5d 65 56 20 bb ab\ 02 03 01 00 01 #publicExponent = eTest: KeyPairValidAndConsistentMessage: # "Everyone gets Friday off."\ 45 76 65 72 79 6f 6e 65 20 67 65 74 73 20 46 72 69 64 61 79 20 6f 66 66 2eSignature: \ 05fa6a812fc7df8bf4f2542509e03e84\ 6e11b9c620be2009efb440efbcc66921\ 6994ac04f341b57d05202d428fb2a27b\ 5c77dfd9b15bfc3d559353503410c1e1Test: VerifyName: RSA/PKCS1-1.5(SHA-1)Source: generated by Wei Dai using Crypto++ 5.0Signature: 0610761F95FFD1B8F29DA34212947EC2AA0E358866A722F03CC3C41487ADC604A48FF54F5C6BEDB9FB7BD59F82D6E55D8F3174BA361B2214B2D74E8825E04E81Test: VerifyMessage: 00Test: NotVerifyAlgorithmType: SignatureName: RSA/PKCS1-1.5(SHA-1)Source: http://islab.oregonstate.edu/emails/pkcs-tng-02/0152KeyFormat: ComponentModulus: A885B6F851A8079AB8A281DB0297148511EE0D8C07C0D4AE6D6FED461488E0D41E3FF8F281B06A3240B5007A5C2AB4FB6BE8AF88F119DB998368DDDC9710ABEDPublicExponent: 010001PrivateExponent: 2B259D2CA3DF851EE891F6F4678BDDFD9A131C95D3305C63D2723B4A5B9C960F5EC8BB7DCDDBEBD8B6A38767D64AD451E9383E0891E4EE7506100481F2B49323Prime1: D7103CD676E39824E2BE50B8E6533FE7CB7484348E283802AD2B8D00C80D19DFPrime2: C89996DC169CEB3F227958275968804D4BE9FC4012C3219662F1A438C9950BB3ModPrime1PrivateExponent: 5D8EA4C8AF83A70634D5920C3DB66D908AC3AF57A597FD75BC9BBB856181C185ModPrime2PrivateExponent: C598E54DAEC8ABC1E907769A6C2BD01653ED0C9960E1EDB7E186FDA922883A99MultiplicativeInverseOfPrime2ModPrime1: 7C6F27B5B51B78AD80FB36E700990CF307866F2943124CBD93D97C137794C104Test: KeyPairValidAndConsistentSource: generated by Wei Dai using Crypto++ 5.0Message: 74657374 # "test"Signature: A7E00CE4391F914D82158D9B732759808E25A1C6383FE87A5199157650D4296CF612E9FF809E686A0AF328238306E79965F6D0138138829D9A1A22764306F6CETest: Verify
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -