期刊文献+

MD5算法在J2EE平台下用户管理系统中的应用 被引量:14

Application of MD5 algorithm based on J2EE in user management system
下载PDF
导出
摘要 MD5是目前在加密领域应用最为广泛的哈希函数。通过研究基于J2EE平台和B/S模式的用户管理系统的基本原理和实现方法,详细说明了基于MVC架构的系统模型,具体阐述了基于MD5进行口令密码校验的原理以及基于Java语言的算法实现。在设计口令密码校验过程中,描述了如何基于Servlet技术生成目前十分流行的图形认证码的方法。最后探讨了应用MD5算法加强Web应用中安全机制的方法和策略。 MD5 is one of the most widely used hash function in the field of cryptography nowadays. By virtue of studying the theory and realization of user management system in J2EE architecture and B/S model, the user management system's architecture in MVC model is stated, the process of verification by password based on MD5 algorithm and the design of MD5 algorithm in Java. During the process of verification, the creation of graphic authentication codes by Servlet technique is described. In the end, it probes into the mechanism and strategy of security identity in web applications based on MD5 algorithm.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第18期4728-4730,4764,共4页 Computer Engineering and Design
关键词 J2EE B/S模式 MVC模式 MD5算法 数字签名 J2EE B/S mode MVC model MD5 algorithm digital signature
  • 相关文献

参考文献10

  • 1Alfred V Aho,Jeffrey D Ullman,John E Hopcroft.Data structures and algorithms[M].Addison Wesley, 1983:255-260.
  • 2Frank Buschmarm,Regine Meunier, Hans Rohnert,et al.Patternoriented software architecture: A system of patterns [M]. John Wiley & Sons Ltd,1996:301-302.
  • 3Marty Hall,Larry Brown.Core servlets and JavaServer pages: Core technologies [M]. 2nd Ed. Prentice Hall, PTR, 2004:15-16.
  • 4Richard Monson-Haefel.Enterprise JavaBeans[M].3rd Ed.O'Reilly Press,2001:155-160.
  • 5Ed Rornan,Rima Patel Sriganesh,Gerald Brose.Mastering enterprise JavaBeans[M].3rd Ed.Wiley,2004:101-102.
  • 6Rivest R. RFC 1321-The MD5 message-digest algorithm [EB/ OL] .http ://www.ietf.org/rfc/rfc1321.txt, 1992.
  • 7Rivest R L.The MD5 message digest algorithm[EB/OL].http:// www.faqs.org/rfes/rfc1320.html,2005.
  • 8Declan McCullagh.Researchers flag up digital signature flaws [C].CNET News.com,2004.
  • 9Wang Xiaoyun, Feng Dengguo, Lai Xuejia, et al. Collisions for hash functions MD4, MD5, Haval-128 and RIPEMD [EB/OL]. http://eprint.iacr.org/2004/199.pdf,2004.
  • 10来学嘉.客观看待MD、SHA-1被“破解”.国家信息安全测评认证,2005,(3):6-7.

同被引文献101

引证文献14

二级引证文献95

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部