Package org.bouncycastle.crypto.generators

Examples of org.bouncycastle.crypto.generators.RSAKeyPairGenerator


    public KeyPairGeneratorSpi()
    {
        super("RSA");

        engine = new RSAKeyPairGenerator();
        param = new RSAKeyGenerationParameters(defaultPublicExponent,
            new SecureRandom(), 2048, defaultTests);
        engine.init(param);
    }
View Full Code Here


        public RSA()
        {
            super("RSA");

            engine = new RSAKeyPairGenerator();
            param = new RSAKeyGenerationParameters(defaultPublicExponent,
                            new SecureRandom(), 2048, defaultTests);
            engine.init(param);
        }
View Full Code Here

    return new PublicHeader(this.exp,this.mod);
  }

  public MessageHeader(int size, int certainty) throws Exception{
    RSAKeyGenerationParameters param = new RSAKeyGenerationParameters(pubExp, sr, size, certainty);
    RSAKeyPairGenerator kpGen = new RSAKeyPairGenerator();
    kpGen.init(param);
    acKp = kpGen.generateKeyPair();
    RSAKeyParameters rsaParam = (RSAKeyParameters)acKp.getPublic();
    this.exp = rsaParam.getExponent();
    this.mod = rsaParam.getModulus();
    eng.init(false, acKp.getPrivate());
  }
View Full Code Here

        if (!input.equals(new String(Hex.encode(data))))
        {
            return new SimpleTestResult(false, "RSA: failed OAEP Test");
        }

        RSAKeyPairGenerator  pGen = new RSAKeyPairGenerator();
        RSAKeyGenerationParameters  genParam = new RSAKeyGenerationParameters(
                                            BigInteger.valueOf(0x11), new SecureRandom(), 768, 25);

        pGen.init(genParam);

        AsymmetricCipherKeyPair  pair = pGen.generateKeyPair();
       
        eng = new RSAEngine();

        if (((RSAKeyParameters)pair.getPublic()).getModulus().bitLength() < 762)
        {
            return new SimpleTestResult(false, "RSA: failed key generation (768) length test");
        }

        eng.init(true, pair.getPublic());

        try
        {
            data = eng.processBlock(data, 0, data.length);
        }
        catch (Exception e)
        {
            return new SimpleTestResult(false, "RSA: failed - exception " + e.toString());
        }

        eng.init(false, pair.getPrivate());

        try
        {
            data = eng.processBlock(data, 0, data.length);
        }
        catch (Exception e)
        {
            return new SimpleTestResult(false, "RSA: failed - exception " + e.toString());
        }

        if (!input.equals(new String(Hex.encode(data))))
        {
            return new SimpleTestResult(false, "RSA: failed key generation (768) Test");
        }

        genParam = new RSAKeyGenerationParameters(BigInteger.valueOf(0x11), new SecureRandom(), 1024, 25);

        pGen.init(genParam);
        pair = pGen.generateKeyPair();

        eng.init(true, pair.getPublic());

        if (((RSAKeyParameters)pair.getPublic()).getModulus().bitLength() < 1018)
        {
View Full Code Here

  public void init(int key_size) throws Exception{
    SecureRandom sr = new SecureRandom();
    RSAKeyGenerationParameters RSAKeyGenPara =
      new RSAKeyGenerationParameters(pubExp, sr, key_size, 80);
    RSAKeyPairGenerator kpgen=new RSAKeyPairGenerator();
    kpgen.init(RSAKeyGenPara);
    AsymmetricCipherKeyPair keyPair=kpgen.generateKeyPair();

    RSAPrivateCrtKeyParameters prvKey=
      (RSAPrivateCrtKeyParameters) keyPair.getPrivate();
    RSAKeyParameters pubKey=
      (RSAKeyParameters) keyPair.getPublic();
View Full Code Here

        public RSA()
        {
            super("RSA");

            engine = new RSAKeyPairGenerator();
            param = new RSAKeyGenerationParameters(defaultPublicExponent,
                            new SecureRandom(), 2048, defaultTests);
            engine.init(param);
        }
View Full Code Here

        public RSA()
        {
            super("RSA");

            engine = new RSAKeyPairGenerator();
            param = new RSAKeyGenerationParameters(defaultPublicExponent,
                            new SecureRandom(), 2048, defaultTests);
            engine.init(param);
        }
View Full Code Here

    long startTime = System.currentTimeMillis();

    Security.addProvider(new BouncyCastleProvider());

    // generate RSA keys
    RSAKeyPairGenerator gen = new RSAKeyPairGenerator();
    gen.init(new RSAKeyGenerationParameters(new BigInteger("10001", 16), new SecureRandom(), 2048, 80));
    AsymmetricCipherKeyPair keyPair = gen.generateKeyPair();

    // some data where first entry is 0
    byte[] data = { 10, 122, 12, 127, 35, 58, 87, 56, -6, 73, 10, -13, -78, 4, -122, -61 };

    // encrypt data asymmetrically
View Full Code Here

        public RSA()
        {
            super("RSA");

            engine = new RSAKeyPairGenerator();
            param = new RSAKeyGenerationParameters(defaultPublicExponent,
                            new SecureRandom(), 2048, defaultTests);
            engine.init(param);
        }
View Full Code Here

    SecureRandom securerandom = new SecureRandom();
    BigInteger pubExp = new BigInteger("10001", 16);

    RSAKeyGenerationParameters RSAKeyGenParams = new RSAKeyGenerationParameters
                        (pubExp,securerandom, strength, 80);
    RSAKeyPairGenerator rsakeygen = new RSAKeyPairGenerator();
    rsakeygen.init(RSAKeyGenParams);
    AsymmetricCipherKeyPair keypair = rsakeygen.generateKeyPair();

    return keypair;
  }
View Full Code Here

TOP

Related Classes of org.bouncycastle.crypto.generators.RSAKeyPairGenerator

Copyright © 2018 www.massapicom. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.