<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:media="http://search.yahoo.com/mrss/"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>rsa - 四号程序员</title>
	<atom:link href="https://www.coder4.com/archives/tag/rsa/feed" rel="self" type="application/rss+xml" />
	<link>https://www.coder4.com</link>
	<description>Keep It Simple and Stupid</description>
	<lastBuildDate>Mon, 26 Sep 2022 01:50:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>open-ssh不再支持rsa的key，提示&quot;no mutual signature algorithm&quot;</title>
		<link>https://www.coder4.com/archives/7786</link>
					<comments>https://www.coder4.com/archives/7786#respond</comments>
		
		<dc:creator><![CDATA[coder4]]></dc:creator>
		<pubDate>Mon, 26 Sep 2022 01:50:06 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[ed25519]]></category>
		<category><![CDATA[rsa]]></category>
		<category><![CDATA[ssh-keygen]]></category>
		<category><![CDATA[密钥算法]]></category>
		<guid isPermaLink="false">https://www.coder4.com/?p=7786</guid>

					<description><![CDATA[换了新版Ubuntu后，发现ssh -T怎么都过不去，开启调试模式后，提示如下： ... no mutual signature algorithm ... 搜了一圈，发现是RSA的key有漏洞，默认已经不支持了，建议换用ed25519： ssh-keygen -t ed25519 &#160; &#160;[......] 继续阅读]]></description>
		
					<wfw:commentRss>https://www.coder4.com/archives/7786/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>使用Crypto++进行RSA加密</title>
		<link>https://www.coder4.com/archives/577</link>
					<comments>https://www.coder4.com/archives/577#respond</comments>
		
		<dc:creator><![CDATA[coder4]]></dc:creator>
		<pubDate>Wed, 24 Mar 2010 08:58:15 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[算法&数据结构]]></category>
		<category><![CDATA[C]]></category>
		<category><![CDATA[Crypto++]]></category>
		<category><![CDATA[rsa]]></category>
		<category><![CDATA[加密.开源]]></category>
		<category><![CDATA[实现]]></category>
		<guid isPermaLink="false">http://www.coder4.com/?p=577</guid>

					<description><![CDATA[Crypto++理论上可以在任何平台上编译，但是作者似乎是个Windows控，默认只生成静态库。当在Linux下编译的时候，需要打个patch给GNUmakefile，然后才能生成.so动态库。 补丁见这里，请爬梯子，注意安全～ http://groups.google.com/group/cryptopp-users/browse_thread/thread/6d37437aa40fc135?pli=1 对了，编译时候记得参数 -lcryptopp -lpthread 包装类RSATool[......] 继续阅读]]></description>
		
					<wfw:commentRss>https://www.coder4.com/archives/577/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>[转]ssh不输入密码登录（使用公钥、私钥验证）</title>
		<link>https://www.coder4.com/archives/564</link>
					<comments>https://www.coder4.com/archives/564#respond</comments>
		
		<dc:creator><![CDATA[coder4]]></dc:creator>
		<pubDate>Tue, 16 Mar 2010 03:14:43 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[rsa]]></category>
		<category><![CDATA[ssh]]></category>
		<category><![CDATA[不用密码]]></category>
		<category><![CDATA[不输入密码]]></category>
		<category><![CDATA[登录]]></category>
		<guid isPermaLink="false">http://www.coder4.com/?p=564</guid>

					<description><![CDATA[转载自：http://www.52zhe.cn/read.php/168.htm 场景：我们通常管理服务器，以一个工作站通过ssh，来管理所有的服务器主机。这样对于安控来讲比较容易控制。而在这个工作站，我们用ssh-keygen来生成所需要的公钥和私钥。并将公钥(客户端:id_*.pub)内容追加到服务器上的认证文件(服务器端:authorized_keys)里面。 注意事项:id_*.pub、authorized_keys所在的位置。千万不要弄混了这个逻辑问题。如果想不明白。就仔细[......] 继续阅读]]></description>
		
					<wfw:commentRss>https://www.coder4.com/archives/564/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Java的RSA实现nopadding</title>
		<link>https://www.coder4.com/archives/552</link>
					<comments>https://www.coder4.com/archives/552#comments</comments>
		
		<dc:creator><![CDATA[coder4]]></dc:creator>
		<pubDate>Wed, 10 Mar 2010 15:01:53 +0000</pubDate>
				<category><![CDATA[Java]]></category>
		<category><![CDATA[Java && J2EE]]></category>
		<category><![CDATA[nopadding]]></category>
		<category><![CDATA[OAEP]]></category>
		<category><![CDATA[rsa]]></category>
		<guid isPermaLink="false">http://www.coder4.com/?p=552</guid>

					<description><![CDATA[java.security包下的算法默认是带有OAEP的padding的，如果想要使用nopadding，需要引入额外的provider，比如bouncycastle Security &#160;&#160;&#160;&#160;&#160;.addProvider(new org.bouncycastle.jce.provider.BouncyCastleProvider()); Cipher.getInstance(&#34;RSA/NONE/NoPadding&#34;, &#038;qu[......] 继续阅读]]></description>
		
					<wfw:commentRss>https://www.coder4.com/archives/552/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
