Welcome![Sign In][Sign Up]
Location:
Search - MD5 decrypt to

Search list

[OS programkenel_crypto

Description: 内核加解密算法 加解密函数库及其使用说明,详见附件。 find_cipher_by_name中参数ciphername可取的值为下面的组合,对应不同的模式: (des,des_ede3,aes,blowfish,cast5,dfc,idea,mars,rc5,rc6,serpent,twofish)-ecb (des,des_ede3,aes,blowfish,cast5,dfc,idea,mars,rc5,rc6,serpent,twofish)-cbc (des,des_ede3,aes,blowfish,cast5,dfc,idea,mars,rc6,serpent,twofish)-cfb struct cipher_implementation* ci中对应的可调用的method:encrypt_iv decrypt_iv encrypt decrypt 比如以des-cbc为find_cipher_by_name的参数得到的ci调用encrypt_iv,decrypt_iv. find_digest_by_name中参数digestname可取的值: sha1 md5 struct digest_implementation* di中对应的可调用的method:open update digest close hmac 计算digest时调用di->digest,计算hmac时调用di->hmac. 注意:加载我们需要的cipher-*.o和digest-*.o之前需先加载cryptoapi.o。 -core encryption and decryption algorithm encryption and decryption functions and their use, as detailed in the annex. Find_cipher_by_name cipher desirable parameter values to the following portfolio, dealing with different modes : (des, des_ede3, Aes, blowfish, cast5, DFC, the idea, mars, RC5, production, serpent, twofish) - ecb ( des, des_ede3, Aes, blowfish, cast5, DFC, the idea, mars, RC5, production, serpent, twofish) - cbc (des, des_ede3, Aes, blowfish, cast5, DFC, the idea, mars, production, the serpent , twofish) - Sample struct cipher_implementation ci * corresponding the available method : encrypt_iv decrypt_iv encrypt decrypt such as a des-cbc find_cipher_by_name parameters for the ci call encrypt_iv, decrypt_iv. find_digest_by_name digestname desirable parameter values : sha1 md
Platform: | Size: 139861 | Author: xf | Hits:

[Crack Hack300_encrypt

Description: 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives : - To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output - To share a file into shadows : cryptest's
Platform: | Size: 389062 | Author: Nikii | Hits:

[OS programkenel_crypto

Description: 内核加解密算法 加解密函数库及其使用说明,详见附件。 find_cipher_by_name中参数ciphername可取的值为下面的组合,对应不同的模式: (des,des_ede3,aes,blowfish,cast5,dfc,idea,mars,rc5,rc6,serpent,twofish)-ecb (des,des_ede3,aes,blowfish,cast5,dfc,idea,mars,rc5,rc6,serpent,twofish)-cbc (des,des_ede3,aes,blowfish,cast5,dfc,idea,mars,rc6,serpent,twofish)-cfb struct cipher_implementation* ci中对应的可调用的method:encrypt_iv decrypt_iv encrypt decrypt 比如以des-cbc为find_cipher_by_name的参数得到的ci调用encrypt_iv,decrypt_iv. find_digest_by_name中参数digestname可取的值: sha1 md5 struct digest_implementation* di中对应的可调用的method:open update digest close hmac 计算digest时调用di->digest,计算hmac时调用di->hmac. 注意:加载我们需要的cipher-*.o和digest-*.o之前需先加载cryptoapi.o。 -core encryption and decryption algorithm encryption and decryption functions and their use, as detailed in the annex. Find_cipher_by_name cipher desirable parameter values to the following portfolio, dealing with different modes : (des, des_ede3, Aes, blowfish, cast5, DFC, the idea, mars, RC5, production, serpent, twofish)- ecb ( des, des_ede3, Aes, blowfish, cast5, DFC, the idea, mars, RC5, production, serpent, twofish)- cbc (des, des_ede3, Aes, blowfish, cast5, DFC, the idea, mars, production, the serpent , twofish)- Sample struct cipher_implementation ci* corresponding the available method : encrypt_iv decrypt_iv encrypt decrypt such as a des-cbc find_cipher_by_name parameters for the ci call encrypt_iv, decrypt_iv. find_digest_by_name digestname desirable parameter values : sha1 md
Platform: | Size: 139264 | Author: xf | Hits:

[Crack Hack300_encrypt

Description: 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives :- To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output- To share a file into shadows : cryptest's
Platform: | Size: 389120 | Author: Nikii | Hits:

[Crack HackMD5tool

Description: MD5信息摘要计算工具 如果对较大的文件进行MD5计算,会自动出现计算进度条, 目前的缺陷是对CPU占用过高,请有识之士修改之,并发 给我一份,非常感谢!-MD5 message digest calculation tool for larger if the paper MD5, will automatically calculate the progress of the current shortcomings of high CPU utilization, insight revisions, and give me a copy, very grateful!
Platform: | Size: 58368 | Author: zhangshijie | Hits:

[File OperateCryptoAPI_ProtectFile

Description: 利用Visual C++ .net2003开发的一款用于保护文件的小程序。 对文件产生MD5值同时对源文件用DES加密,并用私钥加密签名。 对加密文件解密,验证用公钥解密签名与解密文件的MD5值比较,以判断文件是否被修改。 遇到的问题:微软提供的签名函数可能有问题,无论用公钥还是私钥签名,用公钥、私钥(任一)均可解密。怪!希望在此与大家交流交流。-The use of Visual C++. Net2003 developed a document for the protection of small procedures. MD5 value of the document produced at the same time the source file using DES encryption, and signature private key encryption. Encrypted files decryption, authentication using public key to decrypt the signature and decrypt files MD5 value to determine whether a document is modified. Problems encountered: Microsoft to provide the signature function may be a problem regardless of whether it uses a public key or private key signature, using public key, private key (any one) can be decrypted. Strange! Would like to exchange with the U.S. exchanges.
Platform: | Size: 47104 | Author: jimin | Hits:

[Crack Hackjjm

Description: 帮助开发出来的程序加密和解密!采用MD5算法,即时数据库中被人盗窃,也不能得到用户登录密码-Developed procedures to help encrypt and decrypt! Using MD5 algorithm, real-time database which has been stolen, nor can the user login password
Platform: | Size: 2048 | Author: 111111 | Hits:

[ICQ-IM-ChatClient-Server-based-Security-Comunication-Tool

Description: 自己用Java编的Client-Server聊天程序,结合了网络通信、数据安全、多线程的知识 1.使用RSA算法完成DES密钥的分配; 2.使用MD5结合RSA算法完成对消息的签名; 3.对原有消息及签名提供机密性保护(用DES算法加密); 4.能够解密并验证签名的合法性 -Their use of Java made the Client-Server chat program, a combination of network communications, data security, knowledge of multi-threaded one. RSA algorithm using the completion of the distribution of DES keys 2. RSA algorithm combines the use of MD5 message to complete the signature 3. The original message and signature to provide confidentiality protection (with DES encryption algorithm) 4. Able to decrypt and verify the legitimacy of the signature
Platform: | Size: 8192 | Author: Shadow | Hits:

[Delphi VCLMD5

Description: DELPHI MD5加密 1、 MD5String、MD5File、MD5Print、MD5Match这四个函数是供调用的。其他是用来辅助这几个函数的子函数。 2、MD5String为加密字符串。 3、MD5File为加密这个文件。 4、MD5Print是将加密后的密文转换成字符串。 5、MD5Match是用来比较密文是否一致。-DELPHI MD5 encryption 1, MD5String, MD5File, MD5Print, MD5Match the four function is called for. The other is used to these auxiliary function Functions. 2, MD5String for the encrypted string. 3, MD5File encrypted the document. 4, MD5Print is encrypted ciphertext converted into a string. 5, MD5Match ciphertext is used to compare whether they are consistent.
Platform: | Size: 9216 | Author: 韩夜 | Hits:

[JSP/Javajava_DigitalSign

Description: 实用数字签名的步骤 (1)发送方使用MD5算法对原始信息进行计算,获得一个固定长度的信息摘要 (2)发送方用自己的私钥加密生成的信息生成发送方的数字签名,发送方把这个数字签名作为发送信息的附件和明文信息,一同用接收方的公钥进行加密,将加密后的密文一同发送给接收方; (3)接收方首先把接收到的密文用自己的私钥解密,得到明文信息和数字签名,再用发送方的公钥对数字签名进行解密,然后使用相同的单向散列算法来计算解密得到的明文信息,得到信息摘要;对比计算出来的信息摘要和发送方发送过来的信息摘要是否一致-Practical steps to a digital signature (1) sender MD5 algorithm used to calculate the original information, access to a fixed length message digest (2) use their own sender s private key to generate encrypted information generated by the sender s digital signature, the sender of the digital signature as an annex to send a message and express information, together with the recipient s public key for encryption, will be encrypted ciphertext sent to the receiver together (3) the recipient first received ciphertext with its own private key to decrypt received explicit information and digital signatures, and then the sender s public key to decrypt the digital signature, and then use the same one-way hash algorithm to calculate the explicit information to be decrypted, the message digest contrast calculated message digest and the sender sent the message digest are consistent
Platform: | Size: 23552 | Author: 张云 | Hits:

[OS programMD5

Description: 标准C++写的使用MD5算法加密和解密的代码,这个代码测试可以使用。-Written in standard C++ using the MD5 algorithm to encrypt and decrypt the code, this code test can be used.
Platform: | Size: 4096 | Author: lixiuhong | Hits:

[Crack Hackc-md5

Description: 数据加密的基本过程就是对原来为明文的文件或数据按某种算法进行处理,使其成为不可读的一段代码,通常称为“密文”,使其只能在输入相应的密钥之后才能显示出本来内容,通过这样的途径来达到保护数据不被非法人窃取、阅读的目的。 该过程的逆过程为解密,即将该编码信息转化为其原来数据的过程。 是MD5算法设计 -The basic process of data encryption is to express the original documents or data processed by an algorithm, making it unreadable piece of code, commonly referred to as " ciphertext" , it can only be entered only after the corresponding key show original content, through such ways to protect data from unauthorized people to steal, the purpose of reading. The inverse process to decrypt, encode information about the process of transforming its original data. MD5 algorithm is designed
Platform: | Size: 2048 | Author: jason | Hits:

[Crack HackMD5

Description: 使用MD5算法的一个文件加密和解密系统。-MD5 algorithm used to encrypt and decrypt a file system.
Platform: | Size: 359424 | Author: 熊煜然 | Hits:

[Crack HackMD5

Description: MD5加密解密工具,新出现的MD5值自动加到数据库,本地找不到继续到网络上找,网络上找不到就生成新的Md5比对。-The MD5 encrypts to decrypt tool, lately- appeared MD5 valueses automatically add a database, local can not find to continue to seek in the network, can not find born new Md5 to compare a rightness on the network.
Platform: | Size: 21504 | Author: 黄福龙 | Hits:

[Crack HackMD5-Encryption-Algorithm-VCPP

Description: MD5是一个安全的散列算法,输入两个不同的明文不会得到相同的输出值,根据输出值,不能得到原始的明文,即其过程不可逆;所以要解密MD5没有现成的算法,只能用穷举法,把可能出现的明文,用MD5算法散列之后,把得到的散列值和原始的数据形成一个一对一的映射表,通过比在表中比破解密码的MD5算法散列值,通过匹配从映射表中找出破解密码所对应的原始明文。 对信息系统或者网站系统来说,MD5算法主要用在用户注册口令的加密,对于普通强度的口令加密,可以通过以下三种方式进行破解: (1)在线查询密码。一些在线的MD5值查询网站提供MD5密码值的查询,输入MD5密码值后,如果在数据库中存在,那么可以很快获取其密码值。 (2)使用MD5破解工具。网络上有许多针对MD5破解的专用软件,通过设置字典来进行破解。 (3)通过社会工程学来获取或者重新设置用户的口令。 因此简单的MD5加密是没有办法达到绝对的安全的,因为普通的MD5加密有多种暴力破解方式,因此如果想要保证信息系统或者网站的安全,需要对MD5进行改造,增强其安全性,本文就是在MD5加密算法的基础上进行改进! -MD5 is a secure hash algorithm, the two different input plaintext will not get the same output values ​ ​ can not be obtained based on the output value of the original plaintext, i.e. the process is not reversible so is not ready to decrypt MD5 algorithm which can be usedbrute-force method, the plaintext may occur, after the hash with the MD5 algorithm, the resulting hash value and the original data to form a one-to-one mapping table, cracks than the ratio in the table algorithm MD5 hash value of the passwordmatch from the mapping table to find crack the code corresponding to the original plaintext. Information system or site system, the MD5 algorithm is mainly used in the user registered password encryption, password encryption for ordinary strength, can crack through the following three ways: (1) for the codes. The MD5 value of some online website the the MD5 password value query input MD5 password value, exists in the database, you can quickly obtain the password va
Platform: | Size: 274432 | Author: Johnson | Hits:

[Crack HackPractical-digital-signature

Description: 实用数字签名的步骤 (1)发送方使用MD5算法对通信内容进行计算,获得一个固定长度的信息摘要; (2)发送方用自己的私钥加密生成的信息生成发送方的数字签名,发送方把这个数字签名作为发送信息的附件和明文信息,一同用接收方的公钥进行加密,将加密后的密文一同发送给接收方; (3)接收方首先把接收到的密文用自己的私钥解密,得到明文信息和数字签名,再用发送方的公钥对数字签名进行解密,然后使用相同的单向散列算法来计算解密得到的明文信息,得到信息摘要;对比计算出来的信息摘要和发送方发送过来的信息摘要是否一致 思考: (1)请分别选择文件test-1.txt和test_picture.bmp作为通讯内容,分别记录全过程用时,并对比一下; (2)如果所发送的内容数据量非常大,上述方案中的效率不能满足要求,请考虑一下如何解决这个问题。-Practical steps digital signature ( A ) the sender uses the MD5 algorithm to calculate the content of communications , access to a fixed-length message digest ( 2 ) the sender s private key encryption with their own information generated by the sender generates a digital signature , the digital signature of the sender of the message as an attachment and send plaintext , together with the recipient s public key to encrypt the encrypted sent along with the ciphertext to the recipient ( 3 ) First, the recipient receives the ciphertext with his private key to decrypt , get the plaintext and the digital signature , then the sender s public key to decrypt the digital signature , and then using the same one-way hash algorithm to calculate decrypted plaintext information, to receive message digest comparing the calculated message digest and the information sent from the sender summary is consistent Reflections : ( 1 ) Please select the file test-1.txt respectively and test_pictur
Platform: | Size: 1383424 | Author: 丁元元 | Hits:

[JSP/JavaMD5

Description: 非对称密码技术的实现 (1)熟悉RSA相关函数(公私钥生成函数,加密/解密函数); (2)利用公钥加密特定文件(test-1.txt),并用私钥进行解密;反过来,再利用私钥加密特定文件,并用公钥进行解密。对比解密后的文件与原始文件是否一致。 -Achieve asymmetric cryptographic techniques (1) be familiar with RSA-related functions (public and private key generation functions, encryption/decryption function) (2) the use of public key cryptography specific file (test-1.txt), and with the private key to decrypt turn , and then use the private key to encrypt specific files, and use the public key to decrypt it. Comparative decrypted file if the original files are consistent.
Platform: | Size: 4096 | Author: 王同学 | Hits:

[ADO-ODBCMD5100

Description: 标准C++写的使用MD5算法加密和解密的代码,这个代码测试可以使用。-Written in standard C++ using the MD5 algorithm to encrypt and decrypt the code, this code test can be used.
Platform: | Size: 5120 | Author: we31747chengmou | Hits:

[OS programListBoxDlg

Description: 标准C++写的使用MD5算法加密和解密的代码,这个代码测试可以使用。-Standard C++ written using MD5 algorithm to encrypt and decrypt the code, this code can be used to test.
Platform: | Size: 6144 | Author: 露小风 | Hits:

[Windows DevelopCipherGuru 1.0

Description: An application able to encode or decode strings using popular algorithms
Platform: | Size: 714752 | Author: adrenaline96 | Hits:
« 12 »

CodeBus www.codebus.net