Welcome![Sign In][Sign Up]
Location:
Search - encrypt decrypt database

Search list

[Crack Hackjjm

Description: 帮助开发出来的程序加密和解密!采用MD5算法,即时数据库中被人盗窃,也不能得到用户登录密码-Developed procedures to help encrypt and decrypt! Using MD5 algorithm, real-time database which has been stolen, nor can the user login password
Platform: | Size: 2048 | Author: 111111 | Hits:

[Crack HackDecrypt_encrypt

Description: This code to implement connnection with data base. This is mainly to decrypt and encrypt database contents. This for cryptography.(security)
Platform: | Size: 1024 | Author: vallal | Hits:

[CA authDecrypt.rar

Description: 加密的几种常用的源码包,应用于数据库表部分字段的加密,图象文件等文档加密,双方通信时数据加密传输防他人网络截取信息。非对称RSA或ECC公钥加密私钥解密或者可用于数字签名 对称加密AES或者DES,56位的DES加密,128位或192位或256位AES加解密通常可设随便的密码长度,其它位用常字符代替;非对称加密多要先因式分解,对称加密多就移位处理。,Several common source package encryption, encryption, image files, and other document encryption applied to the part of the field of the database table, the two sides communicate data encryption transmission Anti others network interception. The asymmetric RSA or ECC public key to encrypt the private key to decrypt or can be used for digital signatures symmetric encryption AES or DES, 56-bit DES encryption, 128-bit or 192-bit or 256-bit AES encryption and decryption usually can be set casually password length, other bits instead of using the regular characters asymmetric encryption first multi factorization, symmetric encryption shift process.
Platform: | Size: 212992 | Author: 曾祥园 | Hits:

[CA authjm

Description: 一,产生密钥(算法实现可参照文档后的<附件1>KeyGeN.asp) 与<附件1>不同的是,实际要求密钥存放在字符串接受方数据库表KeyPool中,表结构如下: 1,personalID{主码} 2,secret_key{密钥,数据类型最好用text,与实际代码密钥生成长度有关} 3,serverTime{密钥生成时间,用以检验密钥是否失效} 接受方发现密钥失效,则拒绝验证 二,字符串加密(算法实现可参照文档后的<附件2>CRYPT.asp) 从数据库中读取密钥,并用密钥加密{函数:EnCrypt(正文),返回密文} 三,接受方获取密文以及其他数据以后,根据获取的参数personalID从数据库中读取密钥,并且比较时间戳,发现密钥超时(比如15分钟)则拒绝验证。 时间戳有效,则使用密钥解密{函数:DeCrypt(密文),返回正文}-First, the key generation (algorithm can refer to the document after <Annex 1> KeyGeN.asp) And <Annex 1> The difference is that the actual requirements of the key stored in a database table KeyPool string recipient, the table structure is as follows: 1, personalID {main} code 2, secret_key {key, data type, preferably with text, key generation and the actual code length about} 3, serverTime {key generation time, to test whether the key failure} Recipient found key lapses, refused to verify Second, string encryption (algorithm can refer to the document after <Attachment 2> CRYPT.asp) Key is read from the database and use the key to encrypt {function: EnCrypt (text) returns ciphertext} Third, the recipient, and other data acquired after the ciphertext, based on the parameters acquired personalID key read from the database, and compares the timestamp found key timeout (eg 15 minutes) the authentication is denied. Timestamp is valid, then use the key
Platform: | Size: 5120 | Author: 蔡国庆 | Hits:

[JSP/JavaPasswordEn

Description: Java application used to encrypt password and store to the database. Uses MD5 encryption and can also be used to decrypt passwords.
Platform: | Size: 16384 | Author: Oduor | Hits:

[androidsqlcipher-for-android-community-v3.2.0

Description: 使用sqlcipher实现对android中的sqlite数据库加密和解密(Using sqlcipher to encrypt and decrypt the SQLite database in Android)
Platform: | Size: 7993344 | Author: Soaz | Hits:

CodeBus www.codebus.net