Welcome![Sign In][Sign Up]
Location:
Search - encryption decryption hill

Search list

[Crack HackHillCodor

Description: 在VC环境下采用希尔密码体制加密、解密和破译。该软件实现了输入任意长度的密钥对文件进行加密和解密,解密密钥和密文保存在文件中。如果有完整的明文和对应的密文可是实现破译功能,即得出加密密钥。-in VC environment with Hill cryptosystem encryption, decryption and decoding. The software arbitrary length of the input to the key document encryption and decryption, and the decryption key secret to preserve the text in the document. If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.
Platform: | Size: 42819 | Author: | Hits:

[Crack HackHillCodor

Description: 在VC环境下采用希尔密码体制加密、解密和破译。该软件实现了输入任意长度的密钥对文件进行加密和解密,解密密钥和密文保存在文件中。如果有完整的明文和对应的密文可是实现破译功能,即得出加密密钥。-in VC environment with Hill cryptosystem encryption, decryption and decoding. The software arbitrary length of the input to the key document encryption and decryption, and the decryption key secret to preserve the text in the document. If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.
Platform: | Size: 4512768 | Author: | Hits:

[Crack Hackcryptology

Description: 实现了三种古典密码学体制和DES体制及其分析。affine(仿射)读入文件11.txt中内容(小写字母,明文)加密并把内容写入12.txt,还可以解密生成文件13.txt。vigenere,hill体制类似。DES体制包括加密解密雪崩效应差分分析等内容。由于本人还是刚学习程序设计语言及密码学的在校本科生,水平很低,第一次上传只是为了试一下。可以考虑少给几点,呵呵。-achieve three classical cryptography system and DES system and its analysis. P14 (affine) read into the document 11. Txt contents (lowercase letters, expressly) encryption and written 12. txt, can also generate documents declassified 13. txt. Vigenere, hill similar system. DES encryption and decryption system, including avalanche effect Differential analysis of the contents. Because I still just learning programming language and Cryptography in undergraduate school, the low level Uploading is the first to try. Consider a smaller number of points-huh.
Platform: | Size: 10240 | Author: 李栋 | Hits:

[Crack Hack300sunflower

Description: 300种加密解密的算法源代码, 在windows肯定能运行, 希望大家喜欢-300 encryption and decryption algorithm source code, the windows can certainly run, hope you like
Platform: | Size: 387072 | Author: | Hits:

[Crack HackHill_encpyt_decrypt_system

Description: 本源码是对Hill算法的简单实现,压缩包内包含crypt和decrypt两个目录,分别为加密和解密。-the source of Hill simple algorithm to achieve, Compression packet contains crypt and decrypt two catalogs, respectively encryption and decryption.
Platform: | Size: 5120 | Author: 张华 | Hits:

[Crack Hackhillmima

Description: 这是一个基于HILL密码的加密解密程序 能实现文本信息的加密(密钥可自行设定是一二阶矩阵)-HILL This is a password-based encryption and decryption process can realize text messaging encryption (key can be set on its own is a second-order matrix)
Platform: | Size: 1916928 | Author: sjm | Hits:

[OtherHILL

Description: 实现HILL密码的加密和解密,分三个题目详细说明。-HILL achieve password encryption and decryption, is divided into three topics in detail.
Platform: | Size: 10240 | Author: 宋明阳 | Hits:

[Crack HackHillCipher

Description: Hill 加密解密 关于矩阵加密的东西 -Hill encryption and decryption on the encrypted matrix things
Platform: | Size: 2048 | Author: 徐林 | Hits:

[Crack Hackkey

Description: C#平台下的希尔密码加密解密及破译程序,主要是对大学数学建模的该章节内容的实现。只考虑算法,故只对大写字母有效。-C# Platform Hill password encryption and decryption and deciphering procedures, mainly for mathematical modeling of the University chapter of the realization of the content. Only consider the algorithm, it is effective only for capital letters.
Platform: | Size: 261120 | Author: 陈佳 | Hits:

[Crack HackHill

Description:
Platform: | Size: 1895424 | Author: mrmark | Hits:

[Crack HackHill

Description: Hill加密算法的基本思想是将l个明文字母通过线性变换将它们转换为k个密文字母。脱密只要做一次逆变换就可以了。密钥就是变换矩阵本身。即 M=m1m2……ml Ek(M)=c1c2……cl 其中 c1=k11m1+k12m2+……+k1lml c2=k21m1+k22m2+……+k2lml …… cl=kl1m1+kl2m2+……+kllml 通常对于字母加解密,使用mod 26的方法。 以上线性方程可以采用矩阵表示。 -Hill encryption algorithm the basic idea is to express the letter l a linear transformation through them is converted to k-secret alphabet. Off to do a secret as long as the inverse transform it. Key is the transformation matrix itself. That is, M = m1m2 ... ... mlEk (M) = c1c2 ... ... cl which c1 = k11m1+ K12m2+ ... ...+ K1lmlc2 = k21m1+ K22m2+ ... ...+ K2lml ... ... cl = kl1m1+ Kl2m2+ ... ...+ Kllml For encryption and decryption usually letters, use the method of mod 26. Above linear equations can be used express matrix.
Platform: | Size: 143360 | Author: wildkaede | Hits:

[Crack Hackhill

Description: 对称密码学体制中hill密码加密解密算法实现。-Symmetric cryptography system hill password encryption and decryption algorithm.
Platform: | Size: 27648 | Author: shine | Hits:

[Crack Hackmimaxue

Description: 包含仿射caser算法,playfair算法,hill算法,vegenere算法的加解密程序。-Contains affine caser algorithm, playfair algorithm, hill algorithm, vegenere algorithm for encryption and decryption procedures.
Platform: | Size: 3072 | Author: 张苏昕 | Hits:

[Crack Hackhill2mima

Description: 在数学建模中希尔密码的加密与解密是一个复杂的的计算过程,此程序能计算得出任意二阶密钥的加密与解密结果。-Hill, in Mathematical Modeling of encryption and decryption is a complicated calculation process, this process can be any second-order calculation of the encryption and decryption key results.
Platform: | Size: 30720 | Author: 刘海东 | Hits:

[Mathimatics-Numerical algorithmsHILL

Description: 使用c++实现hill密码的加密,解密,破译-Using c++ to achieve hill of encryption, decryption, decoding
Platform: | Size: 1024 | Author: 王玉 | Hits:

[Crack Hackclassic

Description: 古典密码 可选择进行维吉尼亚加解密、希尔加解密、行置换的乘积加解密、仿射加解密 并可选择下列统计计算: 1.不同n值下维吉尼亚密码体制的频率统计 2.不同n值下维吉尼亚密码体制的重合指数计算 3.不同n n值下希尔密码体制的频率统计 4.不同n n值下希尔密码体制的重合指数计算 5.不同(m,n,t)下维吉尼亚和行置换的乘积密码体制的频率统计 6.不同(m,n,t)下维吉尼亚和行置换的乘积密码体制的重合指数计算 7.对于同一明文,给出维吉尼亚密码体制、希尔密码体制、维吉尼亚和行置换的乘积密码体制、Rotor机的频率统计结果 -Virginia may choose to encrypt and decrypt, Gilgado decrypt, encrypt and decrypt the product line of replacement, affine encryption and decryption Can choose the following statistical computing: 1. Under different values of n the frequency of Statistics Virginia cryptosystem 2. Under different values of n coincide Virginia cryptography Index 3. Under different values of n  n Hill Cryptosystem frequency statistics 4. Under different values of n  n coincidence Hill cryptosystem Index 5. Different (m, n, t) under the Virginia and the replacement of the product line frequency statistics cryptosystem 6. Different (m, n, t) under the replacement of the product line of Virginia and the coincidence index calculation code system 7. For the same plaintext, given Virginia cryptosystem, cryptography Hill, Virginia, and the product code line replacement system, Rotor machine frequency statistics
Platform: | Size: 3072 | Author: Beaug | Hits:

[matlabHill

Description: 数学建模实验&matlab实现Hill密码体系的关键环节(加密、解密、破译) 实现通用hill密码n维密码-Mathematical modeling of experimental realization of Hill & matlab key password system (encryption, decryption, decoding) to achieve universal hill n-password password
Platform: | Size: 11264 | Author: jk | Hits:

[Crack HackHill

Description: HILL密码:加密,解密的实现及其相关功能-HILL Password: encryption, decryption and related functions to achieve
Platform: | Size: 2048 | Author: Lucifer | Hits:

[Crack HackHill

Description: Hill密码加密与解密C++程序实现。 其中包括Hill2、Hill4等。(Implementation of Hill encryption and decryption C++ program.)
Platform: | Size: 2048 | Author: JackSkyLily | Hits:

[Crack Hackhill

Description: hill的加密解密代码,很牛的,你要相信我没错(Hill encryption and decryption code, very cattle, you have to believe I am right)
Platform: | Size: 14336 | Author: 654665995 | Hits:
« 12 »

CodeBus www.codebus.net