Welcome![Sign In][Sign Up]
Location:
Search - permutation encryption

Search list

[Crack Hackywmm

Description: 一个简单的移位密码算法程序,可以实现移位加密和解密的功能,-A simple transposition cipher procedures, can shift realize encryption and decryption functions,
Platform: | Size: 268288 | Author: 王功臣 | Hits:

[Crack HackPermutation

Description: Column permutation cipher是基于置换的加密解密方式。利用本程序可实现Column permutation cipher的加密和解密。 -Column permutation cipher is based on the replacement of the encryption and decryption methods. This procedure can be realized using Column permutation cipher encryption and decryption.
Platform: | Size: 332800 | Author: 马茜 | Hits:

[Crack Hackzhihuan

Description: 置换密码算法的原理是不改变明文字符,只将字符在明文中的排列顺序改变,从而实现明文信息的加密。置换密码也叫换位密码。试编程实现矩阵换位密码。它的加密方法是将明文中的字母按照给定的顺序安排在一个矩阵中,然后用根据密钥提供的顺序重新组合矩阵中的字母,形成密文。-Permutation cipher does not change the principle is expressly characters, only characters in the explicit change in order to achieve explicit information encryption. Password replacement is also called transposition password. Programming test matrix transposition password. Its encryption method is to express the letter in accordance with the order given in a matrix, and then use the key provided in accordance with the order re-arrangement of the letters in the matrix to form a ciphertext.
Platform: | Size: 1024 | Author: rose | Hits:

[Crack HackPermutation

Description: 经典密码学中列置换密码的实现 此为字符串版本的加解密实现 开发平台为VC6.0-Classical Cryptography replacement passwords out to achieve this for the string version of the encryption and decryption realize development platform for VC6.0
Platform: | Size: 8192 | Author: 薛智虎 | Hits:

[Crack HackJavaApp-SSA

Description: Java Application for testing Encryption/Decryption of several algorithms: Ceaar, Vigenere, a custom make alg (key + permutation of elements)-Java Application for testing Encryption/Decryption of several algorithms: Ceaar, Vigenere, a custom make alg (key+ permutation of elements)
Platform: | Size: 31744 | Author: johnny | Hits:

[Crack HackMyCAP

Description: 使用viginear,column permutation,DES加密和解密-The use of viginear, column permutation, DES encryption and decryption
Platform: | Size: 57344 | Author: lyq | Hits:

[Crack HackCryptology

Description: 自己编写的加解密程序、包括凯撒、Vigenere、Permutation、DES、RC4、Playfair、RSA、DF密钥交换等密码的实现与演示。值得学习密码和做该方面实践的同学一看。-Prepared their own encryption and decryption procedures, including Caesar, Vigenere, Permutation, DES, RC4, Playfair, RSA, DF, such as password key exchange with the presentation. Password and do learn the practice of the aspects of the students have a look.
Platform: | Size: 4350976 | Author: 小余 | Hits:

[matlab157

Description: Encryption algorithms are becoming more necessary to ensure data is securely transmitted over insecure communication channels. FOX is a recently developed algorithm and its structure is based on the already proven IDEA (International Data Encryption Algorithm) cipher. FOX is a symmetric (private key) block cipher. Its top-level structure uses the Lai-Massey scheme and the round functions used in the scheme are substitution permutation networks (SPN). Its flexibility lies in the fact that it can be efficiently implemented in hardware and software. We report some of the first results of implementing the cipher on an FPGA
Platform: | Size: 136192 | Author: yared | Hits:

[Firewall-Securityzhihuan_jiami

Description: 经典的置换加密算法,写的很详细,注释的也很不错,对你很有帮助-Classic permutation encryption algorithm, written in a very detailed annotation is also very good, very helpful for you
Platform: | Size: 101376 | Author: 小白 | Hits:

[VC/MFCColumnPermutation

Description: 列置换加密算法,用户自己定义密钥,输入明文进行加密;如果知道了密文和密钥,可以解密得到明文-Column permutation encryption algorithm, user-defined keys, enter the text is encrypted If you know the ciphertext and the key can be decrypted plaintext
Platform: | Size: 162816 | Author: 李承泽 | Hits:

[CA authcode

Description: 内涵有凯撒加密,移位加密,维吉利亚加密以及置换加密,全部都可以运行附带源码和实验报告-Connotation Caesar encryption, shift encryption, encryption and permutation encryption Virginia, all can run the report with source code and experimental
Platform: | Size: 521216 | Author: YY | Hits:

[Crack HackColumn-permutation-cipher

Description: 列置换加解密,带简单简单提示,C实现,密码学实验课内容-Column permutation encryption and decryption, simple and easy with tips, C implementation of the contents of the password Experiment Course
Platform: | Size: 159744 | Author: | Hits:

[Crack Hackcolumn-cipher

Description: 列置换加密算法的c程序事件,挺好的程序,相信大家能够满意-Column permutation encryption algorithm c program events, very good program, I believe we can be satisfied
Platform: | Size: 1024 | Author: job | Hits:

[Crack HackcolumEncry

Description: 列置换加密密码,源码,非图形化,c++写的-Column permutation encryption password, source, non-graphical, c++ to write
Platform: | Size: 1024 | Author: 郭威 | Hits:

[CA authPermutation-cipher

Description: C语言实现古典密码学中的列置换,自己原创,有详细注释,便于理解这个算法-Permutation cipher,C language operations can definitely run, help to understand and master the encryption algorithm
Platform: | Size: 1024 | Author: 陈天遥 | Hits:

[Crack HackColumn-permutation-cipher

Description: Column permutation cipher密码的加解密算法,c语言。-Column permutation cipher password encryption and decryption algorithm, c language.
Platform: | Size: 1024 | Author: bob | Hits:

[OtherIP-inverse-permutation

Description: 本代码是DES加密体系中的IP逆置换实现。目的在于打乱明文的ASCII码。-The code IP inverse permutation DES encryption system implementation. Aimed a disrupt plaintext ASCII code.
Platform: | Size: 1024 | Author: Daochao Xu | Hits:

[Crack Hackpermutation

Description: permutation image blocks encryption
Platform: | Size: 2048 | Author: sreedevi | Hits:

[Data structs凯撒密码

Description: 凯撒密码(caeser)是用于加密通过信使传递的作战命令。置换加密的优点就在于它易于实施却难于破解。发送方和接收方很容易事先商量好一个密钥,然后通过密钥从明文中生成密文,即使敌人获取密文,通过密文直接猜测其代表的意义,在实践中是不可能的。 在密码学中存在着各种各样的置换方式,但所有不同的置换方式都包含2个相同的元素:密钥和协议(算法)。凯撒密码的密钥是x,算法是将普通字母表中的字母用密钥对应的字母替换。(The Kaiser code (Caeser) is the operational command used to encrypt messages delivered by messenger. The advantage of permutation encryption is that it is easy to implement but difficult to break. The sender and receiver easily beforehand a key, and then through the key generation from the plaintext ciphertext, even if the enemy gets through the ciphertext ciphertext, directly guess the meaning, in practice is not possible. There are many kinds of permutations in cryptography, but all different permutations have 2 identical elements: key and protocol. The key to the Kaiser code is x. The algorithm replaces the letters in the ordinary alphabet with letters corresponding to the key.)
Platform: | Size: 799744 | Author: 寒修末 | Hits:

[Other归档

Description: 使用python实现置换加密算法的加密与解密(Realize encryption and decryption of permutation encryption algorithm)
Platform: | Size: 1024 | Author: carlw | Hits:
« 12 3 »

CodeBus www.codebus.net