Welcome![Sign In][Sign Up]
Location:
Search - secret text

Search list

[File OperateVigenere加密器(TC版)

Description: 本程序在Tc3.0下编译通过,主要功能实现Vigenere加密解密算法。 使用方法: 0)退出。 1)加密: 根据提示先输入一个明文文件名(*.txt),再输入加密密钥,便可加密。 2)解密: 根据提示先输入欲解密密文的文件名(*.txt),再输入密钥,便可解密。-the procedures under the Tc3.0 compiler, the main function of achieving Vigenere encryption and decryption algorithms. Use : 0) withdrew. 1) encryption : When prompted to input an explicit document (*. txt), the further importation of encryption keys can be encrypted. 2) Material : When prompted to input the text wishes to declassified secret documents (*. txt), the admission of key can be decrypted.
Platform: | Size: 17298 | Author: | Hits:

[Crack Hack3des源代码

Description: 根据设计要求:1)具有文件加密和解密功能;2)具有加解密速度统计功能;3)采用密文反馈链接和密文挪用短块处理技术。我们可以知道,程序要有加密模块、解密模块、子密钥生成模块,这三个模块构成DES算法。DES算法再构成3DES,这很简单,只要加个密钥便可实现。3DES还必须工作在密文反馈连接模式下和使用密文短块挪用技术。至于速度统计功能就很好实现,用文件长度除以处理时间便是加解密速度。-based on the design requirements : 1) with file encryption and decryption function; 2) the speed with the encryption and decryption functions of statistics; 3) Use of dense text links and feedback secret misappropriation short pieces of text processing technology. We know that procedures have encryption module, decryption modules for key generating modules, which constitute three modules DES algorithm. DES algorithm constitute 3DES, this is very simple, as long as add key can be reached. 3DES must also work in close link text feedback mode and the use of short text block secret misappropriation of technology. As for the speed of statistical functions properly achieved, divided by the length of documents with the processing time is the speed encryption and decryption.
Platform: | Size: 14763 | Author: 杨巍 | Hits:

[Crack HackHillCodor

Description: 在VC环境下采用希尔密码体制加密、解密和破译。该软件实现了输入任意长度的密钥对文件进行加密和解密,解密密钥和密文保存在文件中。如果有完整的明文和对应的密文可是实现破译功能,即得出加密密钥。-in VC environment with Hill cryptosystem encryption, decryption and decoding. The software arbitrary length of the input to the key document encryption and decryption, and the decryption key secret to preserve the text in the document. If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.
Platform: | Size: 42819 | Author: | Hits:

[Crack HackranEncode

Description: 随即加密算法,加密解密使用同一个函数,密文长度不改变。可以用在网页或程序中。-immediately encryption algorithms, encryption and decryption using the same function, the secret does not change the length of the text. The website can be used or procedures.
Platform: | Size: 1609 | Author: 黄冠 | Hits:

[Crack HackCDes_standard

Description: 该程序实现单层的DES加密算法,其中CDes.cpp为源程序,其中调用的文件功能如下:dataofText.txt文件是输入的明文,以换行分割各个数据;dataofKey.txt文件时输入的密钥,以换行分割;dataofDES.txt文件是输出的加密数据,其中包括各轮子密钥以及各轮加密输出,以及最后得到的密文,在文件中都有说明。-the realization of the single DES encryption algorithm, which CDes.cpp to source files, Calling the document which functions as follows : dataofText.txt document is imported specifically, in exchange for various bits of data; dataofKey.txt paper input key to change bits; dataofDES.txt document is the output data encryption, including the wheels round and the key encryption exports, and finally the secret text in the document have been described.
Platform: | Size: 10730 | Author: 李文 | Hits:

[JSP/Javacodesystemunderjava

Description: 本设计基本上能够实现了课题的要求,能够实现对恺撒的密文进行很顺利的解密,不会对密文存在太多的要求和限制。唯一不足的地方是在代入法上还不够稳定。-this design is basically a task to achieve the requirements to achieve the right Caesar secret text of a declassified very smoothly, ciphertext not there are too many demands and constraints. The only deficiencies in the law on behalf of income is not enough stability.
Platform: | Size: 4435588 | Author: 陈守勇 | Hits:

[ExploitxkziArticle

Description: 采用PHP+Access数据库实现,体积小,功能大,可以复制到其他任何支持PHP环境的计算机上直接使用。留言本功能: 1、设置留言是否审核后显示功能 2、秘密留言只有管理员可见功能 3、留言本换肤功能(系统提供三套皮肤,可自己修改) 4、留言本宽度自定义功能 5、留言分页列表的显示条数设定功能 6、设置留言时是否使用心情图标功能 7、自由设定留言内容为纯文本或使用多功能编辑进行图文留言功能 8、后台可修改留言本名称,搜索关键字等功能 9、修改管理员帐号或密码功能 管理员用户名为admin 密码为admin PHP多功能编辑器商业版的后台为http://你的网址/留言本目录/editor/admin/login.php 默认编辑器后台管理员名为admin 密码为admin888 -using PHP Access database, small size, function, can be copied to any other supported PHP environment on a computer directly. The voice mail function : one set up voice mail audit revealed two functions, secret messages only three functional managers can see, The message skinnable (three sets of skin system, their amendments) 4, the width of the voice-defined function 5, voice paging list shows the number of six functional set, set up voice mail when the use of functional heart icon 7, free to set up voice mail for the content or use text editors for multifunction facsimile messages functional 8, background can modify the voice of the name, the keyword search function 9. changes administrator account or password function called admin user and password for the admin multifunctional PHP Edit
Platform: | Size: 2097063 | Author: 于鸣 | Hits:

[Other resource123

Description: 还有一个缺陷就是在只知道密文 x 及公钥(n,e)的情况下,只要将 (x^e) mod n 所得余数 s 再不断地循环操作 s = s^e mod n,此运算不断地循环 e 次之后,很多情况下都可以循环出原文,只是计算量过余多一些罢了。不过有不少情况下,根本都无须循环 e 次,不过对于1024位的 n 级别来说,e 也是一个相当大的数值,所以循环密文的余数以解得原文是有些不现实。 以上内容仅供参考,如有不实,请予更正-there is a defect in only know that the secret and public key-x (n, e) the circumstances, as long as (x ^ e) mod n from the remaining s to continuously cycle operation s = s ^ e mod n, this constant cycle of Operational e occasion, the very many circumstances can be recycled from the original, but I calculated the volume more than just. There are, however, many instances, simply do not need e cycle times, but for 1024 the level n, e is a very large figure, so secret circle the remainder of the text was obtained in the original is a bit unrealistic. The above is for reference only, if not true, I corrected
Platform: | Size: 14689 | Author: 行通知 | Hits:

[Crack HackRSA加长分段解密

Description: RSA加长分段解密算法,界面操作。算法步骤如下:1. 读取私钥d和n,作解密之用。 2. 从EncText中读取一大段密文,再把该大段密文分成若干小段密文。 3. 使用d和n把所有小段密文进行解密成对应的小段密文sectByte[],再合成一大段明文字节数组Byte[],并转化成大段明文添加到DecText。 4. 读取下一大段密文,若密文为空,完成解密;否则转2-RSA decryption algorithm lengthened section, the interface operation. Algorithm steps are as follows : 1. Read private key d and n, used for decryption. 2. EncText from reading a big secret of the text, and then the big secret of the text is divided into a number of subparagraphs ciphertext. 3. The use of d and n all subparagraph declassified secret text into corresponding sections ciphertext sectByte [], then synthesis of a large expressly byte array Byte [], and conversion of the university to express DecText added. 4. The next major reading of dense text, if ciphertext empty, completed decryption; Otherwise turn 2
Platform: | Size: 33550 | Author: 何泽荣 | Hits:

[Crack HackRSA加长分段解密

Description: RSA加长分段解密算法,界面操作。算法步骤如下:1. 读取私钥d和n,作解密之用。 2. 从EncText中读取一大段密文,再把该大段密文分成若干小段密文。 3. 使用d和n把所有小段密文进行解密成对应的小段密文sectByte[],再合成一大段明文字节数组Byte[],并转化成大段明文添加到DecText。 4. 读取下一大段密文,若密文为空,完成解密;否则转2-RSA decryption algorithm lengthened section, the interface operation. Algorithm steps are as follows : 1. Read private key d and n, used for decryption. 2. EncText from reading a big secret of the text, and then the big secret of the text is divided into a number of subparagraphs ciphertext. 3. The use of d and n all subparagraph declassified secret text into corresponding sections ciphertext sectByte [], then synthesis of a large expressly byte array Byte [], and conversion of the university to express DecText added. 4. The next major reading of dense text, if ciphertext empty, completed decryption; Otherwise turn 2
Platform: | Size: 33792 | Author: 何泽荣 | Hits:

[Crack HackCDes_standard

Description: 该程序实现单层的DES加密算法,其中CDes.cpp为源程序,其中调用的文件功能如下:dataofText.txt文件是输入的明文,以换行分割各个数据;dataofKey.txt文件时输入的密钥,以换行分割;dataofDES.txt文件是输出的加密数据,其中包括各轮子密钥以及各轮加密输出,以及最后得到的密文,在文件中都有说明。-the realization of the single DES encryption algorithm, which CDes.cpp to source files, Calling the document which functions as follows : dataofText.txt document is imported specifically, in exchange for various bits of data; dataofKey.txt paper input key to change bits; dataofDES.txt document is the output data encryption, including the wheels round and the key encryption exports, and finally the secret text in the document have been described.
Platform: | Size: 185344 | Author: 李文 | Hits:

[JSP/Javacodesystemunderjava

Description: 本设计基本上能够实现了课题的要求,能够实现对恺撒的密文进行很顺利的解密,不会对密文存在太多的要求和限制。唯一不足的地方是在代入法上还不够稳定。-this design is basically a task to achieve the requirements to achieve the right Caesar secret text of a declassified very smoothly, ciphertext not there are too many demands and constraints. The only deficiencies in the law on behalf of income is not enough stability.
Platform: | Size: 4434944 | Author: 陈守勇 | Hits:

[Special Effectslsbhide

Description: 实现信息的隐藏,将文本信息隐藏在BMP位图中,实现了信息的隐秘传输和数字水印-Realize the hidden information, the text information hidden in Bitmap BMP, the realization of the secret transmission of information and digital watermark
Platform: | Size: 1024 | Author: 王春辉 | Hits:

[Linux-Unixsecret

Description: pass.words是弱口令字典,是一个纯文本文件,每行一个口令,可以向里面添加候选口令。 pass.c是进行口令检查的c语言原程序,有两个命令行参数 -w file: 可以使用该选项指定口令字典 -P:默认情况下对/etc/shadow中的用户检查弱口令,可以使用该选项指定检查的文件 编译gcc –o pass pass.c –l crypt 由于要使用加密函数,所以要使用加密库crypt,使用选项-l crypt 运行程序:pass –w ./pass.words –p /etc/shadow -pass.words is a weak password dictionary, is a plain text file, one per line password, you can add to the inside candidate password. Password pass.c is the c language of the original inspection procedures, there are two command-line parameters-w file: You can use the password option specifies a dictionary-P: By default on/etc/shadow user to check the weak password, you can use the option to specify the documents to check the compiler gcc-o pass pass.c-l crypt function due to the use of encryption, so the use of encryption library crypt, use the option-l crypt running the program: pass-w./pass.words-- p/etc/shadow
Platform: | Size: 7168 | Author: 莫松成 | Hits:

[Windows Developsteganography

Description: A steganograghic usfull and incripted tool for hiding critical secret information -text files inside a bitmap images.-A steganograghic usfull and incripted tool for hiding critical secret information-text files inside a bitmap images.
Platform: | Size: 259072 | Author: Tarik | Hits:

[Dialog_Windowsecret

Description: 简单的密码加密程序 含有midi窗口 文计作业-Simple password encryption program window contains the text of dollars operating midi
Platform: | Size: 307200 | Author: 骆落 | Hits:

[matlabHidinginformationinbinaryimage

Description: 基于隐藏密钥可以,将秘密信息msg嵌入到二值载体图像cover,算法简单,主要适合于将密文隐藏在BMP格式的文档里。-Key can be based on hidden, secret information will be embedded into the binary vector msg image cover, simple algorithm, mainly for the cipher text hidden in the BMP format documentation.
Platform: | Size: 4096 | Author: sqt | Hits:

[Crack HackVernamCipher

Description: To encrypt plain text using vernam cipher method, user will need to input their own key in the my key text field. also can change front color of the interfaces. a very simple program using java to encrypt plain text into secret text.
Platform: | Size: 20480 | Author: tani89 | Hits:

[CSharpsecret

Description: 本资料主要实现了文字图像的加解密,主要应用的算法有五种,分别是DES,AES,RSA,ECC,MD5,其中椭圆离散曲线加密算法较难。-This information is mainly to achieve the text image encryption and decryption, mainly used the algorithm has five, respectively is the DES, AES, RSA, ECC, MD5, which discrete elliptic curve encryption algorithm is more difficult.
Platform: | Size: 133120 | Author: 贺魄 | Hits:

[EditorLSB_with_blue

Description: Stegnography the practice of concealing messages or information within other non-secret text or data.
Platform: | Size: 1024 | Author: Rida Zojaj Naeem | Hits:
« 12 3 »

CodeBus www.codebus.net