CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - decrypt md5
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - decrypt md5 - List
[
Crack Hack
]
linux-MD5
DL : 0
毕业设计,md5在linux下的性能测试,加了linux下的时间测试函数!当然也可以加密解密!-graduation design, md5 linux in the performance tests, the increase of time under linux test function! Of course, we can decrypt encrypted!
Date
: 2008-10-13
Size
: 8.72kb
User
:
linchun
[
Crack Hack
]
300_encrypt
DL : 0
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives : - To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output - To share a file into shadows : cryptest's
Date
: 2008-10-13
Size
: 379.94kb
User
:
Nikii
[
Crack Hack
]
hMacSha1
DL : 0
软件实现SHA1的HMAC算法,因为MD5已经被破解,所以就直接不上传了-software SHA1 the HMAC algorithms, as MD5 has been solved, so they do not directly uploaded
Date
: 2025-12-26
Size
: 3kb
User
:
高志权
[
Crack Hack
]
linux-MD5
DL : 0
毕业设计,md5在linux下的性能测试,加了linux下的时间测试函数!当然也可以加密解密!-graduation design, md5 linux in the performance tests, the increase of time under linux test function! Of course, we can decrypt encrypted!
Date
: 2025-12-26
Size
: 8kb
User
:
linchun
[
Crack Hack
]
300_encrypt
DL : 0
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives :- To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output- To share a file into shadows : cryptest's
Date
: 2025-12-26
Size
: 380kb
User
:
Nikii
[
Crack Hack
]
MD5tool
DL : 0
MD5信息摘要计算工具 如果对较大的文件进行MD5计算,会自动出现计算进度条, 目前的缺陷是对CPU占用过高,请有识之士修改之,并发 给我一份,非常感谢!-MD5 message digest calculation tool for larger if the paper MD5, will automatically calculate the progress of the current shortcomings of high CPU utilization, insight revisions, and give me a copy, very grateful!
Date
: 2025-12-26
Size
: 57kb
User
:
zhangshijie
[
Crack Hack
]
jjm
DL : 0
帮助开发出来的程序加密和解密!采用MD5算法,即时数据库中被人盗窃,也不能得到用户登录密码-Developed procedures to help encrypt and decrypt! Using MD5 algorithm, real-time database which has been stolen, nor can the user login password
Date
: 2025-12-26
Size
: 2kb
User
:
111111
[
Crack Hack
]
md5
DL : 0
md5加解密 System.out.println("解密后的二进串:" + byte2hex(clearByte)+"\n") System.out.println("解密后的字符串:" + (new String(clearByte))+"\n") -md5 encryption System.out.println (decrypted binary string:+ byte2hex (clearByte)+) System.out.println (decrypt string:+ (new String (clearByte))+)
Date
: 2025-12-26
Size
: 2kb
User
:
jing
[
Crack Hack
]
MD5andKL
DL : 0
此文件上传的主要原因是他能够加密解密MD5-The file is mainly due to he was able to decrypt MD5 encryption
Date
: 2025-12-26
Size
: 1kb
User
:
newchq
[
Crack Hack
]
MD5
DL : 0
使用MD5算法对指定TXT文档内的内容进行加密。可反向进行解密。-MD5 algorithm used within the specified TXT encrypt the contents of the document. Can decrypt the reverse.
Date
: 2025-12-26
Size
: 13.74mb
User
:
yichaosun
[
Crack Hack
]
c-md5
DL : 0
数据加密的基本过程就是对原来为明文的文件或数据按某种算法进行处理,使其成为不可读的一段代码,通常称为“密文”,使其只能在输入相应的密钥之后才能显示出本来内容,通过这样的途径来达到保护数据不被非法人窃取、阅读的目的。 该过程的逆过程为解密,即将该编码信息转化为其原来数据的过程。 是MD5算法设计 -The basic process of data encryption is to express the original documents or data processed by an algorithm, making it unreadable piece of code, commonly referred to as " ciphertext" , it can only be entered only after the corresponding key show original content, through such ways to protect data from unauthorized people to steal, the purpose of reading. The inverse process to decrypt, encode information about the process of transforming its original data. MD5 algorithm is designed
Date
: 2025-12-26
Size
: 2kb
User
:
jason
[
Crack Hack
]
MD5
DL : 0
使用MD5算法的一个文件加密和解密系统。-MD5 algorithm used to encrypt and decrypt a file system.
Date
: 2025-12-26
Size
: 351kb
User
:
熊煜然
[
Crack Hack
]
3ec3cba
DL : 0
MD5提供基本加密设施为lua5.1:一个哈希(摘要) 功能,对隐窝/解密基于MD5和CFB,和一对隐窝/解密 对DES使用56位密钥。-MD5 offers basic cryptographic facilities for Lua 5.1: a hash (digest) function, a pair crypt/decrypt based on MD5 and CFB, and a pair crypt/decrypt based on DES with 56-bit keys.
Date
: 2025-12-26
Size
: 40kb
User
:
wangbo
[
Crack Hack
]
MD5
DL : 0
MD5加密解密工具,新出现的MD5值自动加到数据库,本地找不到继续到网络上找,网络上找不到就生成新的Md5比对。-The MD5 encrypts to decrypt tool, lately- appeared MD5 valueses automatically add a database, local can not find to continue to seek in the network, can not find born new Md5 to compare a rightness on the network.
Date
: 2025-12-26
Size
: 21kb
User
:
黄福龙
[
Crack Hack
]
jiami
DL : 0
采用DES/MD5算法,多线程同时加密,支持解密,可移植,可匿名或者注册用户(保留加密记录)登录。-use DES/MD5 arithmetic,multithreads encrypt and decrypt,can copy and remove from one pc to another,can anonymity login or register login(save the encrypt records)
Date
: 2025-12-26
Size
: 142kb
User
:
飞鹰
[
Crack Hack
]
clsMD5
DL : 0
一个可以把字符串用MD5加密,并解密的应用类-MDB Concrypt And Decrypt
Date
: 2025-12-26
Size
: 1kb
User
:
杨小铮
[
Crack Hack
]
javaencode
DL : 0
Java加密技术 pdf版,内容介绍BASE64、MD5、SHA、HMAC几种方法,主要描述Java已经实现的一些加密解密算法,最后介绍数字证书。-Java encryption technology PDF version, introduction BASE64, MD5, SHA, HMAC several methods, describes some of the Java has achieved encrypt, decrypt algorithm, and finally in the digital certificate.
Date
: 2025-12-26
Size
: 597kb
User
:
spacebroke
[
Crack Hack
]
md5
DL : 0
MD5 Crypt/Decrypt Algorithm. Written in C++.
Date
: 2025-12-26
Size
: 5kb
User
:
Ermin
[
Crack Hack
]
md5a
DL : 0
MD5的加解密程序。能够加解密文档,是学习秘密学和c语言的比较好的范例。-The MD5 encryption and decryption process. Be able to encrypt and decrypt documents, is a good example to learn the secret science and c language.
Date
: 2025-12-26
Size
: 4kb
User
:
muxiuxiu
[
Crack Hack
]
MD5-Encryption-Algorithm-VCPP
DL : 0
MD5是一个安全的散列算法,输入两个不同的明文不会得到相同的输出值,根据输出值,不能得到原始的明文,即其过程不可逆;所以要解密MD5没有现成的算法,只能用穷举法,把可能出现的明文,用MD5算法散列之后,把得到的散列值和原始的数据形成一个一对一的映射表,通过比在表中比破解密码的MD5算法散列值,通过匹配从映射表中找出破解密码所对应的原始明文。 对信息系统或者网站系统来说,MD5算法主要用在用户注册口令的加密,对于普通强度的口令加密,可以通过以下三种方式进行破解: (1)在线查询密码。一些在线的MD5值查询网站提供MD5密码值的查询,输入MD5密码值后,如果在数据库中存在,那么可以很快获取其密码值。 (2)使用MD5破解工具。网络上有许多针对MD5破解的专用软件,通过设置字典来进行破解。 (3)通过社会工程学来获取或者重新设置用户的口令。 因此简单的MD5加密是没有办法达到绝对的安全的,因为普通的MD5加密有多种暴力破解方式,因此如果想要保证信息系统或者网站的安全,需要对MD5进行改造,增强其安全性,本文就是在MD5加密算法的基础上进行改进! -MD5 is a secure hash algorithm, the two different input plaintext will not get the same output values can not be obtained based on the output value of the original plaintext, i.e. the process is not reversible so is not ready to decrypt MD5 algorithm which can be usedbrute-force method, the plaintext may occur, after the hash with the MD5 algorithm, the resulting hash value and the original data to form a one-to-one mapping table, cracks than the ratio in the table algorithm MD5 hash value of the passwordmatch from the mapping table to find crack the code corresponding to the original plaintext. Information system or site system, the MD5 algorithm is mainly used in the user registered password encryption, password encryption for ordinary strength, can crack through the following three ways: (1) for the codes. The MD5 value of some online website the the MD5 password value query input MD5 password value, exists in the database, you can quickly obtain the password va
Date
: 2025-12-26
Size
: 268kb
User
:
Johnson
«
1
2
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.