Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - one time key encryption
Search - one time key encryption - List
DL : 0
This file contains a C++Builder 4 project called SimplyChaos-X ver 3.1 (SCX31). SCX31 is an encryption tool. I designed it as my graduation paper work. SCX31 is a symmetric stream cipher built on chaos function, one time pad cipher and inspiration from Ground Effect (aviation). The key length can be up to 40 characters (320 bits).
Date : 2008-10-13 Size : 22.79kb User : 范杰

DL : 0
用C语言写的100行DES加密算法. DES算法具有极高安全性,到目前为止,除了用穷举搜索法对DES算法进行攻击外,还没有发现更有效的办法。而56位长的密钥的穷举空间为256,这意味着如果一台计算机的速度是每一秒种检测一百万个密钥,则它搜索完全部密钥就需要将近2285年的时间,可见,这是难以实现的,当然,随着科学技术的发展,当出现超高速计算机后,我们可考虑把DES密钥的长度再增长一些,以此来达到更高的保密程度。-Using C language to write 100 lines of the DES encryption algorithm. DES algorithm has high security, so far, except by exhaustive search attack on the DES algorithm, but also found no more effective way. And 56 long exhaustive key space for the 256, which means that if a computer s speed is detected every second of one million keys, it searches entirely on the needs of key Department of nearly 2285 time can be seen, it is difficult to realize, of course, with the development of science and technology, when the emergence of ultra-high-speed computer, we can consider the DES key length and then some growth in order to achieve higher levels of security.
Date : 2025-12-21 Size : 7kb User : JohnBill

DL : 0
This file contains a C++Builder 4 project called SimplyChaos-X ver 3.1 (SCX31). SCX31 is an encryption tool. I designed it as my graduation paper work. SCX31 is a symmetric stream cipher built on chaos function, one time pad cipher and inspiration from Ground Effect (aviation). The key length can be up to 40 characters (320 bits).
Date : 2025-12-21 Size : 24kb User : 范杰

DL : 0
算法流程 1.将要处理的二进制串进行IP置换 2.将密钥进行PC1置换(64位转为56位), 3.进行16轮操作,对于第i轮操作: 1)将上一次得到的PC1密钥(级除去第一次外,其他的都经过移位处理)的结果左右部分(各28位)分别循环左移1位或2位,然后将移位后的密钥进行PC2[i]置换. 2)将处理串均等分为左右两串Li,Ri(各32位),然后将右串Ri通过E盒拓展为新的右串R (48位),R 与上一步得到的PC2[i]子密钥进行异或操作,结果通过S盒输出(48为转为32位),然后通过P盒直接置换,再与Li异或. 3)将Ri赋给作出Li,R 赋值给Ri. 4)合并处理串StrText=Li+Ri. 4.将最新的处理串进行IP_1置换,置换结果即为所求的加密串或解密串 加密解密的区别 在每轮操作中,加密使用的PC2密钥顺序为0~15,解密使用的PC2密钥顺序为15~0. -Algorithm flow A binary string to be processed is substituted for IP 2 key the PC1 replacement (64 into 56) 16 operation, the operation for the i-th round: 1) about the results of the last PC1 key (remove the first time, the others have been shifting processing) (28) rotate left one or two, and then will shift key PC2 [i] replacement. 2) is divided into the equal treatment string around two bunches of Li, Ri (32), and then expand the right string Ri E box (48-bit), the right string R R​ ​ and the previous step PC2 i] subkey XOR operation result is output via the S-box (48 to 32 conversion), and then directly through the P box replacement and XOR with Li. 3) the Ri to make Li, R is assigned to Ri. 4) merger deal with string StrText Ri = Li+. 4. Latest processing string IP_1 replacement, replacement results shall request string encryption or decryption string Encryption and decryption of difference In each round of operations, PC2 key e
Date : 2025-12-21 Size : 2kb User : zhusiyi

文件加密和解密使用基于密码的加密 (PBE)。 基于密码的加密 (PBE) 从密码派生的加密密钥。为了使从获取的密码密钥非常耗费时间的攻击任务,大多数 PBE 实现 (作为一个如下所示) 将混合在一个随机数称为盐,以创建密钥。,File Encryption and Decryption using Password Based Encryption (PBE). Password-Based Encryption (PBE) derives an encryption key from a password. In order to make the task of getting from password to key very time-consuming for an attacker, most PBE implementations (as the one shown below) will mix in a random number, known as a salt, to create the key.
Date : 2025-12-21 Size : 69kb User : xiaocai

By EldoS Corporation. CryptoBlackbox package of SecureBlackbox is a free collection of components and classes that offer wide range of both basic and sophisticated cryptography functions. This includes: symmetric and asymmetric (PKI-based) cryptography one-time password generation, cryptographic hashes and key derivation functions X.509 certificate management and validation certificate-based data encryption/decryption, signing and signature validation, timestamping TSP and OCSP clients.
Date : 2025-12-21 Size : 1.33mb User : Rafael

DL : 0
RSA算法是第一个能同时用于加密和数字签名的算法,也易于理解和操作。RSA是被研究得最广泛的公钥算法,从提出到现在已近二十年,经历了各种攻击的考验,逐渐为人们接受,普遍认为是目前最优秀的公钥方案之一(The RSA algorithm is the first algorithm that can be used for both encryption and digital signature at the same time. It is also easy to understand and operate. RSA is the most widely researched public key algorithm. It has been nearly twenty years since it was put forward. It has been tested by various kinds of attacks and gradually accepted by people. It is generally considered to be one of the best public key schemes at present. The security of RSA depends on the factor decomposition of large numbers, but it does not theoretically prove that the difficulty of breaking the RSA is equivalent to the difficulty of the large number decomposition.)
Date : 2025-12-21 Size : 190kb User : 木南花开
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.