CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - permutation encryption
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - permutation encryption - List
[
Crack Hack
]
ywmm
DL : 0
一个简单的移位密码算法程序,可以实现移位加密和解密的功能,-A simple transposition cipher procedures, can shift realize encryption and decryption functions,
Date
: 2025-12-17
Size
: 262kb
User
:
王功臣
[
Crack Hack
]
Permutation
DL : 0
Column permutation cipher是基于置换的加密解密方式。利用本程序可实现Column permutation cipher的加密和解密。 -Column permutation cipher is based on the replacement of the encryption and decryption methods. This procedure can be realized using Column permutation cipher encryption and decryption.
Date
: 2025-12-17
Size
: 325kb
User
:
马茜
[
Crack Hack
]
zhihuan
DL : 0
置换密码算法的原理是不改变明文字符,只将字符在明文中的排列顺序改变,从而实现明文信息的加密。置换密码也叫换位密码。试编程实现矩阵换位密码。它的加密方法是将明文中的字母按照给定的顺序安排在一个矩阵中,然后用根据密钥提供的顺序重新组合矩阵中的字母,形成密文。-Permutation cipher does not change the principle is expressly characters, only characters in the explicit change in order to achieve explicit information encryption. Password replacement is also called transposition password. Programming test matrix transposition password. Its encryption method is to express the letter in accordance with the order given in a matrix, and then use the key provided in accordance with the order re-arrangement of the letters in the matrix to form a ciphertext.
Date
: 2025-12-17
Size
: 1kb
User
:
rose
[
Crack Hack
]
Permutation
DL : 0
经典密码学中列置换密码的实现 此为字符串版本的加解密实现 开发平台为VC6.0-Classical Cryptography replacement passwords out to achieve this for the string version of the encryption and decryption realize development platform for VC6.0
Date
: 2025-12-17
Size
: 8kb
User
:
薛智虎
[
Crack Hack
]
JavaApp-SSA
DL : 0
Java Application for testing Encryption/Decryption of several algorithms: Ceaar, Vigenere, a custom make alg (key + permutation of elements)-Java Application for testing Encryption/Decryption of several algorithms: Ceaar, Vigenere, a custom make alg (key+ permutation of elements)
Date
: 2025-12-17
Size
: 31kb
User
:
johnny
[
Crack Hack
]
MyCAP
DL : 0
使用viginear,column permutation,DES加密和解密-The use of viginear, column permutation, DES encryption and decryption
Date
: 2025-12-17
Size
: 56kb
User
:
lyq
[
Crack Hack
]
Cryptology
DL : 0
自己编写的加解密程序、包括凯撒、Vigenere、Permutation、DES、RC4、Playfair、RSA、DF密钥交换等密码的实现与演示。值得学习密码和做该方面实践的同学一看。-Prepared their own encryption and decryption procedures, including Caesar, Vigenere, Permutation, DES, RC4, Playfair, RSA, DF, such as password key exchange with the presentation. Password and do learn the practice of the aspects of the students have a look.
Date
: 2025-12-17
Size
: 4.15mb
User
:
小余
[
Crack Hack
]
DES
DL : 0
DES完整的加解密算法,使用C语言实现,经过测试,可以运行。 明文分组长64比特。有效主密钥长56比特,根据密钥生成算法,由主密钥生成16个48比特的子密钥。 该算法共16轮,每轮使用一个子密钥。 在进行16轮加密之前,先对明文做一个初始置换IP。 每一轮加密的轮函数f为: . 在16轮加密之后,对比特串L16R16换位为R16 L16,做逆置换IP-1,从而得到密文C。 -DES encryption algorithm is complete, use the C language, has been tested, you can run. 64-bit plaintext sub-head. Effective length 56-bit master key, according to the key generation algorithm, the master key generation sub-16 48-bit keys. A total of 16 rounds of the algorithm, each round using a sub-key. During 16 rounds of encryption before doing an initial replacement of the clear IP. Each round of encryption round function f as:. In 16, after encryption, the bit string L16R16 transposition for the R16 L16, do inverse permutation IP-1, to obtain ciphertext C.
Date
: 2025-12-17
Size
: 4kb
User
:
曹云青
[
Crack Hack
]
DES
DL : 0
This particular algorithm is a brute force attack on the popular DES Encryption standard. The DES algorithm consists of 4 main classes which will be briefly discussed -The first class takes into consideration the assumption that the in the inputs are in hex format. Therefore a method was created to convert the hex into binary so that it could be easily permuted. -The second class takes the converted binary input and passes it through a variety of member permutation functions. -The next class also known as the key class handles operations on keys that have not been permuted. -The S-box functionality is provided by the last class.
Date
: 2025-12-17
Size
: 9kb
User
:
RobT
[
Crack Hack
]
cipher
DL : 0
用于实现各种古典加密法,包括凯撒,置换,列置换,仿射加密法,vigenere加密法和现代加密法中的DH密钥交换,RSA,DES加密法等等操作-Used to implement a variety of classical cryptography, including Julius Caesar, replacement, column permutation, affine cipher, vigenere encryption method and encryption method in modern DH key exchange, RSA, DES encryption, and so operation
Date
: 2025-12-17
Size
: 5.21mb
User
:
于鑫
[
Crack Hack
]
PermutatioCipher
DL : 0
置换密码(permutation cipher)加密和解密算法,对英文文章中小写字母加密,输入中文将出错,接受到密文的一方,只有知道密钥句子才能解密。-Replacement password (permutation cipher) encryption and decryption algorithms, written in English letters encryption small article, enter the Chinese will go wrong, the party received ciphertext, only know the key to decrypt the sentence.
Date
: 2025-12-17
Size
: 2kb
User
:
小杨
[
Crack Hack
]
Cryptography
DL : 0
多种加密方法:autokey、Column permutation、des、kaisa、playfire、vigenere。还包括加解密方法。-A variety of encryption methods: autokey, Column permutation, des, kaisa, playfire, vigenere. Also includes encryption and decryption methods.
Date
: 2025-12-17
Size
: 7kb
User
:
张涛
[
Crack Hack
]
Column-permutation-cipher
DL : 0
列置换加解密,带简单简单提示,C实现,密码学实验课内容-Column permutation encryption and decryption, simple and easy with tips, C implementation of the contents of the password Experiment Course
Date
: 2025-12-17
Size
: 156kb
User
:
刘
[
Crack Hack
]
column-cipher
DL : 0
列置换加密算法的c程序事件,挺好的程序,相信大家能够满意-Column permutation encryption algorithm c program events, very good program, I believe we can be satisfied
Date
: 2025-12-17
Size
: 1kb
User
:
job
[
Crack Hack
]
zhihuanjiami
DL : 0
置换密码亦称换位密码。置换只不过是一个简单的换位。每个置换都可以用一个置换矩阵 来表示。每个置换都有一个与之对应的逆置换 。置换密码的特点是仅有一个发送方和接收方知道的加密置换(用于加密)和对应的逆置换(用于解密)。它是对明文 长字母组中的字母位置进行重新排列,而每个字母本身并不改变。-Password replacement, also known as transposition cipher. Replacement is just a simple transposition. Each permutation can be represented by a permutation matrix. Each exchange has a corresponding inverse permutation. Replacement of the password feature is only one sender and receiver know the encryption permutation (for encryption) and the corresponding inverse permutation (for decryption). It is a long letter of the plaintext letters in the group re-arranged location, and each letter in itself does not change.
Date
: 2025-12-17
Size
: 1kb
User
:
张华
[
Crack Hack
]
columEncry
DL : 0
列置换加密密码,源码,非图形化,c++写的-Column permutation encryption password, source, non-graphical, c++ to write
Date
: 2025-12-17
Size
: 1kb
User
:
郭威
[
Crack Hack
]
cmpe47104-2003
DL : 0
In 1974, IBM proposed "Lucifer", an encryption algorithm that uses 64-bit keys. Two years later, NBS (in consultation with NSA) made a modified version of that algorithm into a standard. DES takes in 64 bits of data, employs a 56-bit key, and executes 16 cycles of substitution and permutation before outputting 64 bits of encrypted data
Date
: 2025-12-17
Size
: 9kb
User
:
vipi
[
Crack Hack
]
RIJNDAEL_Final
DL : 0
In 1974, IBM proposed "Lucifer", an encryption algorithm that uses 64-bit keys. Two years later, NBS (in consultation with NSA) made a modified version of that algorithm into a standard. DES takes in 64 bits of data, employs a 56-bit key, and executes 16 cycles of substitution and permutation before outputting 64 bits of encrypted data
Date
: 2025-12-17
Size
: 25kb
User
:
vipi
[
Crack Hack
]
Column-permutation-cipher
DL : 0
Column permutation cipher密码的加解密算法,c语言。-Column permutation cipher password encryption and decryption algorithm, c language.
Date
: 2025-12-17
Size
: 1kb
User
:
bob
[
Crack Hack
]
permutation
DL : 0
permutation image blocks encryption
Date
: 2025-12-17
Size
: 2kb
User
:
sreedevi
«
1
2
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.