CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - permutation encryption
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - permutation encryption - List
[
CA auth
]
code
DL : 0
内涵有凯撒加密,移位加密,维吉利亚加密以及置换加密,全部都可以运行附带源码和实验报告-Connotation Caesar encryption, shift encryption, encryption and permutation encryption Virginia, all can run the report with source code and experimental
Date
: 2025-12-17
Size
: 509kb
User
:
YY
[
CA auth
]
Permutation-cipher
DL : 0
C语言实现古典密码学中的列置换,自己原创,有详细注释,便于理解这个算法-Permutation cipher,C language operations can definitely run, help to understand and master the encryption algorithm
Date
: 2025-12-17
Size
: 1kb
User
:
陈天遥
[
CA auth
]
india
DL : 0
数字图像在现代生活中的应用日益广泛,在一些领域中 须关注其安全问题,例如,军事、医疗和商业图片通常需 进行保密传送。目前最佳的保密手段是采用加密算法。但 于图像的数据量通常较大,因此图像加密时间较长。研究 提出了各种图像加密技术,利用图像的各种性质进行加密 而提高加密速度[1]。现有图像加密技术可以分为空域图像 密技术、变换域图像加密技术和压缩编码图像加密技术。 文研究的图像加密算法属于空域图像加密技术。在文献[2] 出的自适应图像加密算法的基础上,本文给出一种改进的-Existing self-adaptive image encryption algorithm is resistant to known plaintext attacks and with high speed of single round encryption, but its security and speed of whole round encryption is low. This paper proposes a new fast image encryption algorithm based on self-adaptive permutation. This algorithm insures the simpleness and high efficiency of encryption operation, and changes the pixel distribution of encrypted image compared with that of original image. Experimental results show that this algorithm has better performance than other kindred algorithms. 【Key words】image encryption self-adaptive permutation cryptography
Date
: 2025-12-17
Size
: 13kb
User
:
wangc
[
CA auth
]
pailiema
DL : 0
n=4的排列码设计,可以实现文件的加密、解密。内附有明文,也可自行编写。-n = 4, the permutation code design, can achieve file encryption, decryption. Enclosed expressly, or write your own.
Date
: 2025-12-17
Size
: 19kb
User
:
zhudadi
[
CA auth
]
011
DL : 0
Known-Plain-text Attack Against a Permutation Based Video Encryption Algorithm
Date
: 2025-12-17
Size
: 183kb
User
:
hany
[
CA auth
]
transposition
DL : 0
In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed. Mathematically a bijective function is used on the characters positions to encrypt and an inverse function to decrypt.-In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed. Mathematically a bijective function is used on the characters positions to encrypt and an inverse function to decrypt.
Date
: 2025-12-17
Size
: 39kb
User
:
pradeep
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.