Welcome![Sign In][Sign Up]
Location:
Search - 3 DES

Search list

[Crack HackSessionKey_src

Description: 使用crypt api创建一个会话密钥。 在这个例子中使用了一个168位的3DES key-use crypt api to create a session key. In this example the use of a 168 DES key 3
Platform: | Size: 3199 | Author: none | Hits:

[Crack Hack3des源代码

Description: 根据设计要求:1)具有文件加密和解密功能;2)具有加解密速度统计功能;3)采用密文反馈链接和密文挪用短块处理技术。我们可以知道,程序要有加密模块、解密模块、子密钥生成模块,这三个模块构成DES算法。DES算法再构成3DES,这很简单,只要加个密钥便可实现。3DES还必须工作在密文反馈连接模式下和使用密文短块挪用技术。至于速度统计功能就很好实现,用文件长度除以处理时间便是加解密速度。-based on the design requirements : 1) with file encryption and decryption function; 2) the speed with the encryption and decryption functions of statistics; 3) Use of dense text links and feedback secret misappropriation short pieces of text processing technology. We know that procedures have encryption module, decryption modules for key generating modules, which constitute three modules DES algorithm. DES algorithm constitute 3DES, this is very simple, as long as add key can be reached. 3DES must also work in close link text feedback mode and the use of short text block secret misappropriation of technology. As for the speed of statistical functions properly achieved, divided by the length of documents with the processing time is the speed encryption and decryption.
Platform: | Size: 14763 | Author: 杨巍 | Hits:

[TreeViewVirtualTreeview

Description: VirtualTreeviewVirtual Treeview is a treeview control built from ground up. More than 3 years of development made it one of the most flexible and advanced tree controls available today. Virtual Treeview starts off with the claim to improve many aspects of exisiting solutions and introduces some new technologies and priniciples which were not available before. As the name already indicates, this control uses a different paradigm for tree management than other controls of this kind. It does not know anything about the data it manages (except its size), not even the captions of a node. Everything is retrieved from the application via events (or descentants via overridden methods). Virtual Treeview has been carefully designed and thoroughly tested. The control proved its concept as well as everyday fitness already in many commercial products and freeware projects.-VirtualTreeviewVirtual Treeview is a tre eView control built from the ground up. More than 3 y ears of development made it one of the most flexi ble tree and advanced controls available today . Virtual Treeview starts off with the claim to i mprove many aspects of existing solutions and introduces some new technologies and prinicip les which were not available before. As the name already indicates. this control uses a different paradigm for tree other than management controls of this kind. It does not know anything about the data it manages (except its size). not even the captions of a node. Everything is re trieved from the application via events (or des centants via overridden methods). Virtual Tre eView has been carefully designed and thorough ly tested. The control proved its concept a
Platform: | Size: 2690960 | Author: xxx | Hits:

[Crack Hackshujujiami

Description: 一个delphi写得des-3加密/解密程序。 des3是利用3个不同的密钥进行3重des加密,非常安全。-a written des-3 encryption / decryption process. Des3 using three different keys for three heavy des encryption, very safe.
Platform: | Size: 6990 | Author: ad | Hits:

[ExploitLibrary_of_Cryptographic

Description: a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.-a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.
Platform: | Size: 388055 | Author: 刘永 | Hits:

[Other resource339068DESDemo

Description: 功能: 实现DES加密算法的加密解密功能 */ /*- */ /*-说明:des算法的实现代码 */ /*- 能够实现56位或56*3密钥的des算法,可以通过该程序提供的接口 */ /*- 进行数据的加密,保证数据在传送过程的安全性 */ /*- */ /*- */ /*-该程序的所有权利由作者保留 */-functions : DES encryption algorithm to achieve the encryption and decryption function * / / * - * / / * - Note : des algorithm implementation code * / / *- can achieve 56 or 56 * 3 keys des algorithm, through this program the interface * / / *- for data encryption, to ensure data in the process of transmission security * / / * - * / / * - * / / *- all of the proceedings right from the author Bulgaria stay * /
Platform: | Size: 17706 | Author: 长乐 | Hits:

[Other resourcemimaxue_ppt

Description: 非常不错的密码学课件(PPT),共20个文件 1[1].密码学与计算机安全2002-01.ppt 2[1].密码学与计算机安全.ppt 3[1].古典替换密码.ppt 4[1].古典变换密码.ppt 5[1].古典变换密码与乘积密码.ppt 6[1].现代密码学.ppt 7[1].现代分组密码-des.ppt 8[1].数论理论介绍.ppt 9[1].公钥密码学.ppt 10[1].公钥加密算法(续).ppt 11[1].认证、哈希算法.ppt 13[1].数字签名算法.ppt 17[1].ssl协议.rar 18[1].古典替换密码cont.ppt 19[1].可信的计算机系统.ppt 20[1].密钥管理与证书.ppt-very good cryptography Courseware (PPT), A total of 20 documents a [1]. cryptography and computer security 2002 - 01.ppt 2 [1]. Cryptography and computer security. ppt 3 [1]. Classical replace passwords. ppt 4 [1]. Classical transform password. 5 ppt [1]. Classical transform the product code and password. ppt 6 [1]. Modern cryptography. ppt 7 [1]. Modern a password-des.ppt 8 [1]. on the number theory. ppt 9 [1]. Public-key cryptography. pp t 10 [1]. Public-key encryption algorithm (continued). ppt 11 [1]. certification, Hash algorithm. ppt 13 [1]. Digital Signature Algorithm. ppt 17 [1]. ssl agreement. rar 1 8 [1]. Classical replace passwords cont.ppt 19 [1]. credible computer system. ppt 20 [ 1]. key management and certificate. ppt
Platform: | Size: 3093417 | Author: 孟繁宇 | Hits:

[Other resourcesource_liu

Description: 1.Delphi_WDM_USB测试源程序 2.stc单片机eeprom的实用操作(读写)源代码, 演示了eeprom内用户数据的动态分配地址方法,通过51rc及54rd+的实际测试 3.Easy 51Pro串行编程器源程序 4.des单片机算法源程序 5.ds18b20 c51源代码 6.Tasking C51 PWM 测试程序-1.Delphi_WDM_USB testing source 2.stc the SCM eeprom Practical operation (reading and writing) source code, a demonstration eeprom user data within the dynamic address allocation method 51 through the mail and 54rd of the actual test 3.Easy 51Pro serial device programming source 4.des SCM 5.ds18b20 source decoder algorithm source code 6.Tasking C51 PWM test procedures
Platform: | Size: 1276571 | Author: 何君 | Hits:

[assembly languagebaogeascii

Description: 一、用表格形式显示字符 1、题目:用表格形式显示ASCII字符 2、实验要求: 按15行*16列的表格形式显示ASCII码为10H-100H之间的所有字符,即以行为主的顺序用ASCII码递增的次序依次显示对应的字符.每16个字符为一行,每行中的相邻两个字符之间用空白符(ASCII为0)隔开. 3、提示: (1)显示每个字符可能使用功能号为02的显示输出功能调用,使用方法如下: MOV AH,02H MOV DL,输出字符的ASCII码 INT 21H 本题中可把DL初始化为10H,然后不断使其加1(用INC指令)以取得下一个字符的ASCII码. (2)显示空白符时,用其ASCII码为0置入DL寄存器.每行结束时,用显示回车和换行符结束本行并开始下一行. (3)由于逐个显示相继为ASCII字符时,需要保存并不断修改DL寄存器的内容,而显示空白、回车、换行符时也需要使用DL寄存器,为此可用堆栈来保存相继的ASCII字符。 具体用法是:在显示空白或回车、换行符前用指令PUSH DX把DL的内容保存到堆栈中去。在显示空白或回车、换行符后用指令恢复DL寄存器的原始内容。-a tabular form with a character show, entitled : tabular form showed two ASCII characters, experimental requirements : * 15 by 16 firms in tabular form for the show ASCII des-100H between all characters, that is, to act with the main sequence of ASCII increase in the order corresponding to the sequence of characters. Each of the 16 characters, and his party Each line of the adjacent between two characters with an empty site (ASCII 0) separated. 3, Tip : (1), showing each character may be used for 02 functions, the output function, use the following method : MOV AH, 02H MOV DL, Output ASCII characters INT 21H this issue can be put to initialize the DL 10 H, and then it increases one (using INC. Directive) to obtain under an ASCII characters. (2), showing a blank website , with its ASCII 0 p
Platform: | Size: 1454 | Author: 庄宁文 | Hits:

[Dialog_Windowflvatifk_cluster

Description: 3Des algorithm source, can be used for commonly used encryption algorithm-3 des algorithm source, can be 2 for commonly informs the encryption algorithm
Platform: | Size: 9216 | Author: ffq&535 | Hits:

[File OperateIbvolves

Description: 涉及到了TripleDes的算法,在实现过程中,我也参考了论坛现有的关于3DES的代码-Involves the TripleDes algorithm, in the process of implementation, I also refer to the BBS of existing code about 3 des
Platform: | Size: 6144 | Author: inuoke | Hits:

[Otherxcgorithm

Description: 3 des algorithm source, can be 2 for commonly informs the encryption algorithm
Platform: | Size: 9216 | Author: tycex | Hits:

[ComboBoxBPSalgorighmexisting

Description: 涉及到了TripleDes的算法,在实现过程中,我也参考了论坛现有的关于3DES的代码(Involves the TripleDes algorithm, in the process of implementation, I also refer to the BBS of existing code about 3 des)
Platform: | Size: 6144 | Author: mos%255F6186 | Hits:

[Otheraqvnje1

Description: 3Des algorithm source, can be used for commonly used encryption algorithm(3 des algorithm source, can be 2 for commonly informs the encryption algorithm)
Platform: | Size: 8192 | Author: Pbalt | Hits:

[Crack Hack信息安全实验2-1

Description: 实验内容 1、对称密码技术的实现 (1)熟悉相应的DES加密/解密函数的使用,在单机完成对特定文件(test-1.txt)的单重DES加密/解密; (2)针对DES密钥特点(8字节,64比特位,其中真正起作用的为56比特位),设计一次一密的密钥产生机制(即每次会话所使用的密钥都是临时随机产生的); 2、非对称密码技术的实现 (1)熟悉RSA相关函数(公私钥生成函数,加密/解密函数); (2)利用公钥加密特定文件(test-1.txt),并用私钥进行解密;反过来,再利用私钥加密特定文件,并用公钥进行解密。对比解密后的文件与原始文件是否一致。 3、信息摘要技术的实现 (1)熟悉MD5算法的实现函数; (2)利用MD5实现函数,对特定文件(test-1.txt)进行信息摘要的计算,得到信息摘要M1;尝试改变特定文件中的内容(比如改变其中某个字母),再利用MD5计算一次信息摘要,看同之前得到的信息摘要是否相同; 设计要求 1、JAVA语言编程实现 2、单机上完成 3、加密内容为一文本文件(从服务器下载),从服务器上下载相关软件包(jce-1_2_2和帮助文件,主要用于RSA密钥生成和加/解密,如果安装了JDK1.6版本以上,则不需要jce支持)后,请先阅读帮助再进行编程。(DES/RSA/MD5 The implementation of symmetric cryptography (1) familiar with the use of the corresponding DES encryption / decryption function, complete single DES encryption / decryption of a particular file (test-1.txt) in a single machine; (2) for DES key features (8 bytes, 64 bits, which really works for 56 bits), the design of a secret key generation mechanism (i.e. using the session key is randomly generated temporary);)
Platform: | Size: 16384 | Author: 潇洒坤 | Hits:

[OtherAES

Description: 基于DES五种加密,电码本模式(Electronic Codebook Book (ECB));2.密码分组链接模式(Cipher Block Chaining (CBC));3.计算器模式(Counter (CTR));4.密码反馈模式(Cipher FeedBack (CFB));5.输出反馈模式(Output FeedBack (OFB))(Five kinds of encryption based on DES .Electronic Codebook Book(ECB).Cipher Block Chaining (CBC).Counter (CTR).Cipher FeedBack (CFB).Output FeedBack (OFB))
Platform: | Size: 8192 | Author: 第三方df | Hits:

[JSP/JavaChapter6

Description: There are multiple versions of MIPS: including MIPS I, II, III, IV, and V; as well as five releases of MIPS32/64 (for 32- and 64-bit implementations, respectively). As of April 2017, the current version is MIPS32/64 Release 6.[3][4] MIPS32/64 primarily differs from MIPS I–V by defining the privileged kernel mode System Control Coprocessor in addition to the user mode architecture.(There are multiple versions of MIPS: including MIPS I, II, III, IV, and V; as well as five releases of MIPS32/64 (for 32- and 64-bit implementations, respectively). As of April 2017.)
Platform: | Size: 26624 | Author: Tom1215 | Hits:

[matlabReconnaissance des Formes-3

Description: pattern recognition course 3
Platform: | Size: 195584 | Author: ZhaoYe2 | Hits:

[Crack HackCBC_DES

Description: 本程序采用CBC模式DES算法加密,运行CBCdes.exe后,显示提示信息: 加密文件输入1,解密文件输入2,退出输入3。(This program uses CBC mode DES algorithm to encrypt, running CBCdes.exe, display prompt information: Encrypt file input 1, decrypt file input 2, exit input 3.)
Platform: | Size: 40960 | Author: 纵横道 | Hits:

[Report papersEnvoyer et recevoir des données sur le protocole Zigbee 3.0

Description: Le monde informatique a connu une grande expansion depuis que les réseaux sans fil ont vu le jour. Un réseau sans fil permet de lier des terminaux sans liaison filaire. L’existence de ce type de réseaux a permis plus de mobilité et de flexibilité dans la structuration des réseaux. Les utilisateurs peuvent se connecter facilement et peuvent se déplacer tout en gardant la connexion au niveau d’une entreprise, industrie ou maison intelligent. Dans ce chapitre, nous montrons le cadre théorique sur lequel nous nous sommes basés pour traiter les différents aspects de la norme Zigbee. On a consacré aux comparaisons des technologies sans fil déjà réalisées en ciblant plus Zigbee
Platform: | Size: 1408707 | Author: nesrines | Hits:
« 1 2 3 4 5 6 78 9 10 11 12 »

CodeBus www.codebus.net