Welcome![Sign In][Sign Up]
Location:
Search - DES txt

Search list

[Crack HackDes加密解密文件

Description: 可以操作的文件类型:TXT、DOC、JAVA等,且Word文档中包含图片也没问题 运行时使用的例子是本目录下的111.doc文件,运行后自动生成222.doc文件和333.doc文件。 其中111.doc文件加密后的文件是222.doc文件,222.doc文件解密后文件是333.doc文件。-can operate file types : TXT, DOC, JAVA, but Word document contains photographs have no problem running example is the use of the catalog under the 111.doc documents, after running automatically generate documentation and 333.doc 222.doc document. 111.doc file encryption which the document is 222.doc documents, 222.doc declassified document after document is 333.doc document.
Platform: | Size: 37731 | Author: 寒风 | Hits:

[GUI DevelopDES

Description: 將.txt檔做des 作加解密之用途 請多多參考
Platform: | Size: 14525 | Author: 廖正義 | Hits:

[Otherdes

Description: MD5的全称是Message-digest Algorithm 5(信息-摘要算法),在90年代初由MIT Laboratory for Computer Science和RSA Data Security Inc,的Ronald L. Rivest开发出来,经MD2、MD3和MD4发展而来。它的作用是让大容量信息在用数字签名软件签署私人密钥前被\"压缩\"成一种保密的格式(就是把一个任意长度的字节串变换成一定长的大整数)。不管是MD2、MD4还是MD5,它们都需要获得一个随机长度的信息并产生一个128位的信息摘要。虽然这些算法的结构或多或少有些相似,但MD2的设计与MD4和MD5完全不同,那是因为MD2是为8位机器做过设计优化的,而MD4和MD5却是面向32位的电脑。这三个算法的描述和c语言源代码在Internet RFC 1321中有详细的描述(http://www.ietf.org/rfc/rfc1321.txt),这是一份最权威的文档,由Ronald L. Rivest在1992年8月向IETF提交。
Platform: | Size: 3059 | Author: wangweiyang | Hits:

[Crack Hacksdestt

Description: S-DES的编程实现 S-DES的加密使用8位明文和10位密钥做为输入,产生8位的密文做为输出。加解密使用相同的密钥。要求:采用CBC模式对文本加解密 1.对话界面:选择加密或解密,输入密钥,在目录中选择明文或密文文件(内容为二进制,.txt文件,),提示加密或解密完成 2.输出:产生密文文本或明文文本 3.提供:说明文档,源码,可执行程序,通过加密实验,给出运行结果. 4.提交分析雪崩效应文档:相同密钥下明文改变任一位时密文的位差异情况 相同明文下密钥改变任一位时密文的位差异情况-S-DES Programming S-DES encryption using 8 and 10 expressly as a key input, have eight of dense text as output. Encryption and decryption using the same key. Requirements : CBC mode to a declassified version increases. Dialogue interface : Select encryption or decryption key input in the directory option expressly or dense text document (for binary content,. Txt file,), suggesting encryption or decryption completed 2. Output : produce dense text or text the text expressly 3. provide : documentation, source code, executables, through encryption experiment is running results. 4. analytical avalanche effect Document : Key under the same as an explicit change the text at the close of the differences in the same place where expressly as a key change at the potentiometer ciphertext the situation
Platform: | Size: 2048 | Author: 冯鋆 | Hits:

[Crack HackDES加密C代码

Description: DES加密C代码带执行程序-DES encryption with C code enforcement procedures
Platform: | Size: 23552 | Author: 张文奇 | Hits:

[Crack HackDes加密解密文件

Description:
Platform: | Size: 37888 | Author: 寒风 | Hits:

[Crack Hack200561673082201

Description: DES,MD5,ZLIB算法源代码 文件列表: Adler32.cpp ArithDLL.cpp ArithDLL.def ArithDLL.dll ArithDLL.dsp ArithDLL.dsw ArithDLL.h ArithDLL.lib ArithDLL.ncb ArithDLL.opt ArithDLL.plg Arithzxz.h Arithzxz.h.BAK Compress.cpp CRC.cpp Deflate.cpp Deflate.h Des.cpp Des.h Infblock.cpp Infblock.h Infcodes.cpp Infcodes.h Inffast.cpp Inffast.h Inffixed.h Inflate.cpp Inftrees.cpp Inftrees.h Infutil.cpp Infutil.h md5.cpp md5.h ReadMe.txt StdAfx.cpp StdAfx.h String.cpp Trees.cpp Zlib.h Zutil.cpp Zutil.h-DES, MD5, ZLIB algorithm source code files list : Adler32.cpp ArithDLL.cpp ArithDLL.def Arith DLL.dll ArithDLL.dsp ArithDLL.dsw ArithDLL. h ArithDLL.lib Ari ArithDLL.ncb ArithDLL.opt thDLL.plg Arithzxz.h Arithzxz.h.BAK Compres s.cpp CRC.cpp Deflate.cpp Deflate.h Des.cpp D es.h Infblock.cpp In Infblock.h Infcodes.cpp fcodes.h Inffast.cpp In Inffast.h Inffixed.h flate.cpp Inftrees.cpp Inftrees.h Infutil.c pp Infutil.h md5.cpp StdAfx md5.h ReadMe.txt file. cpp StdAfx.h String.cpp Trees.cpp Zlib.h Zuti l.cpp Zutil.h
Platform: | Size: 138240 | Author: water1974 | Hits:

[Crack HackCDes_standard

Description: 该程序实现单层的DES加密算法,其中CDes.cpp为源程序,其中调用的文件功能如下:dataofText.txt文件是输入的明文,以换行分割各个数据;dataofKey.txt文件时输入的密钥,以换行分割;dataofDES.txt文件是输出的加密数据,其中包括各轮子密钥以及各轮加密输出,以及最后得到的密文,在文件中都有说明。-the realization of the single DES encryption algorithm, which CDes.cpp to source files, Calling the document which functions as follows : dataofText.txt document is imported specifically, in exchange for various bits of data; dataofKey.txt paper input key to change bits; dataofDES.txt document is the output data encryption, including the wheels round and the key encryption exports, and finally the secret text in the document have been described.
Platform: | Size: 185344 | Author: 李文 | Hits:

[Crack Hackcryptology

Description: 实现了三种古典密码学体制和DES体制及其分析。affine(仿射)读入文件11.txt中内容(小写字母,明文)加密并把内容写入12.txt,还可以解密生成文件13.txt。vigenere,hill体制类似。DES体制包括加密解密雪崩效应差分分析等内容。由于本人还是刚学习程序设计语言及密码学的在校本科生,水平很低,第一次上传只是为了试一下。可以考虑少给几点,呵呵。-achieve three classical cryptography system and DES system and its analysis. P14 (affine) read into the document 11. Txt contents (lowercase letters, expressly) encryption and written 12. txt, can also generate documents declassified 13. txt. Vigenere, hill similar system. DES encryption and decryption system, including avalanche effect Differential analysis of the contents. Because I still just learning programming language and Cryptography in undergraduate school, the low level Uploading is the first to try. Consider a smaller number of points-huh.
Platform: | Size: 10240 | Author: 李栋 | Hits:

[Crack Hackjava_des_crypto

Description: DES加密解密程序的主程序在 FileDES类中 运行时使用的例子是本目录下的111.doc文件,运行后自动生成222.doc文件和333.doc文件。 其中111.doc文件加密后的文件是222.doc文件,222.doc文件解密后文件是333.doc文件。 可以操作的文件类型我实验了TXT、DOC、JAVA等都没有问题,且Word文档中包含图片也没问题-DES encryption and decryption procedures of the main program at run-time class FileDES used example is the catalog under 111.doc documents, running 222.doc automatically generated files and documents 333.doc. 111.doc document which the document is encrypted 222.doc document, 222.doc document after the document was declassified documents 333.doc. Can operate file type I experiment a TXT, DOC, JAVA and so there is no problem, and the Word document contains pictures have no problem
Platform: | Size: 21504 | Author: chensong | Hits:

[SCMfrequently_used_source_code

Description: 单片机方面大量常用优秀源代码和说明 ACM-12864汉字液晶显示驱动程序 Ad_da转换 ADC0809 adc2051 AD转换类 C51_table DES算法演示 I2c总线 IIC LED显示 编程规范与范例 步进电机 查表 串行通信 打印 代码运算类 代码转换 单片机经验谈 单片机直接驱动液晶显示 电机pwm控制 电机控制 定浮点子程序库 定时与中断 二进制数运算 汇编与c的衔接 键盘扫描程序 键盘与显示 交通灯 抗干扰 滤波 排序 排序类 频率计 软件工程 实用子程序 数字多用表 数字频率计 通讯 显示子程序 延时 移位除 音乐 应用类 源程序 在线下载器源程序 中断应用 自动往返小汽车 51单片机子程序.exe AT90S8515打铃程序.ASM hex2bcd.asm main_last.asm RTX-51 Real-Time(汉).pdf RTX-51 实时操作系统.pdf SOFT_UART.ASM test_read.asm testpw.asm 八月桂花香.asm 单片机C51编程几个有用的模块.htm 单片机实现软件滤波.txt 遥控器程序.txt -err
Platform: | Size: 2518016 | Author: 何小克 | Hits:

[GUI DevelopDES

Description: 將.txt檔做des 作加解密之用途 請多多參考-Will. Txt file to do des for encryption and decryption purposes please refer to
Platform: | Size: 171008 | Author: 廖正義 | Hits:

[Otherdes

Description: MD5的全称是Message-digest Algorithm 5(信息-摘要算法),在90年代初由MIT Laboratory for Computer Science和RSA Data Security Inc,的Ronald L. Rivest开发出来,经MD2、MD3和MD4发展而来。它的作用是让大容量信息在用数字签名软件签署私人密钥前被"压缩"成一种保密的格式(就是把一个任意长度的字节串变换成一定长的大整数)。不管是MD2、MD4还是MD5,它们都需要获得一个随机长度的信息并产生一个128位的信息摘要。虽然这些算法的结构或多或少有些相似,但MD2的设计与MD4和MD5完全不同,那是因为MD2是为8位机器做过设计优化的,而MD4和MD5却是面向32位的电脑。这三个算法的描述和c语言源代码在Internet RFC 1321中有详细的描述(http://www.ietf.org/rfc/rfc1321.txt),这是一份最权威的文档,由Ronald L. Rivest在1992年8月向IETF提交。 -err
Platform: | Size: 3072 | Author: wangweiyang | Hits:

[Crack HackDES

Description: 位输入的DES 加密解密算法实现 单一CPP实现,其中1.txt用于明文输入,key2.txt用于密钥输入,out2.txt为加密后的密文 与解密后的明文输出-Enter the DES encryption and decryption algorithm to achieve a single CPP, which expressly 1.txt for input, key2.txt for key input, out2.txt for encrypted and decrypted ciphertext expressly output after
Platform: | Size: 9216 | Author: rojeck | Hits:

[Crack HackMyCryptograghy

Description: 对DES对各种类型的加解密的一个算法整理,包括对Byte,string,TXT文件类型,及其他类型的文档的一个解加密-Of DES encryption and decryption of all types of finishing an algorithm, including Byte, string, TXT file types, and other types of documents, a solution of encryption
Platform: | Size: 24576 | Author: qer | Hits:

[JSP/JavaDes

Description: DES加密解密程序的主程序在 FileDES类中 运行时使用的例子是本目录下的111.doc文件,运行后自动生成222.doc文件和333.doc文件 。 其中111.doc文件加密后的文件是222.doc文件,222.doc文件解密后文件是333.doc文件。 可以操作的文件类型我实验了TXT、DOC、JAVA等都没有问题,且Word文档中包含图片也没问 题。 -Des
Platform: | Size: 36864 | Author: 钟钟 | Hits:

[Crack HackDES-encryption-algorithm

Description: DES算法加解密全套程序,可运行,实现对txt(文本)文件内容的加解密。用vc6.0编写,内涵源代码,以及详细注释,程序非常简单,经过下载后可以对其源代码修改,加解密器,同时代码非常简单,可以通过读代码学到很多vc的知识啊,比看书学的快多了。另在解密文件夹中还有一个测时间的函数,精确到毫秒,可以计算出程序运行的时间,该代码移植性较强,可以用在别的程序中。-DES encryption algorithm for a full set of procedures, operations, implementation of the txt (text) file content encryption and decryption. Prepared by vc6.0 content source code, as well as detailed notes, a very simple procedure, the download can modify its source code, encryption and decryption, and at the same time very simple code, you can read a lot of code to learn the knowledge vc ah, more than Read books to learn more quickly. Decrypted at the other folders have a function of time measurement, accurate to the millisecond, you can run out of time, the transplantation of a stronger code can be used in other proceedings.
Platform: | Size: 413696 | Author: xiaowei | Hits:

[Crack Hackl2_her.txt

Description: DES encryption. Only missing function "key_former"
Platform: | Size: 1024 | Author: Felix | Hits:

[Othersxy--des

Description: 对八位字符进行加密与解密(使用时需要建立两个TXT文件,具体请看源代码)(bit characters are encrypted and decrypted (using two TXT files to be used when using the source code))
Platform: | Size: 262144 | Author: 山鬼i | Hits:

[Other三轮DES差分分析

Description: 1. 三轮DES(如下图所示)差分攻击实例,任选一组明密文对进行差分分析。 明文:0x8066928BFAECD99D 密文:0X57DECC86A26EA1DC 明文:0xF9187686FAECD99D 密文:0X699074ED42BBAA8A 明文:0xBCCB0915FB9DAD15 密文:0X1B1EF84FCAEE04DF 明文:0X7C6A2463FB9DAD15 密文:0XD82A8F73F24B36EC 明文:0X6EEF46EDDC4C3F51 密文:0X9B4F437F1066BF01 明文:0X5E9C57D2DC4C3F51 密文:0XEFB5FBC6AA1EDEF9 明文:0XE682DAA5F83ECF3B 密文:0X2811CBA30B25F712 明文:0XD03F9B23F83ECF3B 密文:0X1544A0610224698A 明文:0X8506A707CB09FC98 密文:0XA7768AF840F636F4 明文:0X53800018CB09FC98 密文:0X1DC94D3982635A23 利用Python编写的程序,直接在txt文档中输入我们要分析的数据,即可输出第三轮的密钥(Differential analysis of three wheel des Three rounds of DES (as shown in the figure below) differential attack examples, select a group of ciphertext pairs for differential analysis. Using the program written in Python, we can directly input the data we want to analyze in the txt document, and then output the third round key)
Platform: | Size: 7168 | Author: LeeZHY | Hits:
« 12 3 »

CodeBus www.codebus.net