Welcome![Sign In][Sign Up]
Location:
Search - DES others

Search list

[Crack Hackdesende

Description: 自己编的DES加密、解密算法,可实现windows下任何文件的加密、解密,尤其适用使用公用电脑而一些私人的文件不想被别人看到的情况,可设置八个字节的密钥,也就是每一位可以从0到255,这样对方就算已知置换矩阵和S盒的情况下用穷举法破解的难度也在2的32次幂,还是相当安全的。 加密:DESencrypt.exe 解密:DESdecrypt.exe-own addendum to the DES encryption, decryption algorithms can be realized under any windows document encryption, decryption, In particular, the use of common computer application and some private documents do not want others to see, can be set up eight bytes of keys, Each one is from 0 to 255. known each other even if such replacement matrix and the S-box using exhaustive method is difficult to decipher the two 32 power, still quite safe. Encryption : DESencrypt.exe declassified : DESdecrypt.exe
Platform: | Size: 63454 | Author: 古松 | Hits:

[VHDL-FPGA-VerilogDES-source-code-by-HDL

Description: HDL实现的DES算法,及相关的Test bench激励文件-HDL achieve the DES algorithm, and the related documents incentive Test bench
Platform: | Size: 27648 | Author: zyx | Hits:

[Crack Hackdesende

Description: 自己编的DES加密、解密算法,可实现windows下任何文件的加密、解密,尤其适用使用公用电脑而一些私人的文件不想被别人看到的情况,可设置八个字节的密钥,也就是每一位可以从0到255,这样对方就算已知置换矩阵和S盒的情况下用穷举法破解的难度也在2的32次幂,还是相当安全的。 加密:DESencrypt.exe 解密:DESdecrypt.exe-own addendum to the DES encryption, decryption algorithms can be realized under any windows document encryption, decryption, In particular, the use of common computer application and some private documents do not want others to see, can be set up eight bytes of keys, Each one is from 0 to 255. known each other even if such replacement matrix and the S-box using exhaustive method is difficult to decipher the two 32 power, still quite safe. Encryption : DESencrypt.exe declassified : DESdecrypt.exe
Platform: | Size: 63488 | Author: | Hits:

[Crack HackjavaDES

Description: DES加密解密算法,用java实现的。借鉴别人的,很好用。-DES encryption and decryption algorithm, using java to achieve. Learn from others, it just works.
Platform: | Size: 5120 | Author: wy | Hits:

[CA auth479127

Description: des加密算法,转载他人编写的一个加密程序,感谢编写者.-des encryption algorithm, reproduced others prepared an encrypted program, thanks to the authors.
Platform: | Size: 3072 | Author: | Hits:

[Crack HackDES

Description: 实现DES加密文件的功能,超简单的源码。从别人那得到的。-DES encrypted file to achieve the function, super-simple source. It received from others.
Platform: | Size: 40960 | Author: boobcbo | Hits:

[Crack HackDES

Description: 算法流程 1.将要处理的二进制串进行IP置换 2.将密钥进行PC1置换(64位转为56位), 3.进行16轮操作,对于第i轮操作: 1)将上一次得到的PC1密钥(级除去第一次外,其他的都经过移位处理)的结果左右部分(各28位)分别循环左移1位或2位,然后将移位后的密钥进行PC2[i]置换. 2)将处理串均等分为左右两串Li,Ri(各32位),然后将右串Ri通过E盒拓展为新的右串R (48位),R 与上一步得到的PC2[i]子密钥进行异或操作,结果通过S盒输出(48为转为32位),然后通过P盒直接置换,再与Li异或. 3)将Ri赋给作出Li,R 赋值给Ri. 4)合并处理串StrText=Li+Ri. 4.将最新的处理串进行IP_1置换,置换结果即为所求的加密串或解密串 加密解密的区别 在每轮操作中,加密使用的PC2密钥顺序为0~15,解密使用的PC2密钥顺序为15~0. -Algorithm flow A binary string to be processed is substituted for IP 2 key the PC1 replacement (64 into 56) 16 operation, the operation for the i-th round: 1) about the results of the last PC1 key (remove the first time, the others have been shifting processing) (28) rotate left one or two, and then will shift key PC2 [i] replacement. 2) is divided into the equal treatment string around two bunches of Li, Ri (32), and then expand the right string Ri E box (48-bit), the right string R R​ ​ and the previous step PC2 i] subkey XOR operation result is output via the S-box (48 to 32 conversion), and then directly through the P box replacement and XOR with Li. 3) the Ri to make Li, R is assigned to Ri. 4) merger deal with string StrText Ri = Li+. 4. Latest processing string IP_1 replacement, replacement results shall request string encryption or decryption string Encryption and decryption of difference In each round of operations, PC2 key e
Platform: | Size: 2048 | Author: zhusiyi | Hits:

[CA authDecrypt.rar

Description: 加密的几种常用的源码包,应用于数据库表部分字段的加密,图象文件等文档加密,双方通信时数据加密传输防他人网络截取信息。非对称RSA或ECC公钥加密私钥解密或者可用于数字签名 对称加密AES或者DES,56位的DES加密,128位或192位或256位AES加解密通常可设随便的密码长度,其它位用常字符代替;非对称加密多要先因式分解,对称加密多就移位处理。,Several common source package encryption, encryption, image files, and other document encryption applied to the part of the field of the database table, the two sides communicate data encryption transmission Anti others network interception. The asymmetric RSA or ECC public key to encrypt the private key to decrypt or can be used for digital signatures symmetric encryption AES or DES, 56-bit DES encryption, 128-bit or 192-bit or 256-bit AES encryption and decryption usually can be set casually password length, other bits instead of using the regular characters asymmetric encryption first multi factorization, symmetric encryption shift process.
Platform: | Size: 212992 | Author: 曾祥园 | Hits:

[ComboBoxDES_Cwe2.0

Description: 参考别人的后,用MFC做的DES加密解密,有完整的工程。可以对文档进行加密解密。可以在没有打开文本的情况下对文本内容进行预览。可以加密.doc文档,当密钥大于8,自动启动3重DES加密解密。-Reference to others, the use of MFC to do DES encryption and decryption, a complete project. Can decrypt the document. You can not open the case of the text content of the text preview. Can be encrypted. Doc document, when the key is greater than 8, automatic re-start 3 DES encryption and decryption.
Platform: | Size: 1897472 | Author: 陈炜 | Hits:

[CSharpEncrypt_an_string_demo

Description: demo program for simple encryption string using des, rc2 and others
Platform: | Size: 8192 | Author: akmal | Hits:

[CSharpEncrypt_an_string_src

Description: encrypt a string from plain text to des, rc2 or others source code. csharp
Platform: | Size: 53248 | Author: akmal | Hits:

CodeBus www.codebus.net