Welcome![Sign In][Sign Up]
Location:
Search - Research Data Encryption

Search list

[Othercipancaozuoziliao

Description: 磁盘操作资料 MBR Date 自磁芯大战以来,病毒从DOS时代的病毒发展到WINDOS系统的病毒,从变形、加密到智能化现在的病毒是让人防不胜防,现在网络上病毒大肆泛滥,给人们带来的很大的危害,本人在此仅做抛砖引玉,介绍病毒的原理,希望大家共同研究交流。(本文参考了网络上的部分文章,并引用了部分内容。) 要学DOS下的病毒,首先你必须要学会或掌握汇编语言。DOS下病毒一般分为引导型病毒、文件型病毒、混合型病毒等。大部分病毒是感染COM和EXE文件,因此你必须了解COM文件和EXE文件结构。 -disk operating data disk operating data from the MBR Date core since World War II, DOS era of the virus from the virus to WINDOS the virus from deformation, Intelligent Encryption of the virus is now obscured, the network wantonly spread of the virus. bring to the great harm, I would like only to do something on the principle of the virus, I hope we can jointly research exchange. (This reference to the network on the part of the article, and quoted in part.) To learn DOS virus, First you must learn to master or assembly language. DOS virus into leading-type viruses, file virus, a hybrid-type virus. HIV infection is the most COM and EXE file, so you must understand the document COM and EXE file structure.
Platform: | Size: 20140 | Author: 裴裴 | Hits:

[Crack Hackpe_decoder

Description: 在《软件加密技术》这本书里看过PE文件各部分的详细解释之后,我也有了一个自己写PE文件分析器的的想法。虽然好的分析器不在少数,但对于一堆十六进制数,有些朋友可能不明白它代表什么意思。如果在程序里就可以将这些01序列转换成可以直接看懂得信息,那至少用户可以省去以后去查表的麻烦。怀着这样的想法,我仔细的研究了书中分析器PEInfo的源代码,我发现它没有提供信息转换的功能。 通过研究发现,PEInfo是通过PE文件在内存中的映象来获取文件信息的,我在想是否还有别的方法可以绕过将文件映象到内存这一步,直接读取文件信息。这样的方法只有直接读取磁盘上的PE文件,在磁盘上寻找所需要的文件信息。 在这里暂且不说这样的做法和内存映象法有什么优劣,我在此仅仅只是想找寻另一条解决问题的道路,并实现之。看完我的分析和源程序,大家自然知道孰优孰劣。-"software encryption technology," this book read PE part of the document detailed explanations, I have a paper to write his PE analyzer idea. Although good analyzer 2000, but a pile of hexadecimal number, some friends may not understand what it meant. If the program can be converted into 01 sequences can look directly understand information, That, at least users have no future to look-up table of trouble. With the idea, I carefully studied the book analyzer PEInfo of source code, I found that it did not provide data conversion functions. Found through research, through PE PEInfo document in memory mapping information to obtain documents, I wonder whether there are other ways to circumvent the document image to memory this step, direct read file information. This approach is only
Platform: | Size: 111036 | Author: heroin | Hits:

[Othercipancaozuoziliao

Description: 磁盘操作资料 MBR Date 自磁芯大战以来,病毒从DOS时代的病毒发展到WINDOS系统的病毒,从变形、加密到智能化现在的病毒是让人防不胜防,现在网络上病毒大肆泛滥,给人们带来的很大的危害,本人在此仅做抛砖引玉,介绍病毒的原理,希望大家共同研究交流。(本文参考了网络上的部分文章,并引用了部分内容。) 要学DOS下的病毒,首先你必须要学会或掌握汇编语言。DOS下病毒一般分为引导型病毒、文件型病毒、混合型病毒等。大部分病毒是感染COM和EXE文件,因此你必须了解COM文件和EXE文件结构。 -disk operating data disk operating data from the MBR Date core since World War II, DOS era of the virus from the virus to WINDOS the virus from deformation, Intelligent Encryption of the virus is now obscured, the network wantonly spread of the virus. bring to the great harm, I would like only to do something on the principle of the virus, I hope we can jointly research exchange. (This reference to the network on the part of the article, and quoted in part.) To learn DOS virus, First you must learn to master or assembly language. DOS virus into leading-type viruses, file virus, a hybrid-type virus. HIV infection is the most COM and EXE file, so you must understand the document COM and EXE file structure.
Platform: | Size: 19456 | Author: 裴裴 | Hits:

[Crack Hackpe_decoder

Description: 在《软件加密技术》这本书里看过PE文件各部分的详细解释之后,我也有了一个自己写PE文件分析器的的想法。虽然好的分析器不在少数,但对于一堆十六进制数,有些朋友可能不明白它代表什么意思。如果在程序里就可以将这些01序列转换成可以直接看懂得信息,那至少用户可以省去以后去查表的麻烦。怀着这样的想法,我仔细的研究了书中分析器PEInfo的源代码,我发现它没有提供信息转换的功能。 通过研究发现,PEInfo是通过PE文件在内存中的映象来获取文件信息的,我在想是否还有别的方法可以绕过将文件映象到内存这一步,直接读取文件信息。这样的方法只有直接读取磁盘上的PE文件,在磁盘上寻找所需要的文件信息。 在这里暂且不说这样的做法和内存映象法有什么优劣,我在此仅仅只是想找寻另一条解决问题的道路,并实现之。看完我的分析和源程序,大家自然知道孰优孰劣。-"software encryption technology," this book read PE part of the document detailed explanations, I have a paper to write his PE analyzer idea. Although good analyzer 2000, but a pile of hexadecimal number, some friends may not understand what it meant. If the program can be converted into 01 sequences can look directly understand information, That, at least users have no future to look-up table of trouble. With the idea, I carefully studied the book analyzer PEInfo of source code, I found that it did not provide data conversion functions. Found through research, through PE PEInfo document in memory mapping information to obtain documents, I wonder whether there are other ways to circumvent the document image to memory this step, direct read file information. This approach is only
Platform: | Size: 110592 | Author: heroin | Hits:

[Crack Hackaes_core

Description: Verilog实现AES加密算法 密码模块作为安全保密系统的重要组成部分,其核心任务就是加密数据。分组密码算法AES以其高效率、低开销、实现简单等特点目前被广泛应用于密码模块的研制中。密码模块一般被设计成外接在主机串口或并口的一个硬件设备或是一块插卡,具有速度快,低时延的特点。而从整体发展趋势来看,嵌入式密码模块由于灵活,适用于多种用户终端、通信设备和武器平台,将会得到更加广泛的应用-AES encryption algorithm realize Verilog module password security system as an important part of its core mission is to encrypt the data. AES block cipher algorithm for its high efficiency, low overhead, simple features such as the current password is widely used in research and development modules. Password modules are generally designed to host external serial or parallel port of a hardware device or a card with a high speed, low latency characteristics. From the overall development trend, the embedded code module as a result of flexible and applicable to many user terminals, communications equipment and weapons platforms, will be more widely applied
Platform: | Size: 79872 | Author: yuansuchun | Hits:

[Crack Hackcomputer-cyphers

Description: 密码学以研究保密通信为目的,而且仅限于数据通信。 密码技术还应用于信息鉴别和数字鉴别,用以防止电子欺骗。 密码加密算法的对立面就是密码分析,也就是破译技术研究。加密与破译是一对矛盾,了解破译对研究加密非常必要。-Cryptography to secure communications for the purpose of research, but limited to data communications. Cryptographic techniques also applies to information to identify and digital identification, to prevent spoofing. Password encryption algorithm is the antithesis of cryptanalysis, that is, deciphering the technical studies. Encryption and deciphering is a contradiction to understand the study of deciphering the encryption is necessary.
Platform: | Size: 4322304 | Author: lf | Hits:

[VHDL-FPGA-VerilogDES101

Description: 数据加密算法(Data Encryption Algorithm,DEA)的数据加密标准(Data Encryption Standard,DES)是规范的描述,它出自 IBM 的研究工作,并在 1997 年被美国政府正式采纳。它很可能是使用最广泛的秘钥系统,特别是在保护金融数据的安全中,最初开发的 DES 是嵌入硬 件中的。通常,自动取款机(Automated Teller Machine,ATM)都使用 DES。文件是DES代码的VHDL描述 -Data encryption algorithm (Data Encryption Algorithm, DEA) of the Data Encryption Standard (Data Encryption Standard, DES) is a standardized description of it from IBM s research work and, in 1997, formally adopted by the U.S. government. It is probably the most widely used secret key system, especially in protecting the safety of financial data, the initial development of DES is embedded in hardware. Usually, automated teller machines (Automated Teller Machine, ATM) are the use of DES. Document is described in VHDL code DES
Platform: | Size: 676864 | Author: | Hits:

[ERP-EIP-OA-Portalbankmanagement

Description: 银行管理系统 1)背景: 银行的一般储蓄业务 (2)功能模块 1)实现储户开户登记。 2)办理定期存款帐。 3)办理定期取款手续。 4)办理活期存款帐 5)办理活期取款手续。 6)实现利息计算。 7)输出明细表。 8)具有数据备份和数据恢复功能。 (3)说明: 1)有必要进行一定的实际调研,系统功能在实现时参照实际的储蓄系统的功能 2)加分功能:考虑银行系统据的安全与保密工作。数据要有加密功能。 -Bank Management System 1) Background: The bank s general savings business (2) function modules 1) the realization of depositors to open an account registration. 2) for time deposit accounts. 3) procedures for regular withdrawals. 4) demand deposits account for 5) call for withdrawal procedures. 6) the realization of interest rates. 7) the output schedule. 8) with a data backup and data recovery functions. (3) Description: 1) there is a need for some actual research, the system functions in the light of the actual realization of the savings when the function of the system 2) A sub-function: to consider the banking system, according to the security and confidentiality. Data encryption should be.
Platform: | Size: 414720 | Author: 海军 | Hits:

[Crack Hackdes

Description:  数据加密算法(Data Encryption Algorithm,DEA)的数据加密标准(Data Encryption Standard,DES)是规范的描述,它出自 IBM 的研究工作,并在 1997 年被美国政府正式采纳。它很可能是使用最广泛的秘钥系统,特别是在保护金融数据的安全中,最初开发的 DES 是嵌入硬 件中的。通常,自动取款机(Automated Teller Machine,ATM)都使用 DES。 此源码可完成简单的DES加密解密-Data encryption algorithm (Data Encryption Algorithm, DEA) of the Data Encryption Standard (Data Encryption Standard, DES) is to standardize the description, it comes from IBM' s research work, and in 1997 formally adopted by the U.S. government. It is probably the most widely used secret key system, especially in protecting the security of financial data, the initial development of the DES is embedded in hardware. Typically, ATM (Automated Teller Machine, ATM) are the use of DES. This source to be completed by a simple DES encryption and decryption
Platform: | Size: 2048 | Author: 好人 | Hits:

[Crack HackResearch-And-Development-Of-RSA-File-Encryption.ra

Description: 分析RSA算法的应用现状,论证文件加密应用RSA算法的可行性和意义。设计一套完整实用的RSA文件加密解决方案,具体编码实现。对RSA算法进行研究,从常规RSA算法出发,用C++实现RSA加密算法类库,并在32位windows平台封装成组件。在.Net平台引用此组件,实现可以对任意文件进行RSA加密操作的窗体应用程序。经过加密的文件以及密钥文件都是文本文件。给出关键类类图、整个应用程序的结构描述文档、关键模块流程图、较详细的接口文档、所有源代码。对应用程序进行测试,对测试结果进行分析研究,进而对应用程序进行改进,对关键算法进行尽可能的优化,最终得到一个在windows运行的可以用指定密钥对任意文件进行RSA加密并可解密的完整应用程序,和一些相关的可移植组件。-Do research about the application area of RSA encryption and reason that RSA can be used for file encryption. Design a RSA file-encrypt solution and complete an application on Microsoft Windows™ . Design a C++ class based on normal RSA algorithm. And make a DLL module based on the class. Then complete a .Net Framework™ window-application using that DLL. The application can encrypt any file and decrypt them. The file after encryption can be saved as a text file. And the encryption-keys also can be saved as text.Provide pivotal classes chart, project description, core algorithm flowchart, all source code, and module interfaces document. Do application performance test and record the performance data. Analyze the result then optimize core algorithm and improve the application. Finally, create a practical application using RSA algorithm that can encrypt and decrypt any file. And several modules in the project can be reuse by other applications. For instance, the C++ class can be
Platform: | Size: 1044480 | Author: 张波 | Hits:

[Otherdata_encryption_routine

Description: 适用于PIC24 和dsPIC器件的数据加密子程序。加密的算法,对研究加密算法的人有帮助。-PIC24 and dsPIC devices suitable for data encryption routine. Encryption algorithm, encryption algorithm research to help people.
Platform: | Size: 324608 | Author: 东东 | Hits:

[Crack HackDES

Description:   数据加密标准DES   数据加密算法(Data Encryption Algorithm,DEA)的数据加密标准(Data Encryption Standard,DES)是规范的描述,它出自IBM 的研究工作,并在 1977 年被美国政府正式采纳。它是一种对称加密算法,很可能是使用最广泛的密钥系统,特别是在保护金融数据的安全中,最初开发的 DES 是嵌入硬 件中的。通常,自动取款机(Automated Teller Machine,ATM)都使用 DES。-ES Data Encryption Standard Data encryption algorithm (Data Encryption Algorithm, DEA) data encryption standard (Data Encryption Standard, DES) is a standard description of it from IBM s research work, and in 1977 formally adopted by the U.S. government. It is a symmetric encryption algorithm, is probably the most widely used key systems, particularly in protecting the security of financial data, the initial development of the DES is embedded in hardware. Typically, ATM (Automated Teller Machine, ATM) use DES.
Platform: | Size: 4096 | Author: 蟲子 | Hits:

[Crack Hackdes

Description:   数据加密算法(Data Encryption Algorithm,DEA)的数据加密标准(Data Encryption Standard,DES)是规范的描述,它出自IBM 的研究工作,并在 1977 年被美国政府正式采纳。它是一种对称加密算法,很可能是使用最广泛的密钥系统,特别是在保护金融数据的安全中,最初开发的 DES 是嵌入硬 件中的。通常,自动取款机(Automated Teller Machine,ATM)都使用 DES。-Data encryption algorithm (Data Encryption Algorithm, DEA) data encryption standard (Data Encryption Standard, DES) is a standard description of it from IBM' s research work, and in 1977 formally adopted by the U.S. government. It is a symmetric encryption algorithm, is probably the most widely used key systems, particularly in protecting the security of financial data, the initial development of the DES is embedded in hardware. Typically, ATM (Automated Teller Machine, ATM) use DES.
Platform: | Size: 4096 | Author: 李新 | Hits:

[CA authdes

Description: 数据加密算法(Data Encryption Algorithm,DEA)的数据加密标准(Data Encryption Standard,DES)是规范的描述,它出自 IBM 的研究工作,并在 1997 年被美国政府正式采纳。它很可能是使用最广泛的秘钥系统,特别是在保护金融数据的安全中,最初开发的 DES 是嵌入硬 件中的。-Data encryption algorithm (Data Encryption Algorithm, DEA) of the Data Encryption Standard (Data Encryption Standard, DES) is the standard description, it comes from IBM' s research work, and in 1997 formally adopted by the U.S. government. It is probably the most widely used secret key systems, especially in the protection of the security of financial data, the initial development of the DES is embedded in hardware.
Platform: | Size: 8192 | Author: 姜泽彪 | Hits:

[CA authencrytion_COM

Description: 随着计算机通信技术与Internet的飞速发展,用户对信息的安全存储、安全处理和安全传输的需求越来越迫切。本文首先论述了网络数 据加密技术,接着分析了网络数据安全研究的必要性,最后阐述了数据加密在网络通信中的应用-With the computer and communication technologies and the rapid development of Internet users about the security of storage, safe handling and secure transport needs more urgent. This paper discusses the network data encryption, and then analyzes the necessity of the research network data security, data encryption in the last described in the application of network communication
Platform: | Size: 1346560 | Author: 佳佳 | Hits:

[Special Effectsfourier

Description: 基于傅里叶域内的研究水印,实现其鲁棒性。数字水印技术,能有效的维护数字作品及数据的安全性,是信息隐藏领域的一个重要分支,它与信息安全、信息隐藏、数据加密等均有密切关系。数字水印有多个研究方向,主要集中在图像水印方面。基于傅立叶域的数字图像水印技术,是一种常见的水印算法,它具有算法简单,执行效率高,能有效对抗攻击的特点。-Research based on Fourier domain watermarking, to achieve its robustness. Digital watermarking technology to digital works and the effective maintenance of data security, information hiding is an important branch of the field, it is with information security, information hiding, data encryption Dengjun closely related. Digital watermarking has a number of research directions, mainly in terms of image watermarking. Fourier domain-based digital image watermarking technology, is a common watermarking algorithm, which algorithm is simple, the implementation of efficient, effective against attack characteristics.
Platform: | Size: 52224 | Author: 问题 | Hits:

[CA auth8-Mina_Mishra

Description: This literature review glances at the research that has been published in the area of chaos cryptography along with cryptanalysis of chaotic cryptosystem. It compares and contrasts the work done in different research papers towards the designing and cryptanalysis of chaotic cryptosystem for the validity of cryptosystems and improvement in encryption techniques. This review analyzes the role that chaotic cryptosystem has played and will play in the future relative to the security. By reviewing the papers, it is the objective to design a number of secured cryptosystem based on different families of chaotic sequences using various encryption techniques. The work can arrive with more efficient and robust chaotic cryptosystem so as to provide data security, privacy and to preserve the future of network security and prevail secured communication networking.
Platform: | Size: 92160 | Author: ahsun | Hits:

[Crack HackDES

Description: DES算法为密码体制中的对称密码体制,又被成为美国数据加密标准,是1972年美国IBM公司研制的对称密码体制加密算法-DES algorithm for password system of symmetric cryptosystem, and be become us data encryption standard, is in 1972 the United States IBM research of the symmetric cryptosystem encryption algorithm
Platform: | Size: 3950592 | Author: jason | Hits:

[Driver DevelopLinux

Description: Linux平台下数据加密装置接口的驱动研究与实现-Data encryption device interface-driven research in the Linux platform, and Implementation
Platform: | Size: 530432 | Author: liujinsuiyue | Hits:

[Crack Hackidea

Description: In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described in 1991. The algorithm was intended as a replacement for the Data Encryption Standard (DES). IDEA is a minor revision of an earlier cipher, Proposed Encryption Standard (PES). The cipher was designed under a research contract with the Hasler Foundation, which became part of Ascom-Tech AG. The cipher was patented in a number of countries but was freely available for non-commercial use. The name “IDEA” is also a trademark. The last patents expired in 2012 and IDEA is now patent-free and thus free to use.[2][3] IDEA was used in Pretty Good Privacy (PGP) v2.0, and was incorporated after the original cipher used in v1.0, BassOmatic, was found to be insecure.[4] IDEA is an optional algorithm in the OpenPGP standard.
Platform: | Size: 1028096 | Author: marwa | Hits:
« 12 »

CodeBus www.codebus.net