Welcome![Sign In][Sign Up]
Location:
Search - Secret Key Generation

Search list

[JSP/Javaxmlbased_RSA

Description: 对于要加密的文档,www有一套标准,约定用于加密的文档应当组成一定的格式.对于符合这个格式的xml文档,本程序能从中提前rsa加密密钥和明文进行加密.本程序还提供rsa密钥生成接口和加密解密接口.-regard to the encrypted files, www set of standards, agreement for encrypted files should be composed of a certain format. For the format of the xml document, The procedure to locate the advance rsa encryption key and the letter of encryption. The procedures also provide rsa key generation and processing interface secret decryption interface.
Platform: | Size: 40832 | Author: 黎之方 | Hits:

[Other resourceSubstituter.java

Description: 代入法的启发示搜索 我的代码实现是:按照自然语言各字母出现频率的大小从高到低(已经有人作国统计分析了)先生成一张字母出现频率统计表(A)--------(e),(t,a,o,i,n,s,h,r),(d,l),(c,u,m,w,f,g,y,p,b),(v,k,j,x,q,z) ,再对密文字母计算频率,并按频率从高到低生成一张输入密文字母的统计表(B),通过两张表的对应关系,不断用A中的字母去替换B中的字母,搜索不成功时就回退,在这里回朔是一个关键。 -generation into a search of inspiration I said a code is : According to the Natural Language alphabet frequency of the size of precedence (has been for the State Statistical Analysis), Mr. into an alphabet frequency tables (A )--------( e), (t, a, o, i, n, s, h r), (d, l), (c, u, m, w, f, g, y, p, b), (v, k, j, x, q, z), again close to the mother language calculated frequency and frequency input precedence generate a secret letter to the mother TAB (B), Table 2 by the corresponding relations, use of the letters A to B to replace the letters of the alphabet, when unsuccessful search regression, Here is a retrospective key.
Platform: | Size: 3971 | Author: rtshen | Hits:

[JSP/Javaxmlbased_RSA

Description: 对于要加密的文档,www有一套标准,约定用于加密的文档应当组成一定的格式.对于符合这个格式的xml文档,本程序能从中提前rsa加密密钥和明文进行加密.本程序还提供rsa密钥生成接口和加密解密接口.-regard to the encrypted files, www set of standards, agreement for encrypted files should be composed of a certain format. For the format of the xml document, The procedure to locate the advance rsa encryption key and the letter of encryption. The procedures also provide rsa key generation and processing interface secret decryption interface.
Platform: | Size: 40960 | Author: 黎之方 | Hits:

[AI-NN-PRSubstituter.java

Description: 代入法的启发示搜索 我的代码实现是:按照自然语言各字母出现频率的大小从高到低(已经有人作国统计分析了)先生成一张字母出现频率统计表(A)--------(e),(t,a,o,i,n,s,h,r),(d,l),(c,u,m,w,f,g,y,p,b),(v,k,j,x,q,z) ,再对密文字母计算频率,并按频率从高到低生成一张输入密文字母的统计表(B),通过两张表的对应关系,不断用A中的字母去替换B中的字母,搜索不成功时就回退,在这里回朔是一个关键。 -generation into a search of inspiration I said a code is : According to the Natural Language alphabet frequency of the size of precedence (has been for the State Statistical Analysis), Mr. into an alphabet frequency tables (A )--------( e), (t, a, o, i, n, s, h r), (d, l), (c, u, m, w, f, g, y, p, b), (v, k, j, x, q, z), again close to the mother language calculated frequency and frequency input precedence generate a secret letter to the mother TAB (B), Table 2 by the corresponding relations, use of the letters A to B to replace the letters of the alphabet, when unsuccessful search regression, Here is a retrospective key.
Platform: | Size: 4096 | Author: rtshen | Hits:

[OtherDES

Description: 一个实现DES加解密算法的小程序,编程实现DES算法的加密过程、脱密过程和16个内部密钥生成过程-An implementation of DES encryption and decryption algorithm applet, programming encryption algorithm DES implementation process, from secret process and the 16 internal key generation process
Platform: | Size: 122880 | Author: andy | Hits:

[Crack Hackkhalil2006_true_random_number_generator

Description: a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES.
Platform: | Size: 418816 | Author: Hassan Abdelaziz | Hits:

[Crack Hack20060428

Description: 提出了一个新的强壮的密钥管理方案。该方案利用秘钥生成中心(KGC)与秘钥因子组合中心(KGCC)共同完成秘钥托管与秘钥的生成-Proposed a new strong key management program. The program draws on secret key generation center (KGC) and the secret key factors and Fabrication Center (KGCC) co-hosted with the secret key to the completion of secret key generation
Platform: | Size: 194560 | Author: 张伟 | Hits:

[Crack Hacksecret

Description: 关于暗算的加密算法,包括对txt的文件的加密和解密,产生密钥等相关函数-Encryption algorithm on the plot, including txt file encryption, and decryption, key generation and other related functions
Platform: | Size: 2048 | Author: chao | Hits:

[Crack Hack信息安全实验2-1

Description: 实验内容 1、对称密码技术的实现 (1)熟悉相应的DES加密/解密函数的使用,在单机完成对特定文件(test-1.txt)的单重DES加密/解密; (2)针对DES密钥特点(8字节,64比特位,其中真正起作用的为56比特位),设计一次一密的密钥产生机制(即每次会话所使用的密钥都是临时随机产生的); 2、非对称密码技术的实现 (1)熟悉RSA相关函数(公私钥生成函数,加密/解密函数); (2)利用公钥加密特定文件(test-1.txt),并用私钥进行解密;反过来,再利用私钥加密特定文件,并用公钥进行解密。对比解密后的文件与原始文件是否一致。 3、信息摘要技术的实现 (1)熟悉MD5算法的实现函数; (2)利用MD5实现函数,对特定文件(test-1.txt)进行信息摘要的计算,得到信息摘要M1;尝试改变特定文件中的内容(比如改变其中某个字母),再利用MD5计算一次信息摘要,看同之前得到的信息摘要是否相同; 设计要求 1、JAVA语言编程实现 2、单机上完成 3、加密内容为一文本文件(从服务器下载),从服务器上下载相关软件包(jce-1_2_2和帮助文件,主要用于RSA密钥生成和加/解密,如果安装了JDK1.6版本以上,则不需要jce支持)后,请先阅读帮助再进行编程。(DES/RSA/MD5 The implementation of symmetric cryptography (1) familiar with the use of the corresponding DES encryption / decryption function, complete single DES encryption / decryption of a particular file (test-1.txt) in a single machine; (2) for DES key features (8 bytes, 64 bits, which really works for 56 bits), the design of a secret key generation mechanism (i.e. using the session key is randomly generated temporary);)
Platform: | Size: 16384 | Author: 潇洒坤 | Hits:

[Linux-Unixeasy-rsa-3.0.5

Description: 一个easy-rsa秘钥3.0.5版本,供生成加密key(A easy-rsa secret key 3.0.5 version for the generation of encrypted key)
Platform: | Size: 652288 | Author: so天空la | Hits:

[Windows DevelopSM-TOOLS-master

Description: 此工具支持国密各种算法:SM4对称加解密,国密密钥对的生成,SM3信息摘要,SM2数字签名以及验证签名,SM2非对称加解密,PKCS7签名数据包形成以及PKCS7验签, 生成PKCS7数字信封已经解PKCS7签名数据,后续会添加PKCS7签名数字信封相关功能。输入输出格式都严格按照国家密码管理局的相关规定。形成一个本地工具方便大家使用。(This tool supports various national algorithms: SM4 symmetric encryption and decryption, national secret key pair generation, SM3 information summary, SM2 digital signature and verification signature, SM2 asymmetric encryption and decryption, PKCS7 signature data packet formation and PKCS7 checkin, PKCS7 digital envelopes have already solved PKCS7 signature numbers, and then PKCS7 signature digital envelopes will be added. Related functions. The input and output formats are in strict accordance with the relevant regulations of the State Encryption administration. The formation of a local tool is convenient for everyone to use.)
Platform: | Size: 2155520 | Author: 之昂飞 | Hits:

[Windows DevelopDES

Description: main函数文件输入明文,调用秘钥留生成函数(get_k文件)以及加解密函数(encrypt_fcn文件),完成对明文的加密和解密(Encryption and decryption of plaintext are accomplished by inputting main function file into plaintext, calling secret key generation function (get_k file) and encryption and decryption function (encrypt_fcn file).)
Platform: | Size: 3072 | Author: hyperbole | Hits:

[CA authGMCA

Description: SM2 SM3 X.509 国密 证书 国密算法 国密证书 生成签发 相关代码 包含sm2国密算法密钥生成,证书请求生成,数字证书生成,sm3withsm2国密数字签名示例(SM2 SM3 X.509 Secret Certificate Secret Algorithms Secret Certificate Generation and Issuance of Related Codes Including SM2 encryption algorithm key generation, certificate request generation, digital certificate generation, sm3withsm2 encryption digital signature example)
Platform: | Size: 4096 | Author: what_0000 | Hits:

CodeBus www.codebus.net