Welcome![Sign In][Sign Up]
Location:
Search - cryptanalysis

Search list

[Windows DevelopIDEA

Description: IDEA (International Data Encryption Algorithm) Data Encryption Algorithm by famous Chinese scholars and password Jiaboshi experts James L. Massey in 1990 jointly proposed. As a block cipher designed a wonderful work, IDEA algorithm has strong anti-attack capability. Because encryption PGP (Pretty Good Privacy) software showed a very high security, and IDEA is the actual text of PGP encryption algorithm, the introduction of direct attacks to decrypt law, the text of PGP IDEA is the first line of defense. From the safety analysis of the IDEA-differential cryptanalysis capacity is far higher than double DES. Description: After the compiler plugin DLL files Add cf1127 \\ features \\ folder, double-click CalculationFactory.exe, click \"formula / toolbox\", and pressed buttons, \"toolbox\" tab, and can be read Plug-in tools to. The remaining nine folder contains different projects, all compiled into class library, which is calculated factory plug-in DLL files.
Platform: | Size: 20694 | Author: huli | Hits:

[Crack Hackdcades

Description: des差分密码分析实现源代码-des differential cryptanalysis achieve source code
Platform: | Size: 14762 | Author: 林洋 | Hits:

[Crack Hack差分分析(C++)

Description: 差分密码分析,此实验是对S-P密码体制的差分分析-differential cryptanalysis, the experiment of S-P Cryptosystem Differential Analysis
Platform: | Size: 139555 | Author: 小华 | Hits:

[Crack Hackdcades

Description: des差分密码分析实现源代码-des differential cryptanalysis achieve source code
Platform: | Size: 14336 | Author: 林洋 | Hits:

[Crack Hack差分分析(C++)

Description: 差分密码分析,此实验是对S-P密码体制的差分分析-differential cryptanalysis, the experiment of S-P Cryptosystem Differential Analysis
Platform: | Size: 139264 | Author: 小华 | Hits:

[Windows DevelopIDEA

Description: IDEA (International Data Encryption Algorithm) Data Encryption Algorithm by famous Chinese scholars and password Jiaboshi experts James L. Massey in 1990 jointly proposed. As a block cipher designed a wonderful work, IDEA algorithm has strong anti-attack capability. Because encryption PGP (Pretty Good Privacy) software showed a very high security, and IDEA is the actual text of PGP encryption algorithm, the introduction of direct attacks to decrypt law, the text of PGP IDEA is the first line of defense. From the safety analysis of the IDEA-differential cryptanalysis capacity is far higher than double DES. Description: After the compiler plugin DLL files Add cf1127 \ features \ folder, double-click CalculationFactory.exe, click "formula / toolbox", and pressed buttons, "toolbox" tab, and can be read Plug-in tools to. The remaining nine folder contains different projects, all compiled into class library, which is calculated factory plug-in DLL files.-IDEA (International Data Encryption Algorithm) Data Encryption Algorithm by famous Chinese scholars and password Jiaboshi experts James L. Massey in 1990 jointly proposed. As a block cipher designed a wonderful work, IDEA algorithm has strong anti-attack capability. Because encryption PGP (Pretty Good Privacy) software showed a very high security, and IDEA is the actual text of PGP encryption algorithm, the introduction of direct attacks to decrypt law, the text of PGP IDEA is the first line of defense. From the safety analysis of the IDEA-differential cryptanalysis capacity is far higher than double DES. Description: After the compiler plugin DLL files Add cf1127 \ features \ folder, double-click CalculationFactory.exe, click "formula/toolbox", and pressed buttons, "toolbox" tab, and can be read Plug-in tools to. The remaining nine folder contains different projects, all compiled into class library, which is calculated factory plug-in DLL files.
Platform: | Size: 87040 | Author: huli | Hits:

[Crack Hackcomputer-cyphers

Description: 密码学以研究保密通信为目的,而且仅限于数据通信。 密码技术还应用于信息鉴别和数字鉴别,用以防止电子欺骗。 密码加密算法的对立面就是密码分析,也就是破译技术研究。加密与破译是一对矛盾,了解破译对研究加密非常必要。-Cryptography to secure communications for the purpose of research, but limited to data communications. Cryptographic techniques also applies to information to identify and digital identification, to prevent spoofing. Password encryption algorithm is the antithesis of cryptanalysis, that is, deciphering the technical studies. Encryption and deciphering is a contradiction to understand the study of deciphering the encryption is necessary.
Platform: | Size: 4322304 | Author: lf | Hits:

[JSP/Javas_des

Description: DES是种抗密码分析更强的加密方法,尽管DES的安全强度一直是个争论的话题.现今在金融行业已十分流行. java实现的简单DES加密算法-DES is a stronger anti-cryptanalysis of encryption methods, despite the strength of DES security has always been a controversial topic. Present in the financial industry has been very popular. Java achieve simple DES encryption algorithm
Platform: | Size: 6144 | Author: 田伟 | Hits:

[OtherMifare.Cryptanalysis

Description: The secret cipher that secures Mifare Classic RFID tags used in access control systems, subway tickets, and various other security-related applications has recently been disclosed
Platform: | Size: 133120 | Author: Sergio | Hits:

[Crack HackcryptbasInC

Description: Cryptanalysis Source Code in C
Platform: | Size: 16384 | Author: Bahar | Hits:

[DocumentsCryptanalysisofanimageencryptionscheme

Description: Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed, where the encryption process involves a permutation operation and an XORlike transformation of the shuffled pixels, which are controlled by three chaotic systems. This paper discusses some defects of the schemes and how to break them with a chosen-plaintext attack.
Platform: | Size: 251904 | Author: xiaowang | Hits:

[Software EngineeringIntroduction_to_cryptology_Part1_Basic_cryptology

Description: Introduction to Cryptograpy and Cryptanalysis
Platform: | Size: 132096 | Author: marara | Hits:

[Crack HackPractical_Attack_on_KeeLoq

Description: Practical Attack on KeeLoq. KeeLoq, cryptanalysis, block ciphers, slide attacks, meetin- the-middle attacks.
Platform: | Size: 467968 | Author: Tillman | Hits:

[Crack HackCryptoanalysis_of_the_KeeLoq_block_cipher

Description: KeeLoq block cipher, cryptanalysis, slide attacks, guessand- determine attacks, distinguishing attacks
Platform: | Size: 119808 | Author: Tillman | Hits:

[Compress-Decompress algrithmswaes

Description: cryptanalysis of an aes white box
Platform: | Size: 231424 | Author: akshay | Hits:

[Multimedia program2CryptanalysisofVideoEncryption

Description: Content security is an important issue in multimedia applications. In this paper we perform a cryptanalysis of several encryption algorithms that have been proposed to protect the privacy of MPEG video streams. In particular, we analyze the encryption based on permuting the Hu® man codeword list, and two selective encryption algorithms - VEA and MVEA. For the convenience of the reader, we provide a simple overview of MPEG encoding, and we include all analyzed algorithms and their characteristics.-Content security is an important issue in multimedia applications. In this paper we perform a cryptanalysis of several encryption algorithms that have been proposed to protect the privacy of MPEG video streams. In particular, we analyze the encryption based on permuting the Hu® man codeword list, and two selective encryption algorithms- VEA and MVEA. For the convenience of the reader, we provide a simple overview of MPEG encoding, and we include all analyzed algorithms and their characteristics.
Platform: | Size: 89088 | Author: wang | Hits:

[matlabcrosscorelation

Description: In signal processing, cross-correlation is a measure of similarity of two waveforms as a function of a time-lag applied to one of them. This is also known as a sliding dot product or inner-product. It is commonly used to search a long duration signal for a shorter, known feature. It also has applications in pattern recognition, single particle analysis, electron tomographic averaging, cryptanalysis, and neurophysiology.
Platform: | Size: 1024 | Author: Rafal | Hits:

[Crack HackDESdifferential-analysis-

Description: C语言实现——应用分组密码体制的基本原理,实现DES加解密,并分析 DES 的雪崩性质,对DES加密进行差分分析,并利用自己设计的S盒进行加密 -C language- Application of basic principles of block ciphers, DES encryption and decryption to achieve, and the nature of the avalanche DES, differential cryptanalysis of DES encryption, and use their own design S-boxes for encryption
Platform: | Size: 883712 | Author: 赵子番 | Hits:

[CA authCryptanalysis-INCrypt32-of-iCLASS

Description: Cryptanalysis of INCrypt32 in HID s iCLASS Systems ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, and Daewan Han Category / Keywords: secret-key cryptography / INCrypt32, HID s iCLASS, RFID, reverse engineering, chosen message attack.-Abstract: The cryptographic algorithm called INCrypt32 is a MAC algorithm to authenticate participants, RFID cards and readers, in HID Global s iCLASS systems. HID s iCLASS cards are widely used contactless smart cards for physical access control. Although INCrypt32 is a heart of the security of HID s iCLASS systems, its security has not been evaluated yet since the specication has not been open to public. In this paper, we reveal the specication of INCrypt32 by reverse engineering an iCLASS card and investigate the security of INCrypt32. As a result, we show that the secret key of size 64 bits can be recovered using only $2^{18}$ MAC queries if the attacker can request MAC for chosen messages of arbitrary length. If the length of messages is limited to predetermined values by the authentication protocol, the required number of MAC queries grows to $2^{42}$ to recover the secret key.
Platform: | Size: 1284096 | Author: 系站长 系站长 | Hits:

[Crack HackCryptanalysis-of-Multi-Prime-RSA

Description: Cryptanalysis of Multi-Prime RSA
Platform: | Size: 238592 | Author: liyunfei | Hits:
« 12 3 »

CodeBus www.codebus.net