Welcome![Sign In][Sign Up]
Location:
Search - decrypt md5

Search list

[Crack Hacklinux-MD5

Description: 毕业设计,md5在linux下的性能测试,加了linux下的时间测试函数!当然也可以加密解密!-graduation design, md5 linux in the performance tests, the increase of time under linux test function! Of course, we can decrypt encrypted!
Platform: | Size: 8928 | Author: linchun | Hits:

[Crack HackhMacSha1

Description: 软件实现SHA1的HMAC算法,因为MD5已经被破解,所以就直接不上传了-software SHA1 the HMAC algorithms, as MD5 has been solved, so they do not directly uploaded
Platform: | Size: 3072 | Author: 高志权 | Hits:

[Crack Hacklinux-MD5

Description: 毕业设计,md5在linux下的性能测试,加了linux下的时间测试函数!当然也可以加密解密!-graduation design, md5 linux in the performance tests, the increase of time under linux test function! Of course, we can decrypt encrypted!
Platform: | Size: 8192 | Author: linchun | Hits:

[Crack HackMD5tool

Description: MD5信息摘要计算工具 如果对较大的文件进行MD5计算,会自动出现计算进度条, 目前的缺陷是对CPU占用过高,请有识之士修改之,并发 给我一份,非常感谢!-MD5 message digest calculation tool for larger if the paper MD5, will automatically calculate the progress of the current shortcomings of high CPU utilization, insight revisions, and give me a copy, very grateful!
Platform: | Size: 58368 | Author: zhangshijie | Hits:

[Crack Hackjjm

Description: 帮助开发出来的程序加密和解密!采用MD5算法,即时数据库中被人盗窃,也不能得到用户登录密码-Developed procedures to help encrypt and decrypt! Using MD5 algorithm, real-time database which has been stolen, nor can the user login password
Platform: | Size: 2048 | Author: 111111 | Hits:

[ICQ-IM-ChatClient-Server-based-Security-Comunication-Tool

Description: 自己用Java编的Client-Server聊天程序,结合了网络通信、数据安全、多线程的知识 1.使用RSA算法完成DES密钥的分配; 2.使用MD5结合RSA算法完成对消息的签名; 3.对原有消息及签名提供机密性保护(用DES算法加密); 4.能够解密并验证签名的合法性 -Their use of Java made the Client-Server chat program, a combination of network communications, data security, knowledge of multi-threaded one. RSA algorithm using the completion of the distribution of DES keys 2. RSA algorithm combines the use of MD5 message to complete the signature 3. The original message and signature to provide confidentiality protection (with DES encryption algorithm) 4. Able to decrypt and verify the legitimacy of the signature
Platform: | Size: 8192 | Author: Shadow | Hits:

[Crack Hackmd5

Description: md5加解密 System.out.println("解密后的二进串:" + byte2hex(clearByte)+"\n") System.out.println("解密后的字符串:" + (new String(clearByte))+"\n") -md5 encryption System.out.println (decrypted binary string:+ byte2hex (clearByte)+) System.out.println (decrypt string:+ (new String (clearByte))+)
Platform: | Size: 2048 | Author: jing | Hits:

[Delphi VCLMD5

Description: DELPHI MD5加密 1、 MD5String、MD5File、MD5Print、MD5Match这四个函数是供调用的。其他是用来辅助这几个函数的子函数。 2、MD5String为加密字符串。 3、MD5File为加密这个文件。 4、MD5Print是将加密后的密文转换成字符串。 5、MD5Match是用来比较密文是否一致。-DELPHI MD5 encryption 1, MD5String, MD5File, MD5Print, MD5Match the four function is called for. The other is used to these auxiliary function Functions. 2, MD5String for the encrypted string. 3, MD5File encrypted the document. 4, MD5Print is encrypted ciphertext converted into a string. 5, MD5Match ciphertext is used to compare whether they are consistent.
Platform: | Size: 9216 | Author: 韩夜 | Hits:

[JSP/Javajava_DigitalSign

Description: 实用数字签名的步骤 (1)发送方使用MD5算法对原始信息进行计算,获得一个固定长度的信息摘要 (2)发送方用自己的私钥加密生成的信息生成发送方的数字签名,发送方把这个数字签名作为发送信息的附件和明文信息,一同用接收方的公钥进行加密,将加密后的密文一同发送给接收方; (3)接收方首先把接收到的密文用自己的私钥解密,得到明文信息和数字签名,再用发送方的公钥对数字签名进行解密,然后使用相同的单向散列算法来计算解密得到的明文信息,得到信息摘要;对比计算出来的信息摘要和发送方发送过来的信息摘要是否一致-Practical steps to a digital signature (1) sender MD5 algorithm used to calculate the original information, access to a fixed length message digest (2) use their own sender s private key to generate encrypted information generated by the sender s digital signature, the sender of the digital signature as an annex to send a message and express information, together with the recipient s public key for encryption, will be encrypted ciphertext sent to the receiver together (3) the recipient first received ciphertext with its own private key to decrypt received explicit information and digital signatures, and then the sender s public key to decrypt the digital signature, and then use the same one-way hash algorithm to calculate the explicit information to be decrypted, the message digest contrast calculated message digest and the sender sent the message digest are consistent
Platform: | Size: 23552 | Author: 张云 | Hits:

[OS programMD5

Description: 标准C++写的使用MD5算法加密和解密的代码,这个代码测试可以使用。-Written in standard C++ using the MD5 algorithm to encrypt and decrypt the code, this code test can be used.
Platform: | Size: 4096 | Author: lixiuhong | Hits:

[Crack HackMD5andKL

Description: 此文件上传的主要原因是他能够加密解密MD5-The file is mainly due to he was able to decrypt MD5 encryption
Platform: | Size: 1024 | Author: newchq | Hits:

[Crack HackMD5

Description: 使用MD5算法对指定TXT文档内的内容进行加密。可反向进行解密。-MD5 algorithm used within the specified TXT encrypt the contents of the document. Can decrypt the reverse.
Platform: | Size: 14408704 | Author: yichaosun | Hits:

[Crack Hackc-md5

Description: 数据加密的基本过程就是对原来为明文的文件或数据按某种算法进行处理,使其成为不可读的一段代码,通常称为“密文”,使其只能在输入相应的密钥之后才能显示出本来内容,通过这样的途径来达到保护数据不被非法人窃取、阅读的目的。 该过程的逆过程为解密,即将该编码信息转化为其原来数据的过程。 是MD5算法设计 -The basic process of data encryption is to express the original documents or data processed by an algorithm, making it unreadable piece of code, commonly referred to as " ciphertext" , it can only be entered only after the corresponding key show original content, through such ways to protect data from unauthorized people to steal, the purpose of reading. The inverse process to decrypt, encode information about the process of transforming its original data. MD5 algorithm is designed
Platform: | Size: 2048 | Author: jason | Hits:

[Crack HackMD5

Description: 使用MD5算法的一个文件加密和解密系统。-MD5 algorithm used to encrypt and decrypt a file system.
Platform: | Size: 359424 | Author: 熊煜然 | Hits:

[Crack HackMD5

Description: MD5加密解密工具,新出现的MD5值自动加到数据库,本地找不到继续到网络上找,网络上找不到就生成新的Md5比对。-The MD5 encrypts to decrypt tool, lately- appeared MD5 valueses automatically add a database, local can not find to continue to seek in the network, can not find born new Md5 to compare a rightness on the network.
Platform: | Size: 21504 | Author: 黄福龙 | Hits:

[Crack Hackmd5

Description: MD5 Crypt/Decrypt Algorithm. Written in C++.
Platform: | Size: 5120 | Author: Ermin | Hits:

[Crack HackMD5-Encryption-Algorithm-VCPP

Description: MD5是一个安全的散列算法,输入两个不同的明文不会得到相同的输出值,根据输出值,不能得到原始的明文,即其过程不可逆;所以要解密MD5没有现成的算法,只能用穷举法,把可能出现的明文,用MD5算法散列之后,把得到的散列值和原始的数据形成一个一对一的映射表,通过比在表中比破解密码的MD5算法散列值,通过匹配从映射表中找出破解密码所对应的原始明文。 对信息系统或者网站系统来说,MD5算法主要用在用户注册口令的加密,对于普通强度的口令加密,可以通过以下三种方式进行破解: (1)在线查询密码。一些在线的MD5值查询网站提供MD5密码值的查询,输入MD5密码值后,如果在数据库中存在,那么可以很快获取其密码值。 (2)使用MD5破解工具。网络上有许多针对MD5破解的专用软件,通过设置字典来进行破解。 (3)通过社会工程学来获取或者重新设置用户的口令。 因此简单的MD5加密是没有办法达到绝对的安全的,因为普通的MD5加密有多种暴力破解方式,因此如果想要保证信息系统或者网站的安全,需要对MD5进行改造,增强其安全性,本文就是在MD5加密算法的基础上进行改进! -MD5 is a secure hash algorithm, the two different input plaintext will not get the same output values ​ ​ can not be obtained based on the output value of the original plaintext, i.e. the process is not reversible so is not ready to decrypt MD5 algorithm which can be usedbrute-force method, the plaintext may occur, after the hash with the MD5 algorithm, the resulting hash value and the original data to form a one-to-one mapping table, cracks than the ratio in the table algorithm MD5 hash value of the passwordmatch from the mapping table to find crack the code corresponding to the original plaintext. Information system or site system, the MD5 algorithm is mainly used in the user registered password encryption, password encryption for ordinary strength, can crack through the following three ways: (1) for the codes. The MD5 value of some online website the the MD5 password value query input MD5 password value, exists in the database, you can quickly obtain the password va
Platform: | Size: 274432 | Author: Johnson | Hits:

[Software EngineeringMd5Test

Description: MD5码加密生成及解密,MD5码加密生成及解密-Encrypt and decrypt MD5 code generation
Platform: | Size: 191488 | Author: | Hits:

[JSP/JavaMD5

Description: 非对称密码技术的实现 (1)熟悉RSA相关函数(公私钥生成函数,加密/解密函数); (2)利用公钥加密特定文件(test-1.txt),并用私钥进行解密;反过来,再利用私钥加密特定文件,并用公钥进行解密。对比解密后的文件与原始文件是否一致。 -Achieve asymmetric cryptographic techniques (1) be familiar with RSA-related functions (public and private key generation functions, encryption/decryption function) (2) the use of public key cryptography specific file (test-1.txt), and with the private key to decrypt turn , and then use the private key to encrypt specific files, and use the public key to decrypt it. Comparative decrypted file if the original files are consistent.
Platform: | Size: 4096 | Author: 王同学 | Hits:

[JSP/Javamd5jmjm

Description: md5工具,简单的md5加密解密工具,进行的md5转换,简单实用,加密可用解密有点问题(md5 tools,simple md5 encryption Decrypt tool)
Platform: | Size: 396288 | Author: 灯下书半卷 | Hits:
« 12 3 »

CodeBus www.codebus.net