Welcome![Sign In][Sign Up]
Location:
Search - one time key encryption

Search list

[Crack HackScx3.1

Description: This file contains a C++Builder 4 project called SimplyChaos-X ver 3.1 (SCX31). SCX31 is an encryption tool. I designed it as my graduation paper work. SCX31 is a symmetric stream cipher built on chaos function, one time pad cipher and inspiration from Ground Effect (aviation). The key length can be up to 40 characters (320 bits).
Platform: | Size: 23338 | Author: 范杰 | Hits:

[File OperateCryptoAPI_ProtectFile

Description: 利用Visual C++ .net2003开发的一款用于保护文件的小程序。 对文件产生MD5值同时对源文件用DES加密,并用私钥加密签名。 对加密文件解密,验证用公钥解密签名与解密文件的MD5值比较,以判断文件是否被修改。 遇到的问题:微软提供的签名函数可能有问题,无论用公钥还是私钥签名,用公钥、私钥(任一)均可解密。怪!希望在此与大家交流交流。-The use of Visual C++. Net2003 developed a document for the protection of small procedures. MD5 value of the document produced at the same time the source file using DES encryption, and signature private key encryption. Encrypted files decryption, authentication using public key to decrypt the signature and decrypt files MD5 value to determine whether a document is modified. Problems encountered: Microsoft to provide the signature function may be a problem regardless of whether it uses a public key or private key signature, using public key, private key (any one) can be decrypted. Strange! Would like to exchange with the U.S. exchanges.
Platform: | Size: 47104 | Author: jimin | Hits:

[Crack HackDES

Description: 用C语言写的100行DES加密算法. DES算法具有极高安全性,到目前为止,除了用穷举搜索法对DES算法进行攻击外,还没有发现更有效的办法。而56位长的密钥的穷举空间为256,这意味着如果一台计算机的速度是每一秒种检测一百万个密钥,则它搜索完全部密钥就需要将近2285年的时间,可见,这是难以实现的,当然,随着科学技术的发展,当出现超高速计算机后,我们可考虑把DES密钥的长度再增长一些,以此来达到更高的保密程度。-Using C language to write 100 lines of the DES encryption algorithm. DES algorithm has high security, so far, except by exhaustive search attack on the DES algorithm, but also found no more effective way. And 56 long exhaustive key space for the 256, which means that if a computer s speed is detected every second of one million keys, it searches entirely on the needs of key Department of nearly 2285 time can be seen, it is difficult to realize, of course, with the development of science and technology, when the emergence of ultra-high-speed computer, we can consider the DES key length and then some growth in order to achieve higher levels of security.
Platform: | Size: 7168 | Author: JohnBill | Hits:

[Crack HackScx3.1

Description: This file contains a C++Builder 4 project called SimplyChaos-X ver 3.1 (SCX31). SCX31 is an encryption tool. I designed it as my graduation paper work. SCX31 is a symmetric stream cipher built on chaos function, one time pad cipher and inspiration from Ground Effect (aviation). The key length can be up to 40 characters (320 bits).
Platform: | Size: 24576 | Author: 范杰 | Hits:

[Otherbb

Description: 基于AES和RSA加密算法的RFID安全机制 考虑到对国内应用最广泛的Mifarel系列标签的安全手t一级, 在建立以 MFRC500为读卡核心的RFID读卡系统的基础上,提出了一种基于非 对称加密与对称加密算法相结合的RFID安全机制。利用一1卜对称力11密算法对对称 加密算法的密钥的二次加密,做到只有特定的读写器才能拥有读写卡的权利。该 安全机制跳过RFID在开放环境中传输所面临的各种威胁,通过利少月安全性和稳 定性久经考验的公开安全加密算法对存入智能卡信息的重加密,解决了RFID所 面临的安全和隐私泄露问题 -Taking into account the most widely used domestic Mifarel series of labels t a safe hand, In the establishment of MFRC500 as the reader, RFID reader system, the core was proposed based on a based on non- Symmetric encryption and symmetric encryption algorithm is a combination of RFID security mechanism. The use of a one-Bu symmetry edge 11 close to the symmetric algorithm The key encryption algorithm for re-keying, so that only certain card reader in order to have the right to read and write. The Skip RFID security mechanisms to transfer in an open environment faced by a variety of threats, through the pros on the security and stability Qualitative time-tested public security encryption algorithm into the smart card information, re-encryption, solved by RFID Faced with the problem of security and privacy leaks
Platform: | Size: 5257216 | Author: wupiao | Hits:

[CA authaes_mini_project

Description: It is encryption and decryption algorithm. AES is a symmetric encryption algorithm processing data in block of 128 bits.Under the influence of a key, a 128-bit block is encrypted by transforming it in a unique way into a new block of the same size. AES is symmetric since the same key is used for encryption and the reverse transformation, decryption. The only secret necessary to keep for security is the key. AES may configured to use different key-lengths, the standard defines 3 lengths and the resulting algorithms are named AES-128, AES-192 and AES-256 respectively to indicate the length in bits of the key. Each additional bit in the key effectively doubles the strength of the algorithm, when defined as the time necessary for an attacker to stage a brute force attack, i.e. an exhaustive search of all possible key combinations in order to find the right one.
Platform: | Size: 1195008 | Author: asha | Hits:

[Crack HackDES

Description: 算法流程 1.将要处理的二进制串进行IP置换 2.将密钥进行PC1置换(64位转为56位), 3.进行16轮操作,对于第i轮操作: 1)将上一次得到的PC1密钥(级除去第一次外,其他的都经过移位处理)的结果左右部分(各28位)分别循环左移1位或2位,然后将移位后的密钥进行PC2[i]置换. 2)将处理串均等分为左右两串Li,Ri(各32位),然后将右串Ri通过E盒拓展为新的右串R (48位),R 与上一步得到的PC2[i]子密钥进行异或操作,结果通过S盒输出(48为转为32位),然后通过P盒直接置换,再与Li异或. 3)将Ri赋给作出Li,R 赋值给Ri. 4)合并处理串StrText=Li+Ri. 4.将最新的处理串进行IP_1置换,置换结果即为所求的加密串或解密串 加密解密的区别 在每轮操作中,加密使用的PC2密钥顺序为0~15,解密使用的PC2密钥顺序为15~0. -Algorithm flow A binary string to be processed is substituted for IP 2 key the PC1 replacement (64 into 56) 16 operation, the operation for the i-th round: 1) about the results of the last PC1 key (remove the first time, the others have been shifting processing) (28) rotate left one or two, and then will shift key PC2 [i] replacement. 2) is divided into the equal treatment string around two bunches of Li, Ri (32), and then expand the right string Ri E box (48-bit), the right string R R​ ​ and the previous step PC2 i] subkey XOR operation result is output via the S-box (48 to 32 conversion), and then directly through the P box replacement and XOR with Li. 3) the Ri to make Li, R is assigned to Ri. 4) merger deal with string StrText Ri = Li+. 4. Latest processing string IP_1 replacement, replacement results shall request string encryption or decryption string Encryption and decryption of difference In each round of operations, PC2 key e
Platform: | Size: 2048 | Author: zhusiyi | Hits:

[Crack HackCryptBox_Code.zip

Description: 文件加密和解密使用基于密码的加密 (PBE)。 基于密码的加密 (PBE) 从密码派生的加密密钥。为了使从获取的密码密钥非常耗费时间的攻击任务,大多数 PBE 实现 (作为一个如下所示) 将混合在一个随机数称为盐,以创建密钥。,File Encryption and Decryption using Password Based Encryption (PBE). Password-Based Encryption (PBE) derives an encryption key from a password. In order to make the task of getting from password to key very time-consuming for an attacker, most PBE implementations (as the one shown below) will mix in a random number, known as a salt, to create the key.
Platform: | Size: 70656 | Author: xiaocai | Hits:

[CSharpFrm_Main

Description: 使用one-time pad算法加密数据,输入需要加密的数据和密钥,输出解密后的数据-Encrypted data and key algorithm using one-time pad encryption of data, input, output the decrypted data
Platform: | Size: 1024 | Author: 曾林凯 | Hits:

[Program docComparison-Based-Analysis-of-Different-Cryptograp

Description: Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.
Platform: | Size: 747520 | Author: zu | Hits:

[JSP/JavaInfoSecurity

Description: 完成分布式对称密钥分配 说明:作为通讯的双方A和B已经共享一个会话主密钥Km。在完成会话密钥Ks的分配后,A利用Ks对特定文件(test-1.txt)进行加密,并发送给B;B利用Ks对密文进行解密,并对比解密后的明文信息同原来的文件是否一致。 要求: (1)JAVA语言编程实现,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一文本文件(test-1.txt); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中分布式密钥分配方案为参考,完成从步骤1到步骤3的全过程;-Complete distributed symmetric key distribution Description: As both A and B have shared a communication session master key Km. After the completion of the distribution of the session key Ks, A specific file using Ks (test-1.txt) encrypts and sends B B using Ks to decrypt the ciphertext, and the decrypted plaintext comparison with the original whether the files are consistent. Requirements: (1) JAVA programming language, based on DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA there are library functions support) (2) the contents of a text file to communicate (test-1.txt) (3) based on the network completion of key distribution work (both as a communications A, B should be deployed on two hosts) (4) are all assigned to the symmetric key one-time pad, randomly generated (5) the specific key distribution process please textbooks distributed key distribution scheme as a reference, complete step 1 to step 3 in the whole process
Platform: | Size: 15360 | Author: 王同学 | Hits:

[Crack Hackcryptobboxvcl-(1)

Description: By EldoS Corporation. CryptoBlackbox package of SecureBlackbox is a free collection of components and classes that offer wide range of both basic and sophisticated cryptography functions. This includes: symmetric and asymmetric (PKI-based) cryptography one-time password generation, cryptographic hashes and key derivation functions X.509 certificate management and validation certificate-based data encryption/decryption, signing and signature validation, timestamping TSP and OCSP clients.
Platform: | Size: 1393664 | Author: Rafael | Hits:

[Crack HackRSA

Description: RSA算法是第一个能同时用于加密和数字签名的算法,也易于理解和操作。RSA是被研究得最广泛的公钥算法,从提出到现在已近二十年,经历了各种攻击的考验,逐渐为人们接受,普遍认为是目前最优秀的公钥方案之一(The RSA algorithm is the first algorithm that can be used for both encryption and digital signature at the same time. It is also easy to understand and operate. RSA is the most widely researched public key algorithm. It has been nearly twenty years since it was put forward. It has been tested by various kinds of attacks and gradually accepted by people. It is generally considered to be one of the best public key schemes at present. The security of RSA depends on the factor decomposition of large numbers, but it does not theoretically prove that the difficulty of breaking the RSA is equivalent to the difficulty of the large number decomposition.)
Platform: | Size: 194560 | Author: 木南花开 | Hits:

CodeBus www.codebus.net