Welcome![Sign In][Sign Up]
Location:
Search - stream cipher and block cipher

Search list

[Otherebusiness

Description: 信息安全原理及应用 密码学的基本概念和信息理论基础 流密码 分组密码-Principle and application of information security and the basic concepts of cryptography and information theory based on block cipher stream cipher
Platform: | Size: 1446912 | Author: Scorpio | Hits:

[Crack HackRC5

Description: 流密码算法,可用于文件加密和实时通信 ,设计者是著名的密码学家Rivest.该算法效率远高于一般分组密码,并且很适合用于随机数生成-Stream cipher algorithm, can be used for file encryption and real-time communication, the designer is well-known cryptographer Rivest. The algorithm efficiency is much higher than the general block cipher, and is suitable for random number generator
Platform: | Size: 2048 | Author: che wang | Hits:

[File FormatAES_DES_Workmode

Description: 对称/分组密码一般分为流加密(如OFB、CFB等)和块加密(如ECB、CBC等)。对于流加密,需要将分组密码转化为流模式工作。对于块加密(或称分组加密),如果要加密超过块大小的数据,就需要涉及填充和链加密模式,文中提到的ECB和CBC等就是指链加密模式。 本文将要介绍了AES对称加密/分组加密/流密码及其ECB、CBC、CFB、OFB和CTR五种对称加密模式。-Symmetric/block ciphers are generally divided into stream encryption (eg, OFB, CFB, etc.) and block encryption (such as ECB, CBC, etc.). For streaming encryption, block cipher needs to be translated into the work flow model. The encryption block (or block cipher), If you want to encrypt the data block size more than on the need to involve filling and chain encryption mode, the text referred to, such as ECB and CBC encryption mode refers chain. This paper will be introduced the AES symmetric encryption/packet encryption/stream cipher and the ECB, CBC, CFB, OFB and CTR mode in five symmetric encryption.
Platform: | Size: 382976 | Author: 王纪 | Hits:

[Crack HackDES

Description: 对称算法又称为传统密码算法。对称算法的对称性体现在加密密钥能够从解密密钥推算出来, 反之亦然。在大多数对称算法中, 加解密的密钥是相同的。可见, 对称密钥算法的加解密密钥都是保密的。对称密钥算法又分为两种分组密码和流密码。分组密码将明文分割为若干个定长的数据块称为一个分组, 每次对一个分组进行处理流密码又称序列密码, 依次对输人每个元素进行处理。DES算法是一种最通用的对称密钥算法, 属于分组密码算法。-Symmetric algorithm, also known as the traditional cryptographic algorithms. Reflected in the symmetry of symmetric algorithm encryption key can decrypt the keys derived from, and vice versa. In most symmetric algorithms, encryption and decryption key are the same. Visible, symmetric key encryption algorithm key are confidential. Symmetric key algorithm is divided into two block ciphers and stream ciphers. Cipher the plaintext is divided into a number of fixed-length blocks of data called a packet, each packet processing on a stream cipher, also known as cipher, each element in turn for processing the input. DES algorithm is a symmetric key algorithm is the most common, is block cipher.
Platform: | Size: 86016 | Author: 王风 | Hits:

[CA authcellbuzz-rc5-2.0.tar

Description: 用于蜂窝宽带的流和文件的RC5加密程序.包含数字签名,消息加扰等功能.-RC5 is a block cipher that was originally designed by Ronald Rivest (http://theory.lcs.mit.edu/~cis/pubs/rivest/rc5.ps). We have implemented and optimized the RC5 encryption/decryption library for the Sony-Toshiba-IBM Cell Broadband Engine. RC5 is widely used in message encryption, digital signatures, stream encryption.
Platform: | Size: 7168 | Author: wen zhao | Hits:

[Program docComparison-Based-Analysis-of-Different-Cryptograp

Description: Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.
Platform: | Size: 747520 | Author: zu | Hits:

[Crack Hacksse

Description: 实现了SSE(SSE简单流加密算法),该算法具有块加密与流密码特性的加密算法。-It implements SSE (SSE simple stream encryption algorithm), the algorithm has characteristics of stream ciphers and block cipher encryption algorithm.
Platform: | Size: 36864 | Author: liujian | Hits:

[Delphi VCLDelphi_632413

Description: Delphi:采用BASE64算法流加密,编码多个字节,可以编码奇数字节和基数字节,把编码好的块写到流中,当然也可进行BASE64算法流的解密,解密的数据输入到流中,还可进行BASE64算法字符串加密,字符串解密等,比较全的BASE64加密与解密实例,仅供参考。 -Delphi: a stream cipher algorithm using BASE64 encoding a plurality of bytes, and the base may be encoded odd byte byte written to the encoded stream in a good block, of course, also be BASE64 algorithm to decrypt the stream, the decrypted data stream is input to the , and also for BASE64 string encryption algorithm, decryption string, compare the BASE64 encryption and decryption examples for reference only.
Platform: | Size: 9216 | Author: ZS52OX7 | Hits:

[CA authBLAKE2-master

Description: BLAKE2 are cryptographic hash functions based on Dan Bernstein s Cha stream cipher, but a permuted copy of the input block, XORed with some round constants, is added before each Cha round. Like SHA-2, there are two variants differing in the word size. ChaCha operates on a 4×4 array of words. BLAKE repeatedly combines an 8-word hash value with 16 message words, truncating the ChaCha result to obtain the next hash value. BLAKE-256 and BLAKE-224 use 32-bit words and those output digest size are 256 bits and 224 bits, while BLAKE-512 and BLAKE-384 use 64-bit words and those output digest size are 512 bits and 384 bits.-BLAKE2 are cryptographic hash functions based on Dan Bernstein s ChaCha stream cipher, but a permuted copy of the input block, XORed with some round constants, is added before each ChaCha round. Like SHA-2, there are two variants differing in the word size. ChaCha operates on a 4×4 array of words. BLAKE repeatedly combines an 8-word hash value with 16 message words, truncating the ChaCha result to obtain the next hash value. BLAKE-256 and BLAKE-224 use 32-bit words and those output digest size are 256 bits and 224 bits, while BLAKE-512 and BLAKE-384 use 64-bit words and those output digest size are 512 bits and 384 bits.
Platform: | Size: 497664 | Author: Jonathan Young | Hits:

CodeBus www.codebus.net