Welcome![Sign In][Sign Up]
Location:
Search - 密码实验一

Search list

[Other resourcekejian

Description: 专为各大学、函授学校以及远程教育中心向学生们发布复习材料、实验素材等课件而设计的一套专用的基于WEB的上传、下载系统,支持包括无组件上传在内的多种上传方式。客户端脚本均采用JavaScript编写,可适用于包括IE、NC在内的所有支持JavaScript的浏览器。程序在设计上采用了多种流行的数据保护方式,如md5、登陆随机数等以保证数据的安全,其数据库不会被下载,即使数据库丢失也不会泄露密码。本系统经多方测试,占用系统资源极小,是一款非常实用的教学辅助系统。 V2.x系列版本是为面向大型站点专门设计的程序,为开放式管理-tailored to the university, the school and distance education center to release students review material, such as experimental material courseware designed a dedicated Web-based upload and download system, including non-support components upload upload a variety of ways. Client script JavaScript are used to prepare and can be applied to include IE, NC of all support JavaScript browser. Procedures used in the design of a variety of popular data protection methods, such as md5, landing random numbers to ensure data security, its database will be downloaded, even if the database has not divulged lost password. The multilateral system testing, which takes up minimal system resources, is a very useful teaching aids. Firmware version of the series of large-scale site-specific design of procedure
Platform: | Size: 214484 | Author: 何亚辉 | Hits:

[Otheryuecefuhuan

Description: 实验题目 约瑟夫环 一、 实验目的 用一个循环链表来实现约瑟夫环问题 二、 实验内容 编号为1,2,……,n的n个人按顺序时针方向围坐一圈,每个人吃一个密码。一开始任选一个整数作为报数上限值m,从第一个人开始顺时针自1开始顺序报数,报到m时停止报数。报m的人出列,将他的密码作为新的m值,从它在顺时针方向上的下一个人开始重新从1报数,如此下去直到所有人全部出列。 三、 需求分析 输入m=20;n=7,7个人的密码依次是:3,1,7,2,4,8,4,出列顺序为:6,1,4,7,2,3,5。 -experiment a subject Josephus, the experiment used a cycle chain to achieve Joseph Central 2. Experiment No. 1, 2, ..., n, n personal sequential anti-clockwise direction sitting around a circle and each person eating a password. An optional began as a whole reported a few limits on m, started from the first clockwise from the beginning of a sequence of several reported, m report reportedly stopped a few. M reported from the series of his password as a new value m, from it in a clockwise direction for the next re-started from a few reported that more until the total of all out. 3, needs analysis input m = 20; N = 7,7 personal password in order, are : 3,1,7,2,4,8. 4 out out in chronological order : 6,1,4,7,2,3,5.
Platform: | Size: 8244 | Author: 李爱春 | Hits:

[Windows Develop现代密码学实验

Description: 现代密码学实验源代码
Platform: | Size: 1465 | Author: channpc@163.com | Hits:

[Education soft systemkejian

Description: 专为各大学、函授学校以及远程教育中心向学生们发布复习材料、实验素材等课件而设计的一套专用的基于WEB的上传、下载系统,支持包括无组件上传在内的多种上传方式。客户端脚本均采用JavaScript编写,可适用于包括IE、NC在内的所有支持JavaScript的浏览器。程序在设计上采用了多种流行的数据保护方式,如md5、登陆随机数等以保证数据的安全,其数据库不会被下载,即使数据库丢失也不会泄露密码。本系统经多方测试,占用系统资源极小,是一款非常实用的教学辅助系统。 V2.x系列版本是为面向大型站点专门设计的程序,为开放式管理-tailored to the university, the school and distance education center to release students review material, such as experimental material courseware designed a dedicated Web-based upload and download system, including non-support components upload upload a variety of ways. Client script JavaScript are used to prepare and can be applied to include IE, NC of all support JavaScript browser. Procedures used in the design of a variety of popular data protection methods, such as md5, landing random numbers to ensure data security, its database will be downloaded, even if the database has not divulged lost password. The multilateral system testing, which takes up minimal system resources, is a very useful teaching aids. Firmware version of the series of large-scale site-specific design of procedure
Platform: | Size: 214016 | Author: 何亚辉 | Hits:

[Otheryuecefuhuan

Description: 实验题目 约瑟夫环 一、 实验目的 用一个循环链表来实现约瑟夫环问题 二、 实验内容 编号为1,2,……,n的n个人按顺序时针方向围坐一圈,每个人吃一个密码。一开始任选一个整数作为报数上限值m,从第一个人开始顺时针自1开始顺序报数,报到m时停止报数。报m的人出列,将他的密码作为新的m值,从它在顺时针方向上的下一个人开始重新从1报数,如此下去直到所有人全部出列。 三、 需求分析 输入m=20;n=7,7个人的密码依次是:3,1,7,2,4,8,4,出列顺序为:6,1,4,7,2,3,5。 -experiment a subject Josephus, the experiment used a cycle chain to achieve Joseph Central 2. Experiment No. 1, 2, ..., n, n personal sequential anti-clockwise direction sitting around a circle and each person eating a password. An optional began as a whole reported a few limits on m, started from the first clockwise from the beginning of a sequence of several reported, m report reportedly stopped a few. M reported from the series of his password as a new value m, from it in a clockwise direction for the next re-started from a few reported that more until the total of all out. 3, needs analysis input m = 20; N = 7,7 personal password in order, are : 3,1,7,2,4,8. 4 out out in chronological order : 6,1,4,7,2,3,5.
Platform: | Size: 8192 | Author: 李爱春 | Hits:

[Othertest

Description: 古典密码学若干算法 (1) 实现移位密码; (2) 实现替换密码; (3) 实现Vigenere密码(选做); (4) 实现置换密码(换位密码); (5) 对每一种密码,编写加密字符串和加密文件的两种算法并进行实验。 -A number of classical cryptography algorithm (1) the realization of shift cipher (2) to achieve the replacement of the password (3) the realization of Vigenere Password (elected to do) (4) the achievement of replacement password (password transposition) (5) of each passwords, encryption string and the preparation of the two algorithms to encrypt files and carry out such experiments.
Platform: | Size: 31744 | Author: 何何 | Hits:

[SCMlocks_Password

Description: 1.密码锁有两个密码:一是设计密码,放存在ROM中;另一个是使用密码,存于EEPROM中。 2..密码锁的密码用4位有效数字,输入超过4位时以最后输入4位数字为准,数字范围由1~6。 3. 用实验板上K1—K6键作密码数字输入键,分别表示1~6数字,K7,K8键为命令键。其中,K7为密码设置键,K8为开锁键。蜂鸣器用作开锁指示。 4. 开机后进入初始状态,显示器显示“— — — —” 且最高一位闪动,闪动位亦表示当前数字输入位,以后每输入一位数字,闪动位向右循环移动。 5.开锁功能:在初始状态下,从K1—K6键输入密码,再按K8键。 若输入密码的最后4位数与存EEPROM的使用密码内容相同或与存于ROM中的设计密码相同,则开锁成功,并用蜂码器发声指示。 否则输入错误返回初始状态。 开锁状态维持 60秒,超过时间,则自动关闭开锁状态,同时停止声音输出。 6.修改密码功能,在开锁状态下,用K1~K6键输入4位新的使用密码,若超过4位数则以最后4位数为准,然后按K7键,则完成密码修改。新密码存到 EEPROM中,覆盖原来的使用密码,且新密码闪动三下,表示修改成功。完成后自动回到初始状态。 若不在开锁状态或在开锁状态下数字键输入不足4位,按K7键就无效,返回初始状态。 -1. There are two locks Password: First, the design of the password, put there in the ROM another is to use the password in stored in EEPROM. 2. . Cipher-lock with the password 4 digits, enter more than four hours to enter the last four figures, the figures range from 1 ~ 6. 3. With the experiment on-board keys K1-K6 password for digital input keys, respectively, 1 ~ 6 figures, K7, K8 key for command button. Which, K7 keys for password setting, K8 for the unlock key. Unlock instructions for the buzzer. 4. Boot into the initial state, the display shows "----" and a maximum of a flashing, flashing-bit digital input also said that the current place for every subsequent importation of a number of mobile flashing circle to the right place. 5. Unlock feature: in the initial state, K1-K6 keys from a password, and then key K8. If the password and keep the last 4-digit password using the EEPROM or the same content stored in ROM in the design of the same password, then unlock su
Platform: | Size: 52224 | Author: 邱浩淼 | Hits:

[JSP/Javacallsys

Description: 一个很大的重庆爱心能系统设计与实验方法,,,大家可以学一下子-请认真书写上传资料的详细功能、包含内容说明(至少要20个字)。尽量不要让站长把时间都花费在为您修正说明上。压缩包解压时不能有密码。
Platform: | Size: 102400 | Author: csf | Hits:

[Crack HackRSA

Description: 实现RSA密码体制实验 1、编写程序构造一RSA密钥; 2、编写程序实现快速指数算法; 3、编写程序生成大素数; 4、实现RSA密码体制。 -Achieve the RSA cryptosystem- an experiment
Platform: | Size: 7168 | Author: zhang liang | Hits:

[VHDL-FPGA-VerilogVHDL(LOCK)

Description: 数字密码锁的设计与实现 一.实验目的 1. 学习VHDL的综合设计应用 2. 学习数字密码锁的设计 二.实验内容 设计一个数字密码锁,对其编译,仿真,下载。 数字密码锁具体要求如下: 1.系统具有预置的初始密码“00000001”。 2.输入密码与预存密码相同时,开锁成功,显示绿灯,否则开锁失败,显示红灯。 3.具有修改密码功能。修改密码时,先开锁,开锁成功才可以修改。 4.系统同时具有关锁功能。关锁后,显示红灯。 5.密码由拔码开关表示,开锁由按键表示。 6具有一个复位按键。按键后,回到初始状态。 -VHDL Digital Design and Implementation of lock 1. Purpose of the experiment 1. VHDL Integrated Design and Application of Learning 2. Learning digital code lock design 2. Experimental content Design a digital lock on their compilation, simulation, download. Digital code lock specific requirements are as follows: 1. System has preset the initial password "00000001." 2. Enter the same password with the stored password, unlock successful, a green light, or unlock failed to show a red light. 3. With the change password function. Modify password, the first lock, unlock success can modify. 4. The system also has off lock. Shut up after the red light. 5. The password code from the pull switch that unlock the keys, said. 6 has a reset button. Button, the return to initial state.
Platform: | Size: 18432 | Author: 爱好 | Hits:

[SCMpassword

Description: 密码 ★实验任务 小米终于来到了学校,很高兴,他解决了学长留给他的问题,得到了学长的赞赏。他打 点行李回寝室去了,到了宿舍门口才发现这里的门居然不是用钥匙开的,怪不得刚才小米 就觉得奇怪,怎么没有发钥匙,经过小米的仔细“研究”,终于发现这是个密码锁。 这个密码锁很奇怪,密码提示是一串 1 到 n 的排列,他发现这个序列有一个规律:如果 i 出现,那么其后出现的小于 i 的数均为降序。原来是这么回事,小米恍然大悟。门上只有 两个按键和一个竖槽,一个是 PUSH 键,另一个 POP 键。系统每次从槽顶掉入一个数字卡 片(从 1 到 n),PUSH 代表把该数放入暂存槽(后入先出),POP 代表从暂存槽取出一个数 作为当前你要输入的密码。如下图所示: 众所周知,小米很懒,每次进门都要算,多麻烦啊,于是他就找你帮忙,给你一串序 列,其值为 1 到 n 的一个排列,输出形成该序列的操作。 ★数据输入 输入首先为n(1<=n<=20000),接下去为1到n的一个排列。 ★数据输出 输出形成该序列的操作,数据保证该序列可以形成。-Password ★ experimental tasks Millet finally came to the school, I am glad that he left him to solve the problem of seniors, has been appreciated by seniors. He played Point luggage went back to the bedroom, only to find the entrance to the dormitory where the door is not actually opened with a key, just wonder millet To wonder, how did not send the key, after millet careful "research", and finally found this to be a lock. This lock is very strange, the password prompt is a string of 1 to n, arranged, he found that this sequence has a rule: If i there, then the subsequent number smaller than i are in descending order. That this was what, millet understood why. Only the door Two buttons and a vertical slot, one PUSH key, another POP key. Fall from the top of each tank system, a digital card Pieces (from 1 to n), PUSH representative to the number in temporary tanks (after first-out), POP out on behalf of a number from the temporary tank As you enter the current password. As show
Platform: | Size: 71680 | Author: 张泉 | Hits:

[Data structsyousehuhuan

Description: 数据结构实验报告 实验1 线性表及其应用 题目:约瑟夫环 一. 需求分析 1. 本演示程序中,人数n应为任意的,首先应输入一个值赋给初始报数上限m,程序应能自动保存出列人的序号和将出列的人所持的密码赋给m,再次作为报数上限,如此循环,直至所有人都出列为止。 2. 演示程序以用户和计算机的对话方式执行,即在计算机终端上显示“提示信息”之后,由用户在键盘上输入相应数据(即每个人所持的密码),每个人的序号由程序自动分配。 3. 程序执行的命令包括: (1)构造链表;(2)输入数据;(3)执行报数,储存出列人的序号,删除出列人的信息以及把出列人的密码赋给m;(4)结束。 4. 测试数据 (1)n=7,7个人的密码依次为:3,1,7,2,4,8,4,首先m值为6,则这正确的出列顺序为6,1,4,7,2,3,5。 -Experimental data structure report Linear table and its Application Experiment 1 Title: Joseph Ring One. Needs analysis 1. The demonstration program, the number n should be arbitrary, we must first enter a value assigned to the maximum number of initial reports m, procedures should be able to automatically save the list and will be out of the serial number of people who held out the password assigned to m, maximum number again as reported, and so on, until all the columns up. 2. Demo program to computer users and the implementation of dialogue, that is displayed on a computer terminal "message", the keyboard input by the user in the corresponding data (that is, each held by a password), each person s number automatically assigned by the program. 3. Program execution commands are: (1) Construct the list (2) input data (3) The Executive reported that the number of people saved out of the serial number of the column, remove the column s information and the password to the
Platform: | Size: 8192 | Author: xj | Hits:

[Crack Hackshiyan

Description: 1、设计一个周期 3 的多表代替密码并予以实现,要求:第 1 个表由密钥字法 产生(密钥字自拟),第 2 个表由洗牌法产生(注意,字母 a~z 与数字 0~25 一一对应,洗牌法即相当于实验一的方法1(n=25)),第三个表由公式法 产生(数学公式自拟,注意它须是 Z26上的一个一一变换)。 2、设计一个周期 5 的 16-置换移位密码并予以实现,要求:5 个 16-置换至少有一个是由实验一(n=15)提供的两个方法以外、自行设计的其它方法产生。 -With the C programming language, the list is stored in a single structure, on a number of classes (in two classes for example) student achievement management, requirements to achieve the following functions: (1) through a terminal or file a number of students enter the class number, student number, results, data from each class were stored in a different single chain, the data element stored by order of highest to lowest scores and then were sequentially (high to low) output each class of transcript. (2) input classes, number and performance changes (such as+5,-3), at least 1 person on the results of each class were modified and still maintain the data in descending order by score and then were sequentially output of each class of transcript. (3) the total number of each class are output, the highest score, lowest score, average
Platform: | Size: 155648 | Author: 吴燕 | Hits:

[Windows DevelopTEST1_Joseph

Description: 实验内容:约瑟夫环(Joseph)问题的一种描述是:编号为1、2、3……n的n个人按照顺时针方向围坐一圈,没人持有一个密码(正整数)。一开始任选一个正整数作为报数的上限值m,从第一个人开始按照顺时针的方向自1开始顺序报数,报到m时停止报数。报m的人出列,将他的密码作为新的m值,从他的顺时针方向上的下一个人开始重新从1报数,如此下去,直至所有人全部出列为止。试设计一个程序求出出列顺序。-Joseph circle
Platform: | Size: 883712 | Author: 吴坤 | Hits:

[Crack Hackdes-rsa

Description: 密码学实验包括rsa和des的加密和解密破解,还有一份实验报告.-Cryptography experiments including rsa and des of encryption and decryption cracked, and a experiment report
Platform: | Size: 686080 | Author: caichuanhong | Hits:

[Software EngineeringClassical-cryptography

Description: 密码技术实验一经典密码学实验维多利亚密码加密解密-Password technological experiments classic cryptography experimental Victoria password encryption and decryption
Platform: | Size: 206848 | Author: liyehong | Hits:

[Crack Hackencryption

Description: 设计一个周期5 的16-置换移位密码并予以实现,要求:5 个16-置换至少有一个是由实验一(n=15)提供的两个方法以外、自行设计的其它方法产生。-Designing a cycle 5 16- displace the shift password and to achieve the requirements: 5 16- is at least one of the replacement from outside the experiment (n = 15) provides two methods, other methods to generate a self-designed.
Platform: | Size: 1024 | Author: nurala | Hits:

[Windows Develop2

Description: 实现RSA密码体制一、实验目的 1、编写程序构造一RSA密钥; 2、编写程序实现快速指数算法; 3、编写程序生成大素数; 4、实现RSA密码体制。-Achieve an RSA cryptosystem, experimental purposes 1. Write a program construct an RSA key 2. Write a program to achieve rapid exponential algorithm 3. Write a program to generate large prime numbers 4. Implementation of RSA cryptosystem.
Platform: | Size: 5285888 | Author: lihualuo | Hits:

[Crack Hack信息安全实验2-1

Description: 实验内容 1、对称密码技术的实现 (1)熟悉相应的DES加密/解密函数的使用,在单机完成对特定文件(test-1.txt)的单重DES加密/解密; (2)针对DES密钥特点(8字节,64比特位,其中真正起作用的为56比特位),设计一次一密的密钥产生机制(即每次会话所使用的密钥都是临时随机产生的); 2、非对称密码技术的实现 (1)熟悉RSA相关函数(公私钥生成函数,加密/解密函数); (2)利用公钥加密特定文件(test-1.txt),并用私钥进行解密;反过来,再利用私钥加密特定文件,并用公钥进行解密。对比解密后的文件与原始文件是否一致。 3、信息摘要技术的实现 (1)熟悉MD5算法的实现函数; (2)利用MD5实现函数,对特定文件(test-1.txt)进行信息摘要的计算,得到信息摘要M1;尝试改变特定文件中的内容(比如改变其中某个字母),再利用MD5计算一次信息摘要,看同之前得到的信息摘要是否相同; 设计要求 1、JAVA语言编程实现 2、单机上完成 3、加密内容为一文本文件(从服务器下载),从服务器上下载相关软件包(jce-1_2_2和帮助文件,主要用于RSA密钥生成和加/解密,如果安装了JDK1.6版本以上,则不需要jce支持)后,请先阅读帮助再进行编程。(DES/RSA/MD5 The implementation of symmetric cryptography (1) familiar with the use of the corresponding DES encryption / decryption function, complete single DES encryption / decryption of a particular file (test-1.txt) in a single machine; (2) for DES key features (8 bytes, 64 bits, which really works for 56 bits), the design of a secret key generation mechanism (i.e. using the session key is randomly generated temporary);)
Platform: | Size: 16384 | Author: 潇洒坤 | Hits:

[Crack Hack对称密码实验一

Description: 加解密,128bit,文件实现,分组密码加解密(Encryption and decryption)
Platform: | Size: 38912 | Author: wenka | Hits:
« 12 »

CodeBus www.codebus.net