Location:
Search - CRYPT
Search list
Description: 一,产生密钥(算法实现可参照文档后的<附件1>KeyGeN.asp)
与<附件1>不同的是,实际要求密钥存放在字符串接受方数据库表KeyPool中,表结构如下:
1,personalID{主码}
2,secret_key{密钥,数据类型最好用text,与实际代码密钥生成长度有关}
3,serverTime{密钥生成时间,用以检验密钥是否失效}
接受方发现密钥失效,则拒绝验证
二,字符串加密(算法实现可参照文档后的<附件2>CRYPT.asp)
从数据库中读取密钥,并用密钥加密{函数:EnCrypt(正文),返回密文}
三,接受方获取密文以及其他数据以后,根据获取的参数personalID从数据库中读取密钥,并且比较时间戳,发现密钥超时(比如15分钟)则拒绝验证。
时间戳有效,则使用密钥解密{函数:DeCrypt(密文),返回正文}-First, the key generation (algorithm can refer to the document after <Annex 1> KeyGeN.asp)
And <Annex 1> The difference is that the actual requirements of the key stored in a database table KeyPool string recipient, the table structure is as follows:
1, personalID {main} code
2, secret_key {key, data type, preferably with text, key generation and the actual code length about}
3, serverTime {key generation time, to test whether the key failure}
Recipient found key lapses, refused to verify
Second, string encryption (algorithm can refer to the document after <Attachment 2> CRYPT.asp)
Key is read from the database and use the key to encrypt {function: EnCrypt (text) returns ciphertext}
Third, the recipient, and other data acquired after the ciphertext, based on the parameters acquired personalID key read from the database, and compares the timestamp found key timeout (eg 15 minutes) the authentication is denied.
Timestamp is valid, then use the key
Platform: |
Size: 5120 |
Author: 蔡国庆 |
Hits:
Description: Rapid progression of wireless engineering systems, a special domain of sensor network which supports medical diligences is the development of Autonomous Wireless Body Area Network. In this type of environment such as monitoring the health condition of senior citizens .The sensed signal can monitor several types of measurements such as Electroencephalography (EEG), Electrocardiography (ECG), Electromyography (EMG), Skin temperature, Skin conductance or Electrooculography (EOG) etc., compares with the standard level and the information is passed to the care takers or hospital for further necessary actions using a hybrid network of cryptography nowadays are crucial. The privacy information is vital and they have to be safe guarded from several aggressors. We propose a method of crypt analyst method using a cluster pattern of key mechanism provides assure, efficient and improved way to increase the lifetime of the network.-Rapid progression of wireless engineering systems, a special domain of sensor network which supports medical diligences is the development of Autonomous Wireless Body Area Network. In this type of environment such as monitoring the health condition of senior citizens .The sensed signal can monitor several types of measurements such as Electroencephalography (EEG), Electrocardiography (ECG), Electromyography (EMG), Skin temperature, Skin conductance or Electrooculography (EOG) etc., compares with the standard level and the information is passed to the care takers or hospital for further necessary actions using a hybrid network of cryptography nowadays are crucial. The privacy information is vital and they have to be safe guarded from several aggressors. We propose a method of crypt analyst method using a cluster pattern of key mechanism provides assure, efficient and improved way to increase the lifetime of the network.
Platform: |
Size: 267264 |
Author: Opencvresearcher |
Hits:
Description: Cipher Symmetric Crypt Helper Source Code for Linux.
Platform: |
Size: 2048 |
Author: xingdongun |
Hits:
Description: for crypt.h decrytion for ran online use your own ski-for crypt.h decrytion for ran online use your own skill
Platform: |
Size: 29696 |
Author: Johnny |
Hits:
Description: AES Crypt,Decrypt C#
Platform: |
Size: 836608 |
Author: www |
Hits:
Description: AES Crypt Decrypt JAVA Source code
Platform: |
Size: 1024 |
Author: www |
Hits:
Description: Test for the crypt & decript functions of TSmartCard
by 3 Emme System.
You must copy the CRYPTO.DLL in your C:\Windows\System
or C:\Delphi\Bin directory.
}- Test for the crypt & decript functions of TSmartCard
by 3 Emme System.
You must copy the CRYPTO.DLL in your C:\Windows\System
or C:\Delphi\Bin directory.
}
Platform: |
Size: 454656 |
Author: Lookze |
Hits:
Description: Tool for Crypt MD5 easy to use.Small file and not install.
Platform: |
Size: 9216 |
Author: TheShogun |
Hits:
Description: 加密解密文件,支持AES128/AES256/ECB/CBC等-encrypt/decrypt file
Platform: |
Size: 1024 |
Author: tony |
Hits:
Description: Host AP crypt: host-based CCMP encryption implementation for Host AP driver.
Platform: |
Size: 4096 |
Author: xlzengks |
Hits:
Description: lib80211 crypt: host-based WEP encryption implementation for lib80211.
Platform: |
Size: 3072 |
Author: zryvxx |
Hits:
Description: Do not remove this function even if no one is using it as this is an example of how to get notifications about new connector user registration.
Platform: |
Size: 2048 |
Author: vonbeiln |
Hits:
Description: lib80211 crypt: host-based CCMP encryption implementation for lib80211.
Platform: |
Size: 4096 |
Author: znfurk |
Hits:
Description: Cancer, (uncontrolled cell proliferation), has demonstrably high impact on human life: complex feelings and lifestyle changes, caused by malignancy, affect not only patients, but also family and friends. Cancer origin has been linked to genetic and epigenetic abnormalities that target stem cells. Here, we introduce an agent-based model for colon crypt dynamics
Platform: |
Size: 279552 |
Author: Hokietond |
Hits:
Description: Host AP crypt: host-based WEP encryption implementation for Host AP driver.
Platform: |
Size: 2048 |
Author: fenzorao |
Hits:
Description: It XOR every file you want do crypt. It does it very fast.
Platform: |
Size: 12288 |
Author: 2al5no |
Hits:
Description: Md5 Crypt Matlab code
Platform: |
Size: 2048 |
Author: Ngon |
Hits:
Description: Matlabcode blowfish crypt
Platform: |
Size: 665600 |
Author: Ngon |
Hits:
Description: Matlabcode blowfish crypt al
Platform: |
Size: 855040 |
Author: Ngon |
Hits:
Description: SmallHTTPSvers Lab Crypt
Platform: |
Size: 3117056 |
Author: Ngon |
Hits: