Welcome![Sign In][Sign Up]
Location:
Search - DES AT

Search list

[Crack HackDES(c++)

Description: 在通信网络的两端,双方约定一致的Key,在通信的源点用Key对核心数据进行DES加密,然后以密码形式在公共通信网(如电话网)中传输到通信网络的终点,数据到达目的地后,用同样的Key对密码数据进行解密,便再现了明码形式的核心数据。这样,便保证了核心数据在公共通信网中传输的安全性和可靠性。-communications networks in the two ends, the two sides agreed unanimously the Key, In communications with the source Key to the core DES data encryption, Then a password in the form of public communication networks (such as the telephone network) transmission of the communication network in the end, data arrived at their destination, Key used the same password for data decryption, it depicts the code forms the core data. This will ensure that the core data in the public telecommunication network transmission security and reliability.
Platform: | Size: 3971 | Author: fang | Hits:

[Crack Hacklibgringotts-1[1].2.1

Description: libGringotts是一个小型、易于使用的、完全线程的C语言库,最初为Gringotts开发。它的目的是将数据封闭在一个加密和压缩的文件中。它使用加密算法((RIJNDAEL 128/256, SERPENT, TWOFISH, CAST256, SAFER+, LOKI97, 用于加密的3DES, 以及哈希函数的SHA1和 RIPEMD-160)来确保数据尽可能安全,并允许用户对所有使用的加密、哈希函数和压缩算法有完全的控制。 -libGringotts is small, is easy to use, the entire line regulation C language storehouse, at first is the Gringotts development. Its goal is the data seal in an encryption and in the compression document. It uses the encryption algorithm ((RIJNDAEL 12.8/256, million SERPENT, TWOFISH, CAST256, SAFER, LOKI97, uses in 3DES which encrypts, as well as Hasche function SHA1 and RIPEMD-160) guarantee the data to be as far as possible safe, and the permission user to all uses encryption, the Hasche function and the compression algorithm has the complete control.
Platform: | Size: 160768 | Author: 薛某某 | Hits:

[Crack Hacksdestt

Description: S-DES的编程实现 S-DES的加密使用8位明文和10位密钥做为输入,产生8位的密文做为输出。加解密使用相同的密钥。要求:采用CBC模式对文本加解密 1.对话界面:选择加密或解密,输入密钥,在目录中选择明文或密文文件(内容为二进制,.txt文件,),提示加密或解密完成 2.输出:产生密文文本或明文文本 3.提供:说明文档,源码,可执行程序,通过加密实验,给出运行结果. 4.提交分析雪崩效应文档:相同密钥下明文改变任一位时密文的位差异情况 相同明文下密钥改变任一位时密文的位差异情况-S-DES Programming S-DES encryption using 8 and 10 expressly as a key input, have eight of dense text as output. Encryption and decryption using the same key. Requirements : CBC mode to a declassified version increases. Dialogue interface : Select encryption or decryption key input in the directory option expressly or dense text document (for binary content,. Txt file,), suggesting encryption or decryption completed 2. Output : produce dense text or text the text expressly 3. provide : documentation, source code, executables, through encryption experiment is running results. 4. analytical avalanche effect Document : Key under the same as an explicit change the text at the close of the differences in the same place where expressly as a key change at the potentiometer ciphertext the situation
Platform: | Size: 2048 | Author: 冯鋆 | Hits:

[Windows DevelopDes2实验0000000000000000

Description: 一个不错的DES加密和解密程序,如果有人想了解DES加密和解密,可以看看这个程序-a good DES encryption and decryption procedures, if someone wanted to know DES encryption and decryption, can look at the process
Platform: | Size: 183296 | Author: 闾凡兵 | Hits:

[Crack HackDES386.ZIP

Description: DES 加解密算法 C 源码 研究DES算法的朋友值得-DES encryption and decryption algorithm C source research DES algorithm should look at the friends
Platform: | Size: 19456 | Author: 肖蔚 | Hits:

[Crack HackDESlxp

Description: DES加密算法,感兴趣的朋友可以看一下,要自行编译!-DES encryption algorithm, interested friends can look at, to build their own!
Platform: | Size: 78848 | Author: wilson | Hits:

[Crack Hack949327266

Description: 准算法模块是集DES、3DES、AES、RSA、MD5、BlowFish、TEA、RC6等标准算法为一体的算法包,同时在模块中使用了Anti-Debug和程序自校验功能(涉及到软件的加壳和CRC32)、软件使用次数限制,更好的保护您的软件。在模块中作者给出了每种算法详细调用方法,使用者可以根据自己的需要来进行选择。现暂时给出在VB、VC、Delphi三种开发语言中的调用方法,其他语言的调用方法可与我们联系获得,具体可以参看例子程序;现更新DLL可能被破解者替换的漏洞,并对DLL进行了加壳,增加了CRC校验功能,For Delphi还增加了对DeDe的Anti代码,在代码中给出了在NT/2000/XP下关闭计算机的函数。 增加了MD2、MD3、SHA1、SHA256、SHA384、SHA512、HAVAL128、HAVAL160、HAVAL192、HAVAL224、HAVAL256、GOST、TIGER128、TIGER160、TIGER192、RIPEMD128、RIPEMD160、CRC32、CRC32B、ADLER32多种算法-prospective algorithm module combines DES, 3DES, AES, RSA, MD5, BlowFish. TEA, RC6 algorithm standards for the integration of the algorithm package, At the same time the use of the module Anti-Debug and procedures since the checksum function (related to the shell and software CRC 32), software usage restrictions and better protect your software. The module is the author of the algorithm in detail each call, users can meet their own needs to choose. Is temporarily given in VB, VC, Delphi development of the three languages of the call, other languages can call methods and access to our contacts, can see examples of specific procedures; Update DLL is likely to be those who break the replacement of the loopholes, and the shell DLL, an increase of CRC function, For Delphi also added to the Anti
Platform: | Size: 234496 | Author: 马克 | Hits:

[AlgorithmarithmeticofDESencrypt

Description: 提供高质量的数据保护,防止数据未经授权的泄露和未被察觉的修改; 具有相当高的复杂性,使得破译的开销超过可能获得的利益,同时又要便于理解和掌握; DES密码体制的安全性应该不依赖于算法的保密,其安全性仅以加密密钥的保密为基础; 实现经济,运行有效,并且适用于多种完全不同的应用。 -provide high-quality data protection to prevent unauthorized data disclosure and was not aware of the changes; have very high complexity, and makes deciphering the overhead may exceed the benefits, at the same time easy to understand and master; DES password security system should not depend on secrecy algorithm, the security of the encryption key only confidential basis. the realization of economic, operational, effective and applicable to many different applications.
Platform: | Size: 38912 | Author: 范孟君 | Hits:

[Crack Hackjiamisuanfamokuai

Description: 标准算法模块是集DES、3DES、AES、RSA、MD5、BlowFish、TEA、RC6等标准算法为一体的算法包,同时在模块中使用了Anti-Debug和程序自校验功能(涉及到软件的加壳和CRC32)、软件使用次数限制,更好的保护您的软件。在模块中作者给出了每种算法详细调用方法,使用者可以根据自己的需要来进行选择。现暂时给出在VB、VC、Delphi三种开发语言中的调用方法,其他语言的调用方法可与我们联系获得,具体可以参看例子程序;现更新DLL可能被破解者替换的漏洞,并对DLL进行了加壳,增加了CRC校验功能,For Delphi还增加了对DeDe的Anti代码,在代码中给出了在NT/2000/XP下关闭计算机的函。在本站提供了几款壳下载,需要的可以到“加壳技术”模块去下载,在校验的时候用得到,具体的方法在调用模块里面有。-standard algorithm module combines DES, 3DES, AES, RSA, MD5, BlowFish, TEA, RC6 algorithm standards for the integration of the algorithm package, At the same time the use of the module Anti-Debug and procedures since the checksum function (related to the shell and software CRC 32), software usage restrictions and better protect your software. The module is the author of the algorithm in detail each call, users can meet their own needs to choose. Is temporarily given in VB, VC, Delphi development of the three languages of the call, other languages can call methods and access to our contacts, can see examples of specific procedures; Update DLL is likely to be those who break the replacement of the loopholes, and the shell DLL, an increase of CRC function, For Delphi also added to the Anti De
Platform: | Size: 278528 | Author: 小强 | Hits:

[Crack HackDES(c++)

Description: 在通信网络的两端,双方约定一致的Key,在通信的源点用Key对核心数据进行DES加密,然后以密码形式在公共通信网(如电话网)中传输到通信网络的终点,数据到达目的地后,用同样的Key对密码数据进行解密,便再现了明码形式的核心数据。这样,便保证了核心数据在公共通信网中传输的安全性和可靠性。-communications networks in the two ends, the two sides agreed unanimously the Key, In communications with the source Key to the core DES data encryption, Then a password in the form of public communication networks (such as the telephone network) transmission of the communication network in the end, data arrived at their destination, Key used the same password for data decryption, it depicts the code forms the core data. This will ensure that the core data in the public telecommunication network transmission security and reliability.
Platform: | Size: 4096 | Author: fang | Hits:

[Crack Hackjava_des_crypto

Description: DES加密解密程序的主程序在 FileDES类中 运行时使用的例子是本目录下的111.doc文件,运行后自动生成222.doc文件和333.doc文件。 其中111.doc文件加密后的文件是222.doc文件,222.doc文件解密后文件是333.doc文件。 可以操作的文件类型我实验了TXT、DOC、JAVA等都没有问题,且Word文档中包含图片也没问题-DES encryption and decryption procedures of the main program at run-time class FileDES used example is the catalog under 111.doc documents, running 222.doc automatically generated files and documents 333.doc. 111.doc document which the document is encrypted 222.doc document, 222.doc document after the document was declassified documents 333.doc. Can operate file type I experiment a TXT, DOC, JAVA and so there is no problem, and the Word document contains pictures have no problem
Platform: | Size: 21504 | Author: chensong | Hits:

[File OperateCryptoAPI_ProtectFile

Description: 利用Visual C++ .net2003开发的一款用于保护文件的小程序。 对文件产生MD5值同时对源文件用DES加密,并用私钥加密签名。 对加密文件解密,验证用公钥解密签名与解密文件的MD5值比较,以判断文件是否被修改。 遇到的问题:微软提供的签名函数可能有问题,无论用公钥还是私钥签名,用公钥、私钥(任一)均可解密。怪!希望在此与大家交流交流。-The use of Visual C++. Net2003 developed a document for the protection of small procedures. MD5 value of the document produced at the same time the source file using DES encryption, and signature private key encryption. Encrypted files decryption, authentication using public key to decrypt the signature and decrypt files MD5 value to determine whether a document is modified. Problems encountered: Microsoft to provide the signature function may be a problem regardless of whether it uses a public key or private key signature, using public key, private key (any one) can be decrypted. Strange! Would like to exchange with the U.S. exchanges.
Platform: | Size: 47104 | Author: jimin | Hits:

[SCMDES

Description: DES的C语言算法,是一个完整C51工程,直接下载就可以应用了.-DES algorithm in C language, is a complete C51 project, you can directly download the application.
Platform: | Size: 28672 | Author: 米挂 | Hits:

[Crack HackDES

Description: Des算法是一种标准的对称加密算法,其精华就是明文经过一系列的复杂变化后,一般在不知密码的情况下要把它的恢复很难。 算法可以由四个部分描述: 1.获取16个子密钥 2.初始置换置换函数ip 3.加密函数f 4.末置换函数 -Des Algorithm is a standard symmetric encryption algorithm, and its essence is clear after a series of complex changes in law, the general in the circumstances I do not know the password should be difficult to restore it. Algorithm can be described in four parts: 1. To obtain 16 sub-keys 2. The initial replacement replacement function ip 3. Cryptographic function f 4. At the end of displacement function
Platform: | Size: 180224 | Author: wildkaede | Hits:

[CSharpDES-Encrypt

Description: 这是一个用才c井写的DES加密程序,界面美观,可以加密文本文件,文本框中只能加密数字和字母,我把源码都发上去了,希望大家可以完善加密图片的功能,只要做好图片转化为比特流再传给加密函数就可以了,用vs2005打开*.sln即可,然后再运行编译就可以看到结果了。本程序采用C#中的内封装好的类,仔细看开始加密的那个类,可以看到C#的加密功能也是蛮强大的-This is a well written with only c the DES encryption process, interface aesthetics, you can encrypt a text file, the text box only encrypted numbers and letters, I have hair up source, and I hope that we can improve the function of encryption picture, as long as good picture into a bit stream encryption function, then pass it, to use VS2005 to open the*. sln and then run the compiler can see the result. This procedure using C# In the category with a good package, a close look at the beginning of encryption that category, you can see C# Encryption function is also pretty powerful
Platform: | Size: 1996800 | Author: 李梓钺 | Hits:

[Crack HackDES

Description: 本DES算法,使用了效率很高的C完成。目前,国内知名企业的POS终端中,单DES算法,均是采用这个函数完成。函数经本站验证过,可以放心使用。-The DES algorithm, the use of highly efficient C-complete. At present, the domestic well-known enterprises in the POS terminal, single-DES algorithms are supported by the completion of this function. Function verified by the site, you can rest assured that use.
Platform: | Size: 3072 | Author: 小夏 | Hits:

[Delphi VCLdes

Description: 作者提供了DES的Delphi版源码与调用方法,现在标准算法被多数开发者使用,很容易被破解出来。在我们的站点上提供了DES的变形算法源码、为您提供软件安全检测和软件的加密解决方案。-The author provides a DES version of the Delphi source code with the call method, now standard algorithm used by most developers, it is easy to be cracked out. At our site on the deformation provides a DES algorithm source code to provide you with software security testing and encryption software solutions.
Platform: | Size: 190464 | Author: cl | Hits:

[Crack Hackmixed_encryption

Description: 本系统实现了一个基本的混合密码系统。它使用DES作为对称密钥算法,RSA作为公开密钥算法。本系统特点如下:1:提供了俩个加密接口。混合加密,DES加密。2:本系统的DES可以进行1次DES加密(标准DES加密)和3次DES加密。它会根据密钥长度,自动选择加密方案-Implementation of the system a basic hybrid cryptosystem. It uses DES as the symmetric key algorithm, RSA public key algorithm as. The system features are as follows: 1: provide a two months encryption interface. Hybrid encryption, DES encryption. 2: The system can be one of the DES at DES encryption (DES encryption standard) and 3 DES encryption. According to key length it will automatically select encryption scheme
Platform: | Size: 704512 | Author: sunwu | Hits:

[Crack HackDES

Description: 可以在J2me下使用的DES加密算法,输入输出参数均为byte[],使用参数1加密,0解密。-J2me can use at the DES encryption algorithm, input and output parameters are byte [], using the parameters of one encryption, 0 decryption.
Platform: | Size: 4096 | Author: Jacky | Hits:

[Crack HackDES-encryption-algorithm

Description: DES算法加解密全套程序,可运行,实现对txt(文本)文件内容的加解密。用vc6.0编写,内涵源代码,以及详细注释,程序非常简单,经过下载后可以对其源代码修改,加解密器,同时代码非常简单,可以通过读代码学到很多vc的知识啊,比看书学的快多了。另在解密文件夹中还有一个测时间的函数,精确到毫秒,可以计算出程序运行的时间,该代码移植性较强,可以用在别的程序中。-DES encryption algorithm for a full set of procedures, operations, implementation of the txt (text) file content encryption and decryption. Prepared by vc6.0 content source code, as well as detailed notes, a very simple procedure, the download can modify its source code, encryption and decryption, and at the same time very simple code, you can read a lot of code to learn the knowledge vc ah, more than Read books to learn more quickly. Decrypted at the other folders have a function of time measurement, accurate to the millisecond, you can run out of time, the transplantation of a stronger code can be used in other proceedings.
Platform: | Size: 413696 | Author: xiaowei | Hits:
« 12 3 4 5 »

CodeBus www.codebus.net