CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - DES others
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - DES others - List
[
Crack Hack
]
desende
DL : 0
自己编的DES加密、解密算法,可实现windows下任何文件的加密、解密,尤其适用使用公用电脑而一些私人的文件不想被别人看到的情况,可设置八个字节的密钥,也就是每一位可以从0到255,这样对方就算已知置换矩阵和S盒的情况下用穷举法破解的难度也在2的32次幂,还是相当安全的。 加密:DESencrypt.exe 解密:DESdecrypt.exe-own addendum to the DES encryption, decryption algorithms can be realized under any windows document encryption, decryption, In particular, the use of common computer application and some private documents do not want others to see, can be set up eight bytes of keys, Each one is from 0 to 255. known each other even if such replacement matrix and the S-box using exhaustive method is difficult to decipher the two 32 power, still quite safe. Encryption : DESencrypt.exe declassified : DESdecrypt.exe
Update
: 2008-10-13
Size
: 61.97kb
Publisher
:
古松
[
VHDL-FPGA-Verilog
]
DES-source-code-by-HDL
DL : 0
HDL实现的DES算法,及相关的Test bench激励文件-HDL achieve the DES algorithm, and the related documents incentive Test bench
Update
: 2025-02-17
Size
: 27kb
Publisher
:
zyx
[
Crack Hack
]
desende
DL : 0
自己编的DES加密、解密算法,可实现windows下任何文件的加密、解密,尤其适用使用公用电脑而一些私人的文件不想被别人看到的情况,可设置八个字节的密钥,也就是每一位可以从0到255,这样对方就算已知置换矩阵和S盒的情况下用穷举法破解的难度也在2的32次幂,还是相当安全的。 加密:DESencrypt.exe 解密:DESdecrypt.exe-own addendum to the DES encryption, decryption algorithms can be realized under any windows document encryption, decryption, In particular, the use of common computer application and some private documents do not want others to see, can be set up eight bytes of keys, Each one is from 0 to 255. known each other even if such replacement matrix and the S-box using exhaustive method is difficult to decipher the two 32 power, still quite safe. Encryption : DESencrypt.exe declassified : DESdecrypt.exe
Update
: 2025-02-17
Size
: 62kb
Publisher
:
[
Crack Hack
]
javaDES
DL : 0
DES加密解密算法,用java实现的。借鉴别人的,很好用。-DES encryption and decryption algorithm, using java to achieve. Learn from others, it just works.
Update
: 2025-02-17
Size
: 5kb
Publisher
:
wy
[
CA auth
]
479127
DL : 0
des加密算法,转载他人编写的一个加密程序,感谢编写者.-des encryption algorithm, reproduced others prepared an encrypted program, thanks to the authors.
Update
: 2025-02-17
Size
: 3kb
Publisher
:
[
Crack Hack
]
DES
DL : 0
实现DES加密文件的功能,超简单的源码。从别人那得到的。-DES encrypted file to achieve the function, super-simple source. It received from others.
Update
: 2025-02-17
Size
: 40kb
Publisher
:
boobcbo
[
Crack Hack
]
DES
DL : 0
算法流程 1.将要处理的二进制串进行IP置换 2.将密钥进行PC1置换(64位转为56位), 3.进行16轮操作,对于第i轮操作: 1)将上一次得到的PC1密钥(级除去第一次外,其他的都经过移位处理)的结果左右部分(各28位)分别循环左移1位或2位,然后将移位后的密钥进行PC2[i]置换. 2)将处理串均等分为左右两串Li,Ri(各32位),然后将右串Ri通过E盒拓展为新的右串R (48位),R 与上一步得到的PC2[i]子密钥进行异或操作,结果通过S盒输出(48为转为32位),然后通过P盒直接置换,再与Li异或. 3)将Ri赋给作出Li,R 赋值给Ri. 4)合并处理串StrText=Li+Ri. 4.将最新的处理串进行IP_1置换,置换结果即为所求的加密串或解密串 加密解密的区别 在每轮操作中,加密使用的PC2密钥顺序为0~15,解密使用的PC2密钥顺序为15~0. -Algorithm flow A binary string to be processed is substituted for IP 2 key the PC1 replacement (64 into 56) 16 operation, the operation for the i-th round: 1) about the results of the last PC1 key (remove the first time, the others have been shifting processing) (28) rotate left one or two, and then will shift key PC2 [i] replacement. 2) is divided into the equal treatment string around two bunches of Li, Ri (32), and then expand the right string Ri E box (48-bit), the right string R R and the previous step PC2 i] subkey XOR operation result is output via the S-box (48 to 32 conversion), and then directly through the P box replacement and XOR with Li. 3) the Ri to make Li, R is assigned to Ri. 4) merger deal with string StrText Ri = Li+. 4. Latest processing string IP_1 replacement, replacement results shall request string encryption or decryption string Encryption and decryption of difference In each round of operations, PC2 key e
Update
: 2025-02-17
Size
: 2kb
Publisher
:
zhusiyi
[
CA auth
]
Decrypt.rar
DL : 0
加密的几种常用的源码包,应用于数据库表部分字段的加密,图象文件等文档加密,双方通信时数据加密传输防他人网络截取信息。非对称RSA或ECC公钥加密私钥解密或者可用于数字签名 对称加密AES或者DES,56位的DES加密,128位或192位或256位AES加解密通常可设随便的密码长度,其它位用常字符代替;非对称加密多要先因式分解,对称加密多就移位处理。,Several common source package encryption, encryption, image files, and other document encryption applied to the part of the field of the database table, the two sides communicate data encryption transmission Anti others network interception. The asymmetric RSA or ECC public key to encrypt the private key to decrypt or can be used for digital signatures symmetric encryption AES or DES, 56-bit DES encryption, 128-bit or 192-bit or 256-bit AES encryption and decryption usually can be set casually password length, other bits instead of using the regular characters asymmetric encryption first multi factorization, symmetric encryption shift process.
Update
: 2025-02-17
Size
: 208kb
Publisher
:
曾祥园
[
ComboBox
]
DES_Cwe2.0
DL : 0
参考别人的后,用MFC做的DES加密解密,有完整的工程。可以对文档进行加密解密。可以在没有打开文本的情况下对文本内容进行预览。可以加密.doc文档,当密钥大于8,自动启动3重DES加密解密。-Reference to others, the use of MFC to do DES encryption and decryption, a complete project. Can decrypt the document. You can not open the case of the text content of the text preview. Can be encrypted. Doc document, when the key is greater than 8, automatic re-start 3 DES encryption and decryption.
Update
: 2025-02-17
Size
: 1.81mb
Publisher
:
陈炜
[
CSharp
]
Encrypt_an_string_demo
DL : 0
demo program for simple encryption string using des, rc2 and others
Update
: 2025-02-17
Size
: 8kb
Publisher
:
akmal
[
CSharp
]
Encrypt_an_string_src
DL : 0
encrypt a string from plain text to des, rc2 or others source code. csharp
Update
: 2025-02-17
Size
: 52kb
Publisher
:
akmal
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.