Location:
Search - SHA-1 MAC
Search list
Description: HMAC即带密钥的HASH函数,用它产生的报文鉴别码(MAC)可以实现报文鉴别。这里我将其做成一个软件,用于对文件的合法性进行校验。以下我先简单介绍软件相关背景知识再介绍其代码实现。
-HMAC key is to bring the hash function, used the text of the report identifying code (MAC) can realize the text identification. I am here to create a software for the document verifying the legitimacy. I briefly introduce software-related background knowledge will introduce its implementation of the code.
Platform: |
Size: 50008 |
Author: 杨飞 |
Hits:
Description: a C++ Class Library of Cryptographic Primitives
This library includes:
MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES,
IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC,
various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA,
NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser,
elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.-a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.
Platform: |
Size: 388055 |
Author: 刘永 |
Hits:
Description: HMAC即带密钥的HASH函数,用它产生的报文鉴别码(MAC)可以实现报文鉴别。这里我将其做成一个软件,用于对文件的合法性进行校验。以下我先简单介绍软件相关背景知识再介绍其代码实现。
-HMAC key is to bring the hash function, used the text of the report identifying code (MAC) can realize the text identification. I am here to create a software for the document verifying the legitimacy. I briefly introduce software-related background knowledge will introduce its implementation of the code.
Platform: |
Size: 50176 |
Author: 杨飞 |
Hits:
Description: a C++ Class Library of Cryptographic Primitives
This library includes:
MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES,
IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC,
various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA,
NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser,
elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.-a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.
Platform: |
Size: 388096 |
Author: 刘永 |
Hits:
Description: MAC算法SHA—1算法的C语言实现源码-SHA-1 algorithm for the C language source
Platform: |
Size: 2048 |
Author: Sophia quan |
Hits:
Description: PGP SDK 包括大范围的标准加密、数字签名和编解码技术,以及各种网络安全协议执行程序。PGP SDK为开发人员提供同其他PGP产品核心相同的核加密功能。
PGP SDK技术说明:PGP SDK是我们的加密和密钥管理库的C接口,支持以下平台:
· Windows 98, Millennium (ME), NT, 2000, and XP
· Mac OS X
· Linux x86 with 2.0.x kernel or later
· Sun Solaris SPARC 2.5.1, 2.6, 2.7, or 2.8
-PGP SDK支持下列算法:
· Ciphers
o IDEA
o TripleDES
o CAST5
o AES (128-, 182-, 256-bit密钥长度)
o Twofish (256-bit 密钥长度)
· Hashes
o MD5
o SHA-1
o RIPEMD160
o SHA-2 (256-, 384-, 512-bit 密钥长度)
· Public Key Algorithms
o RSA
o Diffie-Hellman
o DSA
Platform: |
Size: 14045184 |
Author: guangmingniu |
Hits:
Description: 1,针对对金融行业密钥不是很熟悉的人
2,介绍金融密钥体系的结构和概念
3,介绍PIN,PIK,MAC,MAK,BMK,MK等
4,即个人密码,PINBLOCK,PIK(个人标识码密钥),报文鉴别码MAC
5,介绍了报文鉴别技术,MAC,MD5,SHA
6,介绍了PINBLOCK生成方法
7,商业银行加密机部署-1, for the financial industry, the key is not very familiar with the person 2, introducing the key system, the financial structure and the concept of three, introduced PIN, PIK, MAC, MAK, BMK, MK and other four, namely, personal password, PINBLOCK, PIK (Personal identification code keys), message authentication code MAC 5, describes the packet identification techniques, MAC, MD5, SHA 6, describes the PINBLOCK generation method 7, commercial banks, security devices and the deployment of
Platform: |
Size: 229376 |
Author: |
Hits:
Description: CrissCross是一种小型的跨平台C + +库,用于处理控制台和文件I / O , CPU的识别( CPUID ) ,散列( MD2 , MD4 , MD5编码,了SHA - 1 ,SHA- 256 ,SHA- 512 ,Tiger) ,Socket( TCP和目前唯一的UDP )和数据结构( LList , DArray , RedBlackTree , AVLTree , SplayTree等) 。其目的是运行在Windows , Linux , FreeBSD的, OpenBSD系统, NetBSD的, Mac OS X的,甚至是NDS 。其他平台可能成为支持的请求。其主要思想是提供的能力,写一个程序使用相同的呼吁主要平台,而无需重写代码。-CrissCross is a small cross-platform C++ library for handling console and file I/O, CPU identification (CPUID), hashing (MD2, MD4, MD5 encoding, the SHA- 1, SHA-256, SHA-512, Tiger), Socket (TCP and the only UDP) and data structures (LList, DArray, RedBlackTree, AVLTree, SplayTree, etc.). Its purpose is to run on Windows, Linux, FreeBSD' s, OpenBSD system, NetBSD' s, Mac OS X, or even NDS. Other platforms may become supported the request. The main idea is to provide the ability to write a program using the same appeal to the major platforms without rewriting code.
Platform: |
Size: 501760 |
Author: Mike |
Hits:
Description: 可以在ios和mac os平台上有效校验MD5或SHA-Compute MD5 or SHA hash of large file efficiently on iOS and Mac OS X
Platform: |
Size: 37888 |
Author: wangbo |
Hits:
Description: 任何的mac算法都可以使用标准的hash功能,比如MD5或者sha-1,这种情况下,强度取决于hash功能,和最后的结果的比特串。密匙是关键。-HMAC is a message authentication code (MAC) and can be used to verify the integrity and authentication of a message. It involves hashing a message with a secret key. As with any MAC, it can be used with standard hash function, such as MD5 or SHA-1, which results in methods such as HMAC-MD5 or HMAC-SHA-1. As with any hashing function, the strength depends on the quality of the hashing function, and the resulting number of code bits. Along with this the number of bits in the secret key is a factor.
Platform: |
Size: 1024 |
Author: Vincent |
Hits:
Description: Wireless Sensor Networks (WSN) are becoming popular day by day,
however one of the main issue in WSN is its limited resources. We
have to look to the resources to create Message Authentication Code
(MAC) keeping in mind the feasibility of technique used for the
sensor network at hand. This research work investigates different
cryptographic techniques such as symmetric key cryptography and
asymmetric key cryptography. Furthermore, it compares different
encryption techniques such as stream cipher (RC4), block cipher
(RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5,
SHA, SHA1 etc). The result of our work provides efficient
techniques for communicating device, by selecting different
comparison matrices i.e. energy consumption, processing time,
memory and expenses that satisfies both the security and restricted
resources in WSN environment to create MAC.
Platform: |
Size: 747520 |
Author: zu |
Hits:
Description: JDK6支持的加密和摘要算法,包括AES、DES、DSA、RSA、ECC、SHA、MD5、MAC等,以及Base64、BCD等,此处为其各个对应的工具和测试类。-Encryption and digest algorithm JDK6 support, including AES, DES, DSA, RSA, ECC, SHA, MD5, MAC, as well as Base64, BCD, etc., where its tools and test each corresponding category.
Platform: |
Size: 1761280 |
Author: lanfog |
Hits: