Welcome![Sign In][Sign Up]
Location:
Search - cryption

Search list

[Othergettime

Description: 加密 加密 加密 -encryption En cryption En cryption En cryption En cryption En cryption Encryption
Platform: | Size: 31600 | Author: okde | Hits:

[Linux-UnixCrypt-PBC-0.4.2-0.7.17.1.tar

Description: PBC perl 接口程序, Pair-Based cryption-PBC perl interface program, Pair-Based cryption
Platform: | Size: 51858 | Author: richard | Hits:

[CA authpbc-0.4.2.tar

Description: pair-based cryption library
Platform: | Size: 464104 | Author: richard | Hits:

[Crack Hackcamellia-BSD-1.2.0.tar

Description: camellia cryption algorithm
Platform: | Size: 11465 | Author: jindi | Hits:

[Crack Hackcamellia-GPL-1.2.0.tar

Description: camellia cryption algorithm
Platform: | Size: 18184 | Author: jindi | Hits:

[Crack Hackt_camellia

Description: camellia cryption code
Platform: | Size: 87807 | Author: jindi | Hits:

[Crack Hackdraft-kato-ipsec-camellia-modes-01

Description: camellia cryption modes -camellia cryption modes
Platform: | Size: 11830 | Author: jindi | Hits:

[Delphi VCLAES1.3

Description: AES 加密1.3算法,delphi. -1.3 AES encryption algorithm, delphi.AES 1.3 en cryption algorithm, delphi.AES 1.3 encryption algorithm, delphi.
Platform: | Size: 351158 | Author: xsh_yuan | Hits:

[Crack Hackmodes

Description: 1. 分析ECB模式和CBC模式的加密过程。 2. 用程序设计语言将算法过程编程实现。 3. 输入明文:I do like this book 加密算法E:异或⊕,密钥为cryption; 移位,密钥为5 两种填充模式:(1)0 (2)密文挪用 初始化向量IV:goodluck 用两种模式进行加密,输出相应的密文。
Platform: | Size: 2568 | Author: 陈觅尘 | Hits:

[Crack HackCryption-Vcdkey-Jeff

Description: 怀恋Dos时代吗? 这里有一个Dos下的加/解密软件[提供原代码!],叫做VCDKEY,你可能要奇怪为什么叫VCDKEY?这要从上大学时候说起了:大学时候,有个铁哥们叫做\"小胖子\",此兄爱看VCD碟子,于是经常租碟在自己电脑上看,而且还经常将一些喜欢的精彩片段辑录到电脑中,而其人缘极好,经常有人去他电脑上玩,但他又不愿意让别人看到他录下的东西!有天,他跟我谈到了他的苦衷,于是,我决定为我的哥们写个东西,于是就有了这个东西! 其实,它的原理很简单,就是文件各字节的异或,但是要配合好字节的异或却要做一些另外的工作!而且它还具有CRC校验及运行时候的进度提示!作为个人的文件加密,C语言的学习都有一定的价值吧! 本人才疏学浅,没有炫耀之意思,只想代码,软件共享,大家共同提高!-nostalgia for the times? Here is a Dos under the plus / decryption software [for the original code! ] Called VCDKEY, you may be wondering why VCDKEY called? From this time on the University Speaking : University of time, to have a buddy called "Overweight", brother love VCD plate, so often rent CDs on their computers perspective, but also often like some of the highlights of all of the computer, and its excellent personal relationship, it was often to go to his computer to play , but he is unwilling to let people see his record things! One day, he told me he talked of the difficulties, and I decided for my brother to write things, he was such a thing! Actually, the principle is very simple. Bytes of the file or different, but to meet good-byte XOR has to be done some other work!
Platform: | Size: 51788 | Author: 杰弗雷 | Hits:

[Windows Develop征服4.0马端源码

Description: using System; using System.Collections.Generic; using System.Text; namespace NewestCOServer { public class Cryption { class CryptCounter { UInt16 m_Counter = 0; public byte Key2 { get { return (byte)(m_Counter >> 8); } } public byte Key1 { get { return (byte)(m_Counter & 0xFF); } } public void Increment() { m_Counter++; } } private CryptCounter _decryptCounter; private CryptCounter _encryptCounter; private byte[] _cryptKey1; private byte[] _cryptKey2; private byte[] _cryptKey3; private byte[] _cryptKey4; private bool Decrypt2 = false; public Cryption() { _decryptCounter = new CryptCounter(); _encryptCounter = new CryptCounter(); _cryptKey1 = new byte[0x100]; _cryptKey2 = new byte[0x100]; byte i_key1 = 0x9D; byte i_key2 = 0x62; for (int i = 0; i 4 | buffer[i] < 4 | buffer[i] < 4 | buffer[i] << 4); buffer[i] ^= (byte)(_cryptKey4[_decryptCounter.Key2] ^ _cryptKey3[_decryptCounter.Key1]); _decryptCounter.Increment(); } } } public void GenerateKeys(UInt32 CryptoKey, UInt32 AccountID) { UInt32 tmpkey1 = 0, tmpkey2 = 0; tmpkey1 = ((CryptoKey + AccountID) ^ (0x4321)) ^ CryptoKey; tmpkey2 = tmpkey1 * tmpkey1; _cryptKey3 = new byte[256]; _cryptKey4 = new byte[256]; for (int i = 0; i < 256; i++) { int right = ((3 - (i % 4)) * 8); int left = ((i % 4)) * 8 + right; _cryptKey3[i] = (byte)(_cryptKey1[i] ^ tmpkey1 left); _cryptKey4[i] = (byte)(_cryptKey2[i] ^ tmpkey2 left); } Decrypt2 = true; } public void GenerateKeys2(byte[] InKey1, byte[] InKey2) { byte[] addKey1 = new byte[4]; byte[] addKey2 = new byte[4]; byte[] addResult = new byte[4]; //addKey1.i = 0; //addKey2.i = 0; byte[] tempKey = new byte[4]; long LMULer; // InKey1[0] = 0x20; // InKey1[1] = 0x5c; // InKey1[2] = 0x48; // InKey1[3] = 0xf4; // InKey2[0] = 0x00; // InKey2[1] = 0x44; // InKey2[2] = 0xa6; // InKey2[3] = 0x2e; //if (Key3) delete [] Key3; //if (Key4) delete [] Key4; _cryptKey3 = new byte[256]; _cryptKey4 = new byte[256]; for (int x = 0; x < 4; x++) { addKey1[x] = InKey1[3 - x]; addKey2[x] = InKey2[3 - x]; } //cout << "Key1: " << addKey1.i << endl; //cout << "Key2: " << addKey2.i << endl; uint Adder1; uint Adder2; uint Adder3; Adder1 = (uint)((addKey1[3] << 24) | (addKey1[2] << 16) | (addKey1[1] << 8) | (addKey1[0])); Adder2 = (uint)((addKey2[3] << 24) | (addKey2[2] << 16) | (addKey2[1] 8) & 0xff); addResult[2] = (byte)((Adder3 >> 16) & 0xff); addResult[3] = (byte)((Adder3 >> 24) & 0xff); for (int b = 3; b >= 0; b--) { // printf("%.2x ", addResult.c[b]); tempKey[3 - b] = addResult[b]; } tempKey[2] = (byte)(tempKey[2] ^ (byte)0x43); tempKey[3] = (byte)(tempKey[3] ^ (byte)0x21); for (int b = 0; b < 4; b++) { tempKey[b] = (byte)(tempKey[b] ^ InKey1[b]); } //Build the 3rd Key for (int b = 0; b < 256; b++) { _cryptKey3[b] = (byte)(tempKey[3 - (b % 4)] ^ _cryptKey1[b]); } for (int x = 0; x < 4; x++) { addResult[x] = tempKey[3 - x]; } Adder3 = (uint)((addResult[3] << 24) | (addResult[2] << 16) | (addResult[1] << 8) | (addResult[0])); LMULer = Adder3 * Adder3; LMULer = LMULer 32; Adder3 = Convert.ToUInt32(LMULer & 0xffffffff); addResult[0] = (byte)(Adder3 & 0xff); addResult[1] = (byte)((Adder3 >> 8) & 0xff); addResult[2] = (byte)((Adder3 >> 16) & 0xff); addResult[3] = (byte)((Adder3 >> 24) & 0xff); for (int b = 3; b >= 0; b--) { tempKey[3 - b] = addResult[b]; } //Build the 4th Key for (int b = 0; b < 256; b++) { _cryptKey4[b] = Convert.ToByte(tempKey[3 - (b % 4)] ^ _cryptKey2[b]); } Decrypt2 = true; //cout << "Int representation: " << charadd.i << endl; } } }
Platform: | Size: 3638778 | Author: andesion@vip.qq.com | Hits:

[Crack HackCryption-Vcdkey-Jeff

Description: 怀恋Dos时代吗? 这里有一个Dos下的加/解密软件[提供原代码!],叫做VCDKEY,你可能要奇怪为什么叫VCDKEY?这要从上大学时候说起了:大学时候,有个铁哥们叫做"小胖子",此兄爱看VCD碟子,于是经常租碟在自己电脑上看,而且还经常将一些喜欢的精彩片段辑录到电脑中,而其人缘极好,经常有人去他电脑上玩,但他又不愿意让别人看到他录下的东西!有天,他跟我谈到了他的苦衷,于是,我决定为我的哥们写个东西,于是就有了这个东西! 其实,它的原理很简单,就是文件各字节的异或,但是要配合好字节的异或却要做一些另外的工作!而且它还具有CRC校验及运行时候的进度提示!作为个人的文件加密,C语言的学习都有一定的价值吧! 本人才疏学浅,没有炫耀之意思,只想代码,软件共享,大家共同提高!-nostalgia for the times? Here is a Dos under the plus/decryption software [for the original code! ] Called VCDKEY, you may be wondering why VCDKEY called? From this time on the University Speaking : University of time, to have a buddy called "Overweight", brother love VCD plate, so often rent CDs on their computers perspective, but also often like some of the highlights of all of the computer, and its excellent personal relationship, it was often to go to his computer to play , but he is unwilling to let people see his record things! One day, he told me he talked of the difficulties, and I decided for my brother to write things, he was such a thing! Actually, the principle is very simple. Bytes of the file or different, but to meet good-byte XOR has to be done some other work!
Platform: | Size: 51200 | Author: 杰弗雷 | Hits:

[Othergettime

Description: 加密 加密 加密 -encryption En cryption En cryption En cryption En cryption En cryption Encryption
Platform: | Size: 31744 | Author: okde | Hits:

[Linux-UnixCrypt-PBC-0.4.2-0.7.17.1.tar

Description: PBC perl 接口程序, Pair-Based cryption-PBC perl interface program, Pair-Based cryption
Platform: | Size: 52224 | Author: | Hits:

[CA authpbc-0.4.2.tar

Description: pair-based cryption library
Platform: | Size: 463872 | Author: | Hits:

[Crack Hackcamellia-BSD-1.2.0.tar

Description: camellia cryption algorithm
Platform: | Size: 11264 | Author: jindi | Hits:

[Crack Hackcamellia-GPL-1.2.0.tar

Description: camellia cryption algorithm
Platform: | Size: 18432 | Author: jindi | Hits:

[Crack Hackt_camellia

Description: camellia cryption code
Platform: | Size: 87040 | Author: jindi | Hits:

[Crack Hackdraft-kato-ipsec-camellia-modes-01

Description: camellia cryption modes -camellia cryption modes
Platform: | Size: 11264 | Author: jindi | Hits:

[Crack Hack22

Description: its cryption for stream cipher
Platform: | Size: 284672 | Author: safa | Hits:
« 12 3 »

CodeBus www.codebus.net