Description: 该程序用于实现密码学中的线性反馈移位寄存器的模拟,本程序以5级为例,并可以判断输出数列的周期-The procedure used to realize Cryptography LFSR simulation, the procedure to 5 as an example, and can determine the cycle of the output series Platform: |
Size: 1024 |
Author:唐扬 |
Hits:
Description: RSA算法的原理分析及实现。RSA是既能用于数据加密也能用于数字签名的一种非对称密码体制的算法。它有一对密钥,其中之一是私有密钥,由用户保存;另一个为公开密钥,可对外公开。并用VC++语言实现,通过MFC设计的一个小系统来模拟算法的简单应用-RSA algorithm and the realization of the principle. RSA is the best tool for data encryption can be used for digital signatures, a non-symmetric cryptography algorithms. It has a pair of keys, one of which is the private key, by the user preserved another for the public key can be made public. And VC++ Language, through the MFC designed a small system to the simple application of simulation algorithm Platform: |
Size: 3694592 |
Author:dxh |
Hits:
Description: RSA算法的原理分析及实现。RSA是既能用于数据加密也能用于数字签名的一种非对称密码体制的算法。它有一对密钥,其中之一是私有密钥,由用户保存;另一个为公开密钥,可对外公开。并用VC++语言实现,通过MFC设计的一个小系统来模拟算法的简单应用-RSA -RSA algorithm and the realization of the principle. RSA is the best tool for data encryption can be used for digital signatures, a non-symmetric cryptography algorithms. It has a pair of keys, one of which is the private key, by the user preserved another for the public key can be made public. And VC++ Language, through the MFC designed a small system to the simple application of simulation algorithm Platform: |
Size: 17408 |
Author:jack |
Hits:
Description: We present elliptic curve cryptography (ECC) coprocessor,
which is dual-field processor with projective
coordinator. We have implemented architecture for scalar
multiplication, which is key operation in elliptic curve
cryptography. Our coprocessor can be adapted both prime field
and binary field, also contains a control unit with 256 bit serial
and parallel operations , which provide integrated highthroughput
with low power consumptions. Our scalar multiplier
architecture operation is perform base on clock rate and produce
better performance in term of time and area compared to similar
works. We used Verilog for programming and synthesized using
Xilinx Vertex II Pro devices. Simulation was done with Modelsim
XE 6.1e, VLSI simulation software from Mentor Graphics
Corporation especially for Xilinx devices. Platform: |
Size: 116736 |
Author:陳曉慧 |
Hits:
Description: This project presents FPGA implementations of the DES and Triple-DES with improved security against power analysis attacks. The proposed designs use Boolean masking, a previously introduced technique to protect smart card implementations from these attacks. Triple DES was the answer to many of the shortcomings of DES. Since it is based on the DES algorithm, it is very easy to modify existing software to use Triple DES. It also has the advantage of proven reliability and a longer key length that eliminates many of the shortcut attacks that can be used to reduce the amount of time it takes to break DES. However, even this more powerful version of DES may not be strong enough to protect data for very much longer. The DES algorithm itself has become obsolete and is in need of replacement.DES encrypts data in 64-bit and it is a symmetric algorithm. The key length is 56-bits.
KEY WORDS: DES, Encryption, Decryption, Cryptography, Simulation, Synthesis, TDES, Cipher.
Platform: |
Size: 5363712 |
Author:abilash |
Hits: