Welcome![Sign In][Sign Up]
Location:
Search - cryptography simulation

Search list

[OtherShiftLiner

Description: 该程序用于实现密码学中的线性反馈移位寄存器的模拟,本程序以5级为例,并可以判断输出数列的周期-The procedure used to realize Cryptography LFSR simulation, the procedure to 5 as an example, and can determine the cycle of the output series
Platform: | Size: 1024 | Author: 唐扬 | Hits:

[Industry researchAdHoc

Description: Ad Hoc网是一种不依赖于任何固定基础设施、没有中心控制节点、计算资源受限的新型无线移动网络.基于ECC(elliptic curves cryptography),提出了一个新的适用于Ad Hoc网的具有口令认证和共享口令进化的多方密钥协商方案.口令的一个功能是作为共享信息认证移动节点的密钥,另一个功能是作为对称密钥加密移动节点间的交互信息.共享口令进化机制保证每次认证节点密钥和协商会话密钥时口令的新鲜性和安全性,从而既减轻了移动节点的计算量和存储负担,又实现了移动节点之间的密钥认证和信息加密.新方案具有抗中间人攻击、抗重放攻击、密钥独立和前向安全等多种安全特性.
Platform: | Size: 165888 | Author: 春春 | Hits:

[Crack HackRSA

Description: RSA算法的原理分析及实现。RSA是既能用于数据加密也能用于数字签名的一种非对称密码体制的算法。它有一对密钥,其中之一是私有密钥,由用户保存;另一个为公开密钥,可对外公开。并用VC++语言实现,通过MFC设计的一个小系统来模拟算法的简单应用-RSA algorithm and the realization of the principle. RSA is the best tool for data encryption can be used for digital signatures, a non-symmetric cryptography algorithms. It has a pair of keys, one of which is the private key, by the user preserved another for the public key can be made public. And VC++ Language, through the MFC designed a small system to the simple application of simulation algorithm
Platform: | Size: 3694592 | Author: dxh | Hits:

[.netVigenere2

Description: 弗吉尼亚密码体制模拟实现,目前只适用于A~Z26个字母-Simulation and Realization of Virginia Cryptography
Platform: | Size: 3169280 | Author: sol | Hits:

[Crack Hackiliyu_51775964004477

Description: RSA算法的原理分析及实现。RSA是既能用于数据加密也能用于数字签名的一种非对称密码体制的算法。它有一对密钥,其中之一是私有密钥,由用户保存;另一个为公开密钥,可对外公开。并用VC++语言实现,通过MFC设计的一个小系统来模拟算法的简单应用-RSA -RSA algorithm and the realization of the principle. RSA is the best tool for data encryption can be used for digital signatures, a non-symmetric cryptography algorithms. It has a pair of keys, one of which is the private key, by the user preserved another for the public key can be made public. And VC++ Language, through the MFC designed a small system to the simple application of simulation algorithm
Platform: | Size: 17408 | Author: jack | Hits:

[VHDL-FPGA-Verilog-Elliptic

Description: We present elliptic curve cryptography (ECC) coprocessor, which is dual-field processor with projective coordinator. We have implemented architecture for scalar multiplication, which is key operation in elliptic curve cryptography. Our coprocessor can be adapted both prime field and binary field, also contains a control unit with 256 bit serial and parallel operations , which provide integrated highthroughput with low power consumptions. Our scalar multiplier architecture operation is perform base on clock rate and produce better performance in term of time and area compared to similar works. We used Verilog for programming and synthesized using Xilinx Vertex II Pro devices. Simulation was done with Modelsim XE 6.1e, VLSI simulation software from Mentor Graphics Corporation especially for Xilinx devices.
Platform: | Size: 116736 | Author: 陳曉慧 | Hits:

[VHDL-FPGA-VerilogSIMULATION-AND-SYNTHESIS-OF-TRIPLE-DES-BLOCK-CIPH

Description: This project presents FPGA implementations of the DES and Triple-DES with improved security against power analysis attacks. The proposed designs use Boolean masking, a previously introduced technique to protect smart card implementations from these attacks. Triple DES was the answer to many of the shortcomings of DES. Since it is based on the DES algorithm, it is very easy to modify existing software to use Triple DES. It also has the advantage of proven reliability and a longer key length that eliminates many of the shortcut attacks that can be used to reduce the amount of time it takes to break DES. However, even this more powerful version of DES may not be strong enough to protect data for very much longer. The DES algorithm itself has become obsolete and is in need of replacement.DES encrypts data in 64-bit and it is a symmetric algorithm. The key length is 56-bits. KEY WORDS: DES, Encryption, Decryption, Cryptography, Simulation, Synthesis, TDES, Cipher.
Platform: | Size: 5363712 | Author: abilash | Hits:

CodeBus www.codebus.net