Welcome![Sign In][Sign Up]
Location:
Search - decrypt s

Search list

[File OperateCSPDemo

Description: Demo:用有微软的cryptoAPI CSP加密API函数,对文件(File)进行Encrypt和Decrypt.产生数字签名.对使用CryptEncrypt()等函数是一个很好的例子,程序测试通过.-Demo : Microsoft's cryptoAPI CSP Cryptographic API function, the document (File) Encrypt and Decrypt. Creating a digital signature. The use CryptEncrypt () function is a good example, the test procedure.
Platform: | Size: 29871 | Author: cogo | Hits:

[Crack Hack300_encrypt

Description: 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives : - To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output - To share a file into shadows : cryptest's
Platform: | Size: 389062 | Author: Nikii | Hits:

[Other resourceff11lockprogs

Description: ff11lockprogs Programs that I ve made that do something with FFXI. Zones + Importer - Reads FFXI dat files to match zone lines to zones Filter v0.3 - A program that will analyze the packets sent from FFXI Keygen - Replacement for keyget, gets next 100 session keys and puts them in key.dat file Server v0.2c - Updated and much better server + client, single player w/ logout Server v0.1 - The first ever FFXI server emulator Developers Server v0.1 - Same as above, but will save up to 10,000 unencrypted packets to the hard drive workingBlowfish - An algorithm FFXI uses to encrypt packets(updated w/ example) Compression - A (de)compression algorithm FFXI uses in packets Packet SDK - Currently only blowfish and compression, but it s all thats required to decrypt ingame packets -ff11lockprogs Programs that I've made that do something with FFXI. Zones Importer - Reads F FXI dat files to match zone lines to zones Filter v0.3-A program that will analyze the packets se nt from FFXI Keygen-Replacement for keyget. 100 gets next session keys and puts them in key.d Server v0.2c at file-Updated and much better se rver client, single player w / logout Server v0.1 - The first e ver FFXI server emulator Developers Server projectile. 1 - Same as above, but will save up to 10. 000 unencrypted packets to the hard drive worki ngBlowfish-An algorithm FFXI uses to encrypt p ackets (updated w / example) Compression-A (de ) compression algorithm FFXI uses in packets Pa. cket SDK - Currently only blowfish and compress ion. but it's all thats required to decrypt ingame pac kets
Platform: | Size: 1163535 | Author: 李少龙 | Hits:

[Other resourceencrypt_de

Description: This code is a cipher which takes in a plaintext or ciphertext string and encrypts / decrypts according to a user defined key value. -This code is a cipher which takes in a plaint ext or ciphertext string and encrypts / decrypt 's according to a user defined key value.
Platform: | Size: 8959 | Author: tongtong | Hits:

[Button controlcrypt

Description: Subject: HowToStorePassWord Here s a small example, while no \"enigma machine\", yet provides a simple way of storing a password with encryption. The password is first encrypted then converted to Hex. The reverse process will first convert to ascii then decrypt. The form has 2 Command buttons, one is Crypt, the other is DeCrypt.
Platform: | Size: 1266 | Author: ling | Hits:

[Crypt_Decrypt algrithmsibe具有认证功能算法

Description: 1 Boneh-Franlin的IBE算法主要由四个子算法组成:Setup,Extract,Encrypt和Decrypt,分别完成系统参数建立、密钥提取、加密和解密的功能。假定消息的明文空间为 ,密文空间 。 (1)、建立: 给定一个安全参数 k蝂+ Step 1: 执行G生成一个素数q, 两个q阶群G1, G2 , 和一个可用的双线性映射 ê: G1碐1瓽2。 此外选取G1 任一生成元 P蜧1,再选取两个HASH函数 H3:{ 0, 1}n×{0, 1}n。 -?, H4:。 :{ 0, 1}n鄘0, 1}n Setp 2: 随机选取一个 s? 令 Ppub=sP。 Step 3: 选择两个算法函数, H1: {0, 1}*?, H2: G2畕0, 1}n 。(对于安全验证,将所有的散列函数看作是随机的数据系统)。 消息空间为M= {0, 1}n。 密文空间为 C = 磠0, 1}n。 输出系统参数为 p = {q, G1, G2, ê, n, P, Ppub, H1, H2 H3, H4,}。 主密钥为 s?。 (2)、提取: 对于一个给定的字符串 Id蝱0, 1}* 算法如下: Step 4: 计算 QId = H1(Id) ?。 Step 5: 设私钥为 SId 则 SId = (QId)s 其中s为主密钥。 (3)、加密: 利用公钥 Id加密m蜯 算法如下: Step 6: 计算 QId = H1(Id) ?。 Step 7: 选择一个随机数 σ?。 Step 8: 设r= H3 (σ,m) Step 9:建立密文为:c= (4)、解密: 令c = 为用公钥加密的密文。如果U不属于 ,则拒绝该密文, 使用私钥要解密 SId? : Step 10:计算σ=V臜2(ê(SId, U)) Step 11:得出m=W H4 (σ) Step 12:设r = H3 (σ,m),验证U与rσ是否相等,如果不等则拒绝。 由上述算法的一般形式可以看出,基本的基于身份的广播加密机制,在解密时需要解一个n个变量的线性方程组(n为用户的数目),虽然有相对有效的方法解方程组但是对于WSN中的节点来说,需要的存储空间和计算量都太大,不适合。 针对上述问题提出了改进的基于身份的广播加密机制[17]。改进的算法不需要解方程组,它基于数学变换利用双线性的特性,在解密时只需要节点自己的私钥和已知的其他节点的公钥即可。采用了IBE算法的简要版本(simple)使用两个hash函数。对于改进基于身份认证的组播认证机制不需要解决任何的线性系统的方程和没有复杂的操作,更适用于计算和存储等能力都受限制的无线传感网络。 2 IBE算法性能分析 2.1 算法安全性 不管对于传统网络还是无线传感器网络,密钥管理方案的安全性都是首要考虑的因素,包括保密性、完整性、有效性等。 现在我们就来分析一下上述IBE算法的安全性。基于椭圆曲线的IBE算法的安全性依赖于给定P和rP条件下计算出r的难度,即求解椭圆曲线对数问题的时间复杂性。节点对明文加密后,将密文连同rP一起发出。解密密文时,当节点正常接收,只要用私钥dID经过计算就可以得到明文;当信息被攻击节点截取时,由于缺少私钥dID,攻击节点要算出密钥只能沿用发送节点的公式: ,假设攻击节点可以知道公钥QId和系统参数P和Ps,同时rP也是连同密文一起发送的,因此只要由P和rP解出发送节点选择的r,就可以得到gID。但是,解出r是几乎不可能的,所以IBE的安全性很高。
Platform: | Size: 1500328 | Author: michelle.yaer@163.com | Hits:

[File OperateCSPDemo

Description: Demo:用有微软的cryptoAPI CSP加密API函数,对文件(File)进行Encrypt和Decrypt.产生数字签名.对使用CryptEncrypt()等函数是一个很好的例子,程序测试通过.-Demo : Microsoft's cryptoAPI CSP Cryptographic API function, the document (File) Encrypt and Decrypt. Creating a digital signature. The use CryptEncrypt () function is a good example, the test procedure.
Platform: | Size: 1423360 | Author: cogo | Hits:

[Crack Hack300_encrypt

Description: 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives :- To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output- To share a file into shadows : cryptest's
Platform: | Size: 389120 | Author: Nikii | Hits:

[AI-NN-PRencrypt_de

Description: This code is a cipher which takes in a plaintext or ciphertext string and encrypts / decrypts according to a user defined key value. -This code is a cipher which takes in a plaint ext or ciphertext string and encrypts/decrypt 's according to a user defined key value.
Platform: | Size: 8192 | Author: tongtong | Hits:

[File OperateCryptoAPI_ProtectFile

Description: 利用Visual C++ .net2003开发的一款用于保护文件的小程序。 对文件产生MD5值同时对源文件用DES加密,并用私钥加密签名。 对加密文件解密,验证用公钥解密签名与解密文件的MD5值比较,以判断文件是否被修改。 遇到的问题:微软提供的签名函数可能有问题,无论用公钥还是私钥签名,用公钥、私钥(任一)均可解密。怪!希望在此与大家交流交流。-The use of Visual C++. Net2003 developed a document for the protection of small procedures. MD5 value of the document produced at the same time the source file using DES encryption, and signature private key encryption. Encrypted files decryption, authentication using public key to decrypt the signature and decrypt files MD5 value to determine whether a document is modified. Problems encountered: Microsoft to provide the signature function may be a problem regardless of whether it uses a public key or private key signature, using public key, private key (any one) can be decrypted. Strange! Would like to exchange with the U.S. exchanges.
Platform: | Size: 47104 | Author: jimin | Hits:

[Button controlcrypt

Description: Subject: HowToStorePassWord Here s a small example, while no "enigma machine", yet provides a simple way of storing a password with encryption. The password is first encrypted then converted to Hex. The reverse process will first convert to ascii then decrypt. The form has 2 Command buttons, one is Crypt, the other is DeCrypt.
Platform: | Size: 1024 | Author: ling | Hits:

[Technology ManagementFDGFD

Description: 本系统由单片机系统、矩阵键盘、LED显示和报警系统组成。系统能完成开锁、超时报警、超次锁定、管理员解密、修改用户密码基本的密码锁的功能。除上述基本的密码锁功能外,还具有调电存储、声光提示等功能,依据实际的情况还可以添加遥控功能。本系统成本低廉,功能实用-The system consists of single-chip microcomputer system, matrix keyboard, LED display and alarm system. System to complete the unlock, overtime alarm, lock超次, administrators decrypt, modify the user s password locks the basic functions. In addition to the above basic code lock function, but also has a transfer electric storage, sound and light features such as tips, according to the actual situation can also add a remote control function. The system low-cost, functional and practical
Platform: | Size: 128000 | Author: yehailong | Hits:

[assembly language08022311145800

Description: 完成开锁、超时报警、超次锁定、管理员解密、修改用户密码基本的密码锁的功能。-Complete the unlock, overtime alarm, lock超次, administrators decrypt, modify the user s password locks the basic functions.
Platform: | Size: 10240 | Author: 陈飞 | Hits:

[VC/MFCdoc1

Description: This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data. -This project demonstrates the use of secure hash functions technique to implement a file encryption/decryption system. This implemented application can encrypt/decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
Platform: | Size: 198656 | Author: vara | Hits:

[Crack Hackdoc2

Description: This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data. -This project demonstrates the use of secure hash functions technique to implement a file encryption/decryption system. This implemented application can encrypt/decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
Platform: | Size: 200704 | Author: vara | Hits:

[Embeded-SCM Developfile

Description: 电子密码锁源程序,系统能完成开锁、超时报警、超次锁定、管理员解密、修改用户密码基本的密码锁的功能-Electron source locks, the system can achieve lock, the police overtime,超次lock, decrypt administrator, modify the user' s password locks the basic functions of
Platform: | Size: 8192 | Author: 宋涛 | Hits:

[Bookshuibiandemimasuo

Description: 本系统由单片机系统、矩阵键盘、LED显示和报警系统组成。系统能完成开锁、超时 报警、超次锁定、管理员解密、修改用户密码基本的密码锁的功能。除上述基本的密码锁功 能外,还具有调电存储、声光提示等功能,依据实际的情况还可以添加遥控功能。本系统成 本低廉,功能实用-The system consists of single-chip systems, matrix keyboard, LED display and alarm system. System to complete the unlock, overtime alarm, lock超次, administrators decrypt, modify the user s password locks the basic functions. In addition to the basic reactive locks can also have a transfer electric storage, sound and light features such as tips, according to the actual situation can also add a remote control function.
Platform: | Size: 4096 | Author: 李刚 | Hits:

[Crack Hackfigerencoder

Description: 该代码通调用指纹采集验证模块对用户进行识别,进而调用加密模块对用户的各类文件进行加密。解密也要用指纹识别模块进行用户识别后方可解密。增强了用户文件的安全性。-The call pass code to verify fingerprint identification module to the user, and then call the user' s encryption module to encrypt the different types of documents. You have to decrypt the fingerprint identification module SIM decrypt before. Enhance the security of user files.
Platform: | Size: 8377344 | Author: 张明烁 | Hits:

[JSP/Javajava_DigitalSign

Description: 实用数字签名的步骤 (1)发送方使用MD5算法对原始信息进行计算,获得一个固定长度的信息摘要 (2)发送方用自己的私钥加密生成的信息生成发送方的数字签名,发送方把这个数字签名作为发送信息的附件和明文信息,一同用接收方的公钥进行加密,将加密后的密文一同发送给接收方; (3)接收方首先把接收到的密文用自己的私钥解密,得到明文信息和数字签名,再用发送方的公钥对数字签名进行解密,然后使用相同的单向散列算法来计算解密得到的明文信息,得到信息摘要;对比计算出来的信息摘要和发送方发送过来的信息摘要是否一致-Practical steps to a digital signature (1) sender MD5 algorithm used to calculate the original information, access to a fixed length message digest (2) use their own sender s private key to generate encrypted information generated by the sender s digital signature, the sender of the digital signature as an annex to send a message and express information, together with the recipient s public key for encryption, will be encrypted ciphertext sent to the receiver together (3) the recipient first received ciphertext with its own private key to decrypt received explicit information and digital signatures, and then the sender s public key to decrypt the digital signature, and then use the same one-way hash algorithm to calculate the explicit information to be decrypted, the message digest contrast calculated message digest and the sender sent the message digest are consistent
Platform: | Size: 23552 | Author: 张云 | Hits:

[SQL Serversp_decrypt

Description: 微软SQL2000 存储过程, 加密解密码, 查看原-Import data, the data import database, import data, import the data into the database data, the data into the database.
Platform: | Size: 2048 | Author: elvesnet | Hits:
« 12 3 »

CodeBus www.codebus.net