Welcome![Sign In][Sign Up]
Location:
Search - des crack

Search list

[CSharpmine_des

Description: des加密演示,短小精干,可在命令行下编译,csc des.cs即可。-des encryption demonstration short crack, and the command line compiler, des.cs prosthesis can be.
Platform: | Size: 1579 | Author: 章三 | Hits:

[Otherdescracker.tar

Description: 破解des算法的程序-Crack des algorithm procedures
Platform: | Size: 59392 | Author: 站长 | Hits:

[Crack Hackdes2003-6-4

Description: DES加密解密源代码-DES encryption and decryption source code
Platform: | Size: 36864 | Author: 陈伟 | Hits:

[Crack Hack大名鼎鼎的L0phtCrack Release 2.52 源代码

Description: 大名鼎鼎的L0phtCrack Release 2.52 源代码-famous L0phtCrack Release 2.52 source code
Platform: | Size: 209920 | Author: 姜涛 | Hits:

[CSharpmine_des

Description: des加密演示,短小精干,可在命令行下编译,csc des.cs即可。-des encryption demonstration short crack, and the command line compiler, des.cs prosthesis can be.
Platform: | Size: 1024 | Author: 章三 | Hits:

[Otherdes_tdes

Description: 完整的Visual Studio 2005 SP1精锐DES加密-Complete Visual Studio 2005 SP1 crack DES encryption
Platform: | Size: 2343936 | Author: 邹德刚 | Hits:

[Windows DevelopDEScrackedamajorevent

Description: 破解DES的重大事件的总结。内容比较详细。有相关的资料来源。-Crack DES, summary of major events. More detailed content. Relevant sources of information.
Platform: | Size: 7168 | Author: miaomiao | Hits:

[Windows DevelopDESHack

Description: Simple OpenSLL program to crack a DES key using Brute Force and initial values.
Platform: | Size: 3072 | Author: marcelo | Hits:

[Crack Hackfnc

Description: 大智慧新一代加密研究,分析大智慧新一代(L2版本,知道公式加密使用的是标准密码算法DES,被加密的验证数据是固定的,密码为最长8个字符,小写与大写字母不区别。所以超过8位的密码是不必要的。密码能破解吗?我觉得是可能的,知道加密后数据及被加密数据,我们要求得到的是密钥。一个可行的办法是穷举,穷举数字及字母的组合,只要写了个穷举的工具及字典工具,基本上6位密码在5分钟左右,穷举所有8位密码估计要50天左右。如果采用类似rainbow crack项目破解windows xp登录密码的方法,先将所有8位字符组合作为密钥加密被加密数据,将得到的加密数据顺序保存,这样只要查表就能知道被加密数据对应的密钥。只要5分钟,就能破解所有的公式密码。代价是大概需要500M硬盘空间预先保存这些数据。-Decryption of a new generation of great wisdom
Platform: | Size: 1120256 | Author: 佳杰 | Hits:

[Sniffer Package capturebaiduvote

Description: Baidu百度红包验证码分析,基于DES等多种基于算法破解的方式识别百度红包验证码-Baidu Baidu verification code red envelope analysis, based on the DES and other ways to crack identification algorithm-based Baidu verification code red envelope
Platform: | Size: 9216 | Author: liming | Hits:

[Otherdpa

Description: 用差分功耗分析的方法破解DES算法的源码通过300组密文分析,可以破解出密钥-Differential power analysis method with the DES algorithm source code crack
Platform: | Size: 3701760 | Author: wangbeibei | Hits:

[Crack HackAES

Description: Assuming that one could build a machine that could recover a DES key in a second (i.e., try 255 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key. To put that into perspective, the universe is believed to be less than 20 billion years old-Assuming that one could build a machine that could recover a DES key in a second (i.e., try 255 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key. To put that into perspective, the universe is believed to be less than 20 billion years old
Platform: | Size: 110592 | Author: vipi | Hits:

[Crack Hackmath_AES

Description: Assuming that one could build a machine that could recover a DES key in a second (i.e., try 255 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key. To put that into perspective, the universe is believed to be less than 20 billion years old-Assuming that one could build a machine that could recover a DES key in a second (i.e., try 255 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key. To put that into perspective, the universe is believed to be less than 20 billion years old
Platform: | Size: 643072 | Author: vipi | Hits:

[Crack Hackweek3-notes

Description: Weakest link” is size of key Attacks take advantage of encryption speed 1993: Weiner: $1M machine, 3.5 hours 1998: EFF’s Deep Crack: $250,000 92 billion keys per second 4 days on average 1999: distributed.net: 23 hours OK for some things (e.g., short time horizon) DES sliDES into wiDESpread DESuetude -Weakest link” is size of key Attacks take advantage of encryption speed 1993: Weiner: $1M machine, 3.5 hours 1998: EFF’s Deep Crack: $250,000 92 billion keys per second 4 days on average 1999: distributed.net: 23 hours OK for some things (e.g., short time horizon) DES sliDES into wiDESpread DESuetude
Platform: | Size: 129024 | Author: vipi | Hits:

[Internet-Networkbaiduvote

Description: Baidu百度红包验证码分析,基于DES等多种基于算法破解的方式识别百度红包验证码-Baidu Baidu verification code red envelope analysis, based on the DES and other ways to crack identification algorithm-based Baidu verification code red envelope
Platform: | Size: 9216 | Author: 程序段 | Hits:

[Software EngineeringDES(CPU-16INT)

Description: 破解DES的PC端程序,使用的(CPU 16线程 加解密 修正多线程_INT)只是提供一种多线程编程破解DES的方法-PC-side program to crack DES, used (CPU 16 thread multithreaded encryption amendment _INT) is to provide a multi-threaded programming methods to break DES
Platform: | Size: 12895232 | Author: 骆扬 | Hits:

[OtherDES

Description: DES加密,用于对网络传输字节的加密,保证信息的安全,防止被破解- 检测到中文 英语 DES加密,用于对网络传输字节的加密,保证信息的安全,防止被破解 DES encryption, used for the transmission of the network byte encryption, to ensure the security of information, to prevent the crack
Platform: | Size: 2048 | Author: 刘子瑞 | Hits:

CodeBus www.codebus.net