Location:
Search - encrypt s
Search list
Description: Demo:用有微软的cryptoAPI CSP加密API函数,对文件(File)进行Encrypt和Decrypt.产生数字签名.对使用CryptEncrypt()等函数是一个很好的例子,程序测试通过.-Demo : Microsoft's cryptoAPI CSP Cryptographic API function, the document (File) Encrypt and Decrypt. Creating a digital signature. The use CryptEncrypt () function is a good example, the test procedure.
Platform: |
Size: 29871 |
Author: cogo |
Hits:
Description: 加密算法
Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives:
- To generate an RSA key
cryptest g
- To encrypt and decrypt a string using RSA
cryptest r
- To calculate MD5, SHS, and RIPEMD-160 message digests:
cryptest m file
- To encrypt and decrypt a string using DES-EDE in CBC mode:
cryptest t
- To encrypt or decrypt a file
cryptest e|d input output
- To share a file into shadows:
cryptest s <pieces> <pieces-needed> file
(make sure file has no extension, if you re running this under DOS)
- To reconstruct a file from shadows:
cryptest j output file1 file2 [....]
- To gzip a file:
cryptest z <compression-level> input output
- To gunzip a file:
cryptest u input output
- To run validation tests:
cryptest v
- To run benchmarks:
cryptest b [time for each benchmark in seconds]
-encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives : - To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output - To share a file into shadows : cryptest's
Platform: |
Size: 389062 |
Author: Nikii |
Hits:
Description: ff11lockprogs
Programs that I ve made that do something with FFXI.
Zones + Importer - Reads FFXI dat files to match zone lines to zones
Filter v0.3 - A program that will analyze the packets sent from FFXI
Keygen - Replacement for keyget, gets next 100 session keys and puts
them in key.dat file
Server v0.2c - Updated and much better server + client, single player w/
logout
Server v0.1 - The first ever FFXI server emulator
Developers Server v0.1 - Same as above, but will save up to 10,000
unencrypted packets to the hard drive
workingBlowfish - An algorithm FFXI uses to encrypt packets(updated w/
example)
Compression - A (de)compression algorithm FFXI uses in packets
Packet SDK - Currently only blowfish and compression, but it s all thats
required to decrypt ingame packets -ff11lockprogs Programs that I've made that do something with FFXI. Zones Importer - Reads F FXI dat files to match zone lines to zones Filter v0.3-A program that will analyze the packets se nt from FFXI Keygen-Replacement for keyget. 100 gets next session keys and puts them in key.d Server v0.2c at file-Updated and much better se rver client, single player w / logout Server v0.1 - The first e ver FFXI server emulator Developers Server projectile. 1 - Same as above, but will save up to 10. 000 unencrypted packets to the hard drive worki ngBlowfish-An algorithm FFXI uses to encrypt p ackets (updated w / example) Compression-A (de ) compression algorithm FFXI uses in packets Pa. cket SDK - Currently only blowfish and compress ion. but it's all thats required to decrypt ingame pac kets
Platform: |
Size: 1163535 |
Author: 李少龙 |
Hits:
Description: 1 Boneh-Franlin的IBE算法主要由四个子算法组成:Setup,Extract,Encrypt和Decrypt,分别完成系统参数建立、密钥提取、加密和解密的功能。假定消息的明文空间为 ,密文空间 。
(1)、建立: 给定一个安全参数 k蝂+
Step 1: 执行G生成一个素数q, 两个q阶群G1, G2 , 和一个可用的双线性映射 ê: G1碐1瓽2。 此外选取G1 任一生成元 P蜧1,再选取两个HASH函数 H3:{ 0, 1}n×{0, 1}n。 -?, H4:。 :{ 0, 1}n鄘0, 1}n
Setp 2: 随机选取一个 s? 令 Ppub=sP。
Step 3: 选择两个算法函数, H1: {0, 1}*?, H2: G2畕0, 1}n 。(对于安全验证,将所有的散列函数看作是随机的数据系统)。 消息空间为M= {0, 1}n。 密文空间为 C = 磠0, 1}n。 输出系统参数为 p = {q, G1, G2, ê, n, P, Ppub, H1, H2 H3, H4,}。 主密钥为 s?。
(2)、提取: 对于一个给定的字符串 Id蝱0, 1}* 算法如下:
Step 4: 计算 QId = H1(Id) ?。
Step 5: 设私钥为 SId 则 SId = (QId)s 其中s为主密钥。
(3)、加密: 利用公钥 Id加密m蜯 算法如下:
Step 6: 计算 QId = H1(Id) ?。
Step 7: 选择一个随机数 σ?。
Step 8: 设r= H3 (σ,m)
Step 9:建立密文为:c=
(4)、解密: 令c = 为用公钥加密的密文。如果U不属于 ,则拒绝该密文, 使用私钥要解密 SId? :
Step 10:计算σ=V臜2(ê(SId, U))
Step 11:得出m=W H4 (σ)
Step 12:设r = H3 (σ,m),验证U与rσ是否相等,如果不等则拒绝。
由上述算法的一般形式可以看出,基本的基于身份的广播加密机制,在解密时需要解一个n个变量的线性方程组(n为用户的数目),虽然有相对有效的方法解方程组但是对于WSN中的节点来说,需要的存储空间和计算量都太大,不适合。
针对上述问题提出了改进的基于身份的广播加密机制[17]。改进的算法不需要解方程组,它基于数学变换利用双线性的特性,在解密时只需要节点自己的私钥和已知的其他节点的公钥即可。采用了IBE算法的简要版本(simple)使用两个hash函数。对于改进基于身份认证的组播认证机制不需要解决任何的线性系统的方程和没有复杂的操作,更适用于计算和存储等能力都受限制的无线传感网络。
2 IBE算法性能分析
2.1 算法安全性
不管对于传统网络还是无线传感器网络,密钥管理方案的安全性都是首要考虑的因素,包括保密性、完整性、有效性等。
现在我们就来分析一下上述IBE算法的安全性。基于椭圆曲线的IBE算法的安全性依赖于给定P和rP条件下计算出r的难度,即求解椭圆曲线对数问题的时间复杂性。节点对明文加密后,将密文连同rP一起发出。解密密文时,当节点正常接收,只要用私钥dID经过计算就可以得到明文;当信息被攻击节点截取时,由于缺少私钥dID,攻击节点要算出密钥只能沿用发送节点的公式: ,假设攻击节点可以知道公钥QId和系统参数P和Ps,同时rP也是连同密文一起发送的,因此只要由P和rP解出发送节点选择的r,就可以得到gID。但是,解出r是几乎不可能的,所以IBE的安全性很高。
Platform: |
Size: 1500328 |
Author: michelle.yaer@163.com |
Hits:
Description: AVR单片机的优化RC6 加密算法(速度快,其优化思想绝对值得学习)
在有128bytes RAM 的AVR单片机上执行 rc6 16/10/8(16 bit/10 rounds/8 bytes keys)
* 对多数代码进行了 C 语言优化,对数据相关循环移位,模乘等用ASM优化
* 在4MHz无乘法器的AVR上得到平均 1172 Bytes/s的加解密速度。
* 编译器: AVR-G-AVR optimization RC6 encryption algorithm (faster, optimizing their thinking definitely worth learning) 128bytes of RAM in the AVR on the implementation of production 16/10/8 (16 bit/10 rounds/8 bytes keys)* for the majority of code optimization of the C language the data related to cycle shift, mode used by other optimization* ASM 4MHz without the multiplier be average AVR 1172 Bytes/s speed encryption and decryption.* Compiler : AVR-G
Platform: |
Size: 5120 |
Author: 陈谭 |
Hits:
Description: Demo:用有微软的cryptoAPI CSP加密API函数,对文件(File)进行Encrypt和Decrypt.产生数字签名.对使用CryptEncrypt()等函数是一个很好的例子,程序测试通过.-Demo : Microsoft's cryptoAPI CSP Cryptographic API function, the document (File) Encrypt and Decrypt. Creating a digital signature. The use CryptEncrypt () function is a good example, the test procedure.
Platform: |
Size: 1423360 |
Author: cogo |
Hits:
Description: 加密算法
Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives:
- To generate an RSA key
cryptest g
- To encrypt and decrypt a string using RSA
cryptest r
- To calculate MD5, SHS, and RIPEMD-160 message digests:
cryptest m file
- To encrypt and decrypt a string using DES-EDE in CBC mode:
cryptest t
- To encrypt or decrypt a file
cryptest e|d input output
- To share a file into shadows:
cryptest s <pieces> <pieces-needed> file
(make sure file has no extension, if you re running this under DOS)
- To reconstruct a file from shadows:
cryptest j output file1 file2 [....]
- To gzip a file:
cryptest z <compression-level> input output
- To gunzip a file:
cryptest u input output
- To run validation tests:
cryptest v
- To run benchmarks:
cryptest b [time for each benchmark in seconds]
-encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives :- To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output- To share a file into shadows : cryptest's
Platform: |
Size: 389120 |
Author: Nikii |
Hits:
Description: 实现DES和RSA的加密解密,MD5还有数字签名。-The realization of DES and RSA s encryption and decryption, MD5 digital signature also.
Platform: |
Size: 4096 |
Author: 天天 |
Hits:
Description: DES( Data Encryption Standard)算法,于1977年得到美国政府的正式许可,是一种用56位密钥来加密64位数据的方法。虽然56位密钥的DES算法已经风光不在,而且常有用Des加密的明文被破译的报道,但是了解一下昔日美国的标准加密算法总是有益的,而且目前DES算法得到了广泛的应用,在某些场合,她仍然发挥着余热-DES (Data Encryption Standard) algorithm, in 1977 the U.S. government s official permission, is a 56 by 64 key to encrypt data. Although the 56 key scenery DES algorithm has not, and often with Des expressly been deciphered encrypted reports, but look past the United States standard encryption algorithm is always useful, but the current DES algorithm is widely used, to a certain some occasions, she continued to play a heat
Platform: |
Size: 966656 |
Author: 朝猛子 |
Hits:
Description: 一次性口令认证系统SKEY的实现,采用MD5算法对口令进行加密,传递校验码-One-Time Password Authentication System sKey realization, using MD5 algorithm to encrypt passwords, transmission Check Code
Platform: |
Size: 497664 |
Author: 赵斌 |
Hits:
Description: This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash code (key) is
generated using the SHA algorithm. Then this key is used to
enctypted the data in the file(s). This key is stored in the
encrypted file along with the encrypted data.
-This project demonstrates the use of secure hash functions technique
to implement a file encryption/decryption system.
This implemented application can encrypt/decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash code (key) is
generated using the SHA algorithm. Then this key is used to
enctypted the data in the file(s). This key is stored in the
encrypted file along with the encrypted data.
Platform: |
Size: 198656 |
Author: vara |
Hits:
Description: This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash code (key) is
generated using the SHA algorithm. Then this key is used to
enctypted the data in the file(s). This key is stored in the
encrypted file along with the encrypted data.
-This project demonstrates the use of secure hash functions technique
to implement a file encryption/decryption system.
This implemented application can encrypt/decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash code (key) is
generated using the SHA algorithm. Then this key is used to
enctypted the data in the file(s). This key is stored in the
encrypted file along with the encrypted data.
Platform: |
Size: 200704 |
Author: vara |
Hits:
Description: DES( Data Encryption Standard)算法,于1977年得到美国政府的正式许可,是一种用56位密钥来加密64位数据的方法。DES算法以被应用于许多需要安全加密的场合。(如:UNIX的密码算法就是以DES算法为基础的)。-DES (Data Encryption Standard) algorithm, in 1977 the U.S. government' s official permission, is a 56 with 64-bit key to encrypt data. DES algorithm to be used in many occasions the necessary security encryption. (Such as: UNIX password algorithm is based on DES algorithm).
Platform: |
Size: 6144 |
Author: lindaqing |
Hits:
Description: DES( Data Encryption Standard)算法,于1977年得到美国政府的正式许可,是一种用56位密钥来加密64位数据的方法。此程序可以对文本进行DES算法加密和解密。-DES (Data Encryption Standard) algorithm,with the U.S. government s official permission, is a 56 with 64-bit key to encrypt data. This procedure can be carried out on the text of DES encryption and decryption algorithm.
Platform: |
Size: 2025472 |
Author: wini |
Hits:
Description: 该代码通调用指纹采集验证模块对用户进行识别,进而调用加密模块对用户的各类文件进行加密。解密也要用指纹识别模块进行用户识别后方可解密。增强了用户文件的安全性。-The call pass code to verify fingerprint identification module to the user, and then call the user' s encryption module to encrypt the different types of documents. You have to decrypt the fingerprint identification module SIM decrypt before. Enhance the security of user files.
Platform: |
Size: 8377344 |
Author: 张明烁 |
Hits:
Description: 通过SQL SERVER存储加密解密过程实现新增用户的密码加密和解密过程,验证登陆用户的合法性。-sqlserver encrypt delphi
Platform: |
Size: 1449984 |
Author: davy |
Hits:
Description: It encrypts a bitmap using a simple algorithm. It s a not a strong encryption method, but it s fast.
Platform: |
Size: 3072 |
Author: LQuantum |
Hits:
Description: 这个是对文件进行加解密的项目,提供一些库函数,你可以直接调用-this source code s function is to encrypt and decrypt the file ,so ,of course ,it can
speed up your program
Platform: |
Size: 13312 |
Author: 刘金波 |
Hits:
Description: Use to decrypt loc file and encrypt Audition s language script file
Platform: |
Size: 1024 |
Author: Shinichi Kudo |
Hits:
Description: 两端传输加密的demo程序,采用c/s架构的socket通讯,加密算法使用RC4算法-Both ends of the transmission of encrypted demo program, c/s architecture socket communication, encryption algorithm using the RC4 algorithm
Platform: |
Size: 5120 |
Author: liuzhuo |
Hits: