Description: 在VC环境下采用希尔密码体制加密、解密和破译。该软件实现了输入任意长度的密钥对文件进行加密和解密,解密密钥和密文保存在文件中。如果有完整的明文和对应的密文可是实现破译功能,即得出加密密钥。-in VC environment with Hill cryptosystem encryption, decryption and decoding. The software arbitrary length of the input to the key document encryption and decryption, and the decryption key secret to preserve the text in the document. If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys. Platform: |
Size: 42819 |
Author:枫 |
Hits:
Description: 在VC环境下采用希尔密码体制加密、解密和破译。该软件实现了输入任意长度的密钥对文件进行加密和解密,解密密钥和密文保存在文件中。如果有完整的明文和对应的密文可是实现破译功能,即得出加密密钥。-in VC environment with Hill cryptosystem encryption, decryption and decoding. The software arbitrary length of the input to the key document encryption and decryption, and the decryption key secret to preserve the text in the document. If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys. Platform: |
Size: 4512768 |
Author:枫 |
Hits:
Description: 实现了三种古典密码学体制和DES体制及其分析。affine(仿射)读入文件11.txt中内容(小写字母,明文)加密并把内容写入12.txt,还可以解密生成文件13.txt。vigenere,hill体制类似。DES体制包括加密解密雪崩效应差分分析等内容。由于本人还是刚学习程序设计语言及密码学的在校本科生,水平很低,第一次上传只是为了试一下。可以考虑少给几点,呵呵。-achieve three classical cryptography system and DES system and its analysis. P14 (affine) read into the document 11. Txt contents (lowercase letters, expressly) encryption and written 12. txt, can also generate documents declassified 13. txt. Vigenere, hill similar system. DES encryption and decryption system, including avalanche effect Differential analysis of the contents. Because I still just learning programming language and Cryptography in undergraduate school, the low level Uploading is the first to try. Consider a smaller number of points-huh. Platform: |
Size: 10240 |
Author:李栋 |
Hits:
Description: 300种加密解密的算法源代码, 在windows肯定能运行, 希望大家喜欢-300 encryption and decryption algorithm source code, the windows can certainly run, hope you like Platform: |
Size: 387072 |
Author: |
Hits:
Description: 本源码是对Hill算法的简单实现,压缩包内包含crypt和decrypt两个目录,分别为加密和解密。-the source of Hill simple algorithm to achieve, Compression packet contains crypt and decrypt two catalogs, respectively encryption and decryption. Platform: |
Size: 5120 |
Author:张华 |
Hits:
Description: 这是一个基于HILL密码的加密解密程序
能实现文本信息的加密(密钥可自行设定是一二阶矩阵)-HILL This is a password-based encryption and decryption process can realize text messaging encryption (key can be set on its own is a second-order matrix) Platform: |
Size: 1916928 |
Author:sjm |
Hits:
Description: 实现HILL密码的加密和解密,分三个题目详细说明。-HILL achieve password encryption and decryption, is divided into three topics in detail. Platform: |
Size: 10240 |
Author:宋明阳 |
Hits:
Description: C#平台下的希尔密码加密解密及破译程序,主要是对大学数学建模的该章节内容的实现。只考虑算法,故只对大写字母有效。-C# Platform Hill password encryption and decryption and deciphering procedures, mainly for mathematical modeling of the University chapter of the realization of the content. Only consider the algorithm, it is effective only for capital letters. Platform: |
Size: 261120 |
Author:陈佳 |
Hits:
Description: Hill加密算法的基本思想是将l个明文字母通过线性变换将它们转换为k个密文字母。脱密只要做一次逆变换就可以了。密钥就是变换矩阵本身。即
M=m1m2……ml
Ek(M)=c1c2……cl
其中
c1=k11m1+k12m2+……+k1lml
c2=k21m1+k22m2+……+k2lml
……
cl=kl1m1+kl2m2+……+kllml
通常对于字母加解密,使用mod 26的方法。
以上线性方程可以采用矩阵表示。
-Hill encryption algorithm the basic idea is to express the letter l a linear transformation through them is converted to k-secret alphabet. Off to do a secret as long as the inverse transform it. Key is the transformation matrix itself. That is, M = m1m2 ... ... mlEk (M) = c1c2 ... ... cl which c1 = k11m1+ K12m2+ ... ...+ K1lmlc2 = k21m1+ K22m2+ ... ...+ K2lml ... ... cl = kl1m1+ Kl2m2+ ... ...+ Kllml For encryption and decryption usually letters, use the method of mod 26. Above linear equations can be used express matrix. Platform: |
Size: 143360 |
Author:wildkaede |
Hits:
Description: 在数学建模中希尔密码的加密与解密是一个复杂的的计算过程,此程序能计算得出任意二阶密钥的加密与解密结果。-Hill, in Mathematical Modeling of encryption and decryption is a complicated calculation process, this process can be any second-order calculation of the encryption and decryption key results. Platform: |
Size: 30720 |
Author:刘海东 |
Hits:
Description: 古典密码
可选择进行维吉尼亚加解密、希尔加解密、行置换的乘积加解密、仿射加解密
并可选择下列统计计算:
1.不同n值下维吉尼亚密码体制的频率统计
2.不同n值下维吉尼亚密码体制的重合指数计算
3.不同n n值下希尔密码体制的频率统计
4.不同n n值下希尔密码体制的重合指数计算
5.不同(m,n,t)下维吉尼亚和行置换的乘积密码体制的频率统计
6.不同(m,n,t)下维吉尼亚和行置换的乘积密码体制的重合指数计算
7.对于同一明文,给出维吉尼亚密码体制、希尔密码体制、维吉尼亚和行置换的乘积密码体制、Rotor机的频率统计结果
-Virginia may choose to encrypt and decrypt, Gilgado decrypt, encrypt and decrypt the product line of replacement, affine encryption and decryption
Can choose the following statistical computing:
1. Under different values of n the frequency of Statistics Virginia cryptosystem
2. Under different values of n coincide Virginia cryptography Index
3. Under different values of n n Hill Cryptosystem frequency statistics
4. Under different values of n n coincidence Hill cryptosystem Index
5. Different (m, n, t) under the Virginia and the replacement of the product line frequency statistics cryptosystem
6. Different (m, n, t) under the replacement of the product line of Virginia and the coincidence index calculation code system
7. For the same plaintext, given Virginia cryptosystem, cryptography Hill, Virginia, and the product code line replacement system, Rotor machine frequency statistics Platform: |
Size: 3072 |
Author:Beaug |
Hits:
Description: Hill密码加密与解密C++程序实现。
其中包括Hill2、Hill4等。(Implementation of Hill encryption and decryption C++ program.) Platform: |
Size: 2048 |
Author:JackSkyLily
|
Hits:
Description: hill的加密解密代码,很牛的,你要相信我没错(Hill encryption and decryption code, very cattle, you have to believe I am right) Platform: |
Size: 14336 |
Author:654665995
|
Hits: