Welcome![Sign In][Sign Up]
Location:
Search - file encryption algorithm in java

Search list

[Crack Hack3des源代码

Description: 根据设计要求:1)具有文件加密和解密功能;2)具有加解密速度统计功能;3)采用密文反馈链接和密文挪用短块处理技术。我们可以知道,程序要有加密模块、解密模块、子密钥生成模块,这三个模块构成DES算法。DES算法再构成3DES,这很简单,只要加个密钥便可实现。3DES还必须工作在密文反馈连接模式下和使用密文短块挪用技术。至于速度统计功能就很好实现,用文件长度除以处理时间便是加解密速度。-based on the design requirements : 1) with file encryption and decryption function; 2) the speed with the encryption and decryption functions of statistics; 3) Use of dense text links and feedback secret misappropriation short pieces of text processing technology. We know that procedures have encryption module, decryption modules for key generating modules, which constitute three modules DES algorithm. DES algorithm constitute 3DES, this is very simple, as long as add key can be reached. 3DES must also work in close link text feedback mode and the use of short text block secret misappropriation of technology. As for the speed of statistical functions properly achieved, divided by the length of documents with the processing time is the speed encryption and decryption.
Platform: | Size: 14336 | Author: 杨巍 | Hits:

[CA authsecurity

Description: 说明: 1、里面有什么: 1.1、org.bouncycastle.*下的所有软件是bouncycastle组织开发的软件包 1.2、org.infosecurity.*下的软件包括: DES_CBC算法的实现 RSA算法的实现(包括:密钥生成、公钥加密和私钥解密、数字签名及签名验证) 数字信封的实现   利用数字信封实现大文件的加密、解密。 2、有什么用:   2.1 研究、学习信息安全中的密码学设计与实现技术。   2.2 当然如果大家觉得在其它地方用的上,我会觉得很高兴的。 3、还有什么改进: 3.1 对文件加密、解密的时候要频繁的IO,如果加一个缓冲区,比如10K、50K等, 只有缓冲区满了才写入DISK这样将提高效率。 3.2 RSA私钥积存的时候可以按PKCS8形式,再经BASE64编码保存比较好。-Note : 1, mean there : 1.1, org.bouncycastle .* of all software development organizations is bouncycastle package 1.2, org.infosecurity .* The software includes : DES_CBC algorithm to achieve the realization of the RSA algorithm (including : key generation, public key and private key encryption decryption, digital signatures and signature verification), the realization of digital envelope using digital envelope realize document encryption, decryption. Two, what is the use of : 2.1, learning the information security cryptography design and technology. 2.2 Of course, if you think in the other parts, I feel very happy. Three, what is there for improvement : 3.1 pairs of file encryption, decryption, and the time to frequent the IO, plus a buffer, such as 10K, 50K, the only buffer is needed for
Platform: | Size: 212992 | Author: 雷敏 | Hits:

[Crack HackCaesar

Description: 一个简单的程序:Caesar加密算法,用java实现的源代码!-A simple procedure: Caesar encryption algorithm, using java realize the source code!
Platform: | Size: 1024 | Author: | Hits:

[JSP/Java222jfilecrypt

Description: 很强的JAVA加密、解密算法源码,一共有6种算法可供选择,另外还可以直接生成ZIP压缩文件。 -JAVA strong encryption, decryption algorithm source, a total of six kinds of algorithms to choose from, also can directly generate ZIP compressed file.
Platform: | Size: 26624 | Author: lb | Hits:

[Crack HackRijndael

Description: 完整的Rijndael加密c算法 以及Rijndael的J2ME实现 还有Rijndael的原理讲解文档-C complete Rijndael encryption algorithm Rijndael in J2ME and realize there is documentation to explain the principles of Rijndael
Platform: | Size: 168960 | Author: sure | Hits:

[JSP/JavaFileDES

Description: DES加密算法JAVA实现程序,对文件进行加密-DES encryption algorithm JAVA realization procedure, the file encryption
Platform: | Size: 1024 | Author: henry | Hits:

[AlgorithmJavaApplication2

Description: Java Shannon Fano Algorithm , encryption and decryption. CitireBit.java read bit by bit from text/bmp file Compara.java compares 2 bits In.txt it s the in file for the interface and algorithm Interfata.java it s the interface file Nod.java it s the node, for the tree structure Performante.java It s for the performances of the algorithm ( in percent ) ScriereBit.java writes a bit into the compressed file Vect.java a vector structure which i use to keep the track in tr-Java Shannon Fano Algorithm , encryption and decryption. CitireBit.java read bit by bit from text/bmp file Compara.java compares 2 bits In.txt it s the in file for the interface and algorithm Interfata.java it s the interface file Nod.java it s the node, for the tree structure Performante.java It s for the performances of the algorithm ( in percent ) ScriereBit.java writes a bit into the compressed file Vect.java a vector structure which i use to keep the track in tree
Platform: | Size: 230400 | Author: dark | Hits:

[Crack Hackjava_security_sdk

Description: 软件是bouncycastle组织开发的软件包,包括DES_CBC算法的实现、RSA算法的实现(包括:密钥生成、公钥加密和私钥解密、数字签名及签名验证)、数字信封的实现、利用数字信封实现大文件的加密、解密。可以作为研究、学习信息安全中的密码学设计与实现技术。在原版的基础上进行一些改进,对文件加密、解密的时候要频繁的IO加一个缓冲区,RSA私钥积存的时候可以按PKCS8形式,再经BASE64编码保存。-Software development organization is bouncycastle package, including DES_CBC Algorithm, RSA algorithm implementation (including: key generation, public key encryption and private decryption, digital signature and signature verification), the realization of digital envelope using the envelope to achieve digital large file encryption and decryption. Can be used as research, study of information security design and implementation of cryptographic technology. On the basis of the original number of improvements, file encryption, decryption time to frequent the IO plus a buffer, RSA private key can PKCS8 accumulated when the form and then saved by the BASE64 encoding.
Platform: | Size: 212992 | Author: 鹿淑煜 | Hits:

[Software EngineeringDESwenjianjiami

Description: 用Java编写的一个文件加密解密系统,采用DES算法!-A file encryption and decryption system written in Java, using DES algorithm!
Platform: | Size: 661504 | Author: 于锴 | Hits:

[Software EngineeringJava-software-protection-technology

Description: 用加密的方法来保护Java类文件,加密可以有效地对抗反编译 Java技术在设计之初就考虑到应用环境的复杂性,因此允许用户根据Java规范定制类加载器,使用这些定制的Classloader可以完成特定的操 作,比如从网络上下载类文件,验证类文件来源等,本文定制了 北京邮电大学硕日毋究生学位论文Java软件保护技术研究及实现一个Classloader来完成加密类文件的加载" (3)负责密钥提取和解密的具体算法不能被加密,否则又需要先将它 们解密,由此将形成一个循环,而它们又是必须要加以保护的核 心内容,本方案中,将它们用C++实现并编译为本地的动态链接 库文件,这样可以有效地抵抗反编译 -Encryption method used to protect Java class files, encryption can be effective against decompile Java technology early in the design to take into account the complexity of the application environment, thus allowing users to customize the Java class loader specification, use these custom Classloader can be completed specific actions, such as class files downloaded from the Internet, verify that the class file sources, Beijing University of Posts and customized paper at no postgraduate Master Thesis Java software protection technology research and implement a Classloader to complete the encryption class file loaded " (3 ) is responsible for extracting and decrypting key specific algorithm can not be encrypted, or they need to first decrypt them, thereby forming a loop, and that they must be taken to protect the core, this scenario, they are implemented using C++ and compiled to native dynamic link library file, which can effectively resist decompile
Platform: | Size: 1024 | Author: 李忠楠 | Hits:

[Crack HackSource

Description: 用JAVA实现的AES算法,可对文件,字符串,byte数组加密,详细显示每一步加密过程,包含生成密匙,加密文件,用密钥k解密文件-AES algorithm using JAVA, may file a string, byte array encryption, the encryption process every step shown in detail, including key generation, encryption, file with the key k to decrypt the file
Platform: | Size: 1613824 | Author: kimifetch | Hits:

[androidMd5

Description: Md5.java是一个字符串加密算法类的代码文件,如果你在用JAVA开发一些应用,这个MD5算法类或许可以直接套用,代码中的关键部分带有注释,部分注释是英文的,不过认真看可以看懂。-Md5.java encryption algorithm is a string class code file, if you are developing some applications using JAVA, the MD5 algorithm may be directly applied to the class, a key part of the code with comments, some comments are in English, but a serious look can understand.
Platform: | Size: 4096 | Author: gpudn24 | Hits:

CodeBus www.codebus.net