Description: rc5]RC5 encryption algorithm Plug-in
In fact, RC5 algorithm with a variety of methods can be used a variety of programming languages, but the majority of books on cryptography algorithm RC5 briefly introduced in the comparison, and is more than its C language algorithms, and as a popular development tools, Visual Studio.Net framework Although System.Security.Crytography Namespaces provide a lot of encryption functions, such as DES, Rijndael, RC2, RSA and MD5, but did not provide RC5 algorithm!
Platform: |
Size: 30019 |
Author:huli |
Hits:
Description: RC5-CTS模式加密解密算法C++程序实现。
解压之后运行main.dsw.在VC++下面打开,执行之后根据显示首先输入密钥(随便输入不超过16字节的字符串),之后提示输入需要加密的plaintext文件,输入plaintext1.txt,这个文件在压缩包里已经存在,(注意一定要写清楚文件类型名,是个文本文件),然后根据提示输入加密文件名,可随便输入一个文件名,但是别忘记了类型名.txt,如ciphertext1.txt。因为不输入类型名将来无法打开。之后输入解密之后的文件名,可输入decrypted.txt
结束。
之后打开生成的ciphertext1.txt和decrypted.txt,还有原来的明文文件plaintext1.txt,可以看出decrypted.txt和plaintext1.txt内容一致。ciphertext1.txt由plaintext1.txt加密得到,而decrypted.txt由ciphertext1.txt解密得到-RC5- CTS mode encryption and decryption algorithm C program. After running main.dsw decompression. The VC Below opened, after the implementation of the first to suggest that the importation of key (casual importing more than 16 byte string), followed by the need to import suggest encrypted plaintext documents, the importation of plaintext1.txt, this document compression bag already exists. (Note that certain types of documents to write clearly, is the text document), then prompted to input encrypted file name, could easily enter a file name, but not forget the type name. txt, as ciphertext1.txt. Because we do not import the type who could not open the future. After following the importation of declassified documents, and can import decrypted.txt end. After opening generated ciphertext1.tx Platform: |
Size: 180224 |
Author:郭佳 |
Hits:
Description: encrypt_RC5是加密算法,有需要的可以看看。-encrypt_RC5 is encryption algorithm, there is a need to look at the can. Platform: |
Size: 7168 |
Author:hello |
Hits:
Description: rc5]RC5 encryption algorithm Plug-in
In fact, RC5 algorithm with a variety of methods can be used a variety of programming languages, but the majority of books on cryptography algorithm RC5 briefly introduced in the comparison, and is more than its C language algorithms, and as a popular development tools, Visual Studio.Net framework Although System.Security.Crytography Namespaces provide a lot of encryption functions, such as DES, Rijndael, RC2, RSA and MD5, but did not provide RC5 algorithm!
Platform: |
Size: 58368 |
Author:huli |
Hits:
Description: 流密码算法,可用于文件加密和实时通信
,设计者是著名的密码学家Rivest.该算法效率远高于一般分组密码,并且很适合用于随机数生成-Stream cipher algorithm, can be used for file encryption and real-time communication, the designer is well-known cryptographer Rivest. The algorithm efficiency is much higher than the general block cipher, and is suitable for random number generator Platform: |
Size: 2048 |
Author:che wang |
Hits:
Description: C#写的RC5加密和解密算法,可以加密解密文件。-RC5 encryption and decryption algorithm written by C#, you can encrypt and decrypt files. Platform: |
Size: 1240064 |
Author: |
Hits:
Description: RC5加密算法类C#
RC5分组密码算法是1994由麻萨诸塞技术研究所的Ronald L. Rivest教授发明的,并由RSA实验室分析。它是参数可变的分组密码算法,三个可变的参数是:分组大小、密钥大小和加密轮数。在此算法中使用了三种运算:异或、加和循环。-RC5 encryption algorithm class C#
RC5 block cipher algorithm in 1994 by Professor Ronald L. Rivest Massachusetts Institute of Technology invention, RSA by laboratory analysis. It is a variable parameter block cipher algorithm, three variable parameters are: packet size, key size and encryption rounds. Use the three operations in this algorithm: XOR, add and circulation. Platform: |
Size: 1024 |
Author:longhsneg |
Hits:
Description: 详细说明:RC5加密算法类C# RC5分组密码算法是1994由麻萨诸塞技术研究所的Ronald L. Rivest教授发明的,并由RSA实验室分析。它是参数可变的分组密码算法,三个可变的参数是:分组大小、密钥大小和加密轮数。在此算法中使用了三种运算:异或、加和循环。-RC5 encryption algorithm class C# RC5 block cipher algorithm in 1994 by Professor Ronald L. Rivest Massachusetts Institute of Technology invention, RSA by laboratory analysis. It is a variable parameter block cipher algorithm, three variable parameters are: packet size, key size and encryption rounds. Use the three operations in this algorithm: XOR, add and circulation. Platform: |
Size: 1521664 |
Author:terry |
Hits: