Welcome![Sign In][Sign Up]
Location:
Search - rsa and des

Search list

[Crack Hackcryptix_src_3-1-2

Description: 另一个使用java编写的加密通用算法包,含des,rsa,sha,md5,md4,md2,idea,blowfish等很多加密算法和密钥存储、签名等源码- Another uses the java compilation the encryption general algorithm package, contains des, rsa, sha, md5, md4, md2, idea, blowfish and so on the very many encryption algorithm and the key saves, source code and so on the signature
Platform: | Size: 2530304 | Author: 站长 | Hits:

[Crack Hackcrypt_desandrsa

Description: des和rsa加密算法程序-des and rsa encryption algorithm procedures
Platform: | Size: 104448 | Author: 站长 | Hits:

[Crack Hack加密算法

Description: 详细介绍了DES和RSA2算法描述,以及他们的实现的有关代码和他们的区别-detail and the DES algorithm RSA2 described, as well as their realization of the code and the difference between them
Platform: | Size: 1823744 | Author: | Hits:

[Software Engineeringaes设计方案

Description: 随着密码分析技术的提高,新的数据加密标准AES取代了过时的DES。文章在阐述AES/RSA加密算法的基础上,分别给出了利用AES/RSA实现客户端/服务器端网络数据传输的加密流程。最后在比较AES算法和RSA算法基础上,将AES与RSA相结合提出一种新的数据加密方案。-analysis technology improvements, new data encryption standard AES replaced the outdated DES. The article described AES/RSA encryption algorithm on the basis of the difference is the use of AES/RSA achieve client/server network data encryption process. Finally in comparison AES and RSA algorithm, based on AES and RSA will be combined, a new data encryption program.
Platform: | Size: 14336 | Author: | Hits:

[Crack HackVC_RSA

Description: 一、RSA基本原理 对明文分组M和密文分组C,加密与解密过程如下: C = POW (M , e) mod n M = POW(C , d) mod n = POW(POW( M ,e), d) mod n=POW( M,e*d) 其中POW是指数函数,mod是求余数函数。 其中收发双方均已知n,发送放已知e,只有接受方已知d,因此公钥加密算法的公钥为 KU={ e , n},私钥为KR={d , n}。该算法要能用做公钥加密,必须满足下列条件: 1. 可以找到e ,d和n,使得对所有M<n ,POW(M ,e*d)=M mod n . 2. 对所有 M<n,计算POW (M , e)和POW(C , d)是比较容易的。 3. 由e 和n确定d是不可行的 -one, the basic tenets of RSA expressly group M and cipher block C, encryption and decryption process is as follows : C = POW (M, e) mod n = M POW (C, d) mod n = POW (POW (M, e), d) mod n = POW (M, e* d), which is an exponential function POW, mod is the pursuit of the remaining functions. Transceivers which both known n, send e Fang known, the only known recipient d, therefore the public key encryption algorithm for public key e KU = (n), private key for KR = (d, n). The algorithm could be used to be a public key encryption, must meet the following conditions : 1. E can be found, and d n, making all the right M
Platform: | Size: 1965056 | Author: | Hits:

[Crack Hack300_encrypt

Description: 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives :- To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output- To share a file into shadows : cryptest's
Platform: | Size: 389120 | Author: Nikii | Hits:

[Crack HackEncryptDLL

Description: 一个自己写的加密/解密DLL文件,包含(Base64, BlowFish, AES, RSA,DES3,GOST)等算法以及用delphi 和 C++Builder 调用的例子源码和调用说明文件。-himself wrote an encryption/decryption DLL files, including (Base64, BlowFish. AES, RSA, DES3. GOST) algorithm and using delphi called Builder and C source code examples and the use of documentation .
Platform: | Size: 919552 | Author: Arnold | Hits:

[Crack Hackencryptdll3.6.1

Description: 《共享软件加密算法库》专业版是一款针对个人、企业开发共享软件的加密工具,支持Windows平台下各类开发工具: VC、VB、BCB、Delphi、PB、VFP、C#、ASP等,算法库中包含了获取计算机硬盘物理序列号、主板序列号功能及多种高强度对称、非对称算法。获取的硬盘序列号不随硬盘分区及格式化改变,支持IDE、SCSI接口硬盘,获取主板序列号的功能支持各类BIOS芯片,这两个功能可方便的用来实现一机一码的注册方式。算法库集成的算法有:BlowFish,MD5,Secret16,AES、SHA、CRC32、RSA、DES、字符串加/解密、文件加/解密等多种功能强大的算法,可以满足软件开发的各类需求,加密算法库附有详细的函数说明及各类软件调用示例。-"sharing software encryption algorithm for" professional version is the one individual, development of shared enterprise software encryption tools support Windows platforms in various types of development tools : VC, VB, BCB, Delphi, PowerBuilder, Visual FoxPro, C#, ASP, algorithm library includes access to the computer hard disk physical sequence, sequence, function of the Main Board and various high-intensity symmetric, asymmetric algorithms. Access to the hard disk, not with the sequence partitions and formatting changes, support IDE, SCSI hard disk interface, access to the Main Board, the sequence function and support a variety of BIOS chips, These two functions can be used to facilitate the realization of a machine a code of registration. Integration Algorithm for the algor
Platform: | Size: 380928 | Author: yangrui | Hits:

[Crack Hack949327266

Description: 准算法模块是集DES、3DES、AES、RSA、MD5、BlowFish、TEA、RC6等标准算法为一体的算法包,同时在模块中使用了Anti-Debug和程序自校验功能(涉及到软件的加壳和CRC32)、软件使用次数限制,更好的保护您的软件。在模块中作者给出了每种算法详细调用方法,使用者可以根据自己的需要来进行选择。现暂时给出在VB、VC、Delphi三种开发语言中的调用方法,其他语言的调用方法可与我们联系获得,具体可以参看例子程序;现更新DLL可能被破解者替换的漏洞,并对DLL进行了加壳,增加了CRC校验功能,For Delphi还增加了对DeDe的Anti代码,在代码中给出了在NT/2000/XP下关闭计算机的函数。 增加了MD2、MD3、SHA1、SHA256、SHA384、SHA512、HAVAL128、HAVAL160、HAVAL192、HAVAL224、HAVAL256、GOST、TIGER128、TIGER160、TIGER192、RIPEMD128、RIPEMD160、CRC32、CRC32B、ADLER32多种算法-prospective algorithm module combines DES, 3DES, AES, RSA, MD5, BlowFish. TEA, RC6 algorithm standards for the integration of the algorithm package, At the same time the use of the module Anti-Debug and procedures since the checksum function (related to the shell and software CRC 32), software usage restrictions and better protect your software. The module is the author of the algorithm in detail each call, users can meet their own needs to choose. Is temporarily given in VB, VC, Delphi development of the three languages of the call, other languages can call methods and access to our contacts, can see examples of specific procedures; Update DLL is likely to be those who break the replacement of the loopholes, and the shell DLL, an increase of CRC function, For Delphi also added to the Anti
Platform: | Size: 234496 | Author: 马克 | Hits:

[Crack Hackjiamisuanfamokuai

Description: 标准算法模块是集DES、3DES、AES、RSA、MD5、BlowFish、TEA、RC6等标准算法为一体的算法包,同时在模块中使用了Anti-Debug和程序自校验功能(涉及到软件的加壳和CRC32)、软件使用次数限制,更好的保护您的软件。在模块中作者给出了每种算法详细调用方法,使用者可以根据自己的需要来进行选择。现暂时给出在VB、VC、Delphi三种开发语言中的调用方法,其他语言的调用方法可与我们联系获得,具体可以参看例子程序;现更新DLL可能被破解者替换的漏洞,并对DLL进行了加壳,增加了CRC校验功能,For Delphi还增加了对DeDe的Anti代码,在代码中给出了在NT/2000/XP下关闭计算机的函。在本站提供了几款壳下载,需要的可以到“加壳技术”模块去下载,在校验的时候用得到,具体的方法在调用模块里面有。-standard algorithm module combines DES, 3DES, AES, RSA, MD5, BlowFish, TEA, RC6 algorithm standards for the integration of the algorithm package, At the same time the use of the module Anti-Debug and procedures since the checksum function (related to the shell and software CRC 32), software usage restrictions and better protect your software. The module is the author of the algorithm in detail each call, users can meet their own needs to choose. Is temporarily given in VB, VC, Delphi development of the three languages of the call, other languages can call methods and access to our contacts, can see examples of specific procedures; Update DLL is likely to be those who break the replacement of the loopholes, and the shell DLL, an increase of CRC function, For Delphi also added to the Anti De
Platform: | Size: 278528 | Author: 小强 | Hits:

[Crack Hackdesrsa

Description: des和rsa加密解密算法的程序源代码,可以理解算法如何实现思想-des and rsa algorithm for encryption and decryption program source code, algorithms can be understood how to achieve ideological
Platform: | Size: 82944 | Author: 孙良旭 | Hits:

[Crack Hackcode

Description: 应用公钥加密体制的代表算法RSA 应用对称加密算法DES 应用散列算法MD5计算消息摘要 数字签名并验证-Application of public key encryption system RSA algorithm application on behalf of a symmetric encryption algorithm MD5 hash algorithm DES application calculated message digest and verify digital signatures
Platform: | Size: 86016 | Author: 邓国文 | Hits:

[JSP/JavaDES_encrypt

Description: 实现DES和RSA的加密解密,MD5还有数字签名。-The realization of DES and RSA s encryption and decryption, MD5 digital signature also.
Platform: | Size: 4096 | Author: 天天 | Hits:

[Windows Developrc5

Description: rc5]RC5 encryption algorithm Plug-in In fact, RC5 algorithm with a variety of methods can be used a variety of programming languages, but the majority of books on cryptography algorithm RC5 briefly introduced in the comparison, and is more than its C language algorithms, and as a popular development tools, Visual Studio.Net framework Although System.Security.Crytography Namespaces provide a lot of encryption functions, such as DES, Rijndael, RC2, RSA and MD5, but did not provide RC5 algorithm!
Platform: | Size: 58368 | Author: huli | Hits:

[Crack HackSDESandRSA

Description: 而SDES是简单的des算法版本,具体算法根据《密码编码学与网络安全》里面的描述 程序里面的RSA设计有缺点: 由于密钥的生成是从小的开始循环来寻找,导致2个密钥1个大,1个小(通常为个位数)。由于时间比较紧迫,没来得及修正。-SDES is a simple and des algorithm version of the specific algorithm based on
Platform: | Size: 61440 | Author: 陈冠鹏 | Hits:

[Crack HackDESRSA

Description: des和rsa的算法演示文档 -des and rsa algorithm presentation
Platform: | Size: 15360 | Author: 赵斌 | Hits:

[ICQ-IM-ChatClient-Server-based-Security-Comunication-Tool

Description: 自己用Java编的Client-Server聊天程序,结合了网络通信、数据安全、多线程的知识 1.使用RSA算法完成DES密钥的分配; 2.使用MD5结合RSA算法完成对消息的签名; 3.对原有消息及签名提供机密性保护(用DES算法加密); 4.能够解密并验证签名的合法性 -Their use of Java made the Client-Server chat program, a combination of network communications, data security, knowledge of multi-threaded one. RSA algorithm using the completion of the distribution of DES keys 2. RSA algorithm combines the use of MD5 message to complete the signature 3. The original message and signature to provide confidentiality protection (with DES encryption algorithm) 4. Able to decrypt and verify the legitimacy of the signature
Platform: | Size: 8192 | Author: Shadow | Hits:

[Crack Hack1

Description: 密码编码学与网络安全:原理与实践(第二版)这本书是密码学的不错教材,国内第二版这本书要买48元,为大家方便就将它上传了吧。 本书内容涵盖了古典密码、DES、AES、RSA等等经典密码学加密算法的详细描述。-Password encoding learning and Network Security: Principles and Practice (Second Edition) This book is a good cryptography materials, the second edition of this book to buy 48 yuan, in order to facilitate the U.S. will upload it instead. The book covers the classical password, DES, AES, RSA, etc. Classical Cryptography encryption algorithm described in detail.
Platform: | Size: 12399616 | Author: 涂进 | Hits:

[Crack Hackjaimi

Description: 信息安全的RSA与DES加解密算法的实现,用的是Visual C++MFC-Information Security RSA encryption and decryption with the DES algorithm, using the Visual C++ MFC
Platform: | Size: 542720 | Author: wen | Hits:

[Crack Hackallencryp

Description: 利用VC编写的加解密算法程序,包括DES、RSA等多个算法-VC prepared using encryption and decryption algorithm procedures, including DES, RSA algorithm, etc.
Platform: | Size: 8637440 | Author: 吉米 | Hits:
« 1 2 34 5 6 7 8 9 10 »

CodeBus www.codebus.net