Welcome![Sign In][Sign Up]
Location:
Search - secure Hash algorithm

Search list

[Crack Hack20041121125751

Description: SHA算法,一个安全散列算法,通过把数据变成相应的消息摘要,根据迭代值,进行四次循环运算而产生的消息摘要.-SHA algorithm, a secure hash algorithm, the data into corresponding news summary, according to the value iteration, for the fourth cycle of operation and the news summary.
Platform: | Size: 7118 | Author: hanlihu | Hits:

[Crack Hacktest

Description: SHA-1(Secure Hash Algorithm)是美国国家标准局(National Institute of Standard and Technology NIST)为了配合数位签章演算法(Digital Signature Algorithm DSA)的使用所发布的联邦资讯处理标准-FIPS PUB 180-1(Federal Information Processing Standard Publication 180-1),而SHA-1 则是SHA-1 (FIPS180)的改良版,现今与MD5 皆广被使用拿来做密码验证功能.其设计的方法是根据MD4,来对输入的资料讯息(Message)产生出一个160 位元的讯息摘要(Digest) ,对於资料安全性提供了有效的保障.
Platform: | Size: 1404 | Author: zyt | Hits:

[Crack HackDSA

Description: Digital Signature Algorithm (DSA)是Schnorr和ElGamal签名算法的变种,被美国NIST作为DSS(DigitalSignature Standard)。算法中应用了下述参数: p:L bits长的素数。L是64的倍数,范围是512到1024; q:p - 1的160bits的素因子; g:g = h^((p-1)/q) mod p,h满足h < p - 1, h^((p-1)/q) mod p > 1; x:x < q,x为私钥 ; y:y = g^x mod p ,( p, q, g, y )为公钥; H( x ):One-Way Hash函数。DSS中选用SHA( Secure Hash Algorithm )。 p, q, g可由一组用户共享,但在实际应用中,使用公共模数可能会带来一定的威胁。签名及验证协议如下: 1. P产生随机数k,k < q; 2. P计算 r = ( g^k mod p ) mod q s = ( k^(-1) (H(m) + xr)) mod q 签名结果是( m, r, s )。 3. 验证时计算 w = s^(-1)mod q u1 = ( H( m ) * w ) mod q u2 = ( r * w ) mod q v = (( g^u1 * y^u2 ) mod p ) mod q 若v = r,则认为签名有效。   DSA是基于整数有限域离散对数难题的,其安全性与RSA相比差不多。DSA的一个重要特点是两个素数公开,这样,当使用别人的p和q时,即使不知道私钥,你也能确认它们是否是随机产生的,还是作了手脚。RSA算法却作不到。
Platform: | Size: 136954 | Author: wildkaede | Hits:

[Crack Hack20041121125751

Description: SHA算法,一个安全散列算法,通过把数据变成相应的消息摘要,根据迭代值,进行四次循环运算而产生的消息摘要.-SHA algorithm, a secure hash algorithm, the data into corresponding news summary, according to the value iteration, for the fourth cycle of operation and the news summary.
Platform: | Size: 7168 | Author: hanlihu | Hits:

[Windows Developshs2

Description: SECURE HASH STANDARD (SHS)使用160-bit SHA 散列算法,主要用于数字签名 DSA-SECURE HASH STANDARD (SHS) using 160-bit SHA hash algorithm, mainly used for digital signature DSA
Platform: | Size: 14336 | Author: zxang | Hits:

[Crack HackSHA_MatLab

Description: SHA (安全Hash算法)是一种单向散列算法,可用于数字加密或数字签名,是比MD5更加安全的单向散列算法,与MD5算法一起时被应用最广泛的两种算法。-SHA (secure Hash algorithm) is a one-way hash algorithm, can be used for digital encryption or digital signature is more secure than the MD5 one-way hash algorithm, in conjunction with the MD5 algorithm was the most widely used two algorithms.
Platform: | Size: 5120 | Author: 张汉江 | Hits:

[Crack Hacktest

Description: SHA-1(Secure Hash Algorithm)是美国国家标准局(National Institute of Standard and Technology NIST)为了配合数位签章演算法(Digital Signature Algorithm DSA)的使用所发布的联邦资讯处理标准-FIPS PUB 180-1(Federal Information Processing Standard Publication 180-1),而SHA-1 则是SHA-1 (FIPS180)的改良版,现今与MD5 皆广被使用拿来做密码验证功能.其设计的方法是根据MD4,来对输入的资料讯息(Message)产生出一个160 位元的讯息摘要(Digest) ,对於资料安全性提供了有效的保障.-SHA-1 (Secure Hash Algorithm) is a United States National Bureau of Standards (National Institute of Standard and Technology NIST) in order to tie in with the digital signature algorithm (Digital Signature Algorithm DSA) issued by the use of Federal Information Processing Standard-FIPS PUB 180-1 (Federal Information Processing Standard Publication 180-1), and SHA-1 is SHA-1 (FIPS180) improved version of the current and MD5 are widely used to make the use of password authentication function. its design method is based on MD4, to the input data message (Message) produced a 160-bit message digest (Digest), for data security to provide effective protection.
Platform: | Size: 1024 | Author: zyt | Hits:

[Crack HackDSA

Description: Digital Signature Algorithm (DSA)是Schnorr和ElGamal签名算法的变种,被美国NIST作为DSS(DigitalSignature Standard)。算法中应用了下述参数: p:L bits长的素数。L是64的倍数,范围是512到1024; q:p - 1的160bits的素因子; g:g = h^((p-1)/q) mod p,h满足h < p - 1, h^((p-1)/q) mod p > 1; x:x < q,x为私钥 ; y:y = g^x mod p ,( p, q, g, y )为公钥; H( x ):One-Way Hash函数。DSS中选用SHA( Secure Hash Algorithm )。 p, q, g可由一组用户共享,但在实际应用中,使用公共模数可能会带来一定的威胁。签名及验证协议如下: 1. P产生随机数k,k < q; 2. P计算 r = ( g^k mod p ) mod q s = ( k^(-1) (H(m) + xr)) mod q 签名结果是( m, r, s )。 3. 验证时计算 w = s^(-1)mod q u1 = ( H( m ) * w ) mod q u2 = ( r * w ) mod q v = (( g^u1 * y^u2 ) mod p ) mod q 若v = r,则认为签名有效。   DSA是基于整数有限域离散对数难题的,其安全性与RSA相比差不多。DSA的一个重要特点是两个素数公开,这样,当使用别人的p和q时,即使不知道私钥,你也能确认它们是否是随机产生的,还是作了手脚。RSA算法却作不到。
Platform: | Size: 136192 | Author: wildkaede | Hits:

[Crack Hacksha1_verilog

Description: 安全散列算法的另一种verilog实现,对面积的要求更小,但损失了速度,但在一般系统中,完全可以满足大部分需要了-Secure Hash Algorithm another Verilog realization of the demands of a smaller area, but a loss of speed, but in the general system, fully satisfy the needs of the most
Platform: | Size: 20480 | Author: 金鑫 | Hits:

[Crack Hackfork256

Description: the hash function FORK-256,256位的安全散列验证算法,SHA-256的替代者。-the hash function FORK-256,256-bit secure hash authentication algorithm, SHA-256 replacement for him.
Platform: | Size: 2048 | Author: yuisikyo | Hits:

[Crack Hackdoc2

Description: This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data. -This project demonstrates the use of secure hash functions technique to implement a file encryption/decryption system. This implemented application can encrypt/decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
Platform: | Size: 200704 | Author: vara | Hits:

[OtherSHAHashalgorithm

Description: SHA Hash algorithm. This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA- 512.
Platform: | Size: 179200 | Author: pccc | Hits:

[JSP/Javasha1

Description:  SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-512 (这些有时候也被称做 SHA-2)。 -SHA (Secure Hash Algorithm, Secure Hash Algorithm translated) is a U.S. National Security Agency (NSA) design, the U.S. National Institute of Standards and Technology (NIST) released a series of password hash function. Formally known as the SHA family members of the first release in 1993. But now people take it the informal name of a SHA-0 in order to avoid confusion of its successor. Two years later, SHA-1, the first successor to SHA issued. There are four variants have been released to enhance the output of some minor changes to the scope and design: SHA-224, SHA-256, SHA-384 and SHA-512 (these are sometimes also known as SHA-2).
Platform: | Size: 1024 | Author: 陈诚 | Hits:

[CA authsha-1

Description: sah-1(Secure Hash Algorithm,安全散列算法)算法源程序-the c sourse code for sha-1(Secure Hash Algorithm) Algorithm
Platform: | Size: 2048 | Author: hehailian | Hits:

[Crack Hacksha2-1.0

Description: SHA-2 (Secure Hash Algorithm 2) hash function, written in C language.
Platform: | Size: 65536 | Author: gKir | Hits:

[Crack HackSHA-1

Description: 安全哈希算法(Secure Hash Algorithm)主要适用于数字签名标准(Digital Signature Standard DSS)里面定义的数字签名算法(Digital Signature Algorithm DSA)。-Secure hash algorithm (Secure Hash Algorithm) is mainly applied to digital signature standard (Digital Signature Standard DSS) which defines the digital signature algorithm (Digital Signature Algorithm DSA).
Platform: | Size: 1024 | Author: Jesse | Hits:

[Crack Hacksha1

Description: 安全散列算法(Secure Hash Algorithm)能计算出一个数字消息所对应到的,长度固定的字符串(又称消息摘要)。且若输入的消息不同,它们对应到不同字符串的机率很高;而SHA是FIPS所认证的五种安全散列算法。-sha1 classic C/C++ algorithm Version 1.5- 2005-01-01 - 64-bit compiler compatibility added - Made variable wiping optional (define SHA1_WIPE_VARIABLES) - Removed unnecessary variable iIn cryptography, SHA-1 is a cryptographic hash function designed by the National Security Agency and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm".
Platform: | Size: 4096 | Author: 周笑 | Hits:

[VHDL-FPGA-VerilogHASH-code-implementation-using-VHDL

Description: implementation for Secure Hash Algorithm 1 SHA-1 in vhdl language contain no test file.
Platform: | Size: 14336 | Author: waleed | Hits:

[Crack HackMD5-Encryption-Algorithm-VCPP

Description: MD5是一个安全的散列算法,输入两个不同的明文不会得到相同的输出值,根据输出值,不能得到原始的明文,即其过程不可逆;所以要解密MD5没有现成的算法,只能用穷举法,把可能出现的明文,用MD5算法散列之后,把得到的散列值和原始的数据形成一个一对一的映射表,通过比在表中比破解密码的MD5算法散列值,通过匹配从映射表中找出破解密码所对应的原始明文。 对信息系统或者网站系统来说,MD5算法主要用在用户注册口令的加密,对于普通强度的口令加密,可以通过以下三种方式进行破解: (1)在线查询密码。一些在线的MD5值查询网站提供MD5密码值的查询,输入MD5密码值后,如果在数据库中存在,那么可以很快获取其密码值。 (2)使用MD5破解工具。网络上有许多针对MD5破解的专用软件,通过设置字典来进行破解。 (3)通过社会工程学来获取或者重新设置用户的口令。 因此简单的MD5加密是没有办法达到绝对的安全的,因为普通的MD5加密有多种暴力破解方式,因此如果想要保证信息系统或者网站的安全,需要对MD5进行改造,增强其安全性,本文就是在MD5加密算法的基础上进行改进! -MD5 is a secure hash algorithm, the two different input plaintext will not get the same output values ​ ​ can not be obtained based on the output value of the original plaintext, i.e. the process is not reversible so is not ready to decrypt MD5 algorithm which can be usedbrute-force method, the plaintext may occur, after the hash with the MD5 algorithm, the resulting hash value and the original data to form a one-to-one mapping table, cracks than the ratio in the table algorithm MD5 hash value of the passwordmatch from the mapping table to find crack the code corresponding to the original plaintext. Information system or site system, the MD5 algorithm is mainly used in the user registered password encryption, password encryption for ordinary strength, can crack through the following three ways: (1) for the codes. The MD5 value of some online website the the MD5 password value query input MD5 password value, exists in the database, you can quickly obtain the password va
Platform: | Size: 274432 | Author: Johnson | Hits:

[Bookshash types

Description: encoding secure hash algorithm document .
Platform: | Size: 9216 | Author: benaz | Hits:
« 12 3 4 »

CodeBus www.codebus.net