Welcome![Sign In][Sign Up]
Location:
Search - transposition cipher

Search list

[Crack Hackywmm

Description: 一个简单的移位密码算法程序,可以实现移位加密和解密的功能,-A simple transposition cipher procedures, can shift realize encryption and decryption functions,
Platform: | Size: 268288 | Author: 王功臣 | Hits:

[Crack Hackzhihuan

Description: 置换密码算法的原理是不改变明文字符,只将字符在明文中的排列顺序改变,从而实现明文信息的加密。置换密码也叫换位密码。-Substitution cipher does not change the principle is expressly characters, only the characters in the explicit change in order to achieve explicit information encryption. Password replacement is also called transposition password.
Platform: | Size: 10240 | Author: AnySand | Hits:

[Crack Hackzhihuan

Description: 置换密码算法的原理是不改变明文字符,只将字符在明文中的排列顺序改变,从而实现明文信息的加密。置换密码也叫换位密码。试编程实现矩阵换位密码。它的加密方法是将明文中的字母按照给定的顺序安排在一个矩阵中,然后用根据密钥提供的顺序重新组合矩阵中的字母,形成密文。-Permutation cipher does not change the principle is expressly characters, only characters in the explicit change in order to achieve explicit information encryption. Password replacement is also called transposition password. Programming test matrix transposition password. Its encryption method is to express the letter in accordance with the order given in a matrix, and then use the key provided in accordance with the order re-arrangement of the letters in the matrix to form a ciphertext.
Platform: | Size: 1024 | Author: rose | Hits:

[Crack Hacktraditionalcode

Description: 古典密码算法中的单表代换密码算法、移位密码算法、Vigenere密码算法。算法比较简单,用命令的方式。可以随机生成明文和密钥。-Classical cryptographic algorithm in a single table substitution cipher, transposition cipher, Vigenere cipher. Algorithm is relatively simple, way to use the command. Can be randomly generated and the key explicitly.
Platform: | Size: 2048 | Author: baichi123 | Hits:

[Othertest

Description: 古典密码学若干算法 (1) 实现移位密码; (2) 实现替换密码; (3) 实现Vigenere密码(选做); (4) 实现置换密码(换位密码); (5) 对每一种密码,编写加密字符串和加密文件的两种算法并进行实验。 -A number of classical cryptography algorithm (1) the realization of shift cipher (2) to achieve the replacement of the password (3) the realization of Vigenere Password (elected to do) (4) the achievement of replacement password (password transposition) (5) of each passwords, encryption string and the preparation of the two algorithms to encrypt files and carry out such experiments.
Platform: | Size: 31744 | Author: 何何 | Hits:

[OtherEncryption

Description: this program implements Substitution and Transposition cipher
Platform: | Size: 2048 | Author: Akshay | Hits:

[Crack Hackzhihuanjiami

Description: 置换密码亦称换位密码。置换只不过是一个简单的换位。每个置换都可以用一个置换矩阵 来表示。每个置换都有一个与之对应的逆置换 。置换密码的特点是仅有一个发送方和接收方知道的加密置换(用于加密)和对应的逆置换(用于解密)。它是对明文 长字母组中的字母位置进行重新排列,而每个字母本身并不改变。-Password replacement, also known as transposition cipher. Replacement is just a simple transposition. Each permutation can be represented by a permutation matrix. Each exchange has a corresponding inverse permutation. Replacement of the password feature is only one sender and receiver know the encryption permutation (for encryption) and the corresponding inverse permutation (for decryption). It is a long letter of the plaintext letters in the group re-arranged location, and each letter in itself does not change.
Platform: | Size: 1024 | Author: 张华 | Hits:

[Crack HackClassical-Cipher

Description: Classical - Cipher is a useful stand alone PC app that can be used to decipher/Encrypt different ciphers, such as Shift Substitution, Affine Substitution, Vigenere Cipher, Transposition Cipher and Jefferson Cipher. Hope you find this useful.
Platform: | Size: 287744 | Author: Alex | Hits:

[Crack HackCipher

Description: 此程序是基于移位和代换算法实现的对信息的加密和解密,对信息安全行业和从事密码方面的研究是个很好的例子。-This procedure is based on the transposition and substitution algorithm implementation of information encryption and decryption, safe to information industry and in the code area of study is a good example of.
Platform: | Size: 2048 | Author: | Hits:

[Crack HackColumnar

Description: Columnar is a transposition cipher. It is used in cryptography. The message is written as letters in a row and it is coded by reading out the letter columnwise.
Platform: | Size: 1024 | Author: aurora | Hits:

[Windows Developtranspositioncipher

Description: 置换密码,密码学课的作业,可以实现列变换,代码通俗易懂,可以运行-transposition cipher
Platform: | Size: 534528 | Author: 李亚奇 | Hits:

[OtherVCKaisa

Description: 使用vc编写的简单的实现凯撒密码代码。语法是,将输入的明文根据其ascll码加上输入的密钥之后换位为相应ascll的密文。-Using vc to write the simple implementation of Caesar cipher code. According to its syntax is that the input plaintext ascll code plus the input key after transposition for the corresponding ascll ciphertext.
Platform: | Size: 66560 | Author: | Hits:

[Windows Develop8645437653473

Description: VB换位密码加密技术示例源代码,有需要的就下载吧。-VB transposition cipher encryption technology sample source code, there is a need to download it.
Platform: | Size: 3072 | Author: 玉米排骨 | Hits:

[CA authImplementation-of-transposition-cipher

Description: Implementation of Transposition Cipher in C
Platform: | Size: 10240 | Author: | Hits:

[Crack Hack4-ERA

Description: 四种加密解密算法的源代码:移位密码、仿射密码、维吉尼亚密码以及置换密码。-Four kinds of encryption and decryption algorithm source code: transposition cipher, affine password, password and password replacement Virginia.
Platform: | Size: 2048 | Author: li | Hits:

[Othertransposition-cipher

Description: 移位密码的加密以及攻击方法,C++文件,密码学初步-Encryption and password attack methods shifts, C++ files, cryptography preliminary
Platform: | Size: 1776640 | Author: 马艾静 | Hits:

[CA authtransposition

Description: In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed. Mathematically a bijective function is used on the characters positions to encrypt and an inverse function to decrypt.-In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed. Mathematically a bijective function is used on the characters positions to encrypt and an inverse function to decrypt.
Platform: | Size: 39936 | Author: pradeep | Hits:

[Crack Hackbab2

Description: this script talks about encryption in java which containing the example script to doing classical cryptography such as classic cipher, transposition cipher, affinecipher and so on. so let s learn together-this script talks about encryption in java which containing the example script to doing classical cryptography such as classic cipher, transposition cipher, affinecipher and so on. so let s learn together..
Platform: | Size: 12288 | Author: su | Hits:

[Crack HackCipher

Description: 置换密码算法的原理是不改变明文字符,只将字符在明文中的排列顺序改变,从而实现明文信息的加密。置换密码也叫换位密码。 试编程实现矩阵换位密码。它的加密方法是将明文中的字母按照给定的顺序安排在一个矩阵中,然后用根据密钥提供的顺序重新组合矩阵中的字母,形成密文。例如,明文为attack begins at five,密钥为cipher,将明文按照每行6个字母的形式排在矩阵中,如下形式: a t t a c k b e g i n s a t f i v e 根据密钥cipher中各字母在字母表中出现的先后顺序,给定一个置换: 根据上面的置换,将原有矩阵中的字母按照第1、4、5、3、2、6的顺序排列,则有下列形式: a a c t t k b i n g e s a i v f t e 从而得到密文:aacttkbingesaivfte 解密过程类推。 -The principle of permutation cipher algorithm is to change the order of characters in plaintext without changing the plaintext characters, so as to realize the encryption of plaintext information. Permutation cipher is also called transposition cipher. Programming to achieve matrix transposition password. Its encryption method is that the letters in the plaintext are arranged in a matrix according to a given order, and then the letters in the matrix are re assembled in the order provided by the key to form a ciphertext. For example, the plaintext is attack begins at five, the key is cipher, and the plaintext is placed in the matrix in the form of 6 letters per row, as follows: A, t, t, a, C, K B, e, G, I, N, s A, t, F, I, V, e According to the order in which the letters in the key cipher appear in the alphabet, a permutation is given: According to the above permutation, the letters in the original matrix are arranged in the order of first, fourth, fifth, 3, 2 and 6, and the follo
Platform: | Size: 1024 | Author: 1 | Hits:

[Windows Develop一、移位密码算法的加密和解密

Description: 实现了移位密码算法的加密和解密,加密与解密程序在同一程序中,通过输入1or2选择加密或解密(The encryption and decryption of the transposition cipher algorithm are realized. In the same program, the encryption and decryption program is encrypted or decrypted by the input 1or2.)
Platform: | Size: 1764352 | Author: fwssnbb1 | Hits:
« 12 »

CodeBus www.codebus.net