搜索资源列表
dess.zip
- Fast DES kit - Phil Karn, KA9Q September 2, 1994 This archive includes optimized DES code in portable C, Borland inline assembler for the 386, and GNU 'as' format assembler for the 386. Contents: readme - this file readme.des - details on
CSPDemo
- Demo:用有微软的cryptoAPI CSP加密API函数,对文件(File)进行Encrypt和Decrypt.产生数字签名.对使用CryptEncrypt()等函数是一个很好的例子,程序测试通过.-Demo : Microsoft's cryptoAPI CSP Cryptographic API function, the document (File) Encrypt and Decrypt. Creating a digital signature. The use Cryp
300_encrypt
- 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests:
ff11lockprogs
- ff11lockprogs Programs that I ve made that do something with FFXI. Zones + Importer - Reads FFXI dat files to match zone lines to zones Filter v0.3 - A program that will analyze the packets sent from FFXI Keygen - Replacement for keyget,
encrypt_de
- This code is a cipher which takes in a plaintext or ciphertext string and encrypts / decrypts according to a user defined key value. -This code is a cipher which takes in a plaint ext or ciphertext string and encrypts / decrypt 's according to
crypt
- Subject: HowToStorePassWord Here s a small example, while no \"enigma machine\", yet provides a simple way of storing a password with encryption. The password is first encrypted then converted to Hex. The reverse process will first convert to as
ibe具有认证功能算法
- 1 Boneh-Franlin的IBE算法主要由四个子算法组成:Setup,Extract,Encrypt和Decrypt,分别完成系统参数建立、密钥提取、加密和解密的功能。假定消息的明文空间为 ,密文空间 。 (1)、建立: 给定一个安全参数 k蝂+ Step 1: 执行G生成一个素数q, 两个q阶群G1, G2 , 和一个可用的双线性映射 ê: G1碐1瓽2。 此外选取G1 任一生成元 P蜧1,再选取两个HASH函数 H3:{ 0, 1}n×{0, 1}n。 -?, H4:。 :{ 0,
figerencoder.rar
- 该代码通调用指纹采集验证模块对用户进行识别,进而调用加密模块对用户的各类文件进行加密。解密也要用指纹识别模块进行用户识别后方可解密。增强了用户文件的安全性。,The call pass code to verify fingerprint identification module to the user, and then call the user' s encryption module to encrypt the different types of documents. You ha
Card_Init
- 对IC卡的初始话,也就是说对卡解密。只能使用深圳明华的-The initial words of the IC card, that is right card to decrypt. Can only use the Shenzhen Ming Wah' s
11
- 完成基于公钥证书的非对称密钥分配工作 说明: (1)作为通讯的双方A和B,都有一个共同信赖的第三方CA,由CA为每个人生成公钥证书和相应的私钥并分发给A、B。 (2)A和B分别将自己的公钥证书提供给对方后,分别在本地验证对方公钥证书是否可靠(假定A、B已经获得CA的公钥),然后A用B的公钥加密一个数据X(整型,可自己定义,比如100)并发送给B,B用自己的私钥解密后得到数据X,然后按协商好的函数F(比如F(X)=2*X)计算得到F(X),再利用A的公钥加密后发送给A;A在本地用自己的
08022311145800
- 完成开锁、超时报警、超次锁定、管理员解密、修改用户密码基本的密码锁的功能。-Complete the unlock, overtime alarm, lock超次, administrators decrypt, modify the user s password locks the basic functions.
doc2
- This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the
file
- 电子密码锁源程序,系统能完成开锁、超时报警、超次锁定、管理员解密、修改用户密码基本的密码锁的功能-Electron source locks, the system can achieve lock, the police overtime,超次lock, decrypt administrator, modify the user' s password locks the basic functions of
sp_decrypt
- 微软SQL2000 存储过程, 加密解密码, 查看原-Import data, the data import database, import data, import the data into the database data, the data into the database.
CryptoPPInteropSign
- 使用先生成一个密码a(数据少),再用自己私钥对a进行非对称加密, 加密后,用对方的公钥对加密后的数据进行非对称加密。生成密文b 然后,用密码a对大文档进行对称加密。生成密文c 把b、c发给对方。 对方收到b、c后,解密。 解密过程正好相反。 将b用自己的私钥解密,再用对方的公钥解密,解出密码d, 再用密码d对c解密。OK 这样可以保证,自己的合法性,只有自己有自己的私钥, 对方,用对方的公钥加密后,只有对方用他的私钥才解得开
FileEncrypt
- 这个是对文件进行加解密的项目,提供一些库函数,你可以直接调用-this source code s function is to encrypt and decrypt the file ,so ,of course ,it can speed up your program
loc
- Use to decrypt loc file and encrypt Audition s language scr ipt file
SimpleCryptoGrapher.tar
- it s about simple encryption.. how to encrypt and decrypt -it s about simple encryption.. how to encrypt and decrypt ..
des
- des算法+代码 // des.cpp - modified by Wei Dai from: /* * This is a major rewrite of my old public domain DES code written * circa 1987, which in turn borrowed heavily from Jim Gillogly s 1977 * public domain code. I pretty much kept my
1008
- Julius Caesar曾经使用过一种很简单的密码。对于明文中的每个字符,将它用它字母表中后5位对应的字符来代替,这样就得到了密文。比如字符A用F来代替。如下是密文和明文中字符的对应关系。 密文 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 明文 V W X Y Z A B C D E F G H I J K L M N O P Q R S T U 你的任务是对给定的密文进行解密得到明文。 你需要注意
