搜索资源列表
TrribleDES
- 这是一个用VC.Net编写的加密算法,TrribleDes,该算法具有较高的执行效率,加密速度大概为每秒3Mb,速度较快!-VC.Net prepared using the encryption algorithm, TrribleDes. the algorithm has a higher efficiency in the implementation, encryption speed of around between 3Mb per second, faster!
2_des
- DES算法把64位的明文输入块变为64位的密文输出块,它所使用的密钥也是64位,首先,DES把输入的64位数据块按位重新组合,并把输出分为L0、 R0两部分,每部分各长32位,并进行前后置换(输入的第58位换到第一位,第50位换到第2位,依此类推,最后一位是原来的第7位),最终由L0输出左 32位,R0输出右32位,根据这个法则经过16次迭代运算后,得到L16、R16,将此作为输入,进行与初始置换相反的逆置换,即得到密文输出。-DES algorithm combines the 64 expr
crc
- CRC码产生器与校验器程序 Features : Executes in one clock cycle per data word Any polynomial from 4 to 32 bits Any data width from 1 to 256 bits Any initialization value Synchronous or asynchronous reset
5.7
- 注意:每行一个命令,命令与说明之间请用“---”隔开,请勿删除此行!-Note: a command per line, order and descr iption please use --- between separated, do not remove this line!
MD5
- 经本人优化后的计算 MD5 的类 CMD5 类及动态库源程序,单线程在 Core 6320 CPU,DDR2 667内存 时,忽略读取硬盘速度,每秒可计算150MB以上的数据,可直接做为计算MD5的工具,也可将其嵌入其它程序作为程序的一部分进行编译.-After I optimized the calculation of MD5 class CMD5 category and dynamic library source, single-threaded at Core 6320 CPU, D
encrypt_extremeProgramming
- simple encryption algo, as aked in IEEE competition. The name of the file is as per the question number.
md5_implication
- MD5算法的实现. 明文数据经MD5算法进行散列处理,可以形成密文/数据的摘要,应用此算法可以实现对邮件的加密. 实验步骤: 1、填充消息:10…0,使消息长度等于448mod512 2、添加明文长度(64位) 3、初始化4个字的寄存器 4、消息由512-bits数据块(Y0,Y1,…)处理4轮,每轮16次迭代 -MD5 algorithm. Plaintext data hashed by the MD5 algorithm, can form dense text/d
AES
- Assuming that one could build a machine that could recover a DES key in a second (i.e., try 255 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key. To put that into per
math_AES
- Assuming that one could build a machine that could recover a DES key in a second (i.e., try 255 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key. To put that into per
week3-notes
- Weakest link” is size of key Attacks take advantage of encryption speed 1993: Weiner: $1M machine, 3.5 hours 1998: EFF’s Deep Crack: $250,000 92 billion keys per second 4 days on average 1999: distributed.net: 23 hours OK for some things
A-chaotic-image-encryption-algorithm-based-on-per
- A chaotic image encryption algorithm based on perceptron
iccardreader
- 支持ISO14443 TYPE A标准的Mifare One系列卡。Mifare One卡的内部存储结构分为16个扇区,从第0区到第15区,每个扇区有独立的密码和权限控制字,可作为独立的电子钱包,每个扇区有4个块,序号为第0块、第1块、第2块、第3块,每块16个字节,第3块是卡的密码和权限控制字专用块,禁止在此存放数据。第0块、第1块、第2块可随意存放数据。-Support the standard of ISO14443 TYPE A Mifare One series card. Mifar
RainbowApplication
- A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering the plaintext password, up to a certain length consisting of a limited set of characters. I
Cipher
- 置换密码算法的原理是不改变明文字符,只将字符在明文中的排列顺序改变,从而实现明文信息的加密。置换密码也叫换位密码。 试编程实现矩阵换位密码。它的加密方法是将明文中的字母按照给定的顺序安排在一个矩阵中,然后用根据密钥提供的顺序重新组合矩阵中的字母,形成密文。例如,明文为attack begins at five,密钥为cipher,将明文按照每行6个字母的形式排在矩阵中,如下形式: a t t a c k b e g i n s a t f i v e 根据密钥ciphe
