Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - S-DES
Search - S-DES - List
DL : 0
信息安全中的S-DES的实现,固定的八位密钥和八为明文,可以加解密
Update : 2008-10-13 Size : 2191 Publisher : dk liu

DES算法及其在VC++6.0下的实现,编译时需要WinPcap开发包,您可以从http://www.vckbase.com/tools下载 WinPcap Developer s pack
Update : 2008-10-13 Size : 43423 Publisher : uuu

DL : 0
RC4加密算法是大名鼎鼎的RSA三人组中的头号人物Ron Rivest在1987年设计的密钥长度可变的流加密算法簇。之所以称其为簇,是由于其核心部分的S-box长度可为任意,但一般为256字节。该算法的速度可以达到DES加密的10倍左右。
Update : 2008-10-13 Size : 3572 Publisher : wzd

DL : 0
ava加密扩展即Java Cryptography Extension,简称JCE。它是Sun的加密服务软件,包含了加密和密匙生成功能。JCE是JCA(Java Cryptography Architecture)的一种扩展。 JCE没有规定具体的加密算法,但提供了一个框架,加密算法的具体实现可以作为服务提供者加入。除了JCE框架之外,JCE软件包还包含了SunJCE服务提供者,其中包括许多有用的加密算法,比如DES(Data Encryption Standard)和Blowfish。 为简单计,在本文中我们将用DES算法加密和解密字节码。下面是用JCE加密和解密数据必须遵循的基本步骤: 步骤1:生成一个安全密匙。在加密或解密任何数据之前需要有一个密匙。密匙是随同被加密的应用一起发布的一小段数据,Listing 3显示了如何生成一个密匙。 【Listing 3:生成一个密匙】 -expansion that Java Cryptography Extension, referred to JCE. It is Sun's encryption software, including encryption and key generation functions. JCE is JCA (Java Cryptography Architecture), an extension. JCE no specific encryption algorithms, but provides a framework, the specific encryption algorithm can achieve as a service provider to join. Apart from the JCE framework, JCE package also includes SunJCE service providers, including many useful encryption algorithms such as DES (Data Encryption Standard) and the Blowfish. For simple terms, in this paper we will use DES encryption and decryption algorithms byte code. Below is JCE encryption and decryption of data must adhere to the basic steps : Step 1 : Generating a security keys. In any encryption or decryption of data is needed befo
Update : 2008-10-13 Size : 3197 Publisher : 肖俊

DL : 0
ava加密扩展即Java Cryptography Extension,简称JCE。它是Sun的加密服务软件,包含了加密和密匙生成功能。JCE是JCA(Java Cryptography Architecture)的一种扩展。 JCE没有规定具体的加密算法,但提供了一个框架,加密算法的具体实现可以作为服务提供者加入。除了JCE框架之外,JCE软件包还包含了SunJCE服务提供者,其中包括许多有用的加密算法,比如DES(Data Encryption Standard)和Blowfish。 为简单计,在本文中我们将用DES算法加密和解密字节码。下面是用JCE加密和解密数据必须遵循的基本步骤: 步骤1:生成一个安全密匙。在加密或解密任何数据之前需要有一个密匙。密匙是随同被加密的应用一起发布的一小段数据,Listing 3显示了如何生成一个密匙。 【Listing 3:生成一个密匙】 -expansion that Java Cryptography Extension, referred to JCE. It is Sun's encryption software, including encryption and key generation functions. JCE is JCA (Java Cryptography Architecture), an extension. JCE no specific encryption algorithms, but provides a framework, the specific encryption algorithm can achieve as a service provider to join. Apart from the JCE framework, JCE package also includes SunJCE service providers, including many useful encryption algorithms such as DES (Data Encryption Standard) and the Blowfish. For simple terms, in this paper we will use DES encryption and decryption algorithms byte code. Below is JCE encryption and decryption of data must adhere to the basic steps : Step 1 : Generating a security keys. In any encryption or decryption of data is needed befo
Update : 2024-04-28 Size : 3072 Publisher : 肖俊

DL : 0
DES( Data Encryption Standard)算法,于1977年得到美国政府的正式许可,是一种用56位密钥来加密64位数据的方法。DES算法以被应用于许多需要安全加密的场合。(如:UNIX的密码算法就是以DES算法为基础的)。-DES (Data Encryption Standard) algorithm, in 1977 the United States government's official permission, is a key 56 to 64-bit data encryption methods. DES algorithm to be applied to many needs security encryption occasions. (Eg : UNIX password algorithm is to DES algorithm-based).
Update : 2024-04-28 Size : 18432 Publisher : yue

DL : 0
s盒设计源程序 可以用语DES设计 -s box design source can design language DES
Update : 2024-04-28 Size : 483328 Publisher : WW

将客户方的文件用DES加密后,通过Tcp连接发送到服务器,然后经过解密得到原来的文件。-customer's document encryption using DES, connecting through DEC sent to the server and then be declassified after the original document.
Update : 2024-04-28 Size : 69632 Publisher : 冷莫

DL : 0
IDEA是一个分组长度为64位的分组密码算法,密钥长度为128位(抗强力攻击能力比DES强),同一算法既可加密也可解密。 IDEA的“混淆”和“扩散”设计原则来自三种运算,它们易于软、硬件实现(加密速度快): -IDEA is a packet length of the 64 block cipher algorithms, key length of 128 (anti strong offensive capability than-DES), the same encryption algorithm can be declassified. IDEA's "confusion" and "proliferation" design principles from the three operators, easy software and hardware to achieve (encryption speed) :
Update : 2024-04-28 Size : 8192 Publisher : HCJ

a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.-a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.
Update : 2024-04-28 Size : 388096 Publisher : 刘永

ImageStone is a powerful C++ class library for image manipulation. it is portable and requiring only a recompiling on any platform. It includes load/save, display, histogram, undo/redo and over 100 predefined filters. It is a mature and easy-to-use image library that everyone from novices to professionals can use and enjoy. 一位高手写的,我好不容易找到的.和大家分享一下 -ImageStone C is a powerful class library fo r image manipulation. it is portable and requir ing only a recompiling on any platform. It inclu des load/save, display, histogram, and undo/redo and over 100 predefined filters. It i s a mature and easy-to-use image library that ev eryone from novices to professionals can use an d enjoy. one expert wrote, I finally found. and share with you
Update : 2024-04-28 Size : 1245184 Publisher : 刘广招

DL : 0
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives :- To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output- To share a file into shadows : cryptest's
Update : 2024-04-28 Size : 389120 Publisher : Nikii

BISON-C: A one-dimensional transport and burnup calculation code with consideration of actinides and fission products Auteur(s) / Author(s) CETNAR J. (1) GRONEK P. (1) Affiliation(s) du ou des auteurs / Author(s) Affiliation(s) (1) University of Mining and Metallurgy, Faculty of Physics and Nuclear Techniques, 30 059 Cracow, POLOGNE -BISON-C: A one-dimensional transport and burnup calculation code with consideration of actinides and fission productsAuteur (s)/Author (s) CETNAR J. (1) GRONEK P. (1) Affiliation (s) du ou des auteurs/Author (s) Affiliation (s) (1) University of Mining and Metallurgy, Faculty of Physics and Nuclear Techniques, 30 059 Cracow, POLOGNE
Update : 2024-04-28 Size : 111616 Publisher :

BISON-C: A one-dimensional transport and burnup calculation code with consideration of actinides and fission products Auteur(s) / Author(s) CETNAR J. (1) GRONEK P. (1) Affiliation(s) du ou des auteurs / Author(s) Affiliation(s) (1) University of Mining and Metallurgy, Faculty of Physics and Nuclear Techniques, 30 059 Cracow, POLOGNE -BISON-C: A one-dimensional transport and burnup calculation code with consideration of actinides and fission productsAuteur (s)/Author (s) CETNAR J. (1) GRONEK P. (1) Affiliation (s) du ou des auteurs/Author (s) Affiliation (s) (1) University of Mining and Metallurgy, Faculty of Physics and Nuclear Techniques, 30 059 Cracow, POLOGNE
Update : 2024-04-28 Size : 111616 Publisher :

DL : 0
Win32 Kernel Rootkits modify the behaviour of the system by Kernel Native API hooking. This technique is typically implemented by modifying the ServiceTable entries in the Service Descriptor Table (SDT). 有关钩子-Win32 Kernel Rootkits modify the behaviou r of the system by Native Kernel API hooking. Thi 's technique is typically implemented by modify ing the ServiceTable entries in the Service Des criptor Table (SDT). on the hook
Update : 2024-04-28 Size : 9216 Publisher : wind

DL : 0
DES( Data Encryption Standard)算法,于1977年得到美国政府的正式许可,是一种用56位密钥来加密64位数据的方法。虽然56位密钥的DES算法已经风光不在,而且常有用Des加密的明文被破译的报道,但是了解一下昔日美国的标准加密算法总是有益的,而且目前DES算法得到了广泛的应用-DES (Data Encryption Standard) algorithm. in 1977 the United States government's official permission, is a key 56 to 64 data encryption methods. Although the 56-key DES algorithm has not scenery, but often with the explicit Des encryption was cracked reports, But the United States to find out the old standard encryption algorithm is always useful, but the current DES algorithm is a widely used
Update : 2024-04-28 Size : 15360 Publisher : leelii

DL : 0
实现DES和RSA的加密解密,MD5还有数字签名。-The realization of DES and RSA s encryption and decryption, MD5 digital signature also.
Update : 2024-04-28 Size : 4096 Publisher : 天天

DL : 0
RC4加密算法是大名鼎鼎的RSA三人组中的头号人物Ron Rivest在1987年设计的密钥长度可变的流加密算法簇。之所以称其为簇,是由于其核心部分的S-box长度可为任意,但一般为256字节。该算法的速度可以达到DES加密的10倍左右。-RC4 encryption algorithm is RSA famous trio of top figures Ron Rivest in 1987, the design of variable length key encryption algorithm flow clusters. The reason for the cluster it is due to the core part of the S-box length can be arbitrary, but is generally 256 bytes. The speed of the algorithm is DES encryption can be achieved about 10 times.
Update : 2024-04-28 Size : 3072 Publisher : wzd

UIT - Secteur de la normalisation des télécommunications ITU - Telecommunication Standardization Sector UIT - Sector de Normalización de las Telecomunicaciones Study Period 1997-2000 Commission d études Study Group Comisión de Estudio 16 Contribution tardive Delayed Contribution Contribución tardía D.xxx Geneva, 7-18 February 2000 Texte disponible seulement en Text available only in Texto disponible solamente en E Question(s): Q.15/SG16 SOURCE*: Nokia Inc. / Nokia Research Center 6000 Connection Drive Irving, Texas 75039 USA Tel : +12147976155 Fax : +19728944589 e-mail : marta.karczewicz@nokia.com TITLE: MVC Decoder Description -UIT- Secteur de la normalisation des télécommunicationsITU- Telecommunication Standardization SectorUIT- Sector de Normalización de las TelecomunicacionesStudy Period 1997-2000Commission d études Study Group Comisión de Estudio 16 Contribution tardive Delayed Contribution Contribución tardía D.xxxGeneva, 7-18 February 2000 Texte disponible seulement en Text available only in Texto disponible solamente en EQuestion (s): Q.15/SG16 SOURCE*: Nokia Inc./Nokia Research Center6000 Connection Drive Irving, Texas 75039USA Tel:+ 12147976155 Fax:+ 19728944589 e-mail: marta. karczewicz@nokia.com TITLE: MVC Decoder Description
Update : 2024-04-28 Size : 1213440 Publisher : 李占闯

AES, 即Advanced Encryption Standard高级加密标准模块, 它是目前国际上最先进的加密技术, 是基于DES之后的最新发布的高段加密标准. 该标准由美国NIST(National Institute of Standards and Technology)组织制定发布.-AES, namely, Advanced Encryption Standard Advanced Encryption Standard module, which is currently the most advanced encryption technology is based on the DES after the latest high-paragraph Encryption Standard. The standard by the U.S. NIST (National Institute of Standards and Technology) organizations to develop Published.
Update : 2024-04-28 Size : 71680 Publisher : fanxihua
« 1 2 ... 4 5 6 7 8 910 11 12 13 14 15 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.