Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - cipher
Search - cipher - List
DL : 0
凯撒密码算法源程序...... 凯撒密码算法源程序-Caesar Cipher Caesar Cipher source source ......
Update : 2024-05-04 Size : 1024 Publisher : edison

DL : 0
Logistc混合m-序列加密,用Netbeans打开工程文件即可运行。-Mixed m-sequence Logistc encryption, using Netbeans open the project file to run.
Update : 2024-05-04 Size : 361472 Publisher : 王莲花

DL : 0
置换密码算法的原理是不改变明文字符,只将字符在明文中的排列顺序改变,从而实现明文信息的加密。置换密码也叫换位密码。试编程实现矩阵换位密码。它的加密方法是将明文中的字母按照给定的顺序安排在一个矩阵中,然后用根据密钥提供的顺序重新组合矩阵中的字母,形成密文。-Permutation cipher does not change the principle is expressly characters, only characters in the explicit change in order to achieve explicit information encryption. Password replacement is also called transposition password. Programming test matrix transposition password. Its encryption method is to express the letter in accordance with the order given in a matrix, and then use the key provided in accordance with the order re-arrangement of the letters in the matrix to form a ciphertext.
Update : 2024-05-04 Size : 1024 Publisher : rose

RFIDhitag2
DL : 2
Low frequency NXP hitag2 encryption cipher This the low frequency NXP hitag2 encryption cipher. The package hitag2.zip contains the following files: hitag2.png - Cipher overview hitag2.c - Source-code-Low frequency NXP hitag2 encryption cipher This the low frequency NXP hitag2 encryption cipher. The package hitag2.zip contains the following files: hitag2.png- Cipher overview hitag2.c- Source-code
Update : 2024-05-04 Size : 31744 Publisher : goofy

Crypto++软件包,包括11个例子,25种加密算法的源程序,从AES到XTEA。-Crypto++ Packages, including 11 examples of 25 kinds of encryption algorithm source code, from the AES to XTEA.
Update : 2024-05-04 Size : 41984 Publisher : Bai

CA authRC6
DL : 0
分组密码算法,可用于文件加密 该算法是NIST征集AES的最终5个候选算法之一,设计者是著名的密码学家Rivest-Block cipher algorithm, can be used for file encryption of the AES algorithm is NIST final assembly candidate Algorithm 5, one of the designers of the famous cryptographer Rivest
Update : 2024-05-04 Size : 2048 Publisher : che wang

伪随机序列在扩频通信、流密码、信道编码等领域有着十分广泛的应用。文通过对伪随机m序列的编码和译码算法进行的MatLab语言仿真,验证了伪随机序列码的编码和译码算法,丰富了伪随机序列的实现方法,并提供了源代码。-Pseudo-random sequence in the spread spectrum communication, stream cipher, in areas such as channel coding has a very wide range of applications. Through the pseudo-random sequence m of encoding and decoding algorithm for the MatLab language simulation code pseudo-random sequence of coding and decoding algorithm, has enriched the realization of pseudo-random sequence method, and provides the source code.
Update : 2024-05-04 Size : 89088 Publisher : Navy2008_CHINA

OtherCYPTO
DL : 0
介绍分组密码的工作模式,包括CBC,OFB,CFB,ECB-Introduced the block cipher mode of operation, including the CBC, OFB, CFB, ECB
Update : 2024-05-04 Size : 198656 Publisher : 李为

DL : 0
caesar cipher 分析 能够分析单个替代的caesar cipher-caesar cipher analysis to analyze a single alternative caesar cipher
Update : 2024-05-04 Size : 3072 Publisher : bingo

这个是流密码算法rabbit,已经验证过,没有问题,使队的-This is a stream cipher algorithm rabbit, has already been verified, there is no problem, so teams
Update : 2024-05-04 Size : 11264 Publisher : yh

DL : 0
数字水印程序,可以把一副图象隐藏进另一幅图象中,并在传输后解压出来-Digital watermarking process, could be an image into another piece of hidden images, and transfer out after the decompression
Update : 2024-05-04 Size : 1024 Publisher : Densic

对称/分组密码一般分为流加密(如OFB、CFB等)和块加密(如ECB、CBC等)。对于流加密,需要将分组密码转化为流模式工作。对于块加密(或称分组加密),如果要加密超过块大小的数据,就需要涉及填充和链加密模式,文中提到的ECB和CBC等就是指链加密模式。 本文将要介绍了AES对称加密/分组加密/流密码及其ECB、CBC、CFB、OFB和CTR五种对称加密模式。-Symmetric/block ciphers are generally divided into stream encryption (eg, OFB, CFB, etc.) and block encryption (such as ECB, CBC, etc.). For streaming encryption, block cipher needs to be translated into the work flow model. The encryption block (or block cipher), If you want to encrypt the data block size more than on the need to involve filling and chain encryption mode, the text referred to, such as ECB and CBC encryption mode refers chain. This paper will be introduced the AES symmetric encryption/packet encryption/stream cipher and the ECB, CBC, CFB, OFB and CTR mode in five symmetric encryption.
Update : 2024-05-04 Size : 382976 Publisher : 王纪

DL : 1
The files included implement the M3 Enigma machine. Rotors.m implements the GUI and enigma.m implements the cipher substitutions. The implementation can be used as an aid to teaching the enigma machine. Also, the source can be used to show how to implement an enigma machine. The files are thoroughly commented and the application can run in MATLAB by just typing rotors -The files included implement the M3 Enigma machine. Rotors.m implements the GUI and enigma.m implements the cipher substitutions. The implementation can be used as an aid to teaching the enigma machine. Also, the source can be used to show how to implement an enigma machine. The files are thoroughly commented and the application can run in MATLAB by just typing rotors
Update : 2024-05-04 Size : 8192 Publisher : Lin

DL : 0
nice crypt method, if you are a delphi programmer you really love this because is very useful code
Update : 2024-05-04 Size : 693248 Publisher : martin19851

Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key Matrix 1.a 5X5 matrix of letters based on a keyword 2.fill in letters of keyword (sans duplicates) 3.fill rest of matrix with other letters Encrypting and Decrypting -plaintext is encrypted two letters at a time 1. if a pair is a repeated letter, insert filler like X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair -Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key Matrix 1.a 5X5 matrix of letters based on a keyword 2.fill in letters of keyword (sans duplicates) 3.fill rest of matrix with other letters Encrypting and Decrypting -plaintext is encrypted two letters at a time 1. if a pair is a repeated letter, insert filler like X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair
Update : 2024-05-04 Size : 133120 Publisher : 黃文岩

古典密码算法中的单表代换密码算法、移位密码算法、Vigenere密码算法。算法比较简单,用命令的方式。可以随机生成明文和密钥。-Classical cryptographic algorithm in a single table substitution cipher, transposition cipher, Vigenere cipher. Algorithm is relatively simple, way to use the command. Can be randomly generated and the key explicitly.
Update : 2024-05-04 Size : 2048 Publisher : baichi123

DL : 0
Cipher Algorithm used in network security
Update : 2024-05-04 Size : 2048 Publisher : MOIYD

DL : 0
I try to create GUI using Matlab to code hills polygraph cipher
Update : 2024-05-04 Size : 1343488 Publisher : Bayu

Othertest
DL : 0
古典密码学若干算法 (1) 实现移位密码; (2) 实现替换密码; (3) 实现Vigenere密码(选做); (4) 实现置换密码(换位密码); (5) 对每一种密码,编写加密字符串和加密文件的两种算法并进行实验。 -A number of classical cryptography algorithm (1) the realization of shift cipher (2) to achieve the replacement of the password (3) the realization of Vigenere Password (elected to do) (4) the achievement of replacement password (password transposition) (5) of each passwords, encryption string and the preparation of the two algorithms to encrypt files and carry out such experiments.
Update : 2024-05-04 Size : 31744 Publisher : 何何

hill cipher c++ program
Update : 2024-05-04 Size : 35840 Publisher : behzad k
« 1 2 34 5 6 7 8 9 10 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.