Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - cipher
Search - cipher - List
DL : 0
实习二 分组密码加密 一、实习目的 1、理解对称加密算法的原理,熟悉常用的对称加密算法:DES、TripleDES、Blowfish; 2、以DESede加密算法为例,掌握分组加密算法加、解密过程的实现。 二、实习内容 1.[基本要求] 以DES/DESede为例,利用java中的相关类实现对指定字符串的加、解密。 2.[实现提示] (1) 可以利用java中的KeyGenerator类创建对称秘钥,利用工厂类KeyGenerator的静态方法getInstance()获得KeyGenerator()类对象; (2) 方法getInstance()的参数为字符串类型,指定加密算法的名称如:Blowfish、DES、DESede、HmacMD5或HmacSHA1等; (3) 利用工厂类Cipher的对象可以创建密码器。同样的,getInstance()的参数为字符串类型,指定加密算法的名称 -Internship two block cipher encryption An internship purpose An understanding of the principles of symmetric encryption algorithms, symmetric encryption algorithms used are familiar: DES, TripleDES, Blowfish 2, DESede encryption algorithm, for example, plus master block encryption algorithm to achieve decryption process. Second, the practical content 1. [Basic requirements] With DES/DESede for example, the use of java in the relevant class implements the specified string encryption and decryption. 2. [Achieve prompt] (1) can be used to create a java class in KeyGenerator symmetric secret key, use the static method getInstance factory class KeyGenerator of () to get KeyGenerator () class object (2) the method getInstance () argument is a string type, specify the name of the encryption algorithm, such as: Blowfish, DES, DESede, HmacMD5 or HmacSHA1 etc. (3) the use of factory class Cipher objects can create a password control. The same, getInstance () argument is a string typ
Update : 2024-05-18 Size : 3072 Publisher : 杨平

This class wraps an output stream and a cipher so that write methods send the data through the cipher before writing them to the underlying output stream Source Code for Linux.
Update : 2024-05-18 Size : 1024 Publisher : luecerke

DL : 0
A Sealed Object is a wrapper around a serializable object instance and encrypts it using a cryptographic cipher for Linux v2.13.6.
Update : 2024-05-18 Size : 2048 Publisher : mengfacei

Delphi:采用BASE64算法流加密,编码多个字节,可以编码奇数字节和基数字节,把编码好的块写到流中,当然也可进行BASE64算法流的解密,解密的数据输入到流中,还可进行BASE64算法字符串加密,字符串解密等,比较全的BASE64加密与解密实例,仅供参考。 -Delphi: a stream cipher algorithm using BASE64 encoding a plurality of bytes, and the base may be encoded odd byte byte written to the encoded stream in a good block, of course, also be BASE64 algorithm to decrypt the stream, the decrypted data stream is input to the , and also for BASE64 string encryption algorithm, decryption string, compare the BASE64 encryption and decryption examples for reference only.
Update : 2024-05-18 Size : 9216 Publisher : ZS52OX7

A block cipher mode that includes authenticated encryption with a streaming mode and optional associated data.
Update : 2024-05-18 Size : 1024 Publisher : caotuikan

Asymmetric Block Cipher for Embedded Linux.
Update : 2024-05-18 Size : 2048 Publisher : penfiecie

Encryption Decryption using columnar cipher. The output is stored as string of binary with 1s and 0s interchanged.
Update : 2024-05-18 Size : 2048 Publisher : rvraghav93

CSharpRC5
DL : 0
RC5加密算法类C# RC5分组密码算法是1994由麻萨诸塞技术研究所的Ronald L. Rivest教授发明的,并由RSA实验室分析。它是参数可变的分组密码算法,三个可变的参数是:分组大小、密钥大小和加密轮数。在此算法中使用了三种运算:异或、加和循环。-RC5 encryption algorithm class C# RC5 block cipher algorithm in 1994 by Professor Ronald L. Rivest Massachusetts Institute of Technology invention, RSA by laboratory analysis. It is a variable parameter block cipher algorithm, three variable parameters are: packet size, key size and encryption rounds. Use the three operations in this algorithm: XOR, add and circulation.
Update : 2024-05-18 Size : 1024 Publisher : longhsneg

DL : 0
Affine Cipher Cryptography In C language
Update : 2024-05-18 Size : 2048 Publisher : Shaili

DL : 1
Autokey cipher cryptography in C language -Autokey cipher cryptography in C language
Update : 2024-05-18 Size : 1024 Publisher : Shaili

The key cache is used for h w cipher state and also for tracking station state such as the current tx antenna.
Update : 2024-05-18 Size : 4096 Publisher : penviewu

DL : 0
ROT13 ( rotate by 13 places , sometimes hyphenated ROT-13) is a simple letter substitution cipher that replaces a letter with the letter 13 letters after it in the alphabet. ROT13 is an example of the Caesar cipher, developed in ancient Rome.
Update : 2024-05-18 Size : 1024 Publisher : ac134604

A block cipher mode that includes authenticated encryption with a streaming mode and optional associated data.
Update : 2024-05-18 Size : 2048 Publisher : kosfxns

DL : 0
A Sealed Object is a wrapper around a serializable object instance and encrypts it using a cryptographic cipher
Update : 2024-05-18 Size : 3072 Publisher : magtchds

DL : 0
Cipher Block Mode for Authentication.
Update : 2024-05-18 Size : 2048 Publisher : wengsingfou

DL : 0
Tiny Encryption Algorithm In cryptography, the Tiny Encryption Algorithm (TEA) is a block cipher notable for its simplicity of description and implementation, typically a few lines of code. It was designed by David Wheeler and Roger Needham of the Cambridge Computer Laboratory it was first presented at the Fast Software Encryption workshop in Leuven in 1994, and first published in the proceedings of that workshop.-Tiny Encryption Algorithm In cryptography, the Tiny Encryption Algorithm (TEA) is a block cipher notable for its simplicity of description and implementation, typically a few lines of code. It was designed by David Wheeler and Roger Needham of the Cambridge Computer Laboratory it was first presented at the Fast Software Encryption workshop in Leuven in 1994, and first published in the proceedings of that workshop.
Update : 2024-05-18 Size : 1024 Publisher : efe

A block cipher mode that includes authenticated encryption with a streaming mode and optional associated data.
Update : 2024-05-18 Size : 6144 Publisher : jhgsf5

DL : 0
project is about encryting and decryping a gile using cipher key
Update : 2024-05-18 Size : 190464 Publisher : Diksha

This Document gives the algorithm and detail steps of Playfair cipher and how to solve the problem related it.
Update : 2024-05-18 Size : 30720 Publisher : deepa

DL : 0
Image Encryption based on the RGB PIXEL Transposition and Shuffling Abstract — Privacy is one of the key issues information Security addresses. Through encryption one can prevent a third party from understanding raw data during signal transmission. The encryption methods for enhancing the security of digital contents has gained high significance in the current era of breach of security and misuse of the confidential information intercepted and misused by the unauthorized parties. This paper sets out to contribute to the general body of knowledge in the area of cryptography application and by developing a cipher algorithm for image encryption of m*n size by shuffling the RGB pixel values. The algorithm ultimately makes it possible for encryption and decryption of the images based on the RGB pixel. The algorithm was implemented using MATLAB. Index Terms — Cryptography, Encryption, algorithm, cipher image
Update : 2024-05-18 Size : 2532352 Publisher : UTKARSH SHARMA
« 1 2 ... 40 41 42 43 44 4546 47 48 49 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.