登录
首页 » 加密解密 » DES(Data Encrypton Standard) 算法的实现网上已经有很多,本人在此讲述的是在DES算法加密过程中如何查看16迭代过程中生成的Ki,Li...

DES(Data Encrypton Standard) 算法的实现网上已经有很多,本人在此讲述的是在DES算法加密过程中如何查看16迭代过程中生成的Ki,Li...

于 2022-02-03 发布 文件大小:148.63 kB
0 133
下载积分: 2 下载次数: 1

代码说明:

DES(Data Encrypton Standard) 算法的实现网上已经有很多,本人在此讲述的是在DES算法加密过程中如何查看16迭代过程中生成的Ki,Li,Ri,Fi,Si等,这样可以当做一个DES加密对照器,这样可以方便的发现你在加密过程中出现的错误! -DES (Data Encrypton Standard) algorithm has been achieved online many, I would like to speak on is the DES encryption algorithm to see how the process 16 iterative process of generating Ki, Li, Ri, Fi, Si, etc., can serve as a control device DES encryption, this can easily find you in the process of encryption the mistakes!

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论


0 个回复

  • Toeplitz矩阵运算
    资源描述 程序是在codeblocks平台上面调试,可实现32768码长的保密放大,保密放大后的的数值以二进制的形式输出。 运用的语言为C
    2022-01-26 03:51:57下载
    积分:1
  • This is a very good article on the RSA, and I hope to help you!
    这是一篇很好的有关RSA的文章,希望对大家有所帮助!-This is a very good article on the RSA, and I hope to help you!
    2022-02-05 17:49:44下载
    积分:1
  • 使用标准C++开发的SHA
    使用标准C++开发的SHA-1算法的实现-Using standard C++ Developed SHA-1 algorithm
    2023-09-06 15:30:03下载
    积分:1
  • DES算法的C++
    DES加密算法的C++实现-DES encryption algorithm in C++
    2023-04-13 06:10:03下载
    积分:1
  • ieee一种基于混沌的新方法An Image Encryption Scheme Based on Chaotic Map...
    ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security
    2022-05-30 11:41:05下载
    积分:1
  • an asp language from the MD5 encryption algorithm achieved.
    一个由asp语言编写的MD5加密算法的实现.-an asp language from the MD5 encryption algorithm achieved.
    2022-08-20 18:26:43下载
    积分:1
  • 文件压缩压缩系统
    文件加密压缩解压缩系统-file encryption compression decompression system
    2022-06-11 19:33:45下载
    积分:1
  • SHA1 message digest algorithm, SHA1 message digest algorithm
    SHA1消息摘要算法, SHA1消息摘要算法-SHA1 message digest algorithm, SHA1 message digest algorithm
    2022-07-28 06:02:21下载
    积分:1
  • 个人编的rsa的源代码,算出public―private key;其中有Euclid,Extend Euclid的实现,以及Millar...
    个人编的rsa的源代码,算出public―private key;其中有Euclid,Extend Euclid的实现,以及Millar-Rabin test的实现,和加密/解密-Rsa personal series of source code, calculate the public-private key including Euclid, Extend Euclid realization, as well as the Millar-Rabin test realization, and the encryption/decryption
    2022-02-15 01:43:51下载
    积分:1
  • document to another, encrypted document to another document, document encryption...
    文件加码,文件加密文件加 码,文件加密文件加码,文件加密-document to another, encrypted document to another document, document encryption coded document, document encryption document to another, Encryption document to another, encrypted document to another document, document encryption
    2022-04-06 09:20:38下载
    积分:1
  • 696518资源总数
  • 104744会员总数
  • 33今日下载