▍1. DES-complete
一个DES加解密程序,有兴趣的可以下来看看。(A program about DES)
一个DES加解密程序,有兴趣的可以下来看看。(A program about DES)
简单的MD5进行加密处理字符串,得到结果保存到。txt中(Simple MD5 encrypted string, the results are saved to. txt in the)
题目:某个公司采用公用电话传递数据,数据是四位的整数,在传递过程中是加密的,加密规则如下: 每位数字都加上5,然后用和除以10的余数代替该数字,再将第一位和第四位交换,第二位和第三位交换。 1.程序分析: 2.程序源代码:(Topic: a company USES the public telephone relay data, data is four integers, in the relay in the process is encrypted, encryption rules are as follows: Each Numbers add 5, then use and divided by the number of 10 instead of a remnant, then the first and fourth exchange, the second and third exchange. 1. The program analysis: 2. The source code:)
文件加密器,实现对文件加密,用来学习的代码(File encryption, encrypting files, the code used to study)
加密程序,很好用。亲自验证,完全正确。希望下载。(we can add and unadd a picture correctly.welcom to download.)
rsa 实现代码,运用大数算法#include "afx.h" #include "Integer.h" #include <string> #include <iostream> using namespace std //构造大数对象并初始化为零 CInteger::CInteger() { m_nLength=1 for(int i=0 i<BI_MAXLEN i++)m_ulValue[i]=0 } //解构大数对象 CInteger::~CInteger() { } /*大数比较 调用方式:N.Cmp(A) 返回值:若N<A返回-1;若N=A返回0;若N>A返回1 */ int CInteger::Cmp(CInteger& A)(#include "afx.h" #include "Integer.h" #include <string> #include <iostream> using namespace std //构造大数对象并初始化为零 CInteger::CInteger() { m_nLength=1 for(int i=0 i<BI_MAXLEN i++)m_ulValue[i]=0 } //解构大数对象 CInteger::~CInteger() { } /*大数比较 调用方式:N.Cmp(A) 返回值:若N<A返回-1;若N=A返回0;若N>A返回1 */ int CInteger::Cmp(CInteger& A))
RC3算法,用c语言实现。包括加密和解密(The RC3 algorithm using the C language. Including encryption and decryption)
凯撒密码作为一种最为古老的对称加密体制,在古罗马的时候都已经很流行,他的基本思想是:通过把字母移动一定的位数来实现加密和解密。例如,如果密匙是把明文字母的位数向后移动三位,那么明文字母B就变成了密文的E,依次类推,X将变成A,Y变成B,Z变成C,由此可见,位数就是凯撒密码加密和解密的密钥。个人原创。(Caesar password as one of the most ancient symmetric encryption system in ancient Rome have been very popular, his basic idea is: by the letters move a certain number of bits to achieve encryption and decryption. For example, if the key is the number of bits of plaintext letters backward move three, the plaintext letter B into a ciphertext E, and so on, X will become Y-become a B,, and Z becomes C Thus, the median is the Caesar cipher encryption and decryption keys. Personal originality.)
本程序是仿射密码的加密与解密,用C语言编写的,经测试没有问题(This procedure is affine password encryption and decryption, written in C, tested no problem)
逆向工程揭秘,包含大量加密解密详细说明。学习逆向工程必备(The secret of Reverse engineering The detailed description contains a large number of encryption and decryption. To learn reverse engineering necessary)
DES( Data Encryption Standard)算法,于1977年得到美国政府的正式许可,是一种用56位密钥来加密64位数据的方法。虽然56位密钥的DES算法已经风光不在,而且常有用Des加密的明文被破译的报道,但是了解一下昔日美国的标准加密算法总是有益的,而且目前DES算法得到了广泛的应用,在某些场合,她仍然发挥着余热.(如:UNIX的密码算法就是以DES算法为基础的)。将其修改为三重DES也能抵抗破解。下面是关于如何实现DES算法的语言性描述:(DES ( Data Encryption Standard ) algorithm, in 1977 the U.S. government s official permission , is a 56 -bit key to encrypt 64 data . 56 keys of the DES algorithm scenery is not , and often with Des encryption expressly decipher reported , but look at the old standard encryption algorithm is always useful , but the DES algorithm has been widely used in a some occasions , she still plays a waste heat . (such as : UNIX password algorithm is DES algorithm -based ) . To modify the Triple DES is also resistant to cracking . The following is a description language on how to achieve the DES algorithm : )
使用cuda的aes加解密kernel函数(the kernel function of aes encrypt)
快速取模指数算法,C++编写,下载即可编译运行,RSA算法里面需要用到的(Take the fast modular exponentiation algorithm, C++ to prepare, you can compile and run the download, the RSA algorithm which need)
椭圆曲线密码算法及其应用论文,对椭圆曲线加解密算法实现具有很好参考价值(Elliptic curve cryptography algorithm and its application papers, the elliptic curve encryption and decryption algorithm to achieve a good reference value )
椭圆曲线密码体制及其在电子银行中的应用,对椭圆曲线的加解密应用具有很好参考价值(Elliptic curve cryptography and its application in e-banking, a good reference value of the elliptic curve encryption and decryption application )
01 authentication dan digital signature dengan metode schnorr
playfair 加密算法的实现,用一个例子做了展示(realize playfair algorithm,use a sample to show the algorithm)