▍1. cipher
说明: 使用维吉尼亚密码进行控制台编程,实现对英文文本文件的加解密!(Virginia password using the console program, to achieve the English version of the document encryption and decryption!)
说明: 使用维吉尼亚密码进行控制台编程,实现对英文文本文件的加解密!(Virginia password using the console program, to achieve the English version of the document encryption and decryption!)
说明: 采用RCS做文件加密的源程序代码,VC环境。包含两个文件包,里面的Readme有详细介绍。(Using RCS to do file encryption source code, VC environment. Package consists of two documents, which detailed the Readme.)
RSA公钥加密程序,可实现密钥对生成,加解密任意字符串功能。MFC界面。(RSA public key encryption program, enabling the key pair generation, encryption and decryption functions of arbitrary strings. MFC interface.)
MD5加密算法,实现报文认证!!运算速度快,兼容性好(MD5 encryption algorithm, message authentication realize! ! Computing speed, better compatibility)
使用DES算法;可以指定使用DES、2DES或者3DES算法;可以对任意的文件进行加密和解密,加密后文件扩展名为.des,可以指定使用ECB,CBC,CFB,OFB,CTR的任意一种模式; (The use of DES algorithm can specify the use of DES, 2DES or 3DES algorithm can arbitrary file encryption and decryption, encryption, named after the file extension. Des, you can specify the use of ECB, CBC, CFB, OFB, CTR arbitrary a model )
des加解密的算法,不错的字符串加密与解密(des encryption and decryption algorithms, a good string encryption and decryption)
MD5算法描述(略)。 设计一个模拟的系统用户安全登录界面,采用MD5算法实现用户登录口令的安全认证。要求模拟界面至少具有用户口令文件的注册和用户登录时输入的口令是否正确的结果提示两个功能。 (MD5 algorithm description (abbreviated). The design of a simulation system security log user interface, using MD5 algorithm users log on password security authentication. Analog interface requirements at least a registered user password files and user login password is entered when the correct results suggest that the two functions.)
信息安全的RSA与DES加解密算法的实现,用的是Visual C++MFC(Information Security RSA encryption and decryption with the DES algorithm, using the Visual C++ MFC)
本源代码,综合了DES,RSA,MD5等几种加密的方法于同一工程中,可以让读者对各种加密方法的实现通过代码实现过程的比较,更好的理解几种软件加密方法(Source code, a combination of DES, RSA, MD5 encryption method, such as several in the same project, will allow readers to a variety of encryption methods to achieve the realization of the process through code comparison, a better understanding of several software encryption methods)
AES-rijndael 算法的详细资料, 包括 AES加密算法中的SBox及其C语言实现.pdf FIPS197(chs).pdf FIPS197.pdf nist.url Rijndael.pdf rijndael算法流程.swf Rijndael算法深入的研究.doc Rijndael算法优化技术研究.doc 公钥密码体制与有限域(2).pdf 一种基于伽罗瓦域的密码系统.pdf(AES-rijndael algorithm detailed information, including the AES encryption algorithm in C language and its SBox realize. PdfFIPS197 (chs). PdfFIPS197.pdfnist.urlRijndael.pdfrijndael flow algorithm. SwfRijndael-depth study of algorithms. DocRijndael algorithm optimization technology research. Doc public key cryptosystem over finite fields and (2). pdf Galois field based on the password system. pdf)
3des算法code,已经通过visual c++编译.比一重des算法更加可靠!(3DES algorithm code, has passed visual c++ Compiler. Than one algorithm more reliable re-des!)
des和rsa的算法演示文档 (des and rsa algorithm presentation)
本程序可以在 PE 文件的结尾增加一个新节,从而在已被“加密”的程序开始运行时,要求输入密码。(This procedure can be the end of the document in the PE to add a new section, which has been in the encryption process to start running when asked to enter a password.)
整体思路 用createkey.java 文件来产生秘钥,用jiami.java 文件来实 现加密,用jiemi.java 文件来实现解密,用BigInteger.java 来实现 大数的表示及运算,用rsa.java 来实现前端图形界面显示。有关函 数见五个文件里的具体实现。 (The overall outlook createkey.java document used to generate secret keys, used to achieve jiami.java file encryption, used to achieve jiemi.java documents declassified by BigInteger.java to achieve expression of large numbers and calculations, using rsa.java to achieve front-end graphical interface display. Related functions, see the five concrete realization of the document.)
一个中国剩余定理的简单算法,密码学基础算法(Chinese Remainder Theorem a simple algorithm, based on cryptography algorithm)
加密算法RSA,DSA等,用C++实现,内附加有详细的说明(Encryption algorithm RSA, DSA, etc., using C++ Realize, with additional detail has)
信息加密原码,用md5算法实现,开发语言:c(original message encryption code used md5 algorithm, the development of language : c)
c++ 写的加密算法,可以加密解密,采用的算法是比较长用的(c write the encryption algorithm, encryption can be decrypted using the algorithm is relatively long with the)