-
DESEncryptionDecrypt
编写的DES 对称加解密技术,可随时进行明文密文之间的转换,有需要的朋友可以下载测试!本人目的打算对后台数据库的敏感信息字段用该方法加密,然后用软件权限控制读取,这样即使直接SQL后台取数,也得不到明文数据。(Write DES symmetrical encryption technology, may at any time for conversion between plaintext cipher, friends in need can be download test! I purpose going to the backstage database of sensitive information field with the method of encryption, and then use software to read access control, so even if the SQL backend access directly, also can not get clear data.
)
- 2013-10-15 09:51:35下载
- 积分:1
-
SEED
Seed加密体制代码,韩国的分组密码加密体制。(Seed encryption system code block cipher encryption system in Korea.)
- 2014-01-16 11:47:11下载
- 积分:1
-
sha256
SHA-256源代码,三个对外的函数:void SHA256Init (SHA256Context *sc)
void SHA256Update (SHA256Context *sc, const void *data, uint32_t len)
void SHA256Final (SHA256Context *sc, uint8_t hash[SHA256_HASH_SIZE])
第一个函数初始化,第二个函数输入要hash的字符串,第三个函数输出结果(SHA-256 source code, three external function: void SHA256Init (SHA256Context* sc) void SHA256Update (SHA256Context* sc, const void* data, uint32_t len) void SHA256Final (SHA256Context* sc, uint8_t hash [SHA256_HASH_SIZE]) The first function is initialized, the second hash function, enter the string, the third function of output)
- 2021-04-27 09:28:44下载
- 积分:1
-
DES_Test
DES加密的MFC实现,主要包括两部分组成,有字符串加密和文件加密两种模式,实现了3DES功能,让加密更安全(including string and files by DES)
- 2013-10-28 19:46:24下载
- 积分:1
-
imgecrypt_cpp
说明: 用C++实现的图像加密和解密算法代码,功能强大(Using C++ implementation of image encryption and decryption algorithm code, powerful)
- 2010-04-12 18:49:30下载
- 积分:1
-
hundunjiami
说明: 一个关于加密音频,图像的VB程序,功能还算可以,希望可以帮到人!!(One on encryption of audio, images VB program, function OK, the desire to help people! !)
- 2021-02-28 17:49:35下载
- 积分:1
-
ASFDSAF
题目:某个公司采用公用电话传递数据,数据是四位的整数,在传递过程中是加密的,加密规则如下:
每位数字都加上5,然后用和除以10的余数代替该数字,再将第一位和第四位交换,第二位和第三位交换。
1.程序分析:
2.程序源代码:(Topic: a company USES the public telephone relay data, data is four integers, in the relay in the process is encrypted, encryption rules are as follows:
Each Numbers add 5, then use and divided by the number of 10 instead of a remnant, then the first and fourth exchange, the second and third exchange.
1. The program analysis:
2. The source code:)
- 2012-05-26 20:07:28下载
- 积分:1
-
s26
C++ implementation for S26
- 2012-01-25 04:34:16下载
- 积分:1
-
Hash
MD5加密算法,实现报文认证!!运算速度快,兼容性好(MD5 encryption algorithm, message authentication realize! ! Computing speed, better compatibility)
- 2008-07-05 00:29:14下载
- 积分:1
-
CloneRockey4ND
ROCKEY4ND加密锁硬复制程序(Rockey4 Rockey4 Smart Rockey4 ND)
(Rockey4 Rockey4 Smart Rockey4ND clone) )
- 2020-09-23 16:07:53下载
- 积分:1