-
另一种编译文档加密案例。
汇编加密文件另一例。-another compilation document encryption cases.
- 2023-06-28 11:05:04下载
- 积分:1
-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1
-
说明:des算法的实现代码 */
能够实现56位或56*n密钥的des算法,可以通过该程序提供的接
进行数据的加密,保证数据在传送...
说明:des算法的实现代码 */
能够实现56位或56*n密钥的des算法,可以通过该程序提供的接
进行数据的加密,保证数据在传送过程的安全性-Description: des algorithm realize the code*/can be achieved 56 or 56* n keys des algorithm, can be provided through the program access data encryption to ensure data security during transmission of
- 2023-07-08 13:10:03下载
- 积分:1
-
使用的是API编程,可格式化、校验和读写特殊扇区。可用作Windows下的磁盘加密。本函数还有以下两个缺点以待改进: 1.本函数还只能读能读 A: 和 B:,即...
使用的是API编程,可格式化、校验和读写特殊扇区。可用作Windows下的磁盘加密。本函数还有以下两个缺点以待改进: 1.本函数还只能读能读 A: 和 B:,即只能对软盘操作 2.不能改变磁盘扇区大小,只能是标准的 512 个字节。 参数说明: command 操作: 0 重置磁盘 2 读扇区 3 写扇区 4 校验磁道 5 格式化磁道 8 得到设备参数 (int 1EH) drive 驱动器 A:=0 B:=1 head 磁头号,范围 0 - 1 track 磁道号,范围 0 - 84 ( 80 - 84 为特殊磁道,通常用来加密 ) sector 扇区号,范围 0 - 255 ( 19 - 255 为非标准扇区编号,通常用来加密) nsectors 每次读或写的扇区数,不能超出每磁道的最大扇区数 buffer 数据写入或读出的缓冲区,大小为 512 个字节 返回值 ( 同 Int 13H ): 0x0 成功 0x1 无效的命令 0x3 磁盘被写保护 0x4 扇区没有找到 0xa 发现坏扇区 0x80 磁盘没有准备好-using the API programming, formatting and testing literacy and special sectors. Windows can be used as a disk encryption. This function has the following two shortcomings to be improved : 1. This function can only be read, read A : and B : that only the right to operate two floppy disks. No change disk sector size, the standard is only 512 bytes. Parameter Description : command operations : 0 Reading 2 replacement disk write Sector Sector 3 4 5 checksum track to be formatted track eight equipment parameters (int 1EH) drive drive
- 2022-08-22 04:00:28下载
- 积分:1
-
自毁程序
鉴于单纯设置一个计数器易被查出,通过修改使其不起作用。我们设计的程序可以通过数据文件,软件执行前通过关键字找到计数基数,然后计算和判别,如果在合理范围,则设定新的关键字,将计数基数放在新关键字指定的位置,并执行子程序 则启动自毁程序。
- 2022-12-11 09:25:03下载
- 积分:1
-
各种反分析软件的手法,包括(反Dede,反单步跟踪,反SoftICE,Ollydbg,反静态分析,以及程序自身的CRC32效验等,对于初学者有很大的帮助.
各种反分析软件的手法,包括(反Dede,反单步跟踪,反SoftICE,Ollydbg,反静态分析,以及程序自身的CRC32效验等,对于初学者有很大的帮助.-Analysis of various anti-software approach, including the (Anti-Dede, anti-single-step tracking, anti-SoftICE, Ollydbg, anti-static analysis, as well as procedures for their own well-tested, such as CRC32, for beginners and has a great help.
- 2022-08-03 04:58:45下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1
-
asdfasfasfdsa
fdsafasfsadf网上花店
您的文件包然后写出其具体功能(至少要20个字)。尽量不要让站长把时间都花费-asdfasfasfdsa
- 2022-04-27 08:46:15下载
- 积分:1
-
一种Base 64的编码方法
一种Base 64的编码方法-a Base 64 encoding methods
- 2022-02-04 11:46:45下载
- 积分:1
-
数字签名(完整代码)
这是一个完整的数字签名过程,包括密钥的分发管理,摘要的提取,在eclipse上测试成功。
- 2022-02-24 16:55:09下载
- 积分:1