-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1
-
大数计算在公钥加密中起到了重要的作用,如何操作大数呢,该程序也许能帮你解决这个问题有所帮助。...
大数计算在公钥加密中起到了重要的作用,如何操作大数呢,该程序也许能帮你解决这个问题有所帮助。-calculated in the end, the public key encryption plays an important role in the operation of large numbers do, the program may be able to help you resolve this problem some help.
- 2023-08-04 22:25:02下载
- 积分:1
-
6)jm.tar.gz是上述程序的程序包,解包后产生一个安装程序install...
6)jm.tar.gz是上述程序的程序包,解包后产生一个安装程序install-jm,运行 ./install-jm就能根据需求选择安装 退出安装程序,安装程序会被自行删除。 8) 以上各程序在RedHatLINUX7.2平台编译通过。 10)本程序仅供学习使用。-6) jm.tar.gz above is the procedure for packages, unpacks resulting from the installation of a procedure install-jm, run./Install- jm demand can choose to exit the setup program to install, the installer will be replaced. 8) The above procedure RedHatLINUX7.2 platform compile. 10) only to learn the procedures used.
- 2022-12-20 09:30:04下载
- 积分:1
-
一个用c编写的文件加密器,可以加密任何类型的文件,速度很快!for dos!...
一个用c编写的文件加密器,可以加密任何类型的文件,速度很快!for dos!-with a paper prepared by the encryption device that can encrypt any type of document, very fast! For dos!
- 2023-02-06 16:35:03下载
- 积分:1
-
Skipjack 加密算法 美国国家安全局标准加密算法
Skipjack 加密算法 美国国家安全局标准加密算法-Skipjack encryption algorithm US country peaceful overall
situation standard encryption algorithm
- 2022-01-26 02:18:26下载
- 积分:1
-
128192和256位密钥的密码Twofish的VHDL实现。
VHDL implementation of the twofish cipher for 128,192 and 256 bit keys.
The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.-VHDL implementation of the twofish cipher for 128,192 and 256 bit keys.
The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some
- 2022-07-08 23:33:44下载
- 积分:1
-
md5加密的bindshe
md5加密的bindshe-md5 encrypted bindshe
- 2022-08-07 16:33:31下载
- 积分:1
-
IPSEC源码包括测试模块代码,容易移植
资源描述在IP层加密的IPSEC源码,包括各个模块的测试代码,可以针对具体的TCPIP协议栈进行移植,本人已经在uc/tcpip协议栈上进行了移植,测试成功,实现了局域网内多个节点的安全通信
- 2023-03-10 15:45:03下载
- 积分:1
-
一个简单的加密算法Kaiser(C语言)
一个简单的加密算法Kaiser(C语言实现) -A simple encryption algorithm Kaiser (C language)
- 2023-05-09 14:25:03下载
- 积分:1
-
DES( Data Encryption Standard)算法,于1977年得到美国政府的正式许可,是一种用56位密钥来加密64位数据的方法。DES算法以被应...
DES( Data Encryption Standard)算法,于1977年得到美国政府的正式许可,是一种用56位密钥来加密64位数据的方法。DES算法以被应用于许多需要安全加密的场合。(如:UNIX的密码算法就是以DES算法为基础的)。-DES (Data Encryption Standard) algorithm, in 1977 the United States government"s official permission, is a key 56 to 64-bit data encryption methods. DES algorithm to be applied to many needs security encryption occasions. (Eg : UNIX password algorithm is to DES algorithm-based).
- 2022-02-02 12:16:17下载
- 积分:1