资源列表
DES
- DES算法把64位的明文输入块变为64位的密文输出块,它所使用的密钥也是64位,其功能是把输入的64位数据块按位重新组合,并把输出分为L0 、R0两个部分,每部分各长32位.-The DES algorithm 64-bit input block of plaintext into a 64-bit output ciphertext block, it uses the key is 64, the function of which is 64-bit block of input dat
1
- 实现RSA算法。并对 I LOVE NANJING UNIVERSITY OF AERONAUTICS AND ASTRONAUTICS 加解密。说明:为了方便实现,分组可以小一点,比如两个字母一组。-Implement the RSA algorithm. And " I LOVE NANJING UNIVERSITY OF AERONAUTICS AND ASTRONAUTICS" encryption and decryption. Descr iption: In or
md5
- 通过实现数字签名算法(DSA),加深对数字签名算法的理解,同时学习Hash算法的实现。 1)利用C\C++语言实现DSA算法。 2)DSA中的Hash函数采用SHA算法。 -By implementing the Digital Signature Algorithm (DSA), a better understanding of the digital signature algorithm, while learning to achieve Hash algorithm. 1
prob3
- Miller-Rabin test is a primality test algorithm which determines whether a given number is prime or not. Implement Miller-Rabin primality test as given in the text book page 257, Algorithm 7.44. (aN− 1 6= 1 mod N) Write three functions to
4
- Cryptographic Hash Functions: A cryptographic hash function must have at least two security properties: collision free and Hiding. Collision free property ensures that for a given function H, no one can find x and y such that H(x) = H(y). The hid
discrete_log
- Solve descrete log problem using meet in the middle attack. More formally, write a program to compute discrete log modulo a prime p. Let g be some element in Z p and suppose you are given h in Z p such that h = gx where 1 ≤ x ≤ 240. Your goal
diffie_hellman
- Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random number mod p. Now generate A,
q1
- Consider an organization with three roles: A, B and C. Whenever B has to issue some instruction to A, B has to take permission via C and then only it will be obeyed by A. This permission is issued with the help of a digital signature. A verifies
mbedtls-2.4.0-apache
- mbed-tls加密库源码,arm收购自polarssl-Mbed-tls encrypt library source code, polarssl has been sold to ARM and renamed.
des.tar
- THE ALGORITHM WRITTEN IN C FOR BOTH ENCRYPTION AND DESCRYPTION AND CAN BE USED AS SINGLE MODULE FOR 3- des ALGORITHM
Hill-Cipher
- Encryption algorithm of Hill cipher with GUI in c#
AES-Assignment-1.3
- AES algorithm implementation in c# with GUI