资源列表
Permutation-cipher
- C语言实现古典密码学中的列置换,自己原创,有详细注释,便于理解这个算法-Permutation cipher,C language operations can definitely run, help to understand and master the encryption algorithm
model_field_11[1].cache
- MD5伪造工具(不要做坏事噢) MD5碰撞测试程序并提供源代码. 利用该程序可伪造出有相同MD5的不同程序.-MD5 crash test program and provide the source code. Use this program can be forged out different programs with the same MD5.
KEELOQ(AVR)
- 用AVR做的可直接调试解密原理的的KEELOQ解码程序-Can be directly used to do debugging AVR decrypt the KEELOQ decoder principle
CertificatePasswordRecovery
- Certificate Password Recovery (.PFX file)
zishiyingjiami
- 为了提高图像加密算法的鲁棒性,提出了一种新的自适应图像加密算法。首先,把任意大小的灰度或彩 色图像分成2 × 2 子块 然后,用左上角子块的像素灰度值和Chebyshev 混沌映射构造与右上角子块等大的矩阵,用该 矩阵对右上角子块进行像素灰度值替换 最后,按顺时针对每个子块进行加密,直到左上角子块加密完毕。该算法不 依赖于图像的大小,而且适用于灰度图像和彩色图像,因而有很强的鲁棒性。同时灰度值扩散机制的引入使得该算 法具有良好的扩散性和扰乱性。-This paper presen
sha256
- sha256 算法实现 , 摘自LINUX内核-sha256 algorithm
original-rc5-v2
- rc5加解密 可以输入密钥进行解密和加密。人机交互较好。-the rc5 encryption and decryption can enter the key for decryption and encryption. Better human-computer interaction.
MD5pojie
- 文件MD5破解工具,可自行修改文件MD5值数。-MD5 cracking tools, you can modify the MD5 value
haxihanshu-SHA-1suanfa
- 哈希函数SHA-1的c实现,能正常运行。很实用,适合用来学习sha-1,希望对你有帮助。-A hash function is SHA-1 (c) achieve normal operation. Very practical, ideal for learning the sha-1, you want to help.
DES
- 可以用于多位二进制数加密解密的DES算法,在main函数中给出了使用范例,使用者可以比较并且了解到DES的雪崩效应。-Can be used for a number of binary encryption and decryption of DES algorithm, using the example given in the main function, the user can compare and understand the avalanche effect of DES.
Mdbmmpj
- MDB密码破解,主要帮助大家解决MDB遗忘密码的问题-MDB password cracking, mainly to help solve the problem of the MDB forgotten password
R1
- Rockey1的开发包,windows下和linux都有-Rockey1 development kit, windows under linux and have