搜索资源列表
-
0下载:
对信息进行加密解密操作 设计换位密码 单表代替密码 维吉尼亚密码,Encryption and decryption of information designed to operate a single table instead of transposition password password password Virginia
-
-
0下载:
古典密码学若干算法
(1) 实现移位密码;
(2) 实现替换密码;
(3) 实现Vigenere密码(选做);
(4) 实现置换密码(换位密码);
(5) 对每一种密码,编写加密字符串和加密文件的两种算法并进行实验。
-A number of classical cryptography algorithm (1) the realization of shift cipher (2) to achieve the replacement of the password
-
-
0下载:
VB加密换位算发,VB6调试通过-Transposition encryption algorithm VB
-
-
0下载:
this program implements Substitution and Transposition cipher
-
-
0下载:
DES完整的加解密算法,使用C语言实现,经过测试,可以运行。
明文分组长64比特。有效主密钥长56比特,根据密钥生成算法,由主密钥生成16个48比特的子密钥。
该算法共16轮,每轮使用一个子密钥。
在进行16轮加密之前,先对明文做一个初始置换IP。
每一轮加密的轮函数f为: .
在16轮加密之后,对比特串L16R16换位为R16 L16,做逆置换IP-1,从而得到密文C。
-DES encryption algorithm is complete, use the C l
-
-
0下载:
C# simple program that encrypt and decrypt text using (columnar transposition) encryption
-
-
1下载:
VB换位密码加密技术示例源代码VB transposition password encryption source code example-VB transposition password encryption source code example
-
-
0下载:
进行日常字符的加密、解密功能,具有随机密匙,和采用国际换位法进行加密处理。-Routine character of the encryption, decryption function, with random keys, and the adoption of international transposition encrypted.
-
-
0下载:
置换密码亦称换位密码。置换只不过是一个简单的换位。每个置换都可以用一个置换矩阵 来表示。每个置换都有一个与之对应的逆置换 。置换密码的特点是仅有一个发送方和接收方知道的加密置换(用于加密)和对应的逆置换(用于解密)。它是对明文 长字母组中的字母位置进行重新排列,而每个字母本身并不改变。-Password replacement, also known as transposition cipher. Replacement is just a simple transposition. Each
-
-
0下载:
To find the transposition encryption in a text.
-
-
0下载:
encryption and dycription using Columnar transposition
-
-
0下载:
换位加密文件。先自己创建一个原文件,然后将其加密。-Transposition encrypted files.First, to create an original document, then encrypt it.
-
-
0下载:
此程序是基于移位和代换算法实现的对信息的加密和解密,对信息安全行业和从事密码方面的研究是个很好的例子。-This procedure is based on the transposition and substitution algorithm implementation of information encryption and decryption, safe to information industry and in the code area of study is a good
-
-
0下载:
VB换位密码加密技术示例源代码,有需要的就下载吧。-VB transposition cipher encryption technology sample source code, there is a need to download it.
-
-
0下载:
Image Encryption based on the RGB PIXEL Transposition and Shuffling
Abstract — Privacy is one of the key issues information Security addresses. Through encryption one can prevent a third party from understanding raw data during signal transmissi
-
-
0下载:
四种加密解密算法的源代码:移位密码、仿射密码、维吉尼亚密码以及置换密码。-Four kinds of encryption and decryption algorithm source code: transposition cipher, affine password, password and password replacement Virginia.
-
-
0下载:
移位密码的加密以及攻击方法,C++文件,密码学初步-Encryption and password attack methods shifts, C++ files, cryptography preliminary
-
-
0下载:
换位加密解密算法:换位密码就是一种早期的加密方法,与明文的字母保持相同,区别是顺序被打乱了。通常,换位加密采用分组的形式,将明文分成指定的长度n的多组数据,然后在组内按照给定的置换规则进行字符换位。-Transposition encryption algorithm
-
-
0下载:
In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes
-
-
0下载:
this scr ipt talks about encryption in java which containing the example scr ipt to doing classical cryptography such as classic cipher, transposition cipher, affinecipher and so on. so let s learn together-this scr ipt talks about encryption in java
-