搜索资源列表
-
0下载:
古典密码算法中的单表代换密码算法、移位密码算法、Vigenere密码算法。算法比较简单,用命令的方式。可以随机生成明文和密钥。-Classical cryptographic algorithm in a single table substitution cipher, transposition cipher, Vigenere cipher. Algorithm is relatively simple, way to use the command. Can be randomly ge
-
-
0下载:
置换密码亦称换位密码。置换只不过是一个简单的换位。每个置换都可以用一个置换矩阵 来表示。每个置换都有一个与之对应的逆置换 。置换密码的特点是仅有一个发送方和接收方知道的加密置换(用于加密)和对应的逆置换(用于解密)。它是对明文 长字母组中的字母位置进行重新排列,而每个字母本身并不改变。-Password replacement, also known as transposition cipher. Replacement is just a simple transposition. Each
-
-
0下载:
Classical - Cipher is a useful stand alone PC app that can be used to decipher/Encrypt different ciphers, such as Shift Substitution, Affine Substitution, Vigenere Cipher, Transposition Cipher and Jefferson Cipher. Hope you find this useful.
-
-
0下载:
此程序是基于移位和代换算法实现的对信息的加密和解密,对信息安全行业和从事密码方面的研究是个很好的例子。-This procedure is based on the transposition and substitution algorithm implementation of information encryption and decryption, safe to information industry and in the code area of study is a good
-
-
0下载:
Columnar is a transposition cipher. It is used in cryptography. The message is written as letters in a row and it is coded by reading out the letter columnwise.
-
-
0下载:
Implementation of Transposition Cipher in C
-
-
0下载:
四种加密解密算法的源代码:移位密码、仿射密码、维吉尼亚密码以及置换密码。-Four kinds of encryption and decryption algorithm source code: transposition cipher, affine password, password and password replacement Virginia.
-
-
0下载:
In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes
-
-
0下载:
this scr ipt talks about encryption in java which containing the example scr ipt to doing classical cryptography such as classic cipher, transposition cipher, affinecipher and so on. so let s learn together-this scr ipt talks about encryption in java
-
-
0下载:
置换密码算法的原理是不改变明文字符,只将字符在明文中的排列顺序改变,从而实现明文信息的加密。置换密码也叫换位密码。
试编程实现矩阵换位密码。它的加密方法是将明文中的字母按照给定的顺序安排在一个矩阵中,然后用根据密钥提供的顺序重新组合矩阵中的字母,形成密文。例如,明文为attack begins at five,密钥为cipher,将明文按照每行6个字母的形式排在矩阵中,如下形式:
a t t a c k
b e g i n s
a t f i v e
根据密钥ciphe
-