- STC-USER-IAP-ISP stc系列双串口测试程序 新一代 1T 8051系列 单片机内核特殊功能寄存器 C51 Core SFRs
- MapSplitter 切图软件
- FPGA 应用开发入门与典型实例 代码 (现场可编程逻辑器件)以其体积小
- vb-OPEN-excel OPEN excel用vb.net打开excel
- sa-pso-bybird 基于原始粒子群算法和原始模拟退火算法的结合
- zhe Disrupt the screen earthquake save the document before running(At the screen earthquake save the document before running)
文件名称:EncryDeCry
介绍说明--下载内容来自于网络,使用问题请自行百度
我在字符串加密时的处理是每次取字符串的三个字节,再把三个字符连成一个24位的整型,前8位存放第一个字符,中间8位存放第二个字符,最后8位存放第三个字符。再取这个整型数的前6位对应的数值去差用户提供对应表,转化成相应的字符,再取第二个6位,第三个6位,第四个六位进行字符的转换。再重复前面相同的操作值到整个字符串转换完毕。在解密的过程就是根据用户提供的表进行查找和移位换原字符串。
这种算法比通常的直接根据用户提供的表进行转换有更高的安全性,且加密解密的效率很高。-string encryption is the handling each from the three-byte string. then three characters together into a 24-bit integer, the former eight store one character, intermediate storage of the second eight characters, the last eight characters placed third. This takes the number of cosmetic six, the numerical difference to users correspondence table, into the corresponding characters, then take the second six months, six third, fourth six characters for the conversion. Repeat the same as before the operation value of the entire string conversion completed. The decryption process is the basis for the user to find and scale displacement for the original strings. This algorithm than usual under the direct users of the conversion table for a higher level of security and encryption and decryption of
这种算法比通常的直接根据用户提供的表进行转换有更高的安全性,且加密解密的效率很高。-string encryption is the handling each from the three-byte string. then three characters together into a 24-bit integer, the former eight store one character, intermediate storage of the second eight characters, the last eight characters placed third. This takes the number of cosmetic six, the numerical difference to users correspondence table, into the corresponding characters, then take the second six months, six third, fourth six characters for the conversion. Repeat the same as before the operation value of the entire string conversion completed. The decryption process is the basis for the user to find and scale displacement for the original strings. This algorithm than usual under the direct users of the conversion table for a higher level of security and encryption and decryption of
(系统自动生成,下载前可以参看下载内容)
下载文件列表
EncryDeCry.java
www.dssz.com.txt
www.dssz.com.txt
1999-2046 搜珍网 All Rights Reserved.
本站作为网络服务提供者,仅为网络服务对象提供信息存储空间,仅对用户上载内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
