搜索资源列表
8104221485
- 德国纳粹二战时发明的密码机engma“迷”的复原模拟程序的源码-Nazi Germany during World War II invention of the cipher machines engma "fans" of the recovery process simulation FOSS
encrypt_de
- This code is a cipher which takes in a plaintext or ciphertext string and encrypts / decrypts according to a user defined key value. -This code is a cipher which takes in a plaint ext or ciphertext string and encrypts / decrypt 's according to
filecrypterpro
- FCP takes a file, generates a random 2048 bit key and encrypts the file with a RC4 stream cipher. The encrypted file is written to a new file along with the decryption stub and key. When the output file is executed it decrypts and executes the
Hidinginformationinbinaryimage
- 基于隐藏密钥可以,将秘密信息msg嵌入到二值载体图像cover,算法简单,主要适合于将密文隐藏在BMP格式的文档里。-Key can be based on hidden, secret information will be embedded into the binary vector msg image cover, simple algorithm, mainly for the cipher text hidden in the BMP format documentation.
Stream-Ciphers-Theory
- Stream Cipher theory and applications
hitag2
- Hitag2算法的C语言程序。验证通过。可运行于VC-// Software optimized 48-bit Philips/NXP Mifare Hitag2 PCF7936/46/47/52 stream cipher algorithm by I.C. Wiener 2006-2007. // For educational purposes only. // No warranties or guarantees of any kind. // This code is r
enigma
- The files included implement the M3 Enigma machine. Rotors.m implements the GUI and enigma.m implements the cipher substitutions. The implementation can be used as an aid to teaching the enigma machine. Also, the source can be used to show how to imp
157
- Encryption algorithms are becoming more necessary to ensure data is securely transmitted over insecure communication channels. FOX is a recently developed algorithm and its structure is based on the already proven IDEA (International Data E
3des_vhdl
- Triple DES cipher files
BasicDES
- Basic DES Cipher files
rc4
- RC4 was designed by Ron Rivest of RSA Security in 1987. While it is officially termed "Rivest Cipher 4", the RC acronym is alternatively understood to stand for "Ron s Code
Enigma
- 这是二战时期著名的,独领一时风骚的密码机Enigma的源代码,它真实的再现了Enigma的工作原理和真实原貌,希望有兴趣的朋友共同参详-This is the famous World War II, was the sole lead of 1:00 coquettish Enigma cipher machine source code, it is a true reproduction of the working principle of the Enigma and true ori
poly
- Poly alphabetic cipher in C
Polyalphabetic-Encryption-decryption
- MATLAB EXAMPLE CODE FOR POLYALPHABETIC CIPHER
Programs_pudn
- THis contains routing algorithms and certain cipher techniques using Matlab
ccn_lab
- this .zip file contains caeser cipher c++ code
BlowfishEncryption
- Blowfish Algorithm is a Feistel Network, iterating a simple encryption function 16 times. The block size is 64 bits, and the key can be any length up to 448 bits. Although there is a complex initialization phase required before any encryption can
grain_p3_80
- A new stream cipher, Grain-128, is proposed. The design is very small in hardware and it targets environments with very limited resources in gate count, power consumption, and chip area. Grain-128 supports key size of 128 bits and IV size of 96 bits.
Playfair-Cipher
- play fair cipher algorithm implementation using java
sequence-cipher-and-shift-register
- 序列密码的安全保密性主要依赖于密钥序列,因此研究什么样的伪随机序列可以作为序列密码的密钥序列就成为序列密码研究中的主要问题,即序列密码的关键是产生密钥序列的算法。-Security and confidentiality of the password depends on the sequence of key sequence, the study of what can be used as a pseudo-random sequence key sequences password b
