搜索资源列表
Hidinginformationinbinaryimage
- 基于隐藏密钥可以,将秘密信息msg嵌入到二值载体图像cover,算法简单,主要适合于将密文隐藏在BMP格式的文档里。-Key can be based on hidden, secret information will be embedded into the binary vector msg image cover, simple algorithm, mainly for the cipher text hidden in the BMP format documentation.
Stream-Ciphers-Theory
- Stream Cipher theory and applications
enigma
- The files included implement the M3 Enigma machine. Rotors.m implements the GUI and enigma.m implements the cipher substitutions. The implementation can be used as an aid to teaching the enigma machine. Also, the source can be used to show how to imp
157
- Encryption algorithms are becoming more necessary to ensure data is securely transmitted over insecure communication channels. FOX is a recently developed algorithm and its structure is based on the already proven IDEA (International Data E
Enigma
- 这是二战时期著名的,独领一时风骚的密码机Enigma的源代码,它真实的再现了Enigma的工作原理和真实原貌,希望有兴趣的朋友共同参详-This is the famous World War II, was the sole lead of 1:00 coquettish Enigma cipher machine source code, it is a true reproduction of the working principle of the Enigma and true ori
poly
- Poly alphabetic cipher in C
Polyalphabetic-Encryption-decryption
- MATLAB EXAMPLE CODE FOR POLYALPHABETIC CIPHER
Programs_pudn
- THis contains routing algorithms and certain cipher techniques using Matlab
BlowfishEncryption
- Blowfish Algorithm is a Feistel Network, iterating a simple encryption function 16 times. The block size is 64 bits, and the key can be any length up to 448 bits. Although there is a complex initialization phase required before any encryption can
Character-frequency-distribution-analaysis-
- The objective is to demonstrate character/ symbol frequency distribution analysis (reference to the English language) on 2 vintage ciphers, namely Caesar cipher (a mono-alphabetic substitution cipher) and the Vigenere cipher (a poly-alphabetic substi
C7
- Feistel cipher is a symmetric structure used in the construction of block ciphers, named after the German-born physicist and cryptographer Horst Feistel
string-data-encryption
- Data Encryption by Matrix Multiplication We will only use numbers 0 to 26 for the encryptive mathematics operation. Numbers from 1 to 26 are for letters from A to Z and 0 is for all non-letter characters. To minimize usage of numbers, all letters
sounds_WormsWorldParty
- Trivium C code, the best cipher in eSTREAM contest
AES
- ES is a symmetric block cipher. The same key is used to encrypt and decrypt the message. The plain text and the cipher text are the same size. The Aes algorithm works as follows: Convert to state array: This step consists of conversion on the
paper3
- 轻型分组密码LED代数故障攻击方法.pdf-LED light block cipher algebraic fault attack method. Pdf
FINAL_UTKARSH
- Image Encryption based on the RGB PIXEL Transposition and Shuffling Abstract — Privacy is one of the key issues information Security addresses. Through encryption one can prevent a third party from understanding raw data during signal transmissi
caesarcipherencryption_decryption_matlab_gui
- Caesar cipher encryption decryption
ARIA
- 韩国商用对称密码算法ARIA算法,对称密码的实现代码,-Korean Commercial symmetric cipher algorithm ARIA algorithm
image encryption
- about cipher for image by matlab
lmcipher_master
- lmcipher LMCipher:Logistic Map密码 单峰映射密码是使用单峰映射函数的密码概念的简单应用。 要使用INSTALL并编译运行'make'。 结束可执行文件“lmcipher”可用于使用给定的密钥加密文件。 关键越大,安全性越好。(lmcipher ======== LMCipher: Logistic Map Cipher The logistic map cipher is a simple proof of concept of a cipher th
