最著名的加密技术

编程入门 行业动态 更新时间:2024-10-11 15:14:39
本文介绍了最著名的加密技术的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧! 问题描述

对于我们的项目,我们需要编写一些目前已知的最佳密码. 请给我最好的密码列表 例如河豚,双鱼等...

For our project we need to code some of best ciphers known at this time. Please give me the list of best ciphers like blowfish, twofish, and etc...

推荐答案

Akshayy, 并不粗鲁,但限于codeproject的Google搜索显示大量文章 [ ^ ]展示了如何进行操作,并对Rinjdael进行了说明. 我建议您观看 .google/url?sa = t& rct = j& q =方式%20does%20rijndael%20work& source = web& cd = 2& ved = 0CFAQtwIwAQ& url = http%3A%2F%2Fwww.youtube %2Fwatch%3Fv%3DySq88y0e8u4& ei = T0PrT5bgBci8rQHircC8BQ& usg = AFQjCNGllcF9fVrYVkuI96ku0IWtZJy5jQ& cad = rja"target =" _ blank"title =" a 我让您自己搜索Twofish. 在专注于最好的加密之前,您可能需要更好地了解要加密的内容以及为什么它很重要.如果您正在编写代码,建议您阅读有关密码安全性的信息 [ ^ ],然后再担心加密问题. Hogan Akshayy, Not to be rude, but a Google search limited to codeproject revealed numerous articles[^] that show how to do it and have explanations for Rinjdael. I recommend watching a video[^] to better understand how it works. I''ll let you search for the Twofish one yourself. Before you focus on the best encryption, you probably need to better understand what you are encrypting and why it is important or not. If you''re writing code, I recommend reading about password security[^] before you worry about encryption. Hogan

如果您要问这两种加密如何完成工作,下面是每个加密的链接,详细介绍它们及其工作原理: Rinjdael: csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf [ ^ ] Twofish: www.schneier/twofish.html [ ^ ] 如果您对如何使用它们更感兴趣,那么这里将是一个不错的起点: stackoverflow/questions/992019/java-256-bit- aes-password-based-encryption [ ^ ] If you are asking how these two encryptions do their job, here is a link for each of them, explaing more about them and their workings: Rinjdael: csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf[^] Twofish: www.schneier/twofish.html[^] If you are more interested in how to use them, here would be a good place to start: stackoverflow/questions/992019/java-256-bit-aes-password-based-encryption[^]

关于您引用的可恢复加密密码的要求,请参阅 Shamir的M of N算法 [ ^ ];将他们的密码2从3中拆分出来,保留一个,邮寄一个给他们,然后是一个受信任的被提名人... With reference to your quoted requirement for recoverable encryption passwords have a look at Shamir''s M of N algorithm[^]; split their password 2 from 3, keep one, mail one to them, and a trusted nominee ...

更多推荐

最著名的加密技术

本文发布于:2023-11-29 22:43:51,感谢您对本站的认可!
本文链接:https://www.elefans.com/category/jswz/34/1647843.html
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。
本文标签:最著名   加密技术

发布评论

评论列表 (有 0 条评论)
草根站长

>www.elefans.com

编程频道|电子爱好者 - 技术资讯及电子产品介绍!