文件名称:doc2
介绍说明--下载内容均来自于网络,请自行研究使用
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash code (key) is
generated using the SHA algorithm. Then this key is used to
enctypted the data in the file(s). This key is stored in the
encrypted file along with the encrypted data.
-This project demonstrates the use of secure hash functions technique
to implement a file encryption/decryption system.
This implemented application can encrypt/decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash code (key) is
generated using the SHA algorithm. Then this key is used to
enctypted the data in the file(s). This key is stored in the
encrypted file along with the encrypted data.
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash code (key) is
generated using the SHA algorithm. Then this key is used to
enctypted the data in the file(s). This key is stored in the
encrypted file along with the encrypted data.
-This project demonstrates the use of secure hash functions technique
to implement a file encryption/decryption system.
This implemented application can encrypt/decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash code (key) is
generated using the SHA algorithm. Then this key is used to
enctypted the data in the file(s). This key is stored in the
encrypted file along with the encrypted data.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
New Folder
..........\crypto-documentation_main.doc
..........\ENCRYPT.H
..........\crypto-documentation_main.doc
..........\ENCRYPT.H