文件名称:Dynamicencryptionanddecryption
介绍说明--下载内容均来自于网络,请自行研究使用
略简说下解密主要是靠加密后得前8个字节+密钥来运算
而前8个字节是根据随机数+启动时间运算而来
详细思路在大家看看代码应该能够看明白的
密钥任意设置 支持 中文、字母、数字、符号(可重复)
其实过程也并非复杂 看得懂的人应该感觉很简单的
运算主要利用 位异或(xor) 位取反(not)
相同内容 每次加密后的内容都不会相同 随机动态生成
加密后的内容需解密时需要保存完整字节
缺少任意位置字节都会导致解密错误(除非最尾的吧)
密钥(key)也要保持跟加密时一致
加密解密测试效果 CPU:(R)D 2.8
30000个字节(易语言升级历程.txt)
只是加密或解密中的一项的耗时
(加、解、耗时都很相邻)
密钥:abcdefg
长度:7
耗时: 0- 16 ms
密钥:abcdefghijklmnopqrhtuvwxyz1234567890~!@#$ ^&*()_+-=
长度:51
耗时: 78-125 ms
密钥越长 费时就多点 加解密key一个字符都不能错
也不会说密钥大概有部分对也能够解密部分信息
-Jane said, slightly under the encrypted decryption key is obtained through the first 8 bytes+ the key to computing
The first 8 bytes is based on random number+ start-up time from operation
For more ideas take a look at the code should be able to see to understand
Key set to support any Chinese, letters, numbers, symbols (repeatable)
In fact, the process is not complex and can read people should feel very simple
Operation mainly use bit different or (xor) bit to take anti-(not)
The same content each time the encrypted content is not dynamically generate the same random
Required to decrypt the encrypted contents of the byte when the need to preserve integrity
Bytes will result in a lack of anywhere to decrypt error (unless the end of it the most)
Key (key) must remain consistent with the encryption
Encryption and decryption test results CPU: (R) D 2.8
30,000 bytes (easy language upgrade process. Txt)
Only encrypted or decrypted in a time-consumin
而前8个字节是根据随机数+启动时间运算而来
详细思路在大家看看代码应该能够看明白的
密钥任意设置 支持 中文、字母、数字、符号(可重复)
其实过程也并非复杂 看得懂的人应该感觉很简单的
运算主要利用 位异或(xor) 位取反(not)
相同内容 每次加密后的内容都不会相同 随机动态生成
加密后的内容需解密时需要保存完整字节
缺少任意位置字节都会导致解密错误(除非最尾的吧)
密钥(key)也要保持跟加密时一致
加密解密测试效果 CPU:(R)D 2.8
30000个字节(易语言升级历程.txt)
只是加密或解密中的一项的耗时
(加、解、耗时都很相邻)
密钥:abcdefg
长度:7
耗时: 0- 16 ms
密钥:abcdefghijklmnopqrhtuvwxyz1234567890~!@#$ ^&*()_+-=
长度:51
耗时: 78-125 ms
密钥越长 费时就多点 加解密key一个字符都不能错
也不会说密钥大概有部分对也能够解密部分信息
-Jane said, slightly under the encrypted decryption key is obtained through the first 8 bytes+ the key to computing
The first 8 bytes is based on random number+ start-up time from operation
For more ideas take a look at the code should be able to see to understand
Key set to support any Chinese, letters, numbers, symbols (repeatable)
In fact, the process is not complex and can read people should feel very simple
Operation mainly use bit different or (xor) bit to take anti-(not)
The same content each time the encrypted content is not dynamically generate the same random
Required to decrypt the encrypted contents of the byte when the need to preserve integrity
Bytes will result in a lack of anywhere to decrypt error (unless the end of it the most)
Key (key) must remain consistent with the encryption
Encryption and decryption test results CPU: (R) D 2.8
30,000 bytes (easy language upgrade process. Txt)
Only encrypted or decrypted in a time-consumin
相关搜索: 加密
(系统自动生成,下载前可以参看下载内容)
下载文件列表
动态加密解密.e