文件名称:EncryDeCry
介绍说明--下载内容均来自于网络,请自行研究使用
我在字符串加密时的处理是每次取字符串的三个字节,再把三个字符连成一个24位的整型,前8位存放第一个字符,中间8位存放第二个字符,最后8位存放第三个字符。再取这个整型数的前6位对应的数值去差用户提供对应表,转化成相应的字符,再取第二个6位,第三个6位,第四个六位进行字符的转换。再重复前面相同的操作值到整个字符串转换完毕。在解密的过程就是根据用户提供的表进行查找和移位换原字符串。
这种算法比通常的直接根据用户提供的表进行转换有更高的安全性,且加密解密的效率很高。-string encryption is the handling each from the three-byte string. then three characters together into a 24-bit integer, the former eight store one character, intermediate storage of the second eight characters, the last eight characters placed third. This takes the number of cosmetic six, the numerical difference to users correspondence table, into the corresponding characters, then take the second six months, six third, fourth six characters for the conversion. Repeat the same as before the operation value of the entire string conversion completed. The decryption process is the basis for the user to find and scale displacement for the original strings. This algorithm than usual under the direct users of the conversion table for a higher level of security and encryption and decryption of
这种算法比通常的直接根据用户提供的表进行转换有更高的安全性,且加密解密的效率很高。-string encryption is the handling each from the three-byte string. then three characters together into a 24-bit integer, the former eight store one character, intermediate storage of the second eight characters, the last eight characters placed third. This takes the number of cosmetic six, the numerical difference to users correspondence table, into the corresponding characters, then take the second six months, six third, fourth six characters for the conversion. Repeat the same as before the operation value of the entire string conversion completed. The decryption process is the basis for the user to find and scale displacement for the original strings. This algorithm than usual under the direct users of the conversion table for a higher level of security and encryption and decryption of
(系统自动生成,下载前可以参看下载内容)
下载文件列表
压缩包 : 37724102encrydecry.rar 列表 EncryDeCry.java