You are here: hacking technology > encryption decipher > Content
Hot Articles
Recommend Articles
New Articles
Detailing asp.net encrypt, decrypt skills
  Add date: 02/25/2011   Publishing date: 02/25/2011   Hits: 27
Total 3 pages, Current page:1, Jump to page:
 

A, data encryption/coding algorithm list

Common used to ensure the security of encryption or coding algorithm is as follows:

1, common encryption algorithm

Public-key algorithms used for sensitive data, abstract, signature, etc to encrypt messages, commonly used encryption algorithm include:

Data Encryption Standard (DES) : Data Encryption Standard, faster, suitable for Encryption large Data circumstance;

3DES (Triple DES) : is based on DES, to a data with three different keys three times higher strength; encrypted,

RC2 and RC4: using variable-length keys of large quantities of data encrypt than DES quickly;

International Data Encryption IDEA (done) International Data Encryption Algorithm, using 128-bit key provide very strong safety;

RSA: by RSA company invention, is a variable-length keys support of public key algorithms, need encrypted files fast length is variable,

DSA (done) : Digital our Digital Signature Algorithm, is a standard DSS (digital-signature standard);

AES Encryption Standard (on) : senior Encryption Standard, is the next generation of Encryption algorithm Standard, quick speed, high level of security, currently AES Standard, an implementation is Rijndael algorithm,

BLOWFISH, it USES variable-length keys, length can reach 448 bit, running speed quickly;

Other algorithms, such as ElGamal, Deffie - Hellman, new elliptic curve algorithm ECC etc.

2 and one-way hash algorithm

One-way hash function are generally used to generate news summary, encryption, common are:

MD5 (5) : < about done is RSA data security and development of a one-way hash Algorithm, MD5 is widely used and can be used to make different length of data blocks AnMa operations into a 128-bit numerical;

SHA (Secure Hash done) this is a relatively new hashing algorithms, can to arbitrary length of data operation generated a 160 bits of numerical;

MAC (< Authentication Code) : news Authentication codes, is a unidirectional function, use a key to use them on the system or user Authentication files or between news. HMAC (for news authentication encryption hashing) is an example of this function.

Cyclic Redundancy Check (CRC) : Cyclic Redundancy Check code, CRC Check because realize simple and submit the wrong ability, it is widely used in various data validation applications. Occupies system resources with software and hardware are less, can come true, is for data transmission error detection to a kind of very good method (CRC is not strictly hashing algorithms, but its role and hashing algorithm is roughly same, so to such).

3 and other data algorithm

Other data algorithm including some commonly used encoding algorithm and expressly (ASCII, Unicode) conversion, such as the Base 64, Quoted Printable, EBCDIC etc.

 

Second, the.net realize algorithm

Common encryption and coding algorithm are already in the.net Framework has been implemented for coding personnel provides tremendous convenience, realize these algorithms namespaces are: System. J Cryptography Security.

System Security. J j Cryptography namespaces provide encryption services, including safety data encoding and decoding, and many other operation, such as hashing, random number generation and news identity authentication.

 

Other pages: : 1 * 2 * 3 * Next>>
Prev:Mobile Guardian Enterprise Edition v6.5 extends encryption and protection to Mac OS X Next:Briefly transparent encryption ideas

Comment:

Category: Home > encryption decipher