Encryption and decryption relevant software source code

Size：11.49KB - 2015-03-28 23:40:11 - Download

Had not the resource is introduced

Size：668.27KB - 2015-03-21 16:51:31 - Download

C # file encryption to decrypt & have spent Contain & have spent EXE RAR Such as file encryption to decrypt

Size：85.26KB - 2015-03-13 14:23:21 - Download

Abstract: VB source code, encryption, encryption program Vb MD5 & have spent RSA RC4 encryption test program + source download, use a custom encryption DLL, EncryptionDLL. DLL. Running effect as shown in example screenshots. Can be in the corresponding column encryption method, the input test characters, and then click the button of encryption, easy to use, for details please download the source code file open after check. Caution for testing: this program is run the demo folder in the project, and need to register EncryptionDLL. DLL component, open the project file, select "project"/" references, "selection component location.

Size：409.25KB - 2015-03-13 11:31:52 - Download

The last upload zip format, I do not know at no. Pass a rar. To decrypt the encrypted text file content. In the right-click menu choose to open the file, open to encrypt or decrypt the text file, then encrypt decrypt operation. Encryption to decrypt function USES a simple shift of the ASCII value of the algorithm.

Size：354.82KB - 2015-02-15 20:22:53 - Download

Used for encryption/decryption code to ATL form

Size：478.06KB - 2015-01-21 21:24:20 - Download

More ancient blowfish encryption decryption algorithm, Delphi, the demand of personnel for reference.

Size：18.2K - 2012-02-18 19:36:11 - Download

C# encryption and decryption program and source code, encryption mainly carried out in two steps, first select the files, the second step Key randomly generated encryption key and IV, using the sender's private key signature random key, using the recipients public key encryption keys and signatures, using a random key grouping using the DES algorithm to encrypt data, MD5 digest generated--> signed with a private key of the sender;

Decryption process is as follows: after factoring out the encrypted session key of the sender's private key to decrypt the ciphertext = = factoring out the keys of the recipients public key validation =, group DES decryption = plaintext = MD5 digest generated with time stamp, timestamp comparison summary = extract obtained clear =, the public key of the sender are clear summary.

Decryption process is as follows: after factoring out the encrypted session key of the sender's private key to decrypt the ciphertext = = factoring out the keys of the recipients public key validation =, group DES decryption = plaintext = MD5 digest generated with time stamp, timestamp comparison summary = extract obtained clear =, the public key of the sender are clear summary.

Size：12.9K - 2012-02-18 19:29:58 - Download

C# simple string encryption algorithms: a case report, interested friends to see, really simple.

Size：2.07M - 2012-02-18 18:28:54 - Download

Cryptographic function library developed for the VC++, written by Rinick Makefile file, under Bcc into lib, contains tutorials and help documentation.

Size：21.3K - 2012-02-18 18:07:25 - Download

Compact and easy to use VC++ text encryption, decryption programs, you can encrypt, decrypt the passage, can save the encrypted file, the program uses the XPBotton control, so the button is beautiful, while not an encryption counter, Statistics Canada, dense number of solutions.

Size：5.95K - 2012-02-18 18:05:37 - Download

DES (Data Encrypt Standard) encryption algorithm, often use a VC++ encryption algorithm, using a simple, this is the core of DES encryption algorithm for program code, for informational purposes only.

Size：18.7K - 2012-02-18 17:57:43 - Download

VC++ registration key encryption source code (including register machines, decrypting machine), this method effectively controls copyright software is cracked, protecting your software is not subject to violation of property rights, within the Cabinet has two source packages, one is the source register machine programs and the other is decrypted source program, a complete set of reference examples.

Decrypt: init target, generate a decryption key, decryption is complete.

Decrypt: init target, generate a decryption key, decryption is complete.

Size：351K - 2012-02-18 17:33:14 - Download

A basic hybrid cipher systems, uses DES as the symmetric key algorithms, RSA public key algorithm.

The following features:

1 provides the two encryption interfaces. Hybrid encryption, DES encryption.

2: DES 1 DES encryption of the system (the standard DES encryption) and 3-DES encryption. It will look at the key length, automatically selects the encryption scheme. When the key length 64-bit when it uses the standard DES encryption, as soon as more than 64-bit key length, the system will set the 2nd key and enable 3-DES encryption. His key length of 112 bits, and it also has a very strong extensibility, offers 3 kinds of encryption and decryption interface: file interface, interface of file handles (can be used for other encryption systems, hybrid encryption module of this system is to use the interfaces), interface and memory buffers. It can also test key is correct, because when you encrypt, it deposited encrypted key cipher text file, decrypt the first redaction with current key decryption key, if key obtained from clear text identical to the current key, the current key is correct.

3: the system's RSA key lengths up to 600-bits binary number (about 720-bits binary number). Encryption/decryption, you can import the key from a file.

4: this system may have a length of up to 300-bits binary (about 360-bits binary number) of big prime number, you can export the prime numbers, you can also import prime number from a file, can also have a specified length of random primes.

5 the system generate RSA key pairs very quickly, typically in less than 3 seconds. After the election, you can export the key pair to a text file, with public-key and mode n you may not be encrypted, but the best secret key encrypted with the DES interfaces provided by the system, again using the decryption. (Originally also planned to implement an RSA key pair management class: it uses a keystore file, which uses a DES key as password. It will be key to this encrypted DES key, and then into the keystore. It can be retrieved in the keystore name RSA key pair, and the keystore can be carried out various actions such as: adding, removing, modifying, changing passwords, and so on. But limited to a matter of time, we did not realize it, looking for interested students can give it a try).

6: this system of mixed RSA key encryption module also has error detection function, largely through the decrypted DES key length to determine, because if the RSA key errors, then the decrypted DES key length must be longer than 16 bytes.

7: this system can save the user to set various options such as: the default path, use DES encryption 3 times, and so on. Next startup, these options take effect automatically.

8: this system provides a friendly and attractive interface. It has 5 background images each time you start the system randomly selects it.

The following features:

1 provides the two encryption interfaces. Hybrid encryption, DES encryption.

2: DES 1 DES encryption of the system (the standard DES encryption) and 3-DES encryption. It will look at the key length, automatically selects the encryption scheme. When the key length 64-bit when it uses the standard DES encryption, as soon as more than 64-bit key length, the system will set the 2nd key and enable 3-DES encryption. His key length of 112 bits, and it also has a very strong extensibility, offers 3 kinds of encryption and decryption interface: file interface, interface of file handles (can be used for other encryption systems, hybrid encryption module of this system is to use the interfaces), interface and memory buffers. It can also test key is correct, because when you encrypt, it deposited encrypted key cipher text file, decrypt the first redaction with current key decryption key, if key obtained from clear text identical to the current key, the current key is correct.

3: the system's RSA key lengths up to 600-bits binary number (about 720-bits binary number). Encryption/decryption, you can import the key from a file.

4: this system may have a length of up to 300-bits binary (about 360-bits binary number) of big prime number, you can export the prime numbers, you can also import prime number from a file, can also have a specified length of random primes.

5 the system generate RSA key pairs very quickly, typically in less than 3 seconds. After the election, you can export the key pair to a text file, with public-key and mode n you may not be encrypted, but the best secret key encrypted with the DES interfaces provided by the system, again using the decryption. (Originally also planned to implement an RSA key pair management class: it uses a keystore file, which uses a DES key as password. It will be key to this encrypted DES key, and then into the keystore. It can be retrieved in the keystore name RSA key pair, and the keystore can be carried out various actions such as: adding, removing, modifying, changing passwords, and so on. But limited to a matter of time, we did not realize it, looking for interested students can give it a try).

6: this system of mixed RSA key encryption module also has error detection function, largely through the decrypted DES key length to determine, because if the RSA key errors, then the decrypted DES key length must be longer than 16 bytes.

7: this system can save the user to set various options such as: the default path, use DES encryption 3 times, and so on. Next startup, these options take effect automatically.

8: this system provides a friendly and attractive interface. It has 5 background images each time you start the system randomly selects it.

Size：990K - 2012-02-18 17:31:23 - Download

RSA software applications, mostly on the Internet. Encrypted connections, the core algorithms for a wide range of digital signatures and digital certificates using RSA. In everyday use, there are more famous Kit Open SSL (SSL,Security Socket Layer, is a secure transport protocol, data protection and identity on the Internet. Open SSL is an open source implementation of SSL and encryption package, by Canada, such as Eric Yang written.

This package contains the RSA's papers, and related source code, source code run on VS2003.

This package contains the RSA's papers, and related source code, source code run on VS2003.

Size：37.1K - 2012-02-18 17:30:31 - Download

VC++ generator registration code, along with decryption program, demo screenshot shown, the top is the registration code generating program, below is a decryption program.

Size：286K - 2012-02-18 16:52:14 - Download

RSA algorithm on how to use VC++ to prevent illegal registration register your software, which prevents software from being cracked. Friends familiar with programming would know, RSA public key cryptosystem was proposed by the R.Rivest,A.Shamir,L.Adleman, not only can be used for data encryption, can also be used for digital signatures, secure high, used it to develop applications of encryption, decryption system has been a lot in the hope that through this kind of simulation, and colleagues together to compete Vc++ illegal cracking prevention. This procedure calls the Miracl ver 4.82-arithmetic library.

Size：34.5K - 2012-02-18 16:23:28 - Download

MD5 encryption, decryption VC++ form instance, MD5 encryption, decryption, for a bunch of strings. Are console programs in the past, today the Winform form version, operation more convenient.

Size：385K - 2012-02-18 16:22:41 - Download

More than 200 of the more common VC++ encryption algorithm code, like DES, ASN, hex, the RSA algorithm, you can save the download on your computer first, and later might be able to use, encryption is also commonly used in a program data processing methods, usability is relatively large.

Size：12.2K - 2012-02-18 15:16:43 - Download

VC using a critical section, start a thread, a simple example, is for informational purposes only.

Size：5.75K - 2012-02-18 15:14:47 - Download

This is the VB realization using encryption software serial number validation instance, does not encrypt the serial number, of course, better reliability, the package contains two source programs, one is the registration procedure, one serial number generating program, you can learn about control. Registration procedures may have some errors, but correction should be very simple.

Size：3.05K - 2012-02-18 15:14:05 - Download

Replace password encryption technique example VB source code, depending on plaintext and key can generate the ciphertext, which is actually a special algorithm, see program would know.

Size：3.94M - 2012-02-18 15:11:50 - Download

VB anti-cracking techniques for sharing software material greatly entire, collected more than more than 20 VB programs against cracking of Photoshop and the other containing technical thinking and design documents. These materials are:

Anti-debugging EnumChildWindows enumeration;

FINDWINDOW detection form anti-debugging;

VB detection key;

VB-CRC32 verify designs;

VB-detection of the parent process;

Take the chicken-and-egg;

Give the slip-proof LOADER;

Registration key pitfall trap;

Range of locking the mouse anti-debugging;

Memory allocation debugging;

……

Anti-debugging EnumChildWindows enumeration;

FINDWINDOW detection form anti-debugging;

VB detection key;

VB-CRC32 verify designs;

VB-detection of the parent process;

Take the chicken-and-egg;

Give the slip-proof LOADER;

Registration key pitfall trap;

Range of locking the mouse anti-debugging;

Memory allocation debugging;

……

Size：17.2K - 2012-02-18 15:10:45 - Download

VB text encryption program who have a calendar, with complete source code, triple encryption, first save the password list, and then the encrypted file, there is a loss, it cannot decrypt the restored, there is a locking feature of the text box.

Note information: HS1610 is a text-encryption algorithm, author of the algorithm in the 10th month of the age of 16 were invented, named HS1610, where "HS" is "Hus Secret" meaning.

Summary note of the following principles:

Encryption:

1. words to encrypt a string, and generates words from 1 to file a unique random number;

2. rearrange string in a random sequence of order after the redaction;

3. save the ciphertext and random sequences.

Decrypt:

1. loading the random sequence and Redaction, fill good secret words several spaces;

2. secret random series of characters and spaces in place;

3. save plain text.

Note information: HS1610 is a text-encryption algorithm, author of the algorithm in the 10th month of the age of 16 were invented, named HS1610, where "HS" is "Hus Secret" meaning.

Summary note of the following principles:

Encryption:

1. words to encrypt a string, and generates words from 1 to file a unique random number;

2. rearrange string in a random sequence of order after the redaction;

3. save the ciphertext and random sequences.

Decrypt:

1. loading the random sequence and Redaction, fill good secret words several spaces;

2. secret random series of characters and spaces in place;

3. save plain text.

Size：7.10K - 2012-02-18 15:09:19 - Download

A fast VB MD5 encryption classes (IcyMD5), comes with a sample file, examples like some of the problems, but of the MD5 class is easy to use, many VB friends reflect such encryption of very fast, calling convenience, may as well try.

Size：16.5K - 2012-02-18 15:07:29 - Download

This VB Visual operations SINE 256 encryption algorithm used in example source program, seemingly very powerful encryption features, of course, you can decrypt. To encrypt the text, character, or on the specified file, decrypt, display processing time, and graphs, graphs to show us the position of encrypted character, operational view above, actually when we don't, this procedure is only to demonstrate the encryption features.

Size：88.0K - 2012-02-18 15:03:29 - Download

This small tools don't look at compact, function also really more, with VB written of, it can completed file encryption, and decrypt, and file merged, and batch heavy named, and file segmentation, and file comparison,, will many function collection in together completed of multifunctional file operation small tools, file encryption min General encryption and senior encryption, compiled Shi if folder within has engineering file, best also manually compiled generated about, so as not to main program in calls Shi errors.

Size：11.8K - 2012-02-18 15:01:07 - Download

A simple VB encryption, decryption program, plus, decryption is the main object of text, or characters, good effect of encryption, high speed, high security and easy to use and easy to learn and code, the program also uses a XP progress bar control styles, VB newbie friends can also look at the progress bar to use. Program really good, running on effects such as a diagram.

Size：45.8K - 2012-02-18 14:57:02 - Download

Collection and arrangement of some of the more classic VB example encryption and decryption algorithms, nearly 10 kinds of algorithms into one program demonstrates, you can choose any encryption testing algorithms for encryption, and finally compare the generated files have different, these algorithms are: Blowfish and the CryptAPI and the Data Encryption Standard, and Simple XOR, and Gost, RC4, Skipjack, and Twofish, and so on.

Size：12.9K - 2012-02-18 14:55:30 - Download

VB on-screen keyboard component that can encrypt and decrypt, character from the surface and are not encrypted, but the program in operation it was encrypted, written by a foreign friend, the interface is part of Han.

Size：3.50K - 2012-02-18 14:53:44 - Download

A personality Txt text encryption algorithm, the original file once encryption allows for encryption if encryption is to decrypt it again, double encryption decryption, interesting, and the reverse decrypting is a bit different, I hope you view the source code, check that out.

Size：3.08K - 2012-02-18 14:43:58 - Download

VB simple string encryption decipher script source code really simple encryption applet, echoing encryption after redaction, while supporting the reverse decrypting, the program can be extended, this program looks at only the core encryption and decryption functionality, more himself found perfection.

Size：1.08M - 2012-02-18 14:39:10 - Download

Instances of VB to generate the registration code, this program uses a DLL in a package, which is specialized to generate the registration code has been prepared, the name is HardwareID.dll, by suit, and computer hardware ID and program ID to generate the registration code, the security level increases, others felt not so easy.

Size：6.37K - 2012-02-18 14:22:11 - Download

New QQ password encryption function modules, the modules in addition to MD5 encrypted portion is found on the Internet and the rest are done I independent. Actually also is simple, is MD5+BASE64, to asked 16 also is 32 of MD5, actually is 32 of, just encryption Hou of 32 bit long of string to to he as another string of HEX, then will that string with BASE64 coding Xia, key is VB in that string will display for "???", is garbled, please don't everywhere shouting what MD5 and BASE64 are is open of algorithm, If you casually find an MD5 module from the Web and the BASE64 module together can complete features of this module, then please continue with sth

Size：3.10K - 2012-02-18 14:07:02 - Download

VB redaction, string encryption, decrypt of examples, will a string became key text, haha, by must of rules transform string, became does not awareness of format, as Shang figure by as shown in of "key text" box within is has was plus had key of text has, became full not recognition has, course, after decrypt restored Hou on can see understand has, string encryption General with in security requirements higher of occasions.

Size：2.76KB - 2012-02-18 14:03:19 - Download

VB string encryption and decryption, simple, code is simple, easy to learn, enter the string to encrypt, click on the "encrypt", or you can click on the "decrypt" restored. Last screen of the Qing dynasty.

Size：53.76KB - 2012-02-18 14:02:34 - Download

ADSL broadband password cracking VB language, after I test, correctly guess solution broadband password! But please try not to indiscriminately use, will eventually be found, is mainly to introduce you a crack method, some VB programming skills.

Usage:

Click "get account" or enter it yourself a broadband account.

Click "Browse" to select a dictionary file (TXT). Then click "load" files added to this list. Dictionary file (. txt) of absolute paths.

Click "start"!

Note: XP.res in this project can be compiled directly into the other projects to make it with XP style

Note that adding resource files to both add a module, set the project from the Sub Main () started, otherwise no initialization process

InitCommonControls function exists in Comctl32.dll (version 5), deprecated, and you want to use the InitCommonControlsEx

Usage:

Click "get account" or enter it yourself a broadband account.

Click "Browse" to select a dictionary file (TXT). Then click "load" files added to this list. Dictionary file (. txt) of absolute paths.

Click "start"!

Note: XP.res in this project can be compiled directly into the other projects to make it with XP style

Note that adding resource files to both add a module, set the project from the Sub Main () started, otherwise no initialization process

InitCommonControls function exists in Comctl32.dll (version 5), deprecated, and you want to use the InitCommonControlsEx

Size：68.67KB - 2012-02-18 14:01:37 - Download

VB source code demo AES encryption algorithm, involve encryption algorithms and file encryption, decryption, application can be on many occasions, this encryption program can encrypt the characters and the encrypting file, of course, can be decrypted, the AES algorithm is of course quite reference significance.

Size：47.49KB - 2011-12-31 10:18:43 - Download

This program is used to login from the command line QQ, you can prevent your QQ landing was stolen QQ numbers software intercepts the password, which can play a security role to a certain extent. Run the screenshot above shows.

Program encryption module is also very simple, is to use the MD5+BASE64 to ask 16 or 32 of the MD5 are actually 32, only 32 bit length of the encrypted string to HEX him as another string, and then under the string using BASE64 encoding, VB is the key in the string is displayed as "???" is garbled.

Program encryption module is also very simple, is to use the MD5+BASE64 to ask 16 or 32 of the MD5 are actually 32, only 32 bit length of the encrypted string to HEX him as another string, and then under the string using BASE64 encoding, VB is the key in the string is displayed as "???" is garbled.

Size：387.39KB - 2011-12-28 09:37:10 - Download

After optimization VC++ encrypted registration module, directly compile the generated DLL file, accompanied by an encryption example, want to help you.

Size：679.33KB - 2011-12-28 09:36:19 - Download

A program that can VC++ source code encryption, (UPS), at the same time compressed, this has the advantage of securing your VC source code from leakage, improve security.

Size：45.96KB - 2011-12-22 10:06:07 - Download

A Pocket VC++ encryption software, also can decrypt encrypted files very large, almost all of the files can be encrypted, enter the password and decrypts, seems to not really encrypted, just encrypt file additional encryption method, and program earlier, still compile was successful.

Size：33.02KB - 2011-12-16 21:58:23 - Download

VB programs that encrypt the text stored in the pictures, it's quite a nice, it can encrypt a piece of text or a text or a picture, and then stored in a picture file, and can be decrypted, can be used to protect your important copyright text or pictures.

Size：6.27KB - 2011-12-13 14:12:50 - Download

Using VB to simulate data coding technology demonstration program, enter a binary data, it will be simulated data to zero, does not return to zero I, pseudo Ternary, Manchester, bipolar alternate mark inversion, differential Manchester compression technique.

Size：184.53KB - 2011-12-13 09:24:26 - Download

Written in VB EXE file decompiling tool, this tool can see EXE internal functions, programs, code, and so on, for learning to program go a long way.

Size：11.98KB - 2011-12-07 12:05:43 - Download

This program is very good, according to user's computer hardware (hard) serial number produces a unique software registration codes, fear no more worry about your software is cracked. And the registration code for secondary processing, such as the registration code will be generated according to the letters inverted, line swap, digital Exchange, separation and deformation, culminate in a formal registration code.

Size：592.2KB - 2011-12-07 08:06:15 - Download

After optimization VC++ algorithm for encryption and decryption, generate encrypted class file, and then you can call, as early as two years of the code, but still very useful now.

Size：7.48KB - 2011-12-06 13:20:33 - Download

VB programming crack Access database password, the program is the use of Brute force attack to crack, relatively easy to use, are interested give it a try.

Size：3.33KB - 2011-12-06 12:21:28 - Download

VB source code of the simple realization of lock folder, lock, unlock folders can be achieved. But still some imperfections, for example, if you lock the folder does not exist, the program also no eject prompt, you need this on the basis of perfect.

Size：6.97KB - 2011-12-05 11:41:39 - Download

VC++ RAS encryption, decryption algorithm examples, basic ideas, generate console Windows, allow you to view the results. Program features small, may not be able to meet your use, but importantly share an encryption, decryption of thought.

Size：14.72KB - 2011-12-04 13:50:20 - Download

C# digital encryption sample program, enter the number in the box, will be replaced by other characters, these characters are relatively unique, learning algorithm friend can see C# Starter Kits will be helpful.

Size：4.74KB - 2011-12-02 12:13:47 - Download

Software to generate the registration code program, in other different is that it locks the user's hardware, which is for the user's hardware generates a unique registration code, can effectively protect your software theft. Can be reference.

Size：73.16KB - 2011-11-28 10:44:44 - Download

VC++ using XOR 256 added to text or file encryption and decryption algorithms, decrypt, an early when the encryption algorithm, but it's very useful, has collected an instance hopes to program VC++ CAD. It is mainly text document to hexadecimal, or file encryption and decryption.

Size：16.77KB - 2011-11-27 02:12:32 - Download

Do not place for wounding your learning, learning a decrypted, this tool is written in VB, crack ACCESS database password only, but also get the version number of the database.

Size：7.32KB - 2011-11-26 16:56:50 - Download

File encryption using XOR encrypted, it can be any file (TXT text files, OFFICE files, EXE, etc), file with the software is not running, and opening is garbled. Is to decrypt the encrypted file back encrypted again (the same), you can complete the decryption.

Size：190.28KB - 2011-11-23 16:51:41 - Download

There are many, generally, there are 21 species of encryption/decryption algorithm source code, and more than 50 various compression/decompression algorithm source code files should be of great help to you, you can select.

Size：108.85KB - 2011-11-23 09:41:43 - Download

Powerful C# example text file encryption and decryption algorithm, used to control, but still useful, after all, a lot of things.

Size：3.06KB - 2011-11-19 21:23:50 - Download

USB flash drive encryption, VB implementation. Effectively preventing virus intrusions, need to use this tool to decrypt to use USB flash drive after encryption. For learning purposes only, please use.

Size：29.19KB - 2011-11-18 08:22:44 - Download

Strong JAVA encryption, decryption algorithm source code, a total of 6 algorithms to choose from, you can also generate ZIP compressed files directly.

Size：42.83KB - 2011-11-11 13:09:59 - Download

WDSsoft a free source code JCT 1, it is a Java encryption and decryption tools package.

Size：41.08KB - 2011-11-09 13:02:56 - Download

This causes are more common C# encryption and decryption class, including RSA,DES,MD5,RC2, and so on, must be able to use after collection.

Size：8.2MB - 2011-11-04 17:28:47 - Download

This compressed package containing cast, Blowfish, simple, des, and Cryptlib, and RSA, and mqueue, and xtrcrypt, gf256, Base32,base64, modexppc, network and some of the common algorithm for encryption, decryption, very full collection of algorithms, source code enthusiasts generally looked, more than 130, all can be compiled by, but also contains the e text of document development, Study on learning algorithm can not miss.

Size：7.73KB - 2011-11-03 15:52:48 - Download

Are actually make your thumb drive bootable file batch rename, so that even if u had poisoned, but because the file suffix changed, so as to avoid the infection.

Size：237.18KB - 2011-11-01 14:32:28 - Download

C preparation of DES, DESX, DES3 encryption algorithm used, and shows how to call c written in Delphi encryption and decryption algorithms.