2021SC@SDUSC openssl hash table
2021SC@SDUSC 4 hash table
man lhash
4.1 hash table
In general data structures such as linear tables and trees, there is no definite relationship between the relative position of records in the structure and the keywords of records, A series of keyword comparisons are needed to find records in the structure This kind of search method is based ...
Added by eheia on Sun, 05 Dec 2021 02:56:13 +0200
Password cracking and HASH computing
Password cracking
1. Introduction to password cracking
·Manual guessing
Trash can project, passive information collection
·Dictionary based brute force cracking (mainstream)
·Keyboard space character explosion
·Dictionary
Text file with user name and password (kali's own dictionary)
-/usr/share/wordlist
-/us ...
Added by sager29 on Sat, 20 Nov 2021 20:19:24 +0200
Usage of AES encryption in OpenSSL
1 Introduction to AES algorithm
Original link: https://blog.csdn.net/mao834099514/article/details/54945776
1.1 introduction to AES algorithm
Advanced Encryption Standard (AES) in cryptography, also known as Rijndael encryption method, is a block encryption standard adopted by the federal government of the United States. This standard is ...
Added by Glen on Sat, 13 Nov 2021 05:01:16 +0200
Implementation and cracking of classical encryption algorithm & large prime generation algorithm
0x00 Preface
Information system security experiment
Experiment 1: implementation and cracking of classical encryption algorithm
1. Realize Caesar encryption and brute force cracking Caesar encryption 2. Select k value and compile Caesar encryption algorithm 3. Write an algorithm to try to brutally crack Caesar encryption
Experiment 2: large ...
Added by benphp on Sat, 16 Oct 2021 09:29:13 +0300
Cryptography Series: bcrypt Encryption Algorithms Detailed
brief introduction
One of the cryptographic algorithms that we will introduce today is bcrypt, a cryptographic hash function designed by Niels Provos and David Mazi res, which was based on the Blowfish password and was introduced at USENIX in 1999.
In addition to adding salt to protect against rainbow table attacks, one of the most import ...
Added by flashmonkey on Sat, 18 Sep 2021 00:13:36 +0300
[Huawei machine test of Niuke network] HJ28 prime partner
subject
describe
Title Description If the sum of two positive integers is prime, the two positive integers are called "prime partners", such as 2 and 5, 6 and 13, which can be applied to communication encryption. Now the society of cryptography asks you to design a program to select several pairs from the existing N (N is an even nu ...
Added by wdseelig on Mon, 06 Sep 2021 02:37:37 +0300