2021SC@SDUSC openssl hash table

2021SC@SDUSC 4 hash table man lhash 4.1 hash table In general data structures such as linear tables and trees, there is no definite relationship between the relative position of records in the structure and the keywords of records, A series of keyword comparisons are needed to find records in the structure This kind of search method is based ...

Added by eheia on Sun, 05 Dec 2021 02:56:13 +0200

Password cracking and HASH computing

Password cracking 1. Introduction to password cracking ·Manual guessing Trash can project, passive information collection ·Dictionary based brute force cracking (mainstream) ·Keyboard space character explosion ·Dictionary Text file with user name and password (kali's own dictionary) -/usr/share/wordlist -/us ...

Added by sager29 on Sat, 20 Nov 2021 20:19:24 +0200

Usage of AES encryption in OpenSSL

1 Introduction to AES algorithm Original link: https://blog.csdn.net/mao834099514/article/details/54945776 1.1 introduction to AES algorithm Advanced Encryption Standard (AES) in cryptography, also known as Rijndael encryption method, is a block encryption standard adopted by the federal government of the United States. This standard is ...

Added by Glen on Sat, 13 Nov 2021 05:01:16 +0200

Implementation and cracking of classical encryption algorithm & large prime generation algorithm

0x00 Preface Information system security experiment Experiment 1: implementation and cracking of classical encryption algorithm 1. Realize Caesar encryption and brute force cracking Caesar encryption 2. Select k value and compile Caesar encryption algorithm 3. Write an algorithm to try to brutally crack Caesar encryption Experiment 2: large ...

Added by benphp on Sat, 16 Oct 2021 09:29:13 +0300

Cryptography Series: bcrypt Encryption Algorithms Detailed

brief introduction One of the cryptographic algorithms that we will introduce today is bcrypt, a cryptographic hash function designed by Niels Provos and David Mazi res, which was based on the Blowfish password and was introduced at USENIX in 1999. In addition to adding salt to protect against rainbow table attacks, one of the most import ...

Added by flashmonkey on Sat, 18 Sep 2021 00:13:36 +0300

[Huawei machine test of Niuke network] HJ28 prime partner

subject describe Title Description If the sum of two positive integers is prime, the two positive integers are called "prime partners", such as 2 and 5, 6 and 13, which can be applied to communication encryption. Now the society of cryptography asks you to design a program to select several pairs from the existing N (N is an even nu ...

Added by wdseelig on Mon, 06 Sep 2021 02:37:37 +0300