c#下的多种字符串加密解密算法

上传者: wanhello | 上传时间: 2020-01-03 11:38:59 | 文件大小: 117KB | 文件类型: zip
3DES,BlowFish,DES,MD5,RC2,Rijndael,SHA,SHA256,SHA384,SHA512,TwoFish。够多的了,其中几种是变型的加解密。适合字符串变换,整体加密,而不是常用的那种修改原文个别字符就能看到密文相应位置的变化。

文件下载

资源详情

[{"title":"( 42 个子文件 117KB ) c#下的多种字符串加密解密算法","children":[{"title":"XCrypt","children":[{"title":"Twofish.cs <span style='color:#111;'> 3.55KB </span>","children":null,"spread":false},{"title":"XCryptSetup","children":[{"title":"XCryptSetup.vdproj <span style='color:#111;'> 29.92KB </span>","children":null,"spread":false},{"title":"Debug","children":null,"spread":false},{"title":"Release","children":null,"spread":false}],"spread":true},{"title":"XCrypt.csproj.user <span style='color:#111;'> 1.73KB </span>","children":null,"spread":false},{"title":"bin","children":[{"title":"Debug","children":null,"spread":false}],"spread":true},{"title":"obj","children":[{"title":"Debug","children":[{"title":"temp","children":null,"spread":false},{"title":"TempPE","children":null,"spread":false}],"spread":true}],"spread":true},{"title":"TwofishEncryption.cs <span style='color:#111;'> 3.77KB </span>","children":null,"spread":false},{"title":"TwofishBase.cs <span style='color:#111;'> 21.74KB </span>","children":null,"spread":false},{"title":"README.doc <span style='color:#111;'> 28.00KB </span>","children":null,"spread":false},{"title":"Blowfish.cs <span style='color:#111;'> 16.62KB </span>","children":null,"spread":false},{"title":"xcrypt.cs <span style='color:#111;'> 13.44KB </span>","children":null,"spread":false},{"title":"twofish","children":[{"title":"Twofish.cs <span style='color:#111;'> 3.56KB </span>","children":null,"spread":false},{"title":"TwofishEncryption.cs <span style='color:#111;'> 4.21KB </span>","children":null,"spread":false},{"title":"TwofishBase.cs <span style='color:#111;'> 21.75KB </span>","children":null,"spread":false}],"spread":true},{"title":"blowfish","children":[{"title":"BlowfishTest","children":[{"title":"BlowfishTest.csproj <span style='color:#111;'> 4.29KB </span>","children":null,"spread":false},{"title":"BlowfishTest.csproj.user <span style='color:#111;'> 1.73KB </span>","children":null,"spread":false},{"title":"bin","children":[{"title":"Debug","children":null,"spread":false}],"spread":false},{"title":"obj","children":[{"title":"Debug","children":[{"title":"temp","children":null,"spread":false},{"title":"TempPE","children":null,"spread":false}],"spread":false}],"spread":false},{"title":"BlowfishTest.sln <span style='color:#111;'> 920B </span>","children":null,"spread":false}],"spread":true},{"title":"CHANGES.TXT <span style='color:#111;'> 3.18KB </span>","children":null,"spread":false},{"title":"Blowfish.cs <span style='color:#111;'> 16.62KB </span>","children":null,"spread":false},{"title":"BlowfishAlgorithmTest.cs <span style='color:#111;'> 3.65KB </span>","children":null,"spread":false},{"title":"BlowfishTest.cs <span style='color:#111;'> 7.27KB </span>","children":null,"spread":false},{"title":"BlowfishTables.cs <span style='color:#111;'> 15.15KB </span>","children":null,"spread":false},{"title":"BlowfishAlgorithm.cs <span style='color:#111;'> 8.45KB </span>","children":null,"spread":false},{"title":"BlowfishAlgorithmTest","children":[{"title":"BlowfishAlgorithmTest.sln <span style='color:#111;'> 938B </span>","children":null,"spread":false},{"title":"bin","children":[{"title":"Debug","children":[{"title":"BlowfishAlgorithmTest.exe <span style='color:#111;'> 28.00KB </span>","children":null,"spread":false}],"spread":false}],"spread":false},{"title":"obj","children":[{"title":"Debug","children":[{"title":"temp","children":null,"spread":false},{"title":"TempPE","children":null,"spread":false}],"spread":false}],"spread":false},{"title":"BlowfishAlgorithmTest.csproj.user <span style='color:#111;'> 1.73KB </span>","children":null,"spread":false},{"title":"BlowfishAlgorithmTest.csproj <span style='color:#111;'> 4.33KB </span>","children":null,"spread":false}],"spread":false},{"title":"BlowfishSimple.cs <span style='color:#111;'> 7.67KB </span>","children":null,"spread":false},{"title":"README.TXT <span style='color:#111;'> 919B </span>","children":null,"spread":false},{"title":"BlowfishCBC.cs <span style='color:#111;'> 3.76KB </span>","children":null,"spread":false}],"spread":false},{"title":"XCrypt.sln <span style='color:#111;'> 1.60KB </span>","children":null,"spread":false},{"title":"BlowfishTables.cs <span style='color:#111;'> 15.15KB </span>","children":null,"spread":false},{"title":"XCrypt.csproj <span style='color:#111;'> 4.46KB </span>","children":null,"spread":false},{"title":"BlowfishAlgorithm.cs <span style='color:#111;'> 8.45KB </span>","children":null,"spread":false},{"title":"XCryptTest","children":[{"title":"bin","children":[{"title":"Debug","children":[{"title":"XCrypt.dll <span style='color:#111;'> 40.00KB </span>","children":null,"spread":false},{"title":"XCryptTest.exe <span style='color:#111;'> 20.00KB </span>","children":null,"spread":false}],"spread":false}],"spread":false},{"title":"obj","children":[{"title":"Debug","children":[{"title":"temp","children":null,"spread":false},{"title":"TempPE","children":null,"spread":false}],"spread":false}],"spread":false},{"title":"frmMain.cs <span style='color:#111;'> 10.19KB </span>","children":null,"spread":false},{"title":"XCryptTest.sln <span style='color:#111;'> 916B </span>","children":null,"spread":false},{"title":"App.ico <span style='color:#111;'> 1.05KB </span>","children":null,"spread":false},{"title":"frmMain.resx <span style='color:#111;'> 5.19KB </span>","children":null,"spread":false},{"title":"XCryptTest.csproj <span style='color:#111;'> 4.46KB </span>","children":null,"spread":false},{"title":"XCryptTest.csproj.user <span style='color:#111;'> 1.79KB </span>","children":null,"spread":false},{"title":"AssemblyInfo.cs <span style='color:#111;'> 2.37KB </span>","children":null,"spread":false}],"spread":false},{"title":"AssemblyInfo.cs <span style='color:#111;'> 2.37KB </span>","children":null,"spread":false},{"title":"BlowfishCBC.cs <span style='color:#111;'> 3.76KB </span>","children":null,"spread":false}],"spread":false}],"spread":true}]

评论信息

  • treeMountain :
    程序可以用,用于学习非常不错,注释完善.
    2014-08-04
  • FlyTiger156 :
    程序可用,加密类型包括的挺多,学习的好东东。
    2014-05-30
  • fengtao6352 :
    好东西 很实用
    2013-12-05
  • NetSky2010 :
    是很多,也算比较全
    2013-08-19
  • wangyifeng123 :
    初学,有用,很好
    2013-06-07

免责申明

【只为小站】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【只为小站】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【只为小站】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,zhiweidada#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明