亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? index.html

?? Encryption tool for delphi 2007. Conatain: Blowfish, MD5...
?? HTML
字號:
<html>
  <head>
    <title>DCPcrypt v2: Users Guide - Index</title>
  </head>
  <body>
    <p align="center"><font size="+2"><b>DCPcrypt Cryptographic Component Library v2 Beta 3</b></font><br>
      <font size="+1">Copyright &copy; 1999-2002 David Barton<br>
      <a href="http://www.cityinthesky.co.uk/">http://www.cityinthesky.co.uk/</a><br>
      <a href="mailto:crypto@cityinthesky.co.uk">crypto@cityinthesky.co.uk</a></font>
    <p><font size="+2">Introduction</font>
    <p>DCPcrypt is a collection of cryptographic components for the Borland Delphi(tm), C++ Builder(tm) and Kylix(tm) programming languages. The supported versions are Delphi 4, 5, 6 and 7, C++ Builder (3?), 4, 5, 6 and Kylix 1 (untested) and 2.
    <p>The idea behind DCPcrypt is that it should be possible to "drop in" any algorithm implementation to replace another with minimum or no code changes. To aid in this goal all cryptographic components are descended from one of several base classes, TDCP_cipher for encryption algorithms and TDCP_hash for message digest algorithms.
    <p>
    <table>
      <tr>
        <td valign="center"><a href="http://www.opensource.org/docs/definition.php"><img src="osi-certified-120x100.png" border="0"></a></td>
        <td valign="center">
          <p>DCPcrypt is open source software (released under the <a href="MIT_license.txt">MIT license</a>) and as such there is no charge for inclusion in other software. However, I am currently a student and if you are making money from my software I would really appreciate a donation of some sort, whether financial or a license for the software you develop (<em>or if anyone wants to sponsor a Mathematical Modelling (Masters) student for their final year...</em>). Please note THIS IS NOT COMPULSORY IN ANY WAY. See <a href="http://www.cityinthesky.co.uk/cryptography.html">http://www.cityinthesky.co.uk/cryptography.html</a> for details on donations.
          <p>This software is OSI Certified Open Source Software. OSI Certified is a certification mark of the <a href="http://www.opensource.org/">Open Source Initiative</a>.
          <p>If you maintain a website then a link to my page at <a href="http://www.cityinthesky.co.uk/">http://www.cityinthesky.co.uk/</a> would be great!
        </td>
      </tr>
    </table>
    <p>&nbsp;
    <p><font size="+2">What's New</font>
    <p>Changes since DCPcrypt v2 Beta 2:
    <ul>
      <li>Corrected C++ Builder compilation problem.
    </ul>
    <p>Changes since DCPcrypt v2 Beta 1:
    <ul>
      <li>Renamed source code files for hashes and ciphers to DCPxxx.pas
      <li>Change the format of Cipher.InitStr so that the hash algorithm used to generate the key is explicitly specified. In order to get the same functionality as before, use TDCP_sha1. e.g. Cipher.InitStr('Hello World',TDCP_sha1);
      <li>Block ciphers are now inherited from an intermediate component that implements the block size specific chaining mode encryption routines.
      <li>Remove the internal component registration, it was more hassle than it was worth. If there is a demand for this to be put back then I might...     
      <li>Added the full range of operation modes for Haval. By changing the defines at the top of DCPhaval.pas you can specify the number of passes and the output hash size.
      <li>Added the Tiger hash algorithm (192bit digest).
      <li>Changed the name of the file containing TDCP_ripemd160 for consistency to DCPripemd160 from DCPrmd160.
      <li>GOST no longer appears on the component palette pending verifying what the actual standard is (the code is still included however).
      <li>Added the RipeMD-128 hash algorithm (128bit digest).
      <li>Added the Serpent block cipher (AES finalist).
      <li>Added the SHA-256,384,512 hash algorithms (256, 384, 512bit digest respectively).
      <li>Added CTR chaining mode to all block ciphers.
    </ul>
    <p>&nbsp;
    <p><font size="+2">Installation</font>
    <p>
    <table>
      <tr>
        <td width="120">Delphi</td>
        <td>Open the appropriate package, DCPdelphiX.dpk where X is your version of Delphi (either 4, 5 or 6). Then press the install button.</td>
      </tr>
      <tr>
        <td width="120">C++ Builder</td>
        <td>Create a new design time package and add all the .pas files from the DCPcrypt2.zip archive including all those in the Ciphers and Hashes subdirectories. Then press the install button.</td>
      </tr>
      <tr>
        <td width="120">Kylix</td>
        <td>Open the DCPkylix.dpk package and then press the install button (note: Kylix 1 users may need to create a new package as with C++ Builder as this is a Kylix 2 package).</td>
      </tr>
    <table>
    <p>You may need to add the directory containing DCPcrypt (and the Ciphers and Hashes subdirectories) to your library search path (found under Environment Options).
    <p>Once installed you will find two extra pages of components on your component palette, namely DCPciphers and DCPhashes. You can now place these components onto the form of your application to start using the algorithms.
    <p>&nbsp;
    <p><font size="+2">Usage</font>
    <p>Please note that an appreciation of the basic principles of encryption/decryption and key management is needed to ensure the correct usage of the ciphers implemented within this package. A good introduction on this subject is provided by Bruce Schneier's "Applied Cryptography" (ISBN: 0-471-11709-9) also see the NIST publication SP800-38A for information on the block cipher chaining modes.
    <ul>
      <li><a href="Ciphers.html">Ciphers</a> - the basic building block of DCPcrypt, the TDCP_cipher component.
      <li><a href="BlockCiphers.html">Block Ciphers</a> - the base of all block ciphers, the TDCP_blockcipher component.
      <li><a href="Hashes.html">Hashes</a> - the base of all hash algorithms, the TDCP_hash component.
    </ul>
    <p>DCPcrypt v2 contains the following ciphers and hash algorithms:
    <p>
    <table bgcolor="#FFFFCC" align="center">
      <tr>
        <td colspan="4" align="center"><font size="+1"><b>Ciphers</b></font></td>
      </tr>
      <tr>
        <td><b>Name</b></td>
        <td><b>Patents</b></td>
        <td><b>Block Size</b></td>
        <td><b>Max Key Size*</b></td>
      </tr>
      <tr>
        <td>Blowfish</td>
        <td>None</td>
        <td>64 bits</td>
        <td>448 bits</td>
      </tr>
      <tr>
        <td>Cast-128</td>
        <td>None</td>
        <td>64 bits</td>
        <td>128 bits</td>
      </tr>
      <tr>
        <td>Cast-256</td>
        <td>Patented?</td>
        <td>128 bits</td>
        <td>256 bits</td>
      </tr>
      <tr>
        <td>DES</td>
        <td>None</td>
        <td>64 bits**</td>
        <td>64 bits</td>
      </tr>
      <tr>
        <td>3DES</td>
        <td>None</td>
        <td>64 bits</td>
        <td>192 bits</td>
      </tr>
      <tr>
        <td>Ice</td>
        <td>None?</td>
        <td>64 bits</td>
        <td>64 bits</td>
      </tr>
      <tr>
        <td>Thin Ice</td>
        <td>None?</td>
        <td>64 bits</td>
        <td>64 bits</td>
      </tr>
      <tr>
        <td>Ice 2</td>
        <td>None?</td>
        <td>64 bits</td>
        <td>128 bits</td>
      </tr>
      <tr>
        <td>IDEA</td>
        <td>Free for non-commercial use</td>
        <td>64 bits</td>
        <td>128 bits</td>
      </tr>
      <tr>
        <td>MARS</td>
        <td>Patented?</td>
        <td>128 bits</td>
        <td>1248 bits</td>
      </tr>
      <tr>
        <td>Misty1</td>
        <td>Free for non-commercial use</td>
        <td>64 bits</td>
        <td>128 bits</td>
      </tr>
      <tr>
        <td>RC2</td>
        <td>None</td>
        <td>64 bits</td>
        <td>1024 bits</td>
      </tr>
      <tr>
        <td>RC4</td>
        <td>None</td>
        <td>N/A</td>
        <td>2048 bits</td>
      </tr>
      <tr>
        <td>RC5</td>
        <td>Patented</td>
        <td>64 bits</td>
        <td>2048 bits</td>
      </tr>
      <tr>
        <td>RC6</td>
        <td>Patented</td>
        <td>128 bits</td>
        <td>2048 bits</td>
      </tr>
      <tr>
        <td>Rijndael (AES)</td>
        <td>None</td>
        <td>128 bits</td>
        <td>256 bits</td>
      </tr>
      <tr>
        <td>Serpent</td>
        <td>None</td>
        <td>128 bits</td>
        <td>256 bits</td>
      </tr>
      <tr>
        <td>TEA</td>
        <td>None</td>
        <td>64 bits</td>
        <td>128 bits</td>
      </tr>
      <tr>
        <td>Twofish</td>
        <td>None</td>
        <td>128 bits</td>
        <td>256 bits</td>
      </tr>
    </table>
    <p>* although the quoted maximum key size may extremely large it doen't mean that the algorithm is secure to the same level.<br>
       ** a 64bit key is used for DES then every 8th bit is discarded (parity) so the effective size is 56 bits.
    <p>
    <table bgcolor="#FFFFCC" align="center">
      <tr>
        <td colspan="3" align="center"><font size="+1"><b>Hash Algorithms</b><font></td>
      </tr>
      <tr>
        <td><b>Name</b></td>
        <td><b>Patents</b></td>
        <td><b>Digest Size</b></td>
      </tr>
      <tr>
        <td>Haval</td>
        <td>None</td>
        <td>128, 160, 192, 224, 256 bits*</td>
      </tr>
      <tr>
        <td>MD4</td>
        <td>None</td>
        <td>128 bits</td>
      </tr>
      <tr>
        <td>MD5</td>
        <td>None</td>
        <td>128 bits</td>
      </tr>
      <tr>
        <td>RipeMD-128</td>
        <td>None</td>
        <td>128 bits</td>
      </tr>
      <tr>
        <td>RipeMD-160</td>
        <td>None</td>
        <td>160 bits</td>
      </tr>
      <tr>
        <td>SHA-1</td>
        <td>None</td>
        <td>160 bits</td>
      </tr>
      <tr>
        <td>SHA-256</td>
        <td>None</td>
        <td>256 bits</td>
      </tr>
      <tr>
        <td>SHA-384</td>
        <td>None</td>
        <td>384 bits</td>
      </tr>
      <tr>
        <td>SHA-512</td>
        <td>None</td>
        <td>512 bits</td>
      </tr>
      <tr>
        <td>Tiger</td>
        <td>None</td>
        <td>192 bits</td>
      </tr>
    </table>
    <p>* The different digest sizes of Haval can be accessed by uncommenting the $defines at the start of DCPhaval.pas.  
    <p>&nbsp;
    <p><font size="+2">Contact</font>
    <p>I appreciate knowing what DCPcrypt is being used for and also if you have any queries or bug reports please email me at <a href="mailto:crypto@cityinthesky.co.uk">crypto@cityinthesky.co.uk</a>. 
    <p>&nbsp;
    <p><em>DCPcrypt is copyrighted &copy; 1999-2003 David Barton.<br>
       All trademarks are property of their respective owners.</em>
  </body>
</html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
色中色一区二区| 亚洲影视在线观看| 久久先锋影音av| 欧美大片一区二区| 日韩视频在线一区二区| 欧美大片国产精品| 精品伦理精品一区| 久久久久久久久97黄色工厂| 91精品在线麻豆| 精品国产一区久久| 欧美国产禁国产网站cc| 亚洲人被黑人高潮完整版| 亚洲午夜免费视频| 国产在线麻豆精品观看| 蜜桃视频第一区免费观看| 国产精品一区二区久久不卡| 国产不卡视频一区| 91.com视频| 国产精品久久久久久久岛一牛影视| 亚洲男同性视频| 国内精品免费**视频| 亚洲成人av资源| 日韩成人免费电影| 99久久精品国产观看| 欧美另类z0zxhd电影| 亚洲国产精品ⅴa在线观看| 亚洲小说欧美激情另类| 国产主播一区二区| 日本久久电影网| 亚洲欧洲一区二区三区| 青娱乐精品视频| 精品视频1区2区3区| 国产日韩欧美麻豆| 极品少妇xxxx精品少妇偷拍| 欧美日韩成人综合天天影院| 国产精品久久久久久亚洲毛片 | 国产精品理论在线观看| 麻豆国产一区二区| 欧美大片在线观看一区二区| 亚洲福利视频一区二区| 欧美午夜寂寞影院| 亚洲国产精品天堂| 欧美日韩在线观看一区二区 | 91麻豆swag| 亚洲激情中文1区| 91亚洲精品久久久蜜桃| 国产精品免费aⅴ片在线观看| 国产成人亚洲综合色影视| 精品奇米国产一区二区三区| 中文字幕在线一区免费| 日韩成人av影视| 日韩免费一区二区三区在线播放| 亚洲电影一级黄| 日韩三级.com| 国产高清成人在线| 亚洲乱码日产精品bd| 欧美日韩在线播| 国产剧情在线观看一区二区| 26uuu欧美| 欧美亚洲日本国产| 久久国产人妖系列| 亚洲三级免费观看| 日韩欧美专区在线| 色婷婷久久一区二区三区麻豆| 亚洲国产aⅴ天堂久久| 精品国产乱码久久久久久免费| 成人免费视频一区二区| 婷婷激情综合网| 国产精品免费aⅴ片在线观看| 欧美另类一区二区三区| 国产精品一二三四五| 亚洲aaa精品| 亚洲图片激情小说| 国产日韩欧美高清| 精品免费一区二区三区| 91玉足脚交白嫩脚丫在线播放| 日韩av一区二| 日韩精品亚洲一区二区三区免费| 久久久美女毛片| 97久久精品人人澡人人爽| 国内成人自拍视频| 日韩黄色小视频| 亚洲国产一区二区在线播放| 国产精品网站在线观看| 久久九九99视频| 欧美v日韩v国产v| 精品国产制服丝袜高跟| 欧美videofree性高清杂交| 成人在线综合网站| 一区二区三区资源| 日韩久久一区二区| 最新高清无码专区| 亚洲精品欧美专区| 一区二区三区在线免费观看| 亚洲免费观看视频| 一区二区三区中文字幕精品精品 | 午夜国产不卡在线观看视频| 亚洲精品乱码久久久久久 | 91麻豆蜜桃一区二区三区| av福利精品导航| 色偷偷久久一区二区三区| 99re在线视频这里只有精品| 色综合久久88色综合天天免费| 91麻豆精东视频| 欧美精品一区二区三区在线播放| 国产欧美一区视频| 夜色激情一区二区| 国产综合久久久久久鬼色| 成人免费视频一区二区| 欧美乱熟臀69xxxxxx| 日本一区二区三区免费乱视频 | 处破女av一区二区| 欧美日韩国产综合视频在线观看| 久久久久久免费毛片精品| 日韩伦理av电影| 国产成人免费高清| 91精品在线观看入口| 1024国产精品| 国产成人精品影视| 日韩欧美aaaaaa| 一区二区三区在线视频观看58| 久久精品国产第一区二区三区| 91丨九色丨蝌蚪富婆spa| 欧美mv日韩mv国产网站| 午夜国产精品影院在线观看| 色婷婷久久99综合精品jk白丝| 国产精品嫩草影院com| 国产免费成人在线视频| 偷拍一区二区三区| 欧美日韩精品高清| 亚洲色图制服丝袜| 91亚洲国产成人精品一区二区三| 久久久久一区二区三区四区| 欧美日韩大陆在线| 亚洲图片一区二区| 色噜噜狠狠色综合欧洲selulu| 欧美成人精精品一区二区频| 日韩一区二区三区精品视频| 亚洲国产精品久久一线不卡| 国产+成+人+亚洲欧洲自线| 精品电影一区二区三区 | 中日韩免费视频中文字幕| 一区二区免费看| 欧美中文字幕久久| 亚洲蜜臀av乱码久久精品蜜桃| 免费成人在线观看视频| 日韩欧美国产1| 久久av资源站| 久久亚洲捆绑美女| 久久99久久精品| 欧美r级电影在线观看| 国产在线精品一区二区| 欧美精品一区二区三区高清aⅴ| 五月婷婷激情综合| 337p亚洲精品色噜噜| 国产一区视频网站| 国产精品女同一区二区三区| 99视频有精品| 免费看欧美女人艹b| 精品国产免费一区二区三区四区| 老司机精品视频一区二区三区| 国产亚洲欧美中文| 成人免费高清视频| 日韩电影免费一区| 国产精品热久久久久夜色精品三区| av资源网一区| 亚洲成人免费看| 欧美国产97人人爽人人喊| 成人av网在线| 狠狠色综合播放一区二区| 欧美一级视频精品观看| 久久精品国产99国产| 6080yy午夜一二三区久久| 国产乱子伦视频一区二区三区 | 国产午夜精品美女毛片视频| 一本色道久久综合亚洲91| 青青草成人在线观看| 亚洲综合丁香婷婷六月香| 亚洲国产精品高清| 欧美成人精品福利| 制服丝袜亚洲色图| 欧美久久一二三四区| 日韩avvvv在线播放| 亚洲午夜国产一区99re久久| 国产精品美女久久久久aⅴ国产馆 国产精品美女久久久久av爽李琼 国产精品美女久久久久高潮 | 欧美日韩精品系列| 欧美天堂亚洲电影院在线播放| 天天亚洲美女在线视频| 一区二区在线观看不卡| 国产精品国产三级国产专播品爱网| 精品国内二区三区| 日韩女同互慰一区二区| 日韩一二三四区| 久久久午夜精品理论片中文字幕| 91麻豆精品久久久久蜜臀| 欧美日韩一区三区| 日韩欧美不卡在线观看视频| 久久蜜桃香蕉精品一区二区三区| 精品成人在线观看| 日韩码欧中文字|