This a linux device driver for Ralink RT2500USB b/g WLAN Card.
This driver implements basic 802.11 function.
Infrastructure and Ad-hoc mode with open or shared or wpapsk or wpa2psk authentication method.
WEP-40 and WEP-104 or tkip or aes ENCRYption.
This file contains a C++Builder 4 project called SimplyChaos-X ver 3.1 (SCX31).
SCX31 is an ENCRYption tool. I designed it as my graduation paper work. SCX31 is a symmetric stream cipher built on chaos function, one time pad cipher and inspiration from Ground Effect (aviation). The key length can be up to 40 characters (320 bits).
It is an experimental testing for python M2Crypto module. M2Crypto is not well document. User may not know how to use SHA256 when signing and verify with RSA. It also have not enough document to show how to use DES to encrypt and decrypt. Here also includes source codes for performance evaluation of the algorithms. This experimental program explore all this issue and may be helpful for some one who using python for doing ENCRYption with RSA and DES.
利用java實現文件的AES加密功能
This Java AES Crypt package contains the Java class es.vocali.util.AESCrypt, which provides file ENCRYption and decryption using aescrypt file format.
Requirements
The Java AES Crypt package only works in Java 6, but can be easily adapted to Java 5 by replacing the call to NetworkInterface.getHardwareAddress() with something else.
In order to use 256 bit AES keys, you must download and install "Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files" from http://java.sun.com/javase/downloads/index.jsp
xyzzy is a program for the Nintendo Wii which will read a console s OTP key storage and dump out the private ENCRYption keys to screen and to SD card. This is useful information in case your Wii ever gets bricked and you need to re-initialize the firmware.
XTHIDE is a GUI that allows the user to hide a text message in an image file.
The user will be asked for a key that will be used to both encode and decode the text into an image.
The key can be of length from 2 to 900 characters.
The ENCRYption pattern for a key hell is not a subset of the ENCRYption pattern for hello .
See help. Created with version 7.01.
This document describes the use of the CRYPTO acceleration module of the EFM32 Gemstones, including support for ECC, SHA, AES block ciphers, and authenticated ENCRYption algorithms.