WIN7及vista语言包安装工具Vistalizator
用于vista,Win7所有版本更改桌面界面,可更改中文版至诸如英文版,中文繁体版,日文版等多个国家语言版本。
http://www.technize.net/windows-7-sp1-language-packs-direct-download-links-kb2483139/
dotnet反编译reflector.zip
Reflector是一个类浏览,分析器,同时它还是一个.net源文件查看器.Reflector支持简单地浏览,定位,搜索,反编译用C#,VB和中间语言写成的编译文件(dll).
来源于:Red Gate Software
Prentice.Hall_-_Cryptography.and.Network.Security.4th.Edition.Nov.2005
Prentice.Hall_-_Cryptography.and.Network.Security.4th.Edition.Nov.2005.rar
CSS2.0帮助文档
本《协议》授予您下列权利:您可以安装、使用、访问、显示、运行本作品。您可以保留多份副本,可以自由传播本作品。
上述权利不适用于您的任何商业行为或商业用途。否则您务必与苏昱联系。
谁是苏昱?自己见文档作者介绍..
Secure Hash Standard
NIST网站:
Federal Information
Processing Standards Publication 180-2
2002 August 1
Announcing the
SECURE HASH STANDARD
Table Of Contents
1. INTRODUCTION .............................................................................................................................................................3
2. DEFINITIONS....................................................................................................................................................................4
2.1 GLOSSARY OF TERMS AND ACRONYMS....................................................................................................................4
2.2 ALGORITHM PARAMETERS, SYMBOLS, AND TERMS...............................................................................................4
2.2.1 Parameters.......................................................................................................................................................4
2.2.2 Symbols.............................................................................................................................................................5
3. NOTATION AND CONVENTIONS............................................................................................................................6
3.1 BIT STRINGS AND INTEGERS......................................................................................................................................6
3.2 OPERATIONS ON WORDS............................................................................................................................................7
4. FUNCTIONS AND CONSTANTS................................................................................................................................9
4.1 FUNCTIONS...................................................................................................................................................................9
4.1.1 SHA-1 Functions.............................................................................................................................................9
4.1.2 SHA-256 Functions........................................................................................................................................9
4.1.3 SHA-384 and SHA-512 Functions................................................................................................................9
4.2 CONSTANTS................................................................................................................................................................ 10
4.2.1 SHA-1 Constants...........................................................................................................................................10
4.2.2 SHA-256 Constants ......................................................................................................................................10
4.2.3 SHA-384 and SHA-512 Constants..............................................................................................................10
5. PREPROCESSING.........................................................................................................................................................12
5.1 PADDING THE MESSAGE ........................................................................................................................................... 12
5.1.1 SHA-1 and SHA-256.....................................................................................................................................12
5.1.2 SHA-384 and SHA-512................................................................................................................................12
5.2 PARSING THE PADDED MESSAGE ............................................................................................................................. 13
5.2.1 SHA-1 and SHA-256.....................................................................................................................................13
5.2.2 SHA-384 and SHA-512................................................................................................................................13
5.3 SETTING THE INITIAL HASH VALUE (H(0)).............................................................................................................. 13
5.3.1 SHA-1..............................................................................................................................................................13
5.3.2 SHA-256 .........................................................................................................................................................13
5.3.3 SHA-384 .........................................................................................................................................................14
5.3.4 SHA-512 .........................................................................................................................................................14
6. SECURE HASH ALGORITHMS ...............................................................................................................................15
6.1 SHA-1......................................................................................................................................................................... 15
6.1.1 SHA-1 Preprocessing...................................................................................................................................15
6.1.2 SHA-1 Hash Computation...........................................................................................................................15
6.1.3 Alternate Method for Computing a SHA-1 Message Digest...................................................................17
2
6.2 SHA-256..................................................................................................................................................................... 18
6.2.1 SHA-256 Preprocessing...............................................................................................................................19
6.2.2 SHA-256 Hash Computation.......................................................................................................................19
6.3 SHA-512..................................................................................................................................................................... 20
6.3.1 SHA-512 Preprocessing...............................................................................................................................21
6.3.2 SHA-512 Hash Computation.......................................................................................................................21
6.4 SHA-384..................................................................................................................................................................... 22
APPENDIX A: SHA-1 EXAMPLES ...................................................................................................................................25
A.1 SHA-1 EXAMPLE (ONE-BLOCK MESSAGE) ........................................................................................................... 25
A.2 SHA-1 EXAMPLE (MULTI-BLOCK MESSAGE) ....................................................................................................... 27
A.3 SHA-1 EXAMPLE (LONG MESSAGE) ....................................................................................................................... 32
APPENDIX B: SHA-256 EXAMPLES ...............................................................................................................................33
B.1 SHA-256 EXAMPLE (ONE-BLOCK MESSAGE) ....................................................................................................... 33
B.2 SHA-256 EXAMPLE (MULTI-BLOCK MESSAGE) ................................................................................................... 35
B.3 SHA-256 EXAMPLE (LONG MESSAGE)................................................................................................................... 40
APPENDIX C: SHA-512 EXAMPLES ...............................................................................................................................41
C.1 SHA-512 EXAMPLE (ONE-BLOCK MESSAGE) ....................................................................................................... 41
C.2 SHA-512 EXAMPLE (MULTI-BLOCK MESSAGE) ................................................................................................... 46
C.3 SHA-512 EXAMPLE (LONG MESSAGE)................................................................................................................... 55
APPENDIX D: SHA-384 EXAMPLES ..........................................................................................................................56
D.1 SHA-384 EXAMPLE (ONE-BLOCK MESSAGE) ....................................................................................................... 56
D.2 SHA-384 EXAMPLE (MULTI-BLOCK MESSAGE) ................................................................................................... 61
D.3 SHA-384 EXAMPLE (LONG MESSAGE)................................................................................................................... 70
APPENDIX E: REFERENCES............................................................................................................................................71