首页
社区
课程
招聘
[旧帖] [求助]peid kanal 结果分析 0.00雪花
发表于: 2012-11-12 14:10 1315

[旧帖] [求助]peid kanal 结果分析 0.00雪花

2012-11-12 14:10
1315
peid kanakl分析的一个程序所用的加密解密算法,怎么分析呢,后面的::0025FDE0表示什么意思?
BASE64 table :: 0025FDE0 :: 00660BE0
BASE64 table :: 0026C290 :: 0066D090
BASE64 table :: 0027DF20 :: 0067EF20
CryptGenRandom [Name] :: 0026C03C :: 0066CE3C
ECC: B-163 (NIST), hash output :: 00253B4A :: 0065494A
ECC: B-233 (NIST), hash input :: 00253DF8 :: 00654BF8
ECC: B-283 (NIST), hash input :: 00254080 :: 00654E80
ECC: B-409 (NIST), hash input :: 002542C8 :: 006550C8
ECC: B-571 (NIST), hash input :: 002545E8 :: 006553E8
ECC: c2pnb163v1 (X 9.62), "a" coef :: 002547E9 :: 006555E9
ECC: c2pnb163v2 (X 9.62), "a" coef :: 00254891 :: 00655691
ECC: c2pnb163v3 (X 9.62), "a" coef :: 00254939 :: 00655739
ECC: c2pnb208w1 (X 9.62), "b" coef :: 00254CB5 :: 00655AB5
ECC: c2pnb272w1 (X 9.62), "a" coef :: 00254FE4 :: 00655DE4
ECC: c2pnb368w1 (X 9.62), "a" coef :: 00255310 :: 00656110
ECC: c2tnb191v1 (X 9.62), "a" coef :: 00254A84 :: 00655884
ECC: c2tnb191v2 (X 9.62), "a" coef :: 00254B3C :: 0065593C
ECC: c2tnb191v3 (X 9.62), "a" coef :: 00254BF4 :: 006559F4
ECC: c2tnb239v1 (X 9.62), "a" coef :: 00254D6A :: 00655B6A
ECC: c2tnb239v2 (X 9.62), "a" coef :: 00254E42 :: 00655C42
ECC: c2tnb239v3 (X 9.62), "a" coef :: 00254F1A :: 00655D1A
ECC: c2tnb359v1 (X 9.62), "a" coef :: 002551E9 :: 00655FE9
ECC: c2tnb431r1 (X 9.62), "a" coef :: 00255446 :: 00656246
ECC: K-163 (NIST), base point x-coord :: 00253A3F :: 0065483F
ECC: K-233 (NIST), base point x-coord :: 00253D8A :: 00654B8A
ECC: K-283 (NIST), base point x-coord :: 00254004 :: 00654E04
ECC: K-409 (NIST), base point x-coord :: 0025421C :: 0065501C
ECC: K-571 (NIST), base point x-coord :: 00254500 :: 00655300
ECC: P-192 (NIST), hash input :: 002526B8 :: 006534B8
ECC: P-192 v2 (X 9.62), hash input :: 00252B38 :: 00653938
ECC: P-192 v3 (X 9.62), hash input :: 00252BF0 :: 006539F0
ECC: P-224 (NIST), hash input :: 00252770 :: 00653570
ECC: P-239 v1 (X 9.62), hash input :: 00252CA8 :: 00653AA8
ECC: P-239 v2 (X 9.62), hash input :: 00252D80 :: 00653B80
ECC: P-239 v3 (X 9.62), hash input :: 00252E58 :: 00653C58
ECC: P-256 (NIST), hash input :: 00252F30 :: 00653D30
ECC: P-384 (NIST), hash input :: 00252840 :: 00653640
ECC: P-521 (NIST), hash input :: 00252988 :: 00653788
ECC: secp112r1 (SEC2), prime modulus :: 0025302C :: 00653E2C
ECC: secp112r1 (SEC2), prime modulus :: 002530A4 :: 00653EA4
ECC: secp112r2 (SEC2), "a" coef :: 002530B2 :: 00653EB2
ECC: secp128r1 (SEC2), "b" coef :: 0025313C :: 00653F3C
ECC: secp128r2 (SEC2), "a" coef :: 002531B4 :: 00653FB4
ECC: secp160k1 (SEC2), base point x-coord :: 00253258 :: 00654058
ECC: secp160r1 (SEC2), "b" coef :: 002532E7 :: 006540E7
ECC: secp160r2 (SEC2), "b" coef :: 0025338F :: 0065418F
ECC: secp192k1 (SEC2), base point x-coord :: 00253440 :: 00654240
ECC: secp224k1 (SEC2), base point x-coord :: 002534F0 :: 006542F0
ECC: secp256k1 (SEC2), base point x-coord :: 002535B8 :: 006543B8
ECC: sect113r1 (SEC2), "a" coef :: 00253804 :: 00654604
ECC: sect113r2 (SEC2), "a" coef :: 00253884 :: 00654684
ECC: sect131r1 (SEC2), "a" coef :: 00253905 :: 00654705
ECC: sect131r2 (SEC2), "a" coef :: 00253995 :: 00654795
ECC: sect163r1 (SEC2), "a" coef :: 00253AA5 :: 006548A5
ECC: sect193r1 (SEC2), "a" coef :: 00253BDE :: 006549DE
ECC: sect193r2 (SEC2), "a" coef :: 00253C9D :: 00654A9D
ECC: sect239k1 (SEC2), base point x-coord :: 00253F2A :: 00654D2A
FORK-256 [mixing] :: 001D6FB7 :: 005D7BB7
List of primes [word] :: 002572CA :: 006580CA
MD5 :: 001C1E19 :: 005C2A19
RIJNDAEL [S-inv] [char] :: 002424F8 :: 006432F8
SHA1 [Compress] :: 001B5394 :: 005B5F94
SHA-224 [Init] :: 001D6E34 :: 005D7A34
SHA-256 [mixing] :: 00256688 :: 00657488
SHA-384 [Init] :: 001D8388 :: 005D8F88
SHA-512 [init] :: 001D8428 :: 005D9028


[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
免费 0
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回
//