Codes and reports for BUAA Cryptography Experiment in 2022 Spring.
- Most programs are written in Python, other programs are written in C due to efficiency issues.
- Due to the introduction of OJ Platform from 2022 Spring, the code has input and output requirements, and the course is more standardized.
- On the names of dictionaries and files
- ex# stands for experiment #
- c# stands for question # of the experiment, and it is compulsory
- op# stands for question # of the experiment, and it is optional
- s# stands for step # of a problem
- Learning and improving are encouraged, but DO NOT COPY COMPLETELY !
File name clearly shows what file contains.
Followings are directions of some special files.
-
ex2/op10
-
ex3/des
-
ex3/op3
-
ex5
- ex5/related - to answer the thinking questions
- figures includes encrypted figures by the work mode of cbc & ecb
- time_record - record times in sm4
- print_2_excel - print record to excel
- more information can be found in report.
-
ex9/op5
-
callgraph - generate function call graph, see the program for usage examples.
- Reports for each experiment.
- Composed by Microsoft Office (Word & PowerPoint, with AxMath plugin).
- Simplified Chinese only.
- Thanks to the guidance from teachers and assistants in Mathematical Fundamentals of Information Security.
- Thanks to the guidance from teachers and assistants in Cryptography and Cryptography Experiments.
- Thanks to the sharings from Zheng Yaowei, Fu Yunhao, Huang Xiang.
- Thanks to the help of Cui Shibo.