Windows NT KAMIDAKI 10.0 build 19045 (Windows 10) AMD64
Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.3.9
Server IP : 192.168.3.16 & Your IP : 216.73.216.204
Domains :
Cant Read [ /etc/named.conf ]
User : SISTEMA
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
C: /
xampp /
perl /
vendor /
lib /
Crypt /
Delete
Unzip
Name
Size
Permission
Date
Action
AuthEnc
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
CAST5_PP
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
Checksum
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
Cipher
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
DSA
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
Digest
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
Mac
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
Mode
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
OpenPGP
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
OpenSSL
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
PK
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
PRNG
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
RIPEMD160
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
RSA
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
Random
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
SSLeay
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
Stream
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
AuthEnc.pm
152
B
-rw-rw-rw-
2020-08-25 11:02
Blowfish.pm
4.66
KB
-rw-rw-rw-
2013-07-24 00:48
CAST5_PP.pm
8.57
KB
-rw-rw-rw-
2006-07-01 20:57
CBC.pm
36.75
KB
-rw-rw-rw-
2013-07-31 00:01
Checksum.pm
2.2
KB
-rw-rw-rw-
2020-08-25 11:02
Cipher.pm
4.09
KB
-rw-rw-rw-
2020-08-25 11:02
DES.pm
3.43
KB
-rw-rw-rw-
2013-07-24 00:41
DES_EDE3.pm
2.68
KB
-rw-rw-rw-
2001-09-15 07:41
DSA.pm
6.82
KB
-rw-rw-rw-
2011-06-17 05:46
Digest.pm
9.12
KB
-rw-rw-rw-
2020-08-25 11:02
IDEA.pm
1.31
KB
-rw-rw-rw-
2013-07-24 00:46
IDEA.pod
1.83
KB
-rw-rw-rw-
2005-12-08 19:38
KeyDerivation.pm
3.65
KB
-rw-rw-rw-
2020-08-25 11:02
Mac.pm
711
B
-rw-rw-rw-
2020-08-25 11:02
Misc.pm
14.59
KB
-rw-rw-rw-
2020-08-25 11:02
Mode.pm
146
B
-rw-rw-rw-
2020-08-25 11:02
OpenPGP.pm
58.89
KB
-rw-rw-rw-
2015-08-16 15:28
PK.pm
505
B
-rw-rw-rw-
2020-08-25 11:02
PRNG.pm
6.49
KB
-rw-rw-rw-
2020-08-25 11:02
RC4.pm
4.78
KB
-rw-rw-rw-
2001-12-13 23:41
RC6.pm
1.37
KB
-rw-rw-rw-
2002-03-17 00:50
RIPEMD160.pm
7.24
KB
-rw-rw-rw-
2020-10-22 03:06
RSA.pm
17.05
KB
-rw-rw-rw-
2017-04-27 01:10
Rijndael.pm
3.06
KB
-rw-rw-rw-
2020-10-10 23:28
SSLeay.pm
17.11
KB
-rw-rw-rw-
2014-04-24 19:39
Serpent.pm
2.15
KB
-rw-rw-rw-
2002-03-30 19:05
Twofish.pm
3.29
KB
-rw-rw-rw-
2020-11-25 06:49
Save
Rename
=head1 NAME IDEA - Perl interface to IDEA block cipher =head1 SYNOPSIS use Crypt::IDEA; =head1 DESCRIPTION This perl extension is an implementation of the IDEA block cipher algorithm. The module implements the Crypt::BlockCipher interface, which has the following methods =over 4 =item blocksize =item keysize =item encrypt =item decrypt =back =head1 FUNCTIONS =over 4 =item blocksize Returns the size (in bytes) of the block cipher. =item keysize Returns the size (in bytes) of the key. =item new my $cipher = new IDEA $key; This creates a new IDEA BlockCipher object, using $key, where $key is a key of C<keysize()> bytes. =item encrypt my $cipher = new IDEA $key; my $ciphertext = $cipher->encrypt($plaintext); This function encrypts $plaintext and returns the $ciphertext where $plaintext and $ciphertext should be of C<blocksize()> bytes. =item decrypt my $cipher = new IDEA $key; my $plaintext = $cipher->decrypt($ciphertext); This function decrypts $ciphertext and returns the $plaintext where $plaintext and $ciphertext should be of C<blocksize()> bytes. =back =head1 EXAMPLE my $key = pack("H32", "0123456789ABCDEF0123456789ABCDEF"); my $cipher = new IDEA $key; my $ciphertext = $cipher->encrypt("plaintex"); # NB - 8 bytes print unpack("H16", $ciphertext), "\n"; =head1 SEE ALSO Crypt::CBD, Crypt::DES, Crypt::Blowfish Bruce Schneier, I<Applied Cryptography>, 1995, Second Edition, published by John Wiley & Sons, Inc. =head1 COPYRIGHT This implementation is copyright Systemics Ltd ( http://www.systemics.com/ ). The IDEA algorithm is patented in Europe and the United States by Ascom-Tech AG. Module altered between 1999 and 2005 to allow added functionality with perl -MCPAN, Changes by Dave Paris (edited lib paths, endian issues, new tests). Thank you to contributors for endian patches and new test suite!