DelphiEncryptionCompendium

2025-12-10 0 301

DEC – Delphi Encryption Compendium

What is DEC?

DEC is a library for Embarcadero Delphi, containing different cryptographic algorithms.
It contains algorithms for these categories:

  • Ciphers: encryption/decryption of data
  • Hashes: \”cryptographic checksums\”
  • Key derivation algorithms like Kdf1-Kdf3 and pbkdf2
  • HMAC message authentication
  • A cryptographic pseudo random number generator
  • CRCs: non cryptographic checksums based on CRC algorithms

Which Delphi versions are compatible?

The current version 6.4.1 is compatible with Delphi XE2 – Delphi 12.3 Athens.
When defining the NO_ASM define in DECOptions.inc it is compatible with all
platforms supported by Delphi! It might be compatible with FPC, but this has
not been focus and is not tested. The development branch contains a more
FPC compatible version already.

If you need support for older Delphi versions use version 5.2, which is compatible
with Delphi 7-2007 at least but lacks some hash implementations, HMAC and KDF
improvements. While V5.2 can be made compatible with newer Delphi versions with
small modifications we strongly recommend to better adapt your code to use the
current version of DEC, given all these improvements made since then.
A list of changes is available in the docs folder.

What is the current status of this project?

V6.0 was released shortly before Christmas 2020. Since then work continued
by some users supplying code, reporting bugs (regressions) along with fixes
and by adding SHA2-224, which was still missing.
Further new algorithms like SHA3 have been added meanwhile.
Details about the changes and additions in V6.4.1 can be found in the
VersionHistory.pdf file in the docs subfolder of the development branch.

In comparison to 5.2 we added some console, VCL and FMX based demo applications.
The FMX based demos are even available via Google play as \”DEC cipher demo\” and
\”DEC hash demo\”.

Where can I get further information? For example if I\’d like to contribute?

In the root folder of DEC V6.4.1 you will find further files with information about
this project like NOTICE.txt, CONTRIBUTING.md, SECURITY.md.
Also take the time to read DEC64.pdf in the Docs folder and look at the demos
provided in the Demos subfolder.

Has it been tested?

DEC 5.2 came with some \”arcane\” test program testing the algoithms implemented
using test data supplied via some text file. For many algorithms this test data
stems from official documentation of the algorithms itsself. DEC 5.2 passes these
tests.

DEC 6.0 reworked these tests into DUnit and DUnitX tests. We also added some more
tests and with this replaced the \”arcane\” test program which used hard to understand
code. A few of the implemented unit tests may still fail, but this is simply because
they are empty sceletons at this point in time waiting to be filled in. We first
need to work out how to implement these tests and maybe look for test data.
Why don\’t you help out by researching useful test data for those few tests?
We\’re talking at block chaining mode tests for the ciphers specifically.

In DEC 6.2 the unit tests for the hash classes were looked at and where not already
used original test data vectors (as far as we could find them – for most we could)
have been added to improve test coverage. V6.3 added further synthesized tests for
some hash classes. For SHA3 and for the GCM block chaining method the original test
vectors provided by NIST are used for the unit tests.

Contained hash algorithms

  • MD2
  • MD4
  • MD5
  • RipeMD128
  • RipeMD160
  • RipeMD256
  • RipeMD320
  • SHA0
  • SHA1
  • SHA224
  • SHA256
  • SHA384
  • SHA512
  • SHA3_224
  • SHA3_256
  • SHA3_384
  • SHA3_512
  • Shake128
  • Shake256
  • Haval128
  • Haval160
  • Haval192
  • Haval224
  • Haval256
  • Tiger
  • Panama
  • Whirlpool0
  • Whirlpool1
  • WhirlpoolT
  • Square
  • Snefru128
  • Snefru256
  • Sapphire

Contained cipher algorithms

  • Null
  • Blowfish
  • Twofish
  • IDEA
  • Cast256
  • Mars
  • RC4
  • RC6
  • AES
  • Square
  • SCOP
  • Sapphire
  • 1DES
  • 2DES
  • 3DES
  • 2DDES
  • 3DDES
  • 3TDES
  • 3Way
  • Cast128
  • Gost
  • Magma
  • Misty
  • NewDES
  • Q128
  • RC2
  • RC5
  • SAFER
  • Shark
  • Skipjack
  • TEA
  • XTEA
  • TEAN

Contained block concatenating modes

Modes ending on x have been invented by the original developer of DEC

  • ECBx
  • CBCx
  • CTSx
  • CTS3
  • CFB8
  • CFBx
  • OFB8
  • OFBx
  • CFS8
  • CFSx
  • GCM

Contained key derivation algorithms:

  • KDF1
  • KDF2
  • KDF3
  • MGF1
  • PBKDF2

Contained message authentication algorithms

  • HMAC

Contained formattings

  • Copy
  • HEX
  • HEXL
  • Base16
  • Base16L
  • DECMIME32
  • Base64
  • MIME64
  • Radix64
  • PGP
  • UU
  • XX
  • ESCAPE
  • BigEndian16
  • BigEndian32
  • BigEndian64

Contained CRCs

  • 8
  • 10
  • 12
  • 16
  • 16CCITT
  • 16XModem
  • 24
  • 32
  • 32CCITT
  • 32ZModem
  • 8ATMHEC
  • 8SMBus
  • 15CAN
  • 16ZMODEM

下载源码

通过命令行克隆项目:

git clone https://github.com/MHumm/DelphiEncryptionCompendium.git

收藏 (0) 打赏

感谢您的支持,我会继续努力的!

打开微信/支付宝扫一扫,即可进行扫码打赏哦,分享从这里开始,精彩与您同在
点赞 (0)

申明:本文由第三方发布,内容仅代表作者观点,与本网站无关。对本文以及其中全部或者部分内容的真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。本网发布或转载文章出于传递更多信息之目的,并不意味着赞同其观点或证实其描述,也不代表本网对其真实性负责。

左子网 编程相关 DelphiEncryptionCompendium https://www.zuozi.net/33636.html

technology talk
上一篇: technology talk
TFrameStand
下一篇: TFrameStand
常见问题
  • 1、自动:拍下后,点击(下载)链接即可下载;2、手动:拍下后,联系卖家发放即可或者联系官方找开发者发货。
查看详情
  • 1、源码默认交易周期:手动发货商品为1-3天,并且用户付款金额将会进入平台担保直到交易完成或者3-7天即可发放,如遇纠纷无限期延长收款金额直至纠纷解决或者退款!;
查看详情
  • 1、描述:源码描述(含标题)与实际源码不一致的(例:货不对板); 2、演示:有演示站时,与实际源码小于95%一致的(但描述中有”不保证完全一样、有变化的可能性”类似显著声明的除外); 3、发货:不发货可无理由退款; 4、安装:免费提供安装服务的源码但卖家不履行的; 5、收费:价格虚标,额外收取其他费用的(但描述中有显著声明或双方交易前有商定的除外); 6、其他:如质量方面的硬性常规问题BUG等。 注:经核实符合上述任一,均支持退款,但卖家予以积极解决问题则除外。
查看详情
  • 1、左子会对双方交易的过程及交易商品的快照进行永久存档,以确保交易的真实、有效、安全! 2、左子无法对如“永久包更新”、“永久技术支持”等类似交易之后的商家承诺做担保,请买家自行鉴别; 3、在源码同时有网站演示与图片演示,且站演与图演不一致时,默认按图演作为纠纷评判依据(特别声明或有商定除外); 4、在没有”无任何正当退款依据”的前提下,商品写有”一旦售出,概不支持退款”等类似的声明,视为无效声明; 5、在未拍下前,双方在QQ上所商定的交易内容,亦可成为纠纷评判依据(商定与描述冲突时,商定为准); 6、因聊天记录可作为纠纷评判依据,故双方联系时,只与对方在左子上所留的QQ、手机号沟通,以防对方不承认自我承诺。 7、虽然交易产生纠纷的几率很小,但一定要保留如聊天记录、手机短信等这样的重要信息,以防产生纠纷时便于左子介入快速处理。
查看详情

相关文章

猜你喜欢
发表评论
暂无评论
官方客服团队

为您解决烦忧 - 24小时在线 专业服务