- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
Cryptography and Network Security the Data Encryption Standard 数据加密标准 内容 1. DES 2. DES说明 3. 分组密码设计理论 4. DES分析 5. DES改进 Modern Block Ciphers will now look at modern block ciphers one of the most widely used types of cryptographic algorithms provide secrecy and/or authentication services in particular will introduce DES (Data Encryption Standard) Block vs Stream Ciphers block ciphers process messages in into blocks, each of which is then en/decrypted like a substitution on very big characters 64-bits or more stream ciphers process messages a bit or byte at a time when en/decrypting many current ciphers are block ciphers hence are focus of course 一Data Encryption Standard (DES) most widely used block cipher in world adopted in 1977 by NBS (now NIST) as FIPS PUB 46 encrypts 64-bit data using 56-bit key has widespread use has been considerable controversy over its security DES History IBM developed Lucifer cipher by team led by Feistel used 64-bit data blocks with 128-bit key then redeveloped as a commercial cipher with input from NSA and others in 1973 NBS issued request for proposals for a national cipher standard IBM submitted their revised Lucifer which was eventually accepted as the DES DES Design Controversy although DES standard is public was considerable controversy over design in choice of 56-bit key (vs Lucifer 128-bit) and because design criteria were classified subsequent events and public analysis show in fact design was appropriate DES has become widely used, especially in financial applications DES数据加密系统流程 64位明文输入 初始置换IP 乘积变换 逆初始置换 64位密文输出 Feistel Cipher Structure DES Round Structure uses two 32-bit L R halves as for any Feistel cipher can describe as: Li = Ri–1 Ri = Li–1 xor F(Ri–1, Ki) takes 32-bit R half and 48-bit subkey and: expands R to 48-bits using perm E adds to subkey passes through 8 S-boxes to get 32-bit result finally permutes this using 32-bit perm P DES DES定义 加密过程 解密过程 DES的
您可能关注的文档
最近下载
- 天然药物化学实验习题.docx VIP
- 天然药物化学考试题及答案.docx VIP
- T_ZJPA 001—2021_制药工业环境微生物数据库构建技术规范.pdf VIP
- 中小学第15课 第二次世界大战(课件)教育教学资料整理.pptx VIP
- 台达IED-G使用手册.pdf VIP
- 实施指南《GB_T42755 - 2023人工智能面向机器学习的数据标注规程》实施指南.docx VIP
- 酒店员工劳动合同范本及签订指南.docx VIP
- 2025广西公需科目考试题库和答案(覆盖99%考题)广西“一区两地一园一通道+人工智能时代的机遇.docx VIP
- 东北财经大学2023-2024学年《马克思主义基本原理概论》期末考试试卷(A卷)含参考答案.docx
- T100鼎新技术手册.docx VIP
原创力文档


文档评论(0)