第1个回答 2009-04-10
1 Introduction
DES is the Data Encryption Standard (Data Encryption Standard) abbreviation. Data Encryption Data Encryption Standard algorithm (Data Encryption Standard, DES) is to standardize the description, it comes from IBM's research work, and in 1997 formally adopted by the U.S. government. It is probably the most widely used secret key system, especially in protecting the security of financial data, the initial development of the DES is embedded in hardware. Typically, ATM (Automated Teller Machine, ATM) are the use of DES.
DES had several years IBM has a patent, but in 1983 has expired, and is in the public area, allowing under certain conditions can be royalty-free use. The last two decades, it has been active in the international arena and secure communication have played an important role to play.
DES is a block cipher algorithm, his 64-bit data encryption for the packet. At the same time, DES is a symmetric algorithm: encryption and decryption using the same algorithm. Its key length is 56 (since each section are used as 8-bit parity), keys can be arbitrary number of 56, but the time can change. Very little of which is considered the number of weak keys, it is easy to avoid them. Therefore, dependent on key confidentiality.
2 Algorithm Framework:
DES of 64 (bit)-bit sub-M to operate explicitly, M, after an initial permutation IP replaced by m0, will be divided into m0 explicit part of the left part and right m0 = (L0, R0), the 32-bit long. 16 exactly the same and then proceed to computing, the computing function is called f, in the computing process of combining data and key. After 16, the left and right parts together after a late replacement, this is complete.
In each round, the key shift bit, and then from the key 56 of the 48 selected. Through an expansion of the right replacement part will extend the data into 48, and through an XOR operation to replace a new 32-bit data for one of its replacement. This constitutes a four-step computing function f. Then, through another XOR operation, the output function f and the left part of combination, the results become part of the new right, the right part of the original to become part of the new left. Repeat the operation 16 times, on the reality.
3 DES decryption
After all the alternative, replacement, or box the cycle varies, you may think that encryption algorithm and decryption algorithm is entirely different. The contrary, carefully selected a variety of operations, was a very useful property: using the same encryption and decryption algorithms.
DES encryption and decryption keys only difference is the opposite order. If the round of encryption keys are K1, K2, K3 .... K16 decryption key is then K16, K15, K14 ... K1.
4 DES Several working methods
The first is the way the electronic density of the (ECB)
N will be explicitly divided into a 64-bit packet, if the explicit length is not a multiple of 64 bits, then at the end of the express provisions of an appropriate number of filler symbols. On the explicit group were given the keys for encryption, the ciphertext C = (C0, C1, ... ..., Cn-1) in which Ci = DES (K, xi), i = 0,1, ... .., n-1.
The second sub-link ciphertext (CBC)
In CBC mode, each xi expressly group first before encryption ciphertext by a group of two plus-bit mode, and then to the DES encryption, CBC ways to overcome the way the ECB reported that weaknesses within the group of heavy, but the explicit group before encryption ciphertext with a group, so a group of former ciphertext error will spread to the next group.
The third ciphertext feedback (CFB), the password can be used to sequence
Express X = (x0, x1, ... ..., xn-1), of which xi composed by the t-bit 0 of the fourth output feedback (OFB), the password can be used in sequence.
CFB and OFB only difference is that DES is a direct output of the t-bit, rather than take the t ciphertext bits, and the rest are the same as CFB. But it is taking the output of DES, it has overcome the CFB ciphertext of the shortcomings of error propagation.
第2个回答 2009-04-10
DES is the Data Encryption Standard abbreviation. Data Encryption Data Encryption Standard algorithm is to standardize the description, it comes from IBM's research work, and in 1997 formally adopted by the U.S. government. It is probably the most widely used secret key system, especially in protecting the security of financial data, the initial development of the DES is embedded in hardware. Typically, ATM are the use of DES.
DES had several years IBM has a patent, but in 1983 has expired, and is in the public area, allowing under certain conditions can be royalty-free use. The last two decades, it has been active in the international arena and secure communication have played an important role to play.
DES is a block cipher algorithm, his 64-bit data encryption for the packet. At the same time, DES is a symmetric algorithm: encryption and decryption using the same algorithm. Its key length is 56 , keys can be arbitrary number of 56, but the time can change. Very little of which is considered the number of weak keys, it is easy to avoid them. Therefore, dependent on key confidentiality.
2 Algorithm Framework:
DES of 64 (bit)-bit sub-M to operate explicitly, M, after an initial permutation IP replaced by m0, will be divided into m0 explicit part of the left part and right m0,the 32-bit long. 16 exactly the same and then proceed to computing, the computing function is called f, in the computing process of combining data and key. After 16, the left and right parts together after a late replacement, this is complete.
In each round, the key shift bit, and then from the key 56 of the 48 selected. Through an expansion of the right replacement part will extend the data into 48, and through an XOR operation to replace a new 32-bit data for one of its replacement. This constitutes a four-step computing function f. Then, through another XOR operation, the output function f and the left part of combination, the results become part of the new right, the right part of the original to become part of the new left. Repeat the operation 16 times, on the reality.
3 DES decryption
After all the alternative, replacement, or box the cycle varies, you may think that encryption algorithm and decryption algorithm is entirely different. The contrary, carefully selected a variety of operations, was a very useful property: using the same encryption and decryption algorithms.
DES encryption and decryption keys only difference is the opposite order. If the round of encryption keys are K1, K2, K3 .... K16 decryption key is then K16, K15, K14 ... K1.
4 DES Several working methods
The first is the way the electronic density of the
N will be explicitly divided into a 64-bit packet, if the explicit length is not a multiple of 64 bits, then at the end of the express provisions of an appropriate number of filler symbols. On the explicit group were given the keys for encryption, the ciphertext C in which Ci = DES,i = 0,1, ... .., n-1.
The second sub-link ciphertext
In CBC mode, each xi expressly group first before encryption ciphertext by a group of two plus-bit mode, and then to the DES encryption, CBC ways to overcome the way the ECB reported that weaknesses within the group of heavy, but the explicit group before encryption ciphertext with a group, so a group of former ciphertext error will spread to the next group.
The third ciphertext feedback , the password can be used to sequence
Express X , of which xi composed by the t-bit 0 of the fourth output feedback , the password can be used in sequence.
CFB and OFB only difference is that DES is a direct output of the t-bit, rather than take the t ciphertext bits, and the rest are the same as CFB. But it is taking the output of DES, it has overcome the ciphertext CFB error propagation of the shortcomings of
第3个回答 2009-04-10
Introduction
Data Encryption Standard (DES is the abbreviation of Data Encryption Standard). Data Encryption algorithm Data Encryption Standard (DES) Data Encryption Standard, it is Standard, from IBM research work, and in 1997 by the U.S. government formally adopted. It is probably the most widely used secret-key systems, especially in the financial data security protection, was originally developed DES is embedded hard thing. Usually, Automated Teller machines (atms) Teller Machine, o use DES.
IBM has to have several patents, DES in 1983, has expired and in public scope permitted in particular conditions can avoid patent royalty and use. 2 years, it has been active in international communication stage, plays an important role.
DES is a group encryption algorithm, with his 64-bit data encryption for grouping. While DES is a symmetric algorithms of encryption and decryption: with the same algorithm. It's the key length is 56 (for each article 8 bits are used for parity), key can be arbitrary 56 number, but can change any time. One of a number of key is believed to be the weak, but easy to avoid them. So the secrecy depends on the keys.
2 algorithm framework:
DES 64 bit of expressly grouping operation, M j, after an initial displacement IP will become replacement m0 expressly into the left part and m0 L0 = (m0 right part, the 32-bit R0), long. Then on wheels identical operation, the operation is called function f, in operation process data and key combination. After 16 rounds left and right after part together after a replacement, so late.
In each round, the key position shift, and then from the key of 56 elected 48. Through a replacement will expand the right data into a part, and through a vision or operation and alternative into new 32 data, in its displacement in time. This four-step operation constitutes a function f. Then, through another or operation, the output and the left () function f part, the result became part of new right and left hemisphere has become a new part. This operation will repeat 16 times, can achieve.
3 DES decryption
After all, replacement, or replaced, you may circulation box that decryption algorithm and encryption algorithm is totally different. Contrary to all kinds of choices, meticulously, received a very useful properties: encryption and decryption use the same method.
DES encryption and decryption only different is the key of the order. If each chakra MiMi add keys were K1, K2 and erp. K16. So MiMi solution is K16 keys, K15, K14... K1.
Four kinds of working style. DES
The first kind of electron dense this way (ECB)
Will a 64 bit expressly into n, if not 64 bit length ratio, the end of a reasonable amount of filling expressly prescribed symbols. With a given set of plaintext encrypted respectively, key plaintext C = C0 (C1,..., Cn, including 1 -), Ci = DES (K), I = 0,1 xi,... .. , n - 1.
The second group links (plaintext CBC)
In CBC mode, every plaintext encrypted before and during group xi before a group of ciphertext bitwise mode, after two plus DES encrypted, CBC ways to overcome the ECB way in groups of weakness, but because expressly set with a group of plaintext encrypted before, so ago a group of errors will spread to plaintext under a group.
The third kind of plaintext way (CFB), feedback can be used to sequence the password
X0 (X = expressly xn, clamps its x1,..., 1 -), including a bit from t xi composed 0 fourth output feedback (OFB), can be used to sequence the password.
The only difference is with CFB OFB is directly take a bit of t DES output, rather than take a bit of plaintext; the rest are identical with CFB. But it is the output of DES, it overcomes the ciphertext error propagation of CFB faults本回答被提问者采纳