des算法密码多长_密码学中的多个DES

des算法密码多长

This is a DES that was susceptible to attacks due to tremendous advances in computer hardware in cryptography. Hence, it was a very complex or competent algorithm it would be feasible to reuse DES rather than writing an of cryptography.

由于加密技术中计算机硬件的巨大进步,这是一种易于受到攻击的DES 。 因此,这是一个非常复杂或称职的算法,重用DES而不是编写加密算法是可行的。

Required to this variation of DES were introduced known as multiple DES which was as follows as Shown:

引入这种DES变体所需的称为多重DES ,如下所示:

1)双DES (1) Double DES)

  • Mainly, Double DES is simple as it does that normal DES does. Double DES uses twp keys to say K1 and K2 in this algorithm. It first performs DES on the original plain text using K! to get the encrypted text in cryptography. Here, it again performs DES on the encrypted text but this time with the other key K2 in this algorithm.

    主要是, Double DES很简单,就像普通DES一样。 在此算法中,双DES使用twp键表示K1和K2。 它首先使用K对原始纯文本执行DES! 以加密方式获取加密的文本。 在这里,它再次对加密的文本执行DES,但是这次使用该算法中的另一个密钥K2。

  • Firstly, the final output is the encryption of encrypted text with the original plain text encrypted twice with two different keys shown in the structure as given below:

    首先,最终输出是加密的文本的加密,原始的纯文本用两个不同的密钥加密了两次,结构如下所示:

    Multiple DES (1)
  • While the doubly encrypted ciphertext block is first decrypted using the key K2 to produce singly encrypted ciphertext by plaintext or original text. Hence, this ciphertext block is then decrypted using the key K1 to obtain the original plain text block in cryptography.

    首先使用密钥K2对双重加密的密文块进行解密,以通过明文或原始文本生成单一加密的密文。 因此,然后使用密钥K1对该密文块进行解密以获得密码术中的原始明文块。

  • Mainly, the cryptanalysis for the basic version of DES requires a search of 256 thus the assumption is Double DES require 2128 keys which is not true for the message.

    主要是,对DES基本版本的密码分析需要搜索256,因此假设Double DES需要2128个密钥,这对于消息而言是不正确的。

    Here, a Meet-in-the-middle attack is the drawback of double DES in this. Mainly, this attack involves encryption from one end, decryption from the other and matching the results in the middle hence the name in the message.

    在此,中间相遇攻击是双重DES的缺点。 主要是,这种攻击涉及从一端进行加密,从另一端进行解密以及在中间匹配结果,从而在消息中使用名称。

Therefore, the simplest form of multiple encryptions has two encryption stages and two keys in this. Here, given a plaintext P and two encryption keys K1 and K2, ciphertext C is created as: C = E(K2, E(K1, P))

因此,多重加密的最简单形式具有两个加密阶段和两个密钥。 在此,给定明文P和两个加密密钥K1K2 ,将密文C创建为: C = E( K2 ,E( K1 ,P))

Then, Decryption requires that the keys be applied in reverse order as: P = D(K1, D(K2, C))

然后,解密要求以相反的顺序应用密钥,例如: P = D( K1 ,D( K2 ,C))

Now, For DES, this scheme involves a key length of 56 * 2 = 112 bits, resulting in a dramatic increase in cryptographic strength in this. Further, but we need to examine the algorithm more closely for this.

现在,对于DES,此方案涉及56 * 2 = 112位的密钥长度,从而导致加密强度显着提高。 此外,但是我们需要对此进行更仔细的研究。

2)三重DES (2) Triple DES)

Here, to improve the security of DES to a higher level triple DES was proposed in this. While this uses three stages on DES for encryption and decryption in cryptography.

在此,为了提高DES的安全性,提出了三重DES。 虽然这在DES上使用三个阶段来进行加密中的加密和解密。

Multiple DES (2)

There basically of two versions of triple-DES are as given:

基本上有两种版本的三重DES

i. Triple DES with Two Keys

一世。 两键三重DES

  • While in triple DES with two keys there are only two keys K1 used by the first and third stages and K2 used in the second stage in this. Basically, first, the plain text is encrypted with key K1 then the output of step one is decrypted with K2 and final the output second step is encrypted again with key K1 in cryptography.

    在具有两个密钥的三重DES中,第一级和第三级仅使用两个密钥K1 ,第二级中仅使用两个密钥K2 。 基本上,首先,用密钥K1加密纯文本,然后用K2解密步骤1的输出,最后再用密钥K1再次加密输出的第二步。





  • Multiple DES (3)




  • It is also called encrypt decrypt encrypt (ECE) mode in cryptography. Hence, Triple DES with two keys is not susceptible to the meet-in-the-middle attack in cryptography.

    在密码学中,它也称为加密解密解密(ECE)模式。 因此,具有两个密钥的三重DES不会受到密码学中的中间相遇攻击。

ii. Triple DES with Three Keys

ii。 三键三键DES

  • It basically had the idea of Triple-DES with three keys:

    它基本上具有使用三个密钥的Triple-DES的想法:





  • Multiple DES (4)




  • While the plain text block P is first encrypted with a key K1 then encrypts with a second key K2 and finally with a third key K3 where K1, K2, and K3 are all different from each other in this algorithm. This is Decryption is done in reverse order in this way. Therefore, this algorithm is mostly used in PGP and S/MIME in cryptography.

    虽然首先使用密钥K1加密纯文本块P ,然后使用第二密钥K2加密,最后使用第三密钥K3加密,其中该算法中的K1K2K3都互不相同。 这就是解密以这种方式以相反的顺序完成。 因此,此算法主要用于密码学中的PGP和S / MIME。

  • Therefore, the DES cipher's key size of multiple of 56 bits of the message was generally enough when that algorithm was designed but the availability of increasing computational power made brute force attacks feasible in this algorithm. Thus, the Triple-DES provides a relatively simple method of increasing the key size of DES to secure against such attacks like that, without the need to design a completely new block cipher algorithm by this technique in cryptography.

    因此,当设计该算法时,消息的56位的DES密码的密钥大小通常就足够了,但是计算能力的提高使暴力攻击在该算法中可行。 因此,Triple-DES提供了一种相对简单的方法来增加DES的密钥大小,以防止类似的攻击,而无需通过这种技术在密码学中设计一种全新的分组密码算法。

MEET-IN-THE-MIDDLE ATTACK

遇见中间攻击

Therefore, the use of double DES results in a mapping that is not equivalent to a single DES encryption in cryptography. Hence, but there is a way to attack this scheme, one that does not depend on any particular property of DES but that will work against any block encryption cipher in cryptography.

因此,使用双DES会导致映射不等同于密码学中的单个DES加密。 因此,但是有一种方法可以攻击这种方案,该方案不依赖于DES的任何特定属性,但是可以与密码学中的任何块加密密码一起工作。

Therefore, the algorithm known as a meet-in-the-middle attack was first described in [DIFF77]. It is based on the observation that we can say if we have it

因此,在[DIFF77]中首先描述了称为中间相遇攻击的算法。 基于观察,我们可以说是否拥有

Multiple DES (5)

Here, it has given a known pair, (P, C), the attack proceeds as follows as see. Firstly, encrypt P for all 256 possible values of K1 in this. While storing these results in a table and then sort the table by the values of X. Next, decrypt C using all 256 possible values of K2 in cryptography. Therefore, as each decryption is produced, check the result against the table for a match by this. Either if a match occurs, then test the two resulting keys against a new known-plaintext–ciphertext pair in cryptography. Hence, if the two keys produce the correct ciphertext, accept them as the correct keys in this algorithm.

在这里,它给出了一个已知的对(P,C) ,攻击如下所示进行。 首先,在此为K1的所有256个可能值加密P。 将这些结果存储在表中后,再按X的值对表进行排序。 接下来,使用密码学中K2的所有256个可能值解密C。 因此,随着每次解密的进行,以此将结果对照表进行核对。 如果发生匹配,则针对密码学中新的已知明文-密文对测试两个结果密钥。 因此,如果两个密钥产生正确的密文,则在此算法中将它们接受为正确的密钥。

For Example, for any given plaintext or original text P, 264 possible ciphertext values could be produced by double DES in this. This was Double DES uses, in effect, a 112-bit key, so that there are 2112 possible keys apply to messages. Therefore, on mean, for a given plaintext or original text P, the number of different 112-bit keys that will produce a given ciphertext as C is given: 2112/264 = 248

例如,对于任何给定的明文或原始文本P ,在此可以通过双DES产生264个可能的密文值。 实际上,这是Double DES使用的112位密钥,因此有2112种可能的密钥适用于消息。 因此,平均而言,对于给定的纯文本或原始文本P,给出将产生给定密文作为C的不同112位密钥的数目: 2112/264 = 248

While, the foregoing procedure will produce about 248 false alarms on the first (P, C) pair in this. Therefore, a similar argument indicates that with an additional 64 bits of known plaintext and ciphertext, the false alarm rate is reduced to 248 - 64 = 2 - 16 in mathematics. While putting another way, if the meet-in-the-middle attack is performed on two blocks of known plaintext–ciphertext, the probability that the correct keys are determined is 1 - 2 - 16 in this way. Thus, the result is that a known-plaintext attack will succeed against double DES, which has a key size of 112 bits, with an effort on the order of 256, which is not much more than the 255 required for single DES in cryptography.

同时,上述过程将在此第一对(P,C)上产生约248个错误警报。 因此,类似的论点表明,在已知的明文和密文有另外的64位的情况下,错误警报率在数学上降低为248-64 = 2-16。 换句话说,如果对已知的明文-密文的两个块执行中间相遇攻击,则以这种方式确定正确密钥的可能性为1-2-16。 因此,结果是,已知的明文攻击将成功抵御密钥大小为112位的双DES,而付出的努力约为256,这不超过密码术中单个DES所需的255。

Image source: https://www.tutorialspoint.com/cryptography/triple_des.htm

图片来源: https : //www.tutorialspoint.com/cryptography/triple_des.htm

翻译自: https://www.includehelp.com/cryptography/multiple-des.aspx

des算法密码多长

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/news/377260.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

《MySQL——索引笔记》

目录回表覆盖索引最左前缀原则联合索引的时候,如何安排索引内的字段顺序?索引下推重建索引问题联合主键索引和 InnoDB 索引组织表问题in与between的区别回表 回到主键索引树搜索的过程,我们称为回表。 覆盖索引 覆盖索引就是在这次的查询中…

计算凸多边形面积的算法

1. 思路: 可以将凸多边形(边数n > 3)划分为 (n - 2) 个三角形,分别运用向量叉积计算每个三角形的面积,最后累加各个三角形的面积就是多边形的面积。 2. 求多边形面积的算法模板:   定义点的结构体 str…

Windows CE开发常见问题解答

转自: http://blog.csdn.net/slyzhang/article/details/6110490 1.怎样在一个控件获得焦点时打开软键盘?比如一个EditBox获得焦点后,这个时候自动打开软键盘,这样可以方便用户输入——SIPINFO、SHSIPINFO、SIPSETINFO、SIPGETINFO…

Julia中的supertype()函数

Julia| supertype()函数 (Julia | supertype() function) supertype() function is a library function in Julia programming language, it is used to get the concrete supertype of the given type (data type). supertype()函数是Julia编程语言中的库函数,用于…

《操作系统知识点整理》

目录进程与线程比较多线程同步与互斥生产者与消费者哲学家就餐问题读者写者问题进程间通信管道消息队列共享内存信号量信号Socket锁互斥锁与自旋锁读写锁乐观锁与悲观锁死锁进程与线程比较 进程是资源(包括内存、打开的文件等)分配的单位,线…

for,foreach,iterator的用法和区别

相同点&#xff1a; 三个都可以用来遍历数组和集合不同点&#xff1a;1.形式差别 for的形式是 for&#xff08;int i0;i<arr.size();i&#xff09;{...} foreach的形式是 for&#xff08;int i&…

和菜鸟一起学linux总线驱动之初识spi驱动主要结构

既然知道了协议了&#xff0c;那么就可以开始去瞧瞧linux kenerl中的spi的驱动代码了&#xff0c;代码中有很多的结构体&#xff0c;还是对主要的结构体先做个了解吧&#xff0c;那样才可以很好的理解驱动。主要是include/linux/spi.h 首先是SPI的主机和从机通信接口&#xff0…

操作系统大内核和微内核_操作系统中的内核

操作系统大内核和微内核A Kernel is the central component of an Operating System. The Kernel is also said to be the heart of the Operating System. It is responsible for managing all the processes, memory, files, etc. The Kernel functions at the lowest level …

《MySQL——锁》

全局锁是什么&#xff1f;全局锁有什么用&#xff1f;全局锁怎么用&#xff1f; 全局锁主要用在逻辑备份过程中&#xff0c;对于InnoDB 引擎的库&#xff0c;使用–single-transaction; MySQL 提供了一个加全局读锁的方法&#xff0c;命令是 Flush tables with read lock (FTW…

搜索引擎Constellio及Google Search Appliances connectors

做搜索产品的时候发现国外一个同类型的产品contellio&#xff0c;发现功能比较强大&#xff0c;先记录下来 貌似可以添加文档 网站 以及数据库等不同类型的数据源 http://wiki.constellio.com/index.php/Main_Page http://www.constellio.com/ http://www.constellio.com htt…

dig下载_DIG的完整形式是什么?

dig下载DIG&#xff1a;副监察长 (DIG: Deputy Inspector General) DIG is an abbreviation of the Deputy Inspector General. It is a high-level position in the Indian Police Service. The officers who already offered service on Senior Superintendent of Police (SS…

分类器是如何做检测的?——CascadeClassifier中的detectMultiScale函数解读

原地址&#xff1a;http://blog.csdn.net/delltdk/article/details/9186875 在进入detectMultiScal函数之前&#xff0c;首先需要对CascadeClassifier做初始化。 1. 初始化——read函数 CascadeClassifier的初始化很简单&#xff1a; cv::CascadeClassifier classifier; cl…

<MySQL>何时使用普通索引,何时使用唯一索引

如果能够保证业务代码不会写入重复数据&#xff0c;就可以继续往下看。 如果业务不能保证&#xff0c;那么必须创建唯一索引。 关于查询能力 普通索引和唯一索引在查询能力上是没有很大差别的。 如&#xff1a;select id from T where k5 1、普通索引查找到满足条件的第一个记…

Web版OutLook,利用POP接收邮件服务器邮件

一直想做一个Web版的OutLook&#xff0c;所以才萌生这个想法&#xff0c;其实以前也接触过这方面的东西。于是上网找了找&#xff0c;漫天的都是Jmail来接收&#xff0c;好吧&#xff0c;既然大家都在用我也就下载下来试试了。 什么&#xff0c;怎么总是报错呢&#xff1f;原来…

abs std::abs_ABS的完整形式是什么?

abs std::absABS&#xff1a;防抱死制动系统 (ABS: Anti-lock Braking System) ABS is an abbreviation of the Anti-lock Braking System. It is a safety anti-skid braking system that is used on a variety of aircraft, automobiles and other land vehicles, such as mo…

ubuntu 使用

shell 命令历史搜索 &#xff1a; ctrl r使能 session 选择界面&#xff1a;安装gnome-session-fallback安装lwqq转载于:https://www.cnblogs.com/JonnyLulu/p/3600263.html

汉字速查使用方法简介

《汉字速查》&#xff08;HanziSearcher&#xff09;是一个支持全汉字字典和词典的检索工具。其界面如下所示。 界面上方为工具栏。 左方为字典和词典检索栏。 右方在启动时显示版权信息和作者的联系方式&#xff0c;在执行检索时&#xff0c;显示检索结果。 检索方法 汉字速查…

android jni示例_Android服务示例

android jni示例A service is a component that runs in the background for supporting different types of operations that are long running. The user is not interacted with these. These perform task even if application is destroyed. Examples include handling of…

《MySQL——选错索引,该如何做》

如果不断地删除历史数据和新增数据&#xff0c;MySQL有时会选错索引。 选择索引是优化器的工作&#xff0c;优化器优化时会考虑的因素&#xff1a;扫描行数、是否需要排序、是否使用临时表 MySQL通过统计索引上的基数&#xff0c;作为索引的区分度。 统计方法时采样统计&#x…

LPWSTR 类型的实参与const.char *类型形参不兼容

CString csPlus; CString csSummand; m_PlusNumber.GetWindowTextW(csPlus); m_Summand.GetWindowTextW(csSummand); int nPlus atoi(csPlus.GetBuffer(0)); //将编辑框文本转换成整数// int nPlus atoi(strcpy(csPlus.GetBuffer(10),"aa")); csPlus.ReleaseBu…