密码学电子书_密码学中的电子密码书(ECB)

密码学电子书

This Electronic Code Book (ECB) is cryptography as a mode of operation for a block cipher, with the characters the main things that every feasible block of plaintext or an original text has a corresponding characteristic of ciphertext value and vice versa. In other words, the same or main plaintext or original value will always result or work in the same ciphertext value. Electronic Code Book(ECB) is used when a volume or character of plaintext is separated or divided into several blocks of data, each or every of which is then encrypted independently divides it of other blocks. Otherwise, Electronic Code Book has the ability or capacity to support or promote a separate encrypted key for each block type in cryptography.

电子密码书(ECB)是一种密码术,是一种针对分组密码的操作模式,其特征是,每个可行的明文或原始文本块均具有对应的密文值特征,反之亦然。 换句话说,相同或主要的明文或原始值将始终产生或使用相同的密文值。 电子卷书(ECB)用于将明文的卷或字符分开或分为几个数据块,然后分别加密每个或每个数据块,然后将其分为其他块。 否则,电子密码书具有为密码术中的每个块类型支持或促进单独的加密密钥的能力。

However, this Electronic Code Book is not a good system or process to use with small or little block sizes (for example, less than 40 bits in a plain text) and identical or properly encryption modes in cryptography. This is due to some particular words and phrases that may be reused again often enough or more so that the same repetitive or repeated part-blocks of ciphertext can emerge or mixed, laying the groundwork for a codebook attack where the plaintext or original text patterns are fairly obvious for this. However, security or privacy may be better if random pad bits are added to each block in cryptography.
On the other hand, 64-bit or larger or greater blocks should contain enough or more unique characteristics (entropy) to make a codebook attack unlikely to succeed in this ECB.

但是,此电子书不是一个很好的系统或过程,不能使用很小或很小的块大小(例如,纯文本中少于40位)以及密码学中相同或适当的加密模式。 这是由于某些特定的单词和短语可能经常或多次重复使用,从而使相同的重复或重复的密文分块出现或混合在一起,从而为进行纯文本或原始文本模式的密码本攻击打下了基础。对此很明显。 但是,如果将随机填充比特添加到加密中的每个块,则安全性或隐私性可能会更好。
另一方面,64位或更大或更大的块应包含足够或更多的独特特征(熵),以使密码本攻击不太可能在此ECB中成功。

In the form of error correction, any bit errors or defects in a ciphertext block affect decryption of that block only of plaintext. This is the Chaining dependency is never an issue in that reordering of the ciphertext blocks will only rebook the corresponding plaintext or original text blocks, but never affect decryption in cryptography.

以纠错的形式,密文块中的任何位错误或缺陷都只会影响该明文块的解密。 这是Chaining依赖性永远不会成为问题,因为密文块的重新排序只会重新预订相应的纯文本或原始文本块,而不会影响密码术中的解密。

ECB


Image source: https://www.geeksforgeeks.org/block-cipher-modes-of-operation

图片来源:https://www.geeksforgeeks.org/block-cipher-modes-of-operation

使用欧洲央行的优势 (Advantages of using ECB)

  • The parallel encryption of particular blocks of bits is possible or feasible, thus it is a faster way of encryption for this.

    特定位块的并行加密是可行或可行的,因此这是一种更快的加密方式。

  • The simple way of a block cipher is this ECB mode of operation.

    分组密码的简单方法是这种ECB操作模式。

使用ECB的缺点 (Disadvantages of using ECB)

  • This is prone to cryptanalysis in cryptography since there is a direct or straight relationship between plaintext or original text and ciphertext.

    由于明文或原始文本与密文之间存在直接或直接的关系,因此在密码学中易于进行密码分析。

(Example)

Different from apart from using a password or message to generate an encryption key, which completes encrypted the keyspace, we have the problem of the algorithm used to process the plain text or original text. If this is ECB we have repeating cipher blocks for the same plain text or original text.

除了使用密码或消息生成加密密钥来完成对密钥空间的加密以外,我们还有用于处理纯文本或原始文本的算法问题。 如果这是ECB,则对于相同的纯文本或原始文本,我们将重复密码块。

As I take "eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee" and encrypt with as the 3-DES and a cryptography key of "bill12345" we get,

当我将“ eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee”作为3-DES和“ bill12345”的加密密钥进行加密时,我们得到:

1122900B30BF1183 1122900B30BF1183 1122900B30BF11831 122900B30BF1183 1122900B30BF1183 1122900B30BF1183 7591F6A1D8B4FC8A

Here, we can see that the word "e...e" values are always coded with the same ciphertext in cryptography. As 3-DES has message blocks of 64-bits, then 8 'e' values will fill each block in the way of cryptography.

在这里,我们可以看到单词“ e ... e”的值在密码学中始终使用相同的密文编码。 由于3-DES具有64位消息块,因此8个“ e”值将以加密方式填充每个块。

    [eeeeeeee] [eeeeeeee] [eeeeeeeee]
[eeeeeeee] [eeeeeeee] [eeeeeeee]
[eeeeee PADDING]

Here, we can say that the word "eeeeeeee" maps to the cipher text of 1122900B30BF1183 as cipher text.

在这里,我们可以说单词“ eeeeeeee”作为密文映射到1122900B30BF1183的密文。

安全挑战 (Security Challenges)

The ECB mode is rather simple in realization for the cryptography. It is possible or feasible to encrypt/decrypt the blocks of data or characters in parallel as there is no dependence between blocks of the plaintext or original text. In case of failure or failure of the encryption/decryption in the cryptography, the mistake extends only within one block and doesn't influence others for this.

ECB模式对于加密而言非常简单。 并行加密/解密数据或字符块是可能的或可行的,因为在明文或原始文本的块之间没有依赖性。 如果密码术失败或加密/解密失败,则错误仅在一个块内延伸,而不会对此造成影响。

Limitations or Restriction of ECB encryption scheme,

ECB加密方案的限制或限制,

  • If blocks of the clear or original text are identical or similar to the corresponding blocks of the ciphertext will be identical or similar too. Otherwise if in the ciphertext some blocks are identical or similar, the corresponding or particular blocks of the clear or original text are identical or similar too. The cryptanalyst of cryptography can decipher or encrypt only one of these blocks of cryptography to find the contents of all of them.

    如果明文或原始文本的块与密文的相应块相同或相似,那么它们也将相同或相似。 否则,如果密文中的某些块相同或相似,则明文或原始文本的相应或特定块也相同或相似。 密码学的密码分析员只能解密或加密这些密码学块中的一个,以查找所有密码学块的内容。

  • In another way case the blocks are independent or free itself becomes possible or feasible to replace or change some blocks of the ciphertext without knowledge of a cryptography key. The malefactor can change the part of blocks in the message with blocks intercepted during the previous message on the same cryptography key.

    在另一种情况下,块是独立的或自由的,在不知道密码密钥的情况下替换或更改密文的某些块本身成为可能或可行的。 恶意因素可以更改消息中块的一部分,而在同一加密密钥上的上一条消息期间会截获这些块。

  • In fact case of drop or insertion at least of one bit into ciphertext there will be a shift or replaced of bits and borders of blocks that will lead to wrong or incorrect decoding or decrypt of all subsequent blocks ciphertext in cryptography (it can be fixed or mixed by realization of control or work methods of borders of ciphertext blocks in the cryptography).

    实际上,在密文中丢弃或插入至少一位的情况下,将对块的位和边界进行移位或替换,这将导致对密码学中所有后续块密文进行错误或不正确的解码或解密(可以固定或固定)。通过实现密码术中密文块边界的控制或工作方法来实现混合)。

翻译自: https://www.includehelp.com/cryptography/electronic-code-book-ecb.aspx

密码学电子书

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/news/541083.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

tsql是mysql中的吗_Mysql中的sql是如何执行的

MySQL中的SQL是如何执行的MySQL是典型的C/S架构,也就是Client/Server架构,服务器端程序使用的mysqld.整体的MySQL流程如下图所示:MySQL是有三层组成:连接层: 负责客户端与服务器端建立连接,客户端发送SQL至服务端;SQL层: 对SQL语句进行查询处理;存储引擎层: 与数据库文件打交道…

软件质量特性测试

针对软件质量特性进行测试,可以避免重大漏测,一般人我不告诉他。《软件工程—产品质量》(GB/T 16260-2006)中规定对软件的每个质量特性与子特性都有定义:一、功能性:是指当软件在指定条件下使用&#xff0c…

PHP array_pop()函数与示例

PHP array_pop()函数 (PHP array_pop() function) array_pop() function is used to delete/pop last element from the array. array_pop()函数用于从数组中删除/弹出最后一个元素。 Syntax: 句法: array_pop(array);Here, array is the input array, function w…

网站关停就没事了?5100万账户文件被盗

曾经是美国三大音乐视频文件共享软件之一的imesh,意外倒闭。而更意外的是,就在近日,imesh这款已经倒闭的软件,5100万账户开始在暗网被黑客拍卖。 Imesh这款软件是美国纽约的老牌音乐视频分享软件之一,早在2000年前便已…

数据库表设计索引外键设计_关于索引的设计决策 数据库管理系统

数据库表设计索引外键设计Introduction: 介绍: The attributes whose values are required inequality or range conditions and those that are keys or that participate in join conditions require access paths. 其值为必需的不等式或范围条件的属性以及作为键…

接口测试从零开始系列_mock技术使用

1、什么情况下会使用mock技术 (1)需要将当前被测单元和其依赖模块独立开来,构造一个独立的测试环境,不关注被测单元的依赖对象,只关注被测单元的功能逻辑 ----------比如被测代码中需要依赖第三方接口返回值进行逻辑处…

amie 规则挖掘_AMIE的完整形式是什么?

amie 规则挖掘AMIE:工程师协会的准会员 (AMIE: Associate Member of the Institution of Engineers) AMIE is an abbreviation of Associate Member of the Institution of Engineers. The Institution of Engineers India Limited (IEIL) provides this profession…

java 马克思_单链表-Java

public class SinglyListNode {int val;SinglyListNode next;SinglyListNode() {}SinglyListNode(int x) {this.val x;}}/*执行用时:12 ms, 在所有 Java 提交中击败了66.93%的用户内存消耗:39.5 MB, 在所有 Java 提交中击败了5.06%的用户*/class MyLink…

python的pass语句_Python | 演示pass语句的示例

python的pass语句python中的pass语句 (pass statement in python) "pass" is a type of null operation or null statement, when it executes nothing happens. It is used when you want do not want to write any code/statement to execute but syntactically a …

HDS:聚焦未来的投资“冻结”

一家日本IT网站报道的有关HDS冻结对高端存储产品的投资一事引发众议。让人陷入疑惑的这次声明就是,HDS认为单纯的阵列产品并非企业存储的未来。 6月1日,IT Pro Nikkei网站发布了一篇报道,内容援引HDS一份表示将冻结高端存储业务的简报。这引发…

java js对象转字符串数组_JS数组转字符串(3种方法)【转】

JavaScript 允许数组与字符串之间相互转换。其中 Array 方法对象定义了 3 个方法,可以把数组转换为字符串,如表所示。数组方法说明toString()将数组转换成一个字符串toLocalString()把数组转换成本地约定的字符串join()将数组元素连接起来以构建一个字符…

中美共建大数据创新研究中心

由贵阳市人民政府、工信部电子一所、美国加州大学伯克利分校合作共建的贵州伯克利大数据创新研究中心日前在贵阳揭牌。 据了解,贵州伯克利大数据创新研究中心将分两阶段建设。第一阶段,2016年9月份至2017年底,将重点完成“学龄儿童大数据分析…

Python中的__init__和self是做什么的?

The __init__ and self are two keywords in python, which performs a vital role in the application. __init__和self是python中的两个关键字,在应用程序中起着至关重要的作用。 To begin with, it is important to understand the concept of class and object…

Palo Alto Networks漏洞防护扩展至云端

中国北京,2016年4月12日 –下一代安全企业Palo Alto Networks?(纽交所代码:PANW)近日宣布进一步增强其下一代安全平台,扩展漏洞防护能力,以满足那些依赖云环境和SaaS应用的业务对安全的需求。 企业机构需要变得更加灵活和有竞争力…

java 嵌套调用_Java嵌套类的使用

嵌套类是指被定义在另一个类内部的类,它为外部类提供服务。嵌套类分四种:静态成员类、非静态成员类、匿名类和局部类。一、静态成员类与非静态成员类的区别?在什么情况下可以用静态成员类?我们知道在类的设计中,为了避…

c语言getenv函数_getenv()函数与C ++中的示例

c语言getenv函数C getenv()函数 (C getenv() function) getenv() function is a library function of cstdlib header. It is used to get the environment string. It accepts a parameter which is an environment variable name (platform dependent, it may either case s…

isless()函数与C ++中的示例

C isless()函数 (C isless() function) isless() function is a library function of cmath header, it is used to check whether the given first value is less than the second value. It accepts two values (float, double or long double) and returns 1 if the first …

停牌17个月 汉能薄膜真的要复牌了?

最近,停牌超过一年的汉能薄膜又有新进展。 10月7日,路透社引述知情人士的消息称,香港证监会或将允许汉能薄膜发电复牌,不过复牌的前提是需汉能将符合一些特定条件。 该消息人士透露,证监会告知汉能,若要恢复…

hive java udf_UDF_Hive教程_田守枝Java技术博客

UDF是User-Defined Functions(用户定义函数)的简称。通过以下命令可以查看HIVE中函数的相关文档:SHOW FUNCTIONS;DESCRIBE FUNCTION ;DESCRIBE FUNCTION EXTENDED ;1、UDF函数可以直接应用于select语句,对查询结构做格式化处理后,再输出内容。…

python 示例_带有示例的Python列表remove()方法

python 示例列出remove()方法 (List remove() Method) remove() method is used to remove the first occurrence of the given element, the method is called with this list (the list from which we have to remove the element) and accepts the element to be removed as…