FROM

honggarae 22/02/2022 1178

DESalgorithmentryparameters

TherearethreeentryparametersofDESalgorithm:Key,Data,Mode.Keyis7bytesand56bitsintotal,whichistheworkingkeyoftheDESalgorithm;Datais8bytesand64bits,whichisthedatatobeencryptedordecrypted;ModeistheworkingmodeofDES,andtherearetwotypes:encryptionOrdecrypt.

ThebasicprinciplesofDES

ThetwoprinciplesofblockcipherdesignareusedinthedesignofDES:confusionanddiffusion,thepurposeofwhichistocounterthestatisticsofthecryptographicsystembytheadversaryanalyze.Confusionistomaketherelationshipbetweenthestatisticalpropertiesoftheciphertextandthevalueofthekeyascomplicatedaspossible,sothatthedependencebetweenthekey,theplaintextandtheciphertextisunavailabletothecryptanalyst.Thefunctionofdiffusionistoapplytheinfluenceofeachplaintexttomoreoutputciphertextbitsasquicklyaspossible,soastoeliminatethestatisticalstructureoftheplaintextinalargenumberofciphertexts,andmaketheinfluenceofeachkeyasquicklyaspossibleThegroundisextendedtomoreciphertextbitstopreventdecipheringthekeypiecebypiece.

Algorithmsteps

TheDESalgorithmturnsa64-bitplaintextinputblockintoa64-bitciphertextoutputblock,andthekeyitusesisalso64bits(56bitsareactuallyused)The8,16,24,32,40,48,56,and64bitsarecheckdigits,sothateachkeyhasanoddnumberof1).Thealgorithmismainlydividedintotwosteps:

1)Initialreplacement

Itsfunctionistorecombinetheinput64-bitdatablockbitbybit,anddividetheoutputintotwopartsL0andR0,eachpartis32bitslong,anditsreplacementruleistoinputThe58thplacewaschangedtothefirstplace,the50thplacewaschangedtothesecondplace...andsoon,thelastplaceistheoriginal7thplace.L0andR0arethetwopartsafterthetranspositionoutput,L0istheleft32bitsoftheoutput,R0istheright32bits,forexample:settheinputvaluebeforethereplacementtoD1D2D3...D64,thentheresultaftertheinitialreplacementis:L0=D58D50……D8;R0=D57D49……D7.

Thereplacementrulesareshowninthefollowingtable:

58,50,42,34,26,18,10,2,

60,52,44,36,28,20,12,4,

62,54,46,38,30,22,14,6,

64,56,48,40,32,24,16,8,

57,49,41,33,25,17,9,1,

59,51,43,35,27,19,11,3,

61,53,45,37,29,21,13,5,

63,55,47,39,31,23,15,7,

p>

2)Inversepermutation

After16iterations,L16andR16areobtained,whichareusedasinputtoperforminversepermutation.Inversepermutationisjusttheinverseoperationofinitialpermutation,thusGettheciphertextoutput.

Thisalgorithmisarepresentativeofthesymmetricencryptionalgorithmsystemandiswidelyusedincomputernetworksystems.

DESand3DES

3DES(ieTripleDES)isanencryptionalgorithmtransitioningfromDEStoAES.Itusesthree56-bitkeystoencryptdatathreetimes.ItisasafervariantofDES.ItusesDESasthebasicmoduleanddesignsablockencryptionalgorithmthroughacombinedblockmethod.ComparedwiththeoriginalDES,3DESismoresecure.

ThismethodusestwokeystoexecutetheDESalgorithmthreetimes.Theencryptionprocessisencryption-decryption-encryption,andthedecryptionprocessisdecryption-encryption-decryption.

The3DESencryptionprocessis:C=Ek3(Dk2(Ek1(P)))

The3DESdecryptionprocessis:P=Dk1(EK2(Dk3(C)))

p>

Theadvantagesofusingtwokeysfortripleencryptionareasfollows:

①Thetwokeyscombinedhaveaneffectivekeylengthof112bit,whichcanmeettheneedsofcommercialapplications.Ifthetotallengthis168bitThethreekeyswillgenerateunnecessaryoverhead.

②Encryption-decryption-encryptionisusedforencryptioninsteadofencryption-encryption-encryption,whicheffectivelyrealizesthebackwardcompatibilitywiththeexistingDESsystem.BecausewhenK1=K2,theeffectoftripleDESisthesameastheoriginalDES,whichhelpstograduallypromotetripleDES.

③TripleDEShassufficientsecurity,andthereisnoreportonthebreachof3DES.

Latest: Computer Application Technology

Next: logic operation