您好,欢迎访问三七文档
当前位置:首页 > 商业/管理/HR > 质量控制/管理 > 密码学与计算机安全 第七讲:现代分组密码
第七讲:现代分组密码1.DES(DataEncryptionStandard)HistorycurrentlythemostwidelyusedblockcipherintheworlddevelopedasaresultoftheNBS(nowNIST)calledforpossibleencryptionalgorithmsforuseinunclassifiedgovernmentapplicationsinMay1973,andagaininAug1974responsewasmostlydisappointing(reworkedclassicalormachineciphers)howeverIBMsubmittedLuciferwasredesignedtobecametheDataEncryptionStandard(DES)7现代分组密码(续)adoptedasa(US)federalstandardinNov76publishedbyNBSasahardwareonlyschemeinJan77byANSIforbothh/w&s/winANSIX3.92-1981(&X3.106-1983modesofuse)subsequentlywidelyadoptedandisinmanystandardsaroundtheworldcfAustralianStandardAS2805.5-1985oneofthelargestusersoftheDESisthebankingindustry,particularlywithEFT,andEFTPOSitisforthisusethattheDEShasprimarilybeenstandardised,withANSIreconfirmingitsusefor5yearperiods-infuturewilluseAES2。DESDesignControversyalthoughthestandardispublic,thedesigncriteriausedareclassifiedwasconsiderablecontroversyoverthedesignparticularlyinthechoiceofa56-bitkey,cf.WDiffie,MHellmanExhaustiveCryptanalysisoftheNBSDataEncryptionStandardIEEEComputer10(6),June1977,pp74-84MHellmanDESwillbetotallyinsecurewithintenyearsIEEESpectrum16(7),Jul1979,pp31-413.DESSecurityrecentanalysishasshowndespitethisthatthechoicewasappropriate,andthatDESiswelldesignedrapidadvancesincomputingspeedthoughhaverenderedthe56bitkeysusceptibletoexhaustivekeysearch,aspredictedbyDiffie&Hellmanhavedemonstratedbreaks:1997onalargenetworkofcomputersinafewmonths1998ondedicatedh/w(EFF)inafewdays1999abovecombinedin22hrs!theDESalsotheoreticallybrokenusingDifferentialorLinearCryptanalysisinpractiseisunlikelytobeaproblemyet4.OverviewoftheDESEncryptionAlgorithmthebasicprocessinencipheringa64-bitdatablockusingtheDESconsistsof:aninitialpermutation(IP)16roundsofacomplexkeydependentcalculationfafinalpermutation,beingtheinverseofIP5.DESKeySchedulethesubkeysusedineachroundareformedbythekeyschedulewhichhas:aninitialpermutationofthekey(PC1)whichselects56-bitsintwo28-bithalves16stagesconsistingof:selecting24-bitsfromeachhalfpermutingthembyPC2foruseinfunctionf,rotatingeachhalfseparatelyeither1or2placesdependingonthekeyrotationscheduleKScanbedescribedfunctionallyas:SKi=PC2(KS(PC1(Key),i))6.PC1PC1isusedtoselect56of64bitssuppliedasthekeyevery8thbitisdiscarded(assumedtobeparity)nb.simplisitics/wimplementationswhichjustconcatenate8bytes,essentiallyonlyhave48-bitsPC1alsosplitsthekeybitsinto2halves(CandD)nb.inDESnumberbitsfrom1(left,MSB)to32/64(right,LSB)57,49,41,33,25,17,9,CHalf1,58,50,42,34,26,18,10,2,59,51,43,35,27,19,11,3,60,52,44,36,63,55,47,39,31,23,15,DHalf7,62,54,46,38,30,22,14,6,61,53,45,37,29,21,13,5,28,20,12,4
本文标题:密码学与计算机安全 第七讲:现代分组密码
链接地址:https://www.777doc.com/doc-3277704 .html