In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
This article is about what the DES encryption algorithm is. The editor thinks it is very practical, so share it with you as a reference and follow the editor to have a look.
The most representative symmetric encryption algorithm is the DES encryption algorithm. DES encryption adopts the method of block encryption, which uses 56-bit key to encrypt 64-bit plaintext and finally produces 64-bit ciphertext; the algorithm features: short packet, too short key, short password life cycle and slow operation speed.
Among the symmetric encryption algorithms, the most classical and representative algorithm is DES encryption algorithm.
DES algorithm is a symmetric cryptosystem in the cryptosystem, also known as the American data encryption Standard. It is a symmetric cryptosystem encryption algorithm developed by IBM Company in 1972. The plaintext is grouped according to 64 bits, the key length is 64 bits, and the key is actually 56 bits participating in the DES operation (8, 16, 24, 32, 40, 48, 56, 64 bits are parity bits, so that each key has an odd number of 1) the plaintext group and the 56-bit key are replaced by bits or exchanged to form ciphertext groups.
Basic principles:
There are three entry parameters: key, data, and mode. Key is the key used for encryption and decryption, data is the encryption and decryption of data, and mode is its working mode. When the mode is encrypted, the plaintext is grouped according to 64 bits to form a plaintext group. Key is used to encrypt data, and when the mode is decryption mode, key is used to decrypt data. In practical application, the key only uses 56 of the 64 bits, so it has high security.
DES features:
DES algorithm has extremely high security. Except for using exhaustive search method to attack DES algorithm, no more effective method has been found. On the other hand, the exhaustive space of 56-bit long keys is 2 ^ 56, which means that if a computer detects one million keys per second, it will take nearly 2285 years to search for all keys. However, this does not mean that DES is unbreakable. In fact, with the development of hardware technology and Internet, it is more and more possible to crack it, and it takes less and less time. It takes hours to use specially designed hardware for parallel processing.
In order to overcome the defect of small key space of DES, the transformation mode of triple DES is proposed.
Thank you for reading! This is the end of this article on "what is the DES encryption algorithm?". I hope the above content can be of some help to you, so that you can learn more knowledge. if you think the article is good, you can share it out for more people to see!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.