Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

The concept of encryption and decryption and the implementation of DES encryption algorithm

2025-04-03 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Plaintext: also known as plain text is information that users can directly understand

Cipher text: Cipher text is a collection of meaningless random code

Encryption: Encryption is the process of converting plaintext into ciphertext under the control of a specific algorithm and key.

Decryption: converting ciphertext into plaintext by inputting a secret key under the control of a specific algorithm

encryption algorithm decryption algorithm

plaintext------------------

Encryption algorithm is divided into symmetric encryption algorithm (private key algorithm) and asymmetric encryption algorithm (public key algorithm), symmetric encryption algorithm and asymmetric encryption algorithm is the difference between the encryption key and decryption key of symmetric encryption algorithm is the same.

Famous encryption algorithms are DES/3DES, IDEA, RC series, CAST, AES advanced data encryption, etc.

DES encrypts 64-bit ciphertext blocks in block mode, with a fixed 56-bit key. The encryption process is as follows:

Input 64-bit plaintext data----permutation function permutation-----16 rounds of iteration under key control-----swap left and right 32 bits------second permutation with inverse function----output ciphertext data

3DES encryption algorithm is to use three keys respectively DES algorithm implementation three times

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report