In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-02 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
This article is to share with you about what the data encryption algorithm is. The editor thinks it is very practical, so share it with you as a reference and follow the editor to have a look.
Data encryption algorithm is a symmetrical encryption algorithm, which is the most widely used key system, especially in protecting the security of financial data; cryptographic algorithm is the general name of encryption algorithm and decryption algorithm, it is the core of cryptosystem, cryptographic algorithm can be regarded as some combination of exchange, when the input is plaintext, after these transformations, the output is ciphertext, this process is the encryption algorithm.
Data encryption algorithm (Data Encryption Algorithm,DEA) is a symmetric encryption algorithm, which is probably the most widely used key system, especially in protecting the security of financial data, the originally developed DEA is embedded in hardware. Typically, automatic teller machines (Automated Teller Machine,ATM) use DEA. It comes from the research work of IBM, and IBM also had a patent on it for several years, but after it expired in 1983, it is in the public domain, allowing it to be used free of royalties under certain conditions. It was formally adopted by the United States government in 1997.
Characteristics
Cryptographic algorithm is the general name of encryption algorithm and decryption algorithm, and it is the core of cryptosystem. Cryptographic algorithms can be seen as combinations of exchanges. When the input is plaintext, after these transformations, the output is ciphertext. This is the process of encryption exchange, where the cryptographic algorithm is called the encryption algorithm.
On the contrary, when the input is ciphertext, after password transformation, the output is plaintext, this is the process of decryption exchange, and the cryptographic algorithm is called decryption algorithm. Commonly used encryption algorithms are: AES, RSA/ECC, Diffie-hellman, SHA-1/SHA-256.
Encryption standard
The original idea of DES can refer to the Enigma machine of Germany in World War II, and its basic idea is roughly the same. The traditional password encryption comes from the ancient idea of cyclic shift, on the basis of which the Enigma machine is diffused and blurred. But the essential principle is all the same. Modern DES does the same thing at the binary level: instead of ambiguity, it makes analysis more difficult.
Encryption principle
DES uses a 56-bit key and additional 8-bit parity bits (the 8th bit of each set is used as parity bits) to produce a maximum packet size of 64 bits. This is an iterative block cipher using a technique called Feistel where encrypted text blocks are split in half.
Apply the loop function to half of them using the subkey, and then "XOR" the output with the other half; then exchange the two halves, and the process continues, but the last loop is not exchanged. DES uses 16 cycles and uses four basic operations: XOR, permutation, substitution, and shift operations.
Triple DES
A common variant of DES is triple DES (3DES), a mechanism for encrypting data three times (using DES three times) with a key of 16856 bits; it usually (but not always) provides extremely strong security. If the three 56-bit child elements are the same, the triple DES is backward compatible with DES.
Thank you for reading! This is the end of this article on "what is the data encryption algorithm?". I hope the above content can be of some help to you, so that you can learn more knowledge. If you think the article is good, you can share it out for more people to see!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.