Cryptography Beginner (i) basic concepts and DES encryption algorithm

Source: Internet
Author: User
Tags password book idf

1th Chapter

Encryption-Decryption

Decipher

PlainText-redaction

Secret key

Cryptographic algorithms

Symmetric password-public key password (asymmetric password)

One-way hash function-hash value

Message Authentication Code

Digital signatures

Pseudo-random number generator

The corresponding diagram of the threat and cipher technology in information security

---

Implicit writing technique

Digital watermark

Do not use a secret cipher algorithm

Password algorithm password early evening to the show

Developing high-strength cryptographic algorithms is very difficult.

Using low-strength passwords is more dangerous than not doing task encryption

Any password will be cracked someday.

2nd Chapter

Caesar Password: The alphabet is encrypted with a certain number of rows "panning". The use of brute force cracking is easy to decrypt.

Simple replacement Password: Use the letter substitution table for encryption. Use brute force and frequency analysis to decipher passwords.

Enigma:

Enigma is a machine consisting of a keyboard, a gear, and a battery box bulb.

The daily password is recorded by the IDF password

Enigma's Weaknesses:

The communication password is entered continuously and encrypted two times.

The communication password is artificially selected.

An IDF code book must be distributed.

3rd. Symmetric password

encoding : An operation that maps something in the real world to a sequence of bits becomes encoded.

XOR: XOR operation, same as 0 xor, 0xor0=0,0xor1=1,1xor0=1,1xor1=0

the nature of the XOR : A xor or B XOR B is a.

One-time password book-the password that will never be deciphered

Definition: XOR the plaintext with a sequence of bits and the length of the plaintext.

does not have practicality.

DES (Data Encryption Standard)

Now des has been able to crack, the strength is not as good as before.

Specific operation:

Des is a symmetric cipher algorithm that encrypts 64 bits of plaintext into 64 bits of ciphertext, with a key length of 56 bits.

Des is encrypted in plaintext (bit sequence) of 64 bits, and this 64-bit unit becomes a grouping.

Feistel Network

Triple DES (Triple-des)

Triple DES is a cryptographic algorithm that is obtained to increase des strength by repeating des three times.

Triple DES has backward compatibility with Des.

Cryptography Beginner (i) basic concepts and DES encryption algorithm

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.