Detailed parsing Data Encryption

Source: Internet
Author: User

Data Encryption terminology

Plaintext: Raw or unencrypted data. The encryption algorithm is used to encrypt it. The input information of the encryption algorithm is plain text andKey;

Ciphertext: Plaintext encrypted format, which is the output information of the encryption algorithm. The encryption algorithm is public, while the key is not public. Ciphertext, which should not be understood by keyless users for data storage and transmission.

For example, the plaintext is a string: as kingfishers catch fire is easy to use. Assume that the data processed is only uppercase letters and spaces ). Assume that the key is a string: ELIOT

Data Encryption Algorithm

1) block space characters that divide plaintext into multiple Key Strings in length are expressed as "+)

 
 
  1. AS+KI NGFIS HERS+ CATCH +FIRE 

2) 00 ~ An integer in the range of 26 replaces each character in the plain text. The space character is 00, A = 01,..., Z = 26:

 
 
  1. 0119001109 1407060919 0805181900 0301200308 0006091805 

3) Replace each character of the key in the same way as Step 2:

 
 
  1. 0512091520 

4) for each block in the plain text, replace each character with the corresponding integer encoding and the integer encoding of the character at the corresponding position in the key and the value after the modulo 27:

5) Replace the integer encoding in the result of step 4 with its equivalent character:

 
 
  1. FDIZB SSOXL MQ+GT HMBRA ERRFY 

If a key is provided, the decryption process in this example is very simple. The problem is how difficult it is for a malicious attacker to obtain a key using a matched plaintext or ciphertext without knowing the key? For the simple example above, the answer is quite easy, not general, but the complex encryption mode is also very easy to design.

The best case is that the encryption mode allows attackers to pay far more than the benefits they obtain for cracking. In fact, this objective applies to all security measures. The acceptable final goal of this encryption mode is that even the inventor of this mode cannot obtain the key through the matching plaintext and ciphertext, and thus cannot crack the ciphertext.

The introduction of encryption technology is complete, and we hope you can solve it. For more information, see: Detailed parsing of Data Encryption

  1. Generate and exchange pre-shared keys
  2. PKI Basic Content 1)
  3. How long does it take to crack your password?
  4. Password Technology at the core of information security
  5. Expose new methods for wiki decryption to steal confidential information
  6. Network threat defense UTM technical decryption illustration)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.