December 03, 2010 author the5fire
After nearly two weeks of intense and intense cryptographic learning, it is finally time to come to an end. Since it is a paragraph, there will be a paragraph, so it is necessary.
The title of this paper is "three rounds of S-DES software to achieve differential attacks", for this topic is also arranged to conquer the plan:
1. The software implements the DES algorithm and implements the encryption and decryption function. Article: using Java to implement real data DES encryption (Java source code) is the product of this stage.
2. The software realizes the S-DES algorithm and completes the encryption and decryption function. Article: S-DES algorithm JAVA Implementation (source code download) is the product of this stage.
3. Learn what three rounds of DES and three rounds of S-DES. Article: three-wheeled des and triple DES
4. Learn about differential attacks and master their principles. Stage product: differential cryptanalysis Overview
5. Use differential analysis to attack three rounds of DES. Stage product: three rounds of des process overview in differential analysis and three rounds of des attack in Software
6. Use differential analysis to attack three rounds of S-DES. Stage product: None
At present, the fifth stage has been completed, where the papers are regarded as course papers, and the final one is the graduation thesis. In fact, des is more complex than S-DES, but the research on S-DES difference analysis seems not much, the difference analysis on des at that time a lot. Therefore, this paper is the difference analysis of S-DES.
I am about to start my internship this month, and I am about to spend half of my learning time. But if my head is there, I can't learn it. Why can't I learn it.
The next step is to learn Java Web development. Java is a network programming language. Therefore, it should have a different flavor. Have a cup of coffee and see how it tastes.