1 / 4
文档名称:

计算机加密算法原理入门.doc

格式:doc   大小:62KB   页数:4页
下载后只包含 1 个 DOC 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

计算机加密算法原理入门.doc

上传人:yzhluyin9 2017/2/24 文件大小:62 KB

下载得到文件列表

计算机加密算法原理入门.doc

文档介绍

文档介绍:The symmetric key algorithms fall into two categories: ? Block ciphers: ? Operate on 64-bit message blocks. Even though most of the block ciphers operate on a 64-bit block, it is not an absolute requirement. ? Stream ciphers: ? Operate on a stream of data, which basically means they operate on a byte ata time. Chaining Mechanics in Block Cipher In the block ciphers, it is necessary to break up larger messages into 64-bit blocks and somehow chain them together. mon chaining mechanisms called modes exist, and each mode defines a method bining the plain text (the message that is not encrypted), the secret key, and the cipher text (the encrypted text) to generate the stream of cipher text that is actually transmitted to the recipient. These four modes are as follows: 1. Electronic codebook (ECB) The ECB chaining mechanism encodes each 64-bit block independently but uses the same key. The result is that the same plain text will always result in the same cipher text. This weakness can be exploited in multiple ways. For example, ifa snooper knows the plain text and the corresponding cipher text, that person can at least understand some parts ofa message. Another Vulnerability is the opportunity for an eavesdropper to analyze and perform pattern matching. A much simpler vulnerability is that an eavesdropper can recognize a change of information (when the cipher text changes) and make i