当前位置:网站首页>Des/3des/aes differences
Des/3des/aes differences
2022-07-27 10:18:00 【Xiang Yu Han】
DES
1977 year 1 month , The United States government promulgated : Adopt IBM The scheme designed by the company is the official data encryption standard for non confidential data (DESData Encryption Standard) .
Currently in China , With the launch of the three gold projects, especially the gold card project ,DES Algorithm in POS、ATM、 Magnetic card and smart card (IC card )、 Gas station 、 Highway toll stations and other fields are widely used , In order to achieve the confidentiality of key data , Such as the credit card holder's PIN Encrypted transmission of ,IC Card and POS Two way authentication between 、 Financial transaction data package MAC Verification, etc , All used DES Algorithm .
DES There are three entry parameters of the algorithm :Key、Data、Mode.
among Key by 8 Bytes in total 64 position , yes DES Working key of algorithm ;
Data Also for the 8 Bytes 64 position , Data to be encrypted or decrypted ;
Mode by DES How it works , There are two kinds of : Encrypt or decrypt .
DES The algorithm works like this :
Such as Mode For encryption , Then use Key Go get the data Data To encrypt , Generate Data In the form of a password (64 position ) As DES Output result of ;
Such as Mode To decrypt , Then use Key Go to the data in the form of password Data Decrypt , Revert to Data In clear code form (64 position ) As DES Output result of .
At both ends of the communication network , Both parties agree Key, At the source of communication Key The core data is DES encryption , Then in the form of password in the public communication network ( Such as the telephone network ) To the end of the communication network , When the data reaches the destination , Use the same Key Decrypt password data , It reproduces the core data in clear code form . such , It ensures the core data ( Such as PIN、MAC etc. ) Security and reliability of transmission in public communication network .
By regularly switching to new ones at the source and destination of the communication network at the same time Key, It can further improve the confidentiality of data , This is the popular practice of financial trading networks .
3DES
3DES yes DES A mode of encryption algorithm , It USES 3 strip 64 The key of bit encrypts the data three times . Data encryption standard (DES) It is a long-standing encryption standard in the United States , It uses symmetric key encryption .
3DES( namely Triple DES) yes DES towards AES Transitional encryption algorithm (1999 year ,NIST take 3-DES Specified as a transitional encryption standard ), yes DES A safer variant of . It uses DES For basic modules , We design a group encryption algorithm by combining groups .
AES
AES(Advanced Encryption Standard): Advanced encryption standard , Is the next generation of encryption algorithm standards , Fast , High level of security .
use AES encryption 2000 year 10 month ,NIST( The American National Institute of standards and Technology ) Announced from 15 A new key encryption standard selected from three candidate algorithms .Rijndael Selected to be the future AES.Rijndael Is in 1999 In the second half of , By researchers Joan Daemen and Vincent Rijmen Created .AES It is increasingly becoming the actual standard for encrypting various forms of electronic data .
American Institute of standards and Technology (NIST) On 2002 year 5 month 26 A new advanced encryption standard was formulated on the th (AES) standard .
AES The algorithm is based on permutation and permutation . array Is to rearrange the data , substitution Is to replace one data unit with another .
AES Several different methods are used to perform permutation and permutation operations .AES It's an iterative 、 Password of symmetric key packet , It can be used 128、192 and 256 A key , And use 128 position (16 byte ) Group encryption and decryption data .
Unlike public key encryption, which uses key pairs , Symmetric key cryptography uses the same key to encrypt and decrypt data . The number of bits of encrypted data returned through block cipher is the same as the input data . Iterative encryption uses a circular structure , In this loop, the input data is replaced and replaced repeatedly .
边栏推荐
- Shell综合应用案例,归档文件、发送消息
- Practice and exploration of overseas site Seata of ant group
- Reason for pilot importerror: cannot import name 'pilot_ Version 'from' PIL ', how to install pilot < 7.0.0
- NFS 服务器的搭建
- Snowflake vs. databricks who is better? The latest war report in 2022
- NFT system development - Tutorial
- 【英雄哥六月集训】第 24天: 线段树
- Hugo learning notes
- Pygame: alien invasion
- When I went to oppo for an interview, I got numb
猜你喜欢

Snowflake vs. databricks who is better? The latest war report in 2022

Shell operator, $((expression)) "or" $[expression], expr method, condition judgment, test condition, [condition], comparison between two integers, judgment according to file permission, judgment accor

Reason for pilot importerror: cannot import name 'pilot_ Version 'from' PIL ', how to install pilot < 7.0.0

数据分析如何解决商业问题?这里有份超详细攻略

Food safety | the kitchen board environment is very important. Do you know these use details?

Vs2019 Community Edition Download tutorial (detailed)

3D人脸重建:Joint 3D Face Reconstruction and Dense Alignment with position Map Regression Network

Leetcode.1260. 2D grid migration____ In situ violence / dimensionality reduction + direct positioning of circular array

VS2019+CUDA11.1新建项目里没有CUDA选项

Anaconda安装(非常详细)
随机推荐
Girl fan wants to find a boyfriend, but it's for
Ant高级-path和fileset
hugo学习笔记
FSM onehot answer record
PCL各模块概述(1.6)
邮件服务器
Pyautogui实现自动化办公-RPA小case
How to create a.Net image with diagnostic tools
hdu5289(Assignment)
Shell变量、系统预定义变量$HOME、$PWD、$SHELL、$USER、自定义变量、特殊变量$n、$#、$*、[email protected]、$?、env看所有的全局变量值、set看所有变量
wind10配置adb命令
Shell流程控制(重点)、if 判断、case 语句、let用法、for 循环中有for (( 初始值;循环控制条件;变量变化 ))和for 变量 in 值 1 值 2 值 3… 、while 循环
Huawei switch dual uplink networking smart Link Configuration Guide
Visual slam lecture notes (I): Lecture 1 + Lecture 2
ORACLE 11g手动内存管理
Anaconda installation (very detailed)
直播倒计时 3 天|SOFAChannel#29 基于 P2P 的文件和镜像加速系统 Dragonfly
Summary of binary tree exercises
RobotFramework+Eclispe环境安装篇
Shell运算符、$((运算式))” 或 “$[运算式]、expr方法、条件判断、test condition、[ condition ]、两个整数之间比较、按照文件权限进行判断、按照文件类型进行判断