畢業(yè)設計論文 外文文獻翻譯 DES算法的安全性及其應用 中英文對照_第1頁
畢業(yè)設計論文 外文文獻翻譯 DES算法的安全性及其應用 中英文對照_第2頁
畢業(yè)設計論文 外文文獻翻譯 DES算法的安全性及其應用 中英文對照_第3頁
畢業(yè)設計論文 外文文獻翻譯 DES算法的安全性及其應用 中英文對照_第4頁
畢業(yè)設計論文 外文文獻翻譯 DES算法的安全性及其應用 中英文對照_第5頁
已閱讀5頁,還剩11頁未讀 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領

文檔簡介

1、算法的安全性及其應用摘要 :對des算法的加密進行分析,提出des算法安全性問題,介紹了des算法的應用,指出密鑰的長度、多重des算法、算法的安全管理、弱密鑰等安全性問題必須給予重視。關鍵詞 : des算法 ; 密鑰 ; 加密 ; 安全性 ; 應用.數據加密標準(data encryption standard , des)是美國國家標準局研究,除美國國防部以外其他部門的計算機系統(tǒng)的數據加密標準,屬于分組密碼的一種,在具體的應用中還無法將這種加密算法完全破解掉,因此也被美國政府作為限制出口的一種技術,它目前仍被廣泛使用,具有較高的安全性。1.des算法概述des是一個對稱算法:加密和解密用的

2、是同一算法(除密鑰編排不同以外),既可用于加密又可用于解密。它的核技術是:在相信復雜函數可以通過簡單函數迭代若干圈得到的原則下,利用f函數及對合等運算,充分利用非線性運算。des以64位為分組對數據加密。每組64位,最后一組若不足64位以“0”補齊。密鑰通常表示為64位的數,但每個第8位都用作奇偶校驗,可以忽略,所以密鑰的長度為56位,密鑰可以是任意的56位的數,且可在任意的時候改變。其中極少量的數被認為是弱密鑰,但能容易地避開它們,所有的保密性依賴于密鑰。2.des算法的加密分析 2.1 des算法的基本思想des對64位的明文分組進行操作。通過一個初始置換,將明文分組分成左半部分(l0)和

3、右半部分(r0),各32位長。r0與子密鑰k1進行f函數的運算,輸出32位的數,然后與l0執(zhí)行異或操作得到r1,l1則是上一輪的r0,如此經過16輪后,左、右半部分合在一起,經過一個末置換(初始置換的逆置換),這樣該算法就完成了。2.2 初始置換初始置換在第一輪運算前執(zhí)行,對輸入分組實施如表1所示的變換(此表應從左向右、從上向下讀)。例如,初始位置把明文的第58位換到第1位的位置,把第50位換到第2位的位置,把第42位換到第3位的位置等等。初始置換和對應的末置換并不影響des的安全性。它的主要目的是為了更容易地將明文與密文數據以字節(jié)大放入des芯片中。2.3 子密鑰的生成子密鑰的產生如圖1所示

4、1。將64位密鑰進行密鑰置換,不考慮每個字節(jié)的第8位,des密鑰由64位減至56位,56位密鑰被分成兩部分,前28位為c0,后28位為d0。c0,d0。接著,根據輪數,c0和d0分別經過lsi循環(huán)左移1位或2位。16次循環(huán)左移的位數依據下列規(guī)則進行:循環(huán)左移位數 ,經過循環(huán)左移得到的ci,di經過壓縮置換即得到子密鑰ki(,16)。壓縮置換也稱作置換選擇,就是從56位中選出48位,表2定義了壓縮置換。例如,處在第33位位置的那一位在輸出時移到了第35位的位置,而處在第 18位位置的那一位被略去。2.4 16輪迭代過程 算法有16次迭代,迭代如圖2所示2。從圖中可得到 ,。 函數的實現原理是將進

5、行擴展置換后其結果與進行異或,并把輸出內容執(zhí)行s盒替代與p盒轉換后得到,其原理如圖3所示3。 擴展置換也叫做e盒,它將數據右半部分從32位擴展到48位,改變了位的次序,重復了某些位,比原輸入長了16位,數據位仍取決于原輸入。擴展置換的48位輸出按順序分成8組,每組6位,分別輸入8個s子盒,每個子盒輸出4 位,共32位。假設將s盒的6位的輸入標記為b1、b2、b3、b4、b5、b6,則b1和b6組合構成了一個2位的數,從0到3,它對應著s表中的一行。從b2 到 b5構成了一個4位的數,從0到15,對應著表中的一列,行列交匯處的數據就是該s盒的輸出。每個s盒被看作一個4位輸入的代替函數:b2到b5

6、直接輸入,輸出結果為4位,b1和b6位來自臨近的分組,它們從特定的s盒的4個代替函數中選擇一個。這是該算法的關鍵步驟,所有其他的運算都是線性的,易于分析,而s盒是非線性的,它比des其他任何一步提供了更好的安全性。p盒轉換是把每個輸入位映射到輸出位,任意一位不能被映射兩次,也不能被略去。2.5 末置換末置換是初始置換的逆過程,des在最后一輪后,左半部分和右半部分并未交換,而是將r16和l16并在一起形成一個分組作為末置換的輸入。3 des算法安全性問題3.1 des算法密鑰的長度最初的羅斯福密碼中密鑰長度為128位,的加密單位僅有64位二進制,而且其中某些位還要用于奇偶校驗或其他通訊開銷,有

7、效密鑰只有56位, 這對于數據傳輸來說太小,各次迭代中使用的密鑰ki是遞推產生的,這種相關性必然降低了密碼體制的安全性。因此,人們會對56位密鑰的安全性產生質疑,那么56位密鑰是否足夠,已成為人們爭論的焦點之一。至今,最有效的破解des算法的方法是窮舉搜約是228,493,000年。但是,仍有學者認為在可預見的將來用窮舉法尋找正確密鑰已趨于可行,所以若要安全保護10年以上的數據最好不用des算法。近年來有人提出用差分和線性攻擊方案來破解des算法,雖然,從理論上來說破譯的性能高于窮舉搜索法,但要有超高速計算機提供支持,以致于美國國家保密局和計算機科學技術學會組織各界專家研究des密碼體制的安全

8、性問題后,得出樂觀的結論:沒有任何可以破譯des密碼體制的系統(tǒng)分析法。若使用窮舉法,則在1990年以前基本上不可能產生出每天能破譯一個des密鑰的專用計算機。即使屆時能制造出這樣的專用機,它的破譯成功率也只會在0.1到0.2之間,而且造價可能高達幾千萬美元。根據目前的計算技術和des的分析情況,16圈des(采用16輪迭代)仍然是安全的,但提醒使用者不要使用低于16圈的des,特別是10圈以下的des。盡管如此,我們仍然需要考慮對des算法進行改進,使密鑰長度增加些,以實現更好的保密功能。3.2 多重des算法針對des算法上的缺陷,各國專家們都在研究如何增強des算法的安全性,現在已發(fā)展出幾

9、十種改進的des,經過比較,筆者認為多重des具有較高的可行性。為了增加密鑰的長度,采用多重des加密技術,將分組密碼進行級聯,在不同的密鑰作用下,連續(xù)多次對一組明文進行加密。針對des算法,專家們的共識是采用3重des加密算法。3重des方法需要執(zhí)行3次常規(guī)的des加密步驟,但最常用的3重des算法中僅僅用兩個56位des密鑰。假設這兩個密鑰為k1與k2,其算法的步驟是:)用密鑰k1進行des加密;)用步驟1的結果使用密鑰k2進行des解密;)用步驟2的結果使用密鑰k1進行des加密。這個過程稱為ede(加密解密加密)。三重des可使加密密鑰長度擴展到128位,其中有效112位。三重des的

10、112位密鑰長度在可以預見的將來可認為是合適的、安全的,據稱,目前尚無人找到針對此方案的攻擊方法。因為要破譯它可能需要嘗試256個不同的56位密鑰直到找到正確的密鑰。但是三重des的時間是des算法的3倍,時間開銷較大。 3.3 避開des算法漏洞,實現安全管理在des密鑰key的使用、管理及密鑰更換的過程中,應絕對避開des算法的應用誤區(qū),即:絕對不能把key的第 、 位作為有效數據位,來對key進行管理。從上述des算法的描述中知道,每個字節(jié)的第8位作為奇偶校驗位以確保密鑰不發(fā)生錯誤,這8位不參與des運算。因此,特別推薦給金融銀行界及非金融業(yè)界的領導及決策者們,尤其是負責管理密鑰的人,要

11、對此點予以高度重視。有的銀行金融交易網絡,利用定期更換des密鑰key的辦法來進一步提高系統(tǒng)的安全性和可靠性,如果忽略了上述應用誤區(qū),那么,更換新密鑰將是徒勞的,將威脅到金融交易網絡的安全運行,所以更換密鑰一定要保證新key與舊key真正的不同即除了第 、 位以外其它位數據發(fā)生了變化,這樣才能保證des算法安全可靠發(fā)揮作用,須務必對此保持高度重視。現代密碼學的特征是算法可以公開。保密的關鍵是如何保護好自己的密鑰,而破密的關鍵則是如何能破解得到密鑰。統(tǒng)的安全主管者,要根據本系統(tǒng)實際所使用的密鑰長度與其所保護的信息的敏感程度、重要程度以及系統(tǒng)實際所處安全環(huán)境的惡劣程度,在留有足夠的安全系數的條件下

12、來確定其密鑰和證書更換周期的長短。同時,將已廢棄的密鑰和證書放入黑庫歸檔,以備后用。密鑰更換周期的正確安全策略是系統(tǒng)能夠安全運行的保障,是系統(tǒng)的安全管理者最重要、最核心的日常工作任務。3.4 弱密鑰在des算法中存在12個半弱密鑰和4個弱密鑰。由于在子密鑰的產生過程中,密鑰被分成了2個部分,如果這2個部分分成了全0或全1,那么每輪產生的子密鑰都是相同的,當密鑰是全0或全1,或者一半是1或0時,就會產生弱密鑰或半弱密鑰,des算法的安全性就會變差。在設定密鑰時應避免弱密鑰或半弱密鑰的出現。4.des算法的應用自des算法頒布之后,引起了學術界和企業(yè)界的廣泛重視。許多廠家很快生產出實現des算法的

13、硬件產品,廣大用戶在市場上買到高速而又廉價的des 硬件產品之后,開始用它加密自己的重要數據,從而大大推廣了密碼技術的使用。des算法的入口參數有3個:key、data、mode。其中key為8個字節(jié)共64位,是des算法的工作密鑰;data也為8個字節(jié)64位,是要被加密或被解密的數據;mode為des的工作方式,有兩種:加密和解密。des算法是這樣工作的:如mode為加密,則用key去把數據data 進行加密,生成data的密碼形式(64位)作為des的輸出結果;如mode為解密,則用key去把密碼形式的數據data解密,還原為data的明碼形式(64 位)作為des的輸出結果。在通信網絡的

14、兩端,雙方約定了一致的 key,在通信的源點用key對核心數據進行des加密,然后以密碼形式在公共通信網(如電話網)中傳輸到通信網絡的終點,數據到達目的地后,用同樣的key對密碼數據進行解密,便再現了明碼形式的核心數據。這樣,便保證了核心數據在公共通信網中傳輸的安全性和可靠性3。通過定期在通信網絡的源端和目的端同時改用新的key,便能更進一步提高數據的保密性,這正是現在金融交易網絡的流行做法。在.net開發(fā)系統(tǒng)中,微軟公司提供了des公用密鑰的加密類,使用它,我們可以自己編制自己的標準des加密算法。在任何一個單位,程序員只要設計此程序就能對零散離散文件進行加密傳輸,而如果要和其他單位交換數據

15、,由于使用的公用算法,只需要向對方提供密鑰及算法說明即可,使用非常方便。參考文獻 :盧開澄計算機密碼學計算機網絡中的數據保密與安全:第 版北京:清華大學出版社,馮登國,吳文玲分組密碼的設計與分析北京:清華大學出版社,畢業(yè)設計(論文)英文翻譯題 目 : 基于混合密碼的數字簽名方案設計院、系(部): 電子信息工程學院專業(yè)及班級: 0 7 0 4 0 5 姓 名: 劉 軍 飛 學 號: 070405114 指 導 教師: 張 艷 玲 日 期: 2011.05.02 des algorithm safety and its applicationabstract: the encryption alg

16、orithm for des, the article analyzes the safety problems des algorithm is introduced, and points out that the application of the proposed algorithm is des key lengths, multiple des algorithm, algorithm of safety management, such as weak key safety problems must be addressed.keywords: des algorithms;

17、 key; encryption; safety; applicationdata encryption standard (des) is the u.s. national bureau of outside the u.s. defense department, in addition to other departments of the computer system data encryption standard, belongs to a block cipher in the specific application, still unable to break the e

18、ncryption algorithm, so completely off by the united states government as a technology export restrictions, it is still widely used, has higher security.1 des algorithm overviewdes is a symmetric algorithm: encryption and decryption is the same algorithm with (except the key organises different outs

19、ide), can be used not only can be used to encrypt and decrypt. it is the core technology in believe complex function can: through simple iterative several laps () function gets under the principle of duige using f function and such operations, make full use of nonlinear operations. des to 64-bit dat

20、a encryption for grouping. each group 64-bit, if one last set of less than 6 bits to 0 fill neat. key usually expressed as a 64-bit number, but each article 8 bits are used as parity and can be ignored, so dense length is 56, key can be arbitrary 56 number, and can in any time change. one of very fe

21、w number is considered weak key, but can easily avoid them, all the secrecy dependent on the keys.2 des algorithm encryption analysis2.1the basic idea of 210 des algorithmdes 64-bit expressly grouping of operation. through an initial displacement, will expressly group into left brain part (l0) and t

22、he right-side part (r0), each 32 bits long. r0 and son key k1 used, and on f function output 32-bit number, then and l0 executive xor operator get r1, l1 is the last round r0, so after 16 rounds, left, right after partial together, after a late replacement (initial displacement inversereplacement),

23、so this algorithm is completed.2.2 initial displacementinitial displacement in the first round of input, former executive computing group implement such as table 1 shows transform (this form should, from left to right to read) for example, the initial position of the proclaimed to the 58th a change

24、of position, one of the first 50 change to second place position, put the first 4 to third position, etc. initial displacement and the corresponding end displacement does not affect the safety of des. its main purpose is to will be more easily with ciphertext data in bytes written in des chip the si

25、ze.2.3the key to generate sonthe key to produce as shown in figure 1 son shown 1. will 64-bit decryption key, dont consider key replacement each byte number eight, ds keys consists of a 64-bit to 56, 56 key is divided into two parts, the first 28 bits after c0, for 28 for d0. c0 = k57k49k41. k52k44k

26、36, d0 = k63k55k47. k20k12k4. then, according to round number, c0 and d0 lsi cycle respectively after moves left in 1 or 2 bits. 16 times cycle of digit moves left the following rules: cycle according 1,1,2,2,2,2,2,2,1,2,2,2,2,2,21 left shift several.after cycle of ci, moves left get di after compre

27、ssion replacement namely get son ki (i = 1 key,., 16). compression replacement also called replacement choice, is selected from 56 48 bits, table 2 defines compression replacement. for example, in the positions is 33 output moved in a position of # 35 in 18th place, and that a position omitting .2.4

28、 16 iteration processdes algorithm has 16 iterations, the iterative as figure2shows 2. from the graph can get li = ri - 1, ri = li - 1 f (ri - 1, ki), i = 1, 2, 3. 15,16.f function realization principle is to expand ri - 1 ki after displacement and the results are different, and the output content o

29、r executive s box of alternative and p box after converting get f (ri - 1, ki), ts principle fig.03 shows 1. expand replacement also called e box, it will data from the right part 32-bit expanded to 48 bits, changed a sequence, repeat some bits, compared to the original input long 16, data bits, sti

30、ll depends on the original input. extension of the replacement of 48 bits in sequence into eight groups output, each group of six, eight s respectively input son box, each child box output four, a total of 32. assumptions will s box six input marked b1, b2, b3, b4,b5, b6, then b1 and b6 constitute a

31、 2 bits number, from 0 to 3, it corresponds to s the line. watch from b2 to b5 constituted a 4 digit number, from 0 to 15, corresponding to table a column in the ranks of the data interchange, is that the s box output. each s box can be viewed as a four input to replace function: b2 to b5 direct inp

32、ut, output results for four, b1 and b6 participants from neighboring grouping, them from specific s box 4 instead of function choose a. this is the key step in the algorithm, and all other operations are linear, easy to analysis, and s box is nonlinear, it any other step than des provides better sec

33、urity. p boxes each input a transition is mapped to output a, any one cannot be mapped twice, also cannot be cut out.2. 5 end displacementthe replacement of the initial replacement is the inverse process,des during the last round, right and left parts, but will not exchange part r16 and l16 and toge

34、ther to form a group as the input end displacement.3 des algorithm safety issues3.1 des algorithm key lengthsinitial roosevelt password for 128-bit key length, des56 bits, this is too small for data transmission, the keys used in every iteration of the recursive ki is produced, this correlation inev

35、itable reduces the password system security. therefore, people will to 56 keys have cast doubt on the safety, then 56 key whether enough, has become one of the focuses of debate.so far, the most effective cracked des algorithm method is exhaustively search method. 56 need 228,493,000 years is about.

36、 still, some scholars think in the foreseeable future exhaustion method with finding the right key has already become more and more feasible, so if want security protection of 10 years of above data had better not use des algorithm.in recent years some proposed with difference and linear attack sche

37、me to crack, though, from des algorithm theoretically decipher than the performance exhaustively search method, but must have the super-fast computers provide support, that american state secrecy bureau and computer science and technology institute organizing.world experts research des password syst

38、em, it is concluded that the problem of safety in the conclusion of optimism after: without any can decipher des password system system analysis. if use exhaustively method, is in before 1990 basically impossible to produce each day to decipher a des key special computer. even when can produce such

39、steels, it will only in deciphering success rate between 0.1 to 0.2, and cost could be as high as millions dollars. according to the present computing and des analysis situation, 16 - circle des (with 16 iteration) is still safe, but warn users dont use less than 16 - circle des, especially 10 - cir

40、cle the following des. nevertheless, we still need to consider to des algorithm was improved, add some key length, in order to achieve better confidential function.3. 2 multiple des algorithmaimed at the defects of algorithm, des nations experts are studying how to enhance the security of des algori

41、thm, has now developed dozens of improved des, after comparison, the author thinks that multiple des has the high feasibility.in order to increase the key lengths, using multiple des encryption technology group password, cascade, in a different key function, continuous many times for a group of plai

42、ntext encrypted. according to the experts, des algorithm adopts triple des consensus is encryption algorithm. triple des method needs to perform three conventional des encrypted steps, but the most commonly used three heavy des algorithm using only two 56 des keys. suppose this two keys with k2, its

43、 algorithm triassic-paleogene the steps are:1) for des encrypted with key k1;2) the results in step 1 to use a key k2 to des decryption;3) the results in step 2 to use a key k1 for des encrypted.this process is called ede (encryption - decryption - encryption).triple des can make the encryption key

44、length expanded to 128-bit, including effective 112. the 112 triple des key length in the foreseeable future can think is appropriate, safe, allegedly, at present there is no people find in this scheme method of assault. because want decipher it may need to try to 256 different 56 key until you find

45、 the right key. but triple des time is three times the des algorithm, time consuming is bigger.3.3 avoid des algorithm loophole, realize safe managementin des keys use and management of the key specific and key changes process, should absolutely avoid des algorithm application pitfalls, namely: defi

46、nitely not the key specific section 8, 16, 24. 64 bit as valid data bits, to manage to key specific. from the description of the above des algorithm, each byte of the first that eight as parity to ensure the key not errors occur, the eight not participation des operations. therefore, particularly re

47、commended for financial banking and non-financial industry leadership and decision makers, especially responsible for managing the people, which key point pay serious attention. some banks financial transaction network, use change regularly des keys to key specific to further improve reliability and

48、 safety of the system, if you ignore the above application pitfalls, then, change the new key will be in vain, and threaten financial transaction network safety running, so change key must ensure new key specific and old key specific real different that, in addition to the first 8, 16, 24. 64 bit be

49、yond other bits of data changed, so that we can guarantee des algorithm safe and reliable work, must make sure to keep high attention.modern cryptography features is algorithm can open. the key is how to protect the confidentiality of their keys, and the key is broken secret key. how can get hacking

50、 the security of the system, this system according to the director of the actual use of key length and the sensitive degree of protection of information, important degree and the actual place security environment system of degree, in bad with sufficient safety coefficient conditions from determine i

51、ts key and certificate change cycle length. meanwhile, will have abandoned key and certificate in black library archive, away for future use. key change cycle right security strategy is system can safe operation of the systems safety protection, is the most important and the most managers of daily t

52、asks.3.4 weak keysin des algorithm 12 and a half exists weak key and four weak keys. because the key in the son produced process, the key is divided into 2 parts, if this 2 parts into full 0 or total 1, so each wheel produces daughter keys are the same, and when keys are all 0 or 1, or half full 1 o

53、r 0, can produce weak keys, or half a weak the safety of keys, des algorithm will become poor. in setting key should avoid weak keys, or half a weak key to appear.4 des use of the algorithmafter since des algorithm, caused promulgated by academic and corporate attention. many manufacturers soon prod

54、uce realize des algorithm hardware products, users in the market to buy high speed and cheap des hardware products, to start using it after the important data encryption himself, thus greatly promote the use of a password techniques.des algorithm entry parameters have 3: key specific, data, mode. on

55、e key specific for 8 byte 64 bits, which is the key; des algorithm work data also for 8 byte 64-bit, is to be encrypted or message decrypted data; mode for des way of working, have two kinds: encryption and decryption. des algorithm is how it works: such as mode for encryption, then use the data to key specific data encrypt data and generate the password form (64 bits); the output as des such as mode for decryption, from

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
  • 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論