Chapter6 data encryption standard (DES)
- Initial permutation
- 右半Feistal cipher
(1).expansion P-box (32->48)
(2).和round key XOR (48)
(3).S-Boxes. (48)
(4).straight P-Box. (48->32)
- 左半和右半XOR, 右半仍維持step2前的樣子
- swap (最後一個round不要)
- 重複step2, 3, 4(2, 3, 4為一個round, DES 跑16 round)
- final permutation
●key gen
1. Key input
2. Parity drop
3. Shift left. 4. Shift left. (1, 2, 9, 16 round: 1 bit, else: 2 bit)
5. Compression P-Box
重複step 3,4,5(3, 4, 5為一個round, DES 跑16 round)
●DES weakness
1. Weakness in key:
(1). Weak key: 一個weak key產生16個相同的subkey。這會使得plain-text加密兩次會產生plain-text
Ek(Ek(P)) = P
Ek(Ek(P)) = P
(2). Semi weak key:一個semi-weak key會產生兩個不同subkey,每個subkey個會出現8次,稱這2個key為pair,使用這兩個subkey去加密會使plain-text 和cipher-text一樣。
Ek1(Ek2(P)) = P
Ek1(Ek2(P)) = P
(3). Possible weak key:一個possible weak key會產生4個相同的weak key(subkey)。
2. Key complement
C = E(P, K)
/C = E(/P, K)
3. Double DES
可以用meet in the middle attack
沒有留言:
張貼留言