2023年全國碩士研究生考試考研英語一試題真題(含答案詳解+作文范文)_第1頁
已閱讀1頁,還剩6頁未讀 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領

文檔簡介

1、<p>  DATA ENCRYPTION STANDARD (DES)</p><p>  Federal Information Processing Standards Publications (FIPS PUBS) are issued by the National Bureau of Standards in accordance with section 111 (f) (2) of t

2、he Federal Property and Administrative Services Act of 1949, as amended, Public Law 89-306 (79 Stat 1127), Executive Order 11717 (38 FR 12315, dated May 11, 1973), and Part 6 of Title 15 Code of Federal Regulations.</

3、p><p>  Name of Standard. Data Encryption Standard (DES).</p><p>  Category of Standard. Computer Security.</p><p>  Explanation. The Data Encryption Standard (DES) specifies a FIPS ap

4、proved cryptographic algorithm as required by FIPS 140-1. This publication provides a complete description of a mathematical algorithm for encrypting (enciphering) and decrypting (deciphering) binary coded information. E

5、ncrypting data converts it to an unintelligible form called cipher. Decrypting cipher converts the data back to its original form called plaintext. The algorithm described in this standard specifies both encipheri</p&

6、gt;<p>  A key consists of 64 binary digits ("O"s or "1"s) of which 56 bits are randomly generated and used directly by the algorithm. The other 8 bits, which are not used by the algorithm, are

7、 used for error detection. The 8 error detecting bits are set to make the parity of each 8-bit byte of the key odd, i.e., there is an odd number of "1"s in each 8-bit byte1. Authorized users of encrypted comput

8、er data must have the key that was used to encipher the data in order to decrypt it. The encryption algori</p><p>  Data can be recovered from cipher only by using exactly the same key used to encipher it. U

9、nauthorized recipients of the cipher who know the algorithm but do not have the correct key cannot derive the original data algorithmically. However, anyone who does have the key and the algorithm can easily decipher the

10、 cipher and obtain the original data. A standard algorithm based on a secure key thus provides a basis for exchanging encrypted computer data by issuing the key used to encipher it to those</p><p>  Data tha

11、t is considered sensitive by the responsible authority, data that has a high value, or data that represents a high value should be cryptographically protected if it is vulnerable to unauthorized disclosure or undetected

12、modification during transmission or while in storage. A risk analysis should be performed under the direction of a responsible authority to determine potential threats. The costs of providing cryptographic protection usi

13、ng this standard as well as alternative methods of p</p><p>  Approving Authority. Secretary of Commerce.</p><p>  Maintenance Agency. U.S. Department of Commerce, National Institute of Standard

14、s and Technology, Computer Systems Laboratory.</p><p>  Applicability. This standard may be used by Federal departments and agencies when the following conditions apply:</p><p>  An authorized o

15、fficial or manager responsible for data security or the security of any computer system decides that cryptographic protection is required; </p><p> ?、赥he data is not classified according to the National Sec

16、urity Act of 1947, as amended, or the Atomic Energy Act of 1954, as amended. </p><p>  Federal agencies or departments which use cryptographic devices for protecting data classified according to either of th

17、ese acts can use those devices for protecting unclassified data in lieu of the standard. </p><p>  Other FIPS approved cryptographic algorithms may be used in addition to, or in lieu of, this standard when i

18、mplemented in accordance with FIPS 140-1. </p><p>  In addition, this standard may be adopted and used by non-Federal Government organizations. Such use is encouraged when it provides the desired security fo

19、r commercial and private organizations.</p><p>  Applications. Data encryption (cryptography) is utilized in various applications and environments. The specific utilization of encryption and the implementati

20、on of the DES will be based on many factors particular to the computer system and its associated components. In general, cryptography is used to protect data while it is being communicated between two points or while it

21、is stored in a medium vulnerable to physical theft. Communication security provides protection to data by enciphering it a</p><p>  Implementations. Cryptographic modules which implement this standard shall

22、conform to the requirements of FIPS 140-1. The algorithm specified in this standard may be implemented in software, firmware, hardware, or any combination thereof. The specific implementation may depend on several factor

23、s such as the application, the environment, the technology used, etc. Implementations which may comply with this standard include electronic devices (e.g., VLSI chip packages), micro-processors using Read </p><

24、;p>  Export Control. Cryptographic devices and technical data regarding them are subject to Federal Government export controls as specified in Title 22, Code of Federal Regulations, Parts 120 through 128. Some exports

25、 of cryptographic modules implementing this standard and technical data regarding them must comply with these Federal regulations and be licensed by the U.S. Department of State. Other exports of cryptographic modules im

26、plementing this standard and technical data regarding them fall unde</p><p>  Patents. Cryptographic devices implementing this standard may be covered by U.S. and foreign patents issued to the International

27、Business Machines Corporation. However, IBM has granted nonexclusive, royalty-free licenses under the patents to make, use and sell apparatus which complies with the standard. The terms, conditions and scope of the licen

28、ses are set out in notices published in the May 13, 1975 and August 31, 1976 issues of the Official Gazette of the United States Patent and Trademark O</p><p> ?。?1) Alternative Modes of Using the DES. FIPS

29、PUB 81, DES Modes of Operation, describes four different modes for using the algorithm described in this standard. These four modes are called the Electronic Codebook (ECB) mode, the Cipher Block Chaining (CBC) mode, the

30、 Cipher Feedback (CFB) mode, and the Output Feedback (OFB) mode. ECB is a direct application of the DES algorithm to encrypt and decrypt data; CBC is an enhanced mode of ECB which chains together blocks of cipher text; C

31、FB uses previo</p><p>  數(shù)據(jù)加密標準( DES )</p><p>  聯(lián)邦信息處理標準出版物(符合FIPS出版)是由國家標準局根據(jù)第111條(六) ( 2 )1949年修訂的聯(lián)邦財產(chǎn)和行政管理服務法,公法89-306 ( 79統(tǒng)計1127年) ,行政命令11717 ( 聯(lián)邦條例法典12315-38 ,日期1973年5月11日) ,以及聯(lián)邦條例法典15-6。<

32、;/p><p> ?。?)標準的Name of Standard. Data Encryption Standard (DES).名稱。數(shù)據(jù)加密標準( DES )。</p><p> ?。?)Category of Standard. Computer Security.種類標準。計算機安全。</p><p> ?。?)Explanation. The Data Enc

33、ryption Standard (DES) specifies a FIPS approved cryptographic algorithm as required by FIPS 140-1.解釋。數(shù)據(jù)加密標準( DES )指定了一個符合FIPS批準的加密算法的要求,符合FIPS 140-1第。 This publication provides a complete description of a mathematical a

34、lgorithm for encrypting (enciphering) and decrypting (deciphering) binary coded information.這本刊物提供了一個完整說明的數(shù)學算法加密(加密)和解密(解密)二進制編碼的信息。 Encrypting data converts it to an unintelligible form called cipher.加密就是把數(shù)據(jù)轉(zhuǎn)換為密文。 Decry

35、pting cipher converts the data b</p><p>  一個密鑰由64個二進制數(shù)字組成(“O”或“1”),其中56位是隨機生成,并直接利用該算法。 算法不用The other 8 bits, which are not used by the algorithm, are used for error detection.其他8位,這8位用于錯誤檢測。The 8 error dete

36、cting bits are set to make the parity of each 8-bit byte of the key odd, ie, there is an odd number of "1"s in each 8-bit byte錯誤檢測位設置使平價每8位字節(jié)中有一個關鍵字是奇數(shù)個,比如在每個8位字節(jié)有一個單數(shù)個“1” 。加密數(shù)據(jù)計算機授權用戶必須具備密鑰,這是用來加密數(shù)據(jù)和解密的。The en

37、cryption algorithm specified in this standard is commonly known among those using the standard.那些使用該標準的普遍認為該標準為加密算法標準。 The un</p><p>  數(shù)據(jù)可以用用于加密的密鑰來恢復。 Unauthorized recipients of the cipher who know the algo

38、rithm but do not have the correct key cannot derive the original data algorithmically.未經(jīng)授權的密文接收者知道算法但是沒有正確的密鑰是不能恢復明文的。 However, anyone who does have the key and the algorithm can easily decipher the cipher and obtain the

39、 original data.然而,誰知道密鑰和算法就可以輕松地破譯密碼并獲取原始數(shù)據(jù)。 A standard algorithm based on a secure key thus provides a basis for exchanging encrypted computer data by issuing the key used to encipher it to those authorized </p>

40、<p>  如果具有較高價值或者表現(xiàn)出高價值的數(shù)據(jù)很容易受到未經(jīng)授權者獲得或在傳輸過程或者存儲中進行修改未被發(fā)現(xiàn),主管部門認為這樣敏感的數(shù)據(jù)一個受到密碼保護。主管部門履行的A risk analysis should be performed under the direction of a responsible authority to determine potential threats.風險分析應確定潛在的威脅。 T

41、he costs of providing cryptographic protection using this standard as well as alternative methods of providing this protection and their respective costs should be projected.使用這個標準既要選擇密碼保護的方法又要預計各自的費用。 A responsible auth

42、ority then should make a decision, based on these analyses, whether or </p><p> ?。?)Approving Authority. Secretary of Commerce.審批機關。商務部長。</p><p> ?。?)維修機構。美國商業(yè)部,國家標準與技術研究所,計算機系統(tǒng)實驗室。</p>&

43、lt;p> ?。?) Applicability. This standard may be used by Federal departments and agencies when the following conditions apply:適用性。當以下條件滿足時聯(lián)邦部門和機構可能會用這個標準:</p><p> ?、僖唤?jīng)授權的官員或管理員負責保護數(shù)據(jù)安全或任何計算機系統(tǒng)的安全,取決于加密保護;&l

44、t;/p><p> ?、谛拚?947年的國家安全法或1954年的原子能法,將數(shù)據(jù)歸類。</p><p>  聯(lián)邦機構或部門使用加密裝置,保護機密數(shù)據(jù),根據(jù)上述兩種情況可以使用這些設備來代替標準保護未保密的數(shù)據(jù)。 </p><p>  其他符合FIPS批準的加密算法,按照FIPS 140-1執(zhí)行可用于除或代替這個標準。</p><p>  此外

45、,這一標準可能會被采納并在非聯(lián)邦政府組織使用。 Such use is encouraged when it provides the desired security for commercial and private organizations.鼓勵商業(yè)和私人組織使用,它提供了理想的安全。</p><p>  (7)Applications. Data encryption (cryptography) i

46、s utilized in various applications and environments.應用。數(shù)據(jù)加密(加密)運用在各種應用軟件和環(huán)境。The specific utilization of encryption and the implementation of the DES will be based on many factors particular to the computer system and its

47、 associated components.具體DES加密和執(zhí)行應用將基于許多因素,特別是計算機系統(tǒng)及其相關部件。 In general, cryptography is used to protect data while it is being communicated between two points or while it is stored in a medium vulnerable to physical theft

48、.一般,加密是用來在兩</p><p> ?。?)Implementations. Cryptographic modules which implement this standard shall conform to the requirements of FIPS 140-1.執(zhí)行。加密模塊遵照FIPS 140-1的要求執(zhí)行這個標準。The algorithm specified in this stand

49、ard may be implemented in software, firmware, hardware, or any combination thereof.這個標準指定的算法可能在軟件,固件,硬件,或任何組合物上實施。The specific implementation may depend on several factors such as the application, the environment, the te

50、chnology used, etc. Implementations which may comply with this standard include electronic dev</p><p>  (9)出口管制。加密裝置和技術數(shù)據(jù)受到美國聯(lián)邦政府聯(lián)邦條例法典22條120-128部分的出口管制。Some exports of cryptographic modules implementing thi

51、s standard and technical data regarding them must comply with these Federal regulations and be licensed by the US Department of State.一些實施這一標準出口的加密模塊和技術方面的數(shù)據(jù),它們必須遵照這些聯(lián)邦法規(guī)并獲得美國國務院許可。Other exports of cryptographic modules

52、implementing this standard and technical data regarding them fall under the licensing authority of the Bureau of Export Administration of the US Department of Commerce.其他實施這一標準出</p><p> ?。?0)Patents. Cryptog

53、raphic devices implementing this standard may be covered by US and foreign patents issued to the International Business Machines Corporation.專利權。實施這一標準的加密裝置可能涵蓋美國和外國專利發(fā)給國際商用機器公司。However, IBM has granted nonexclusive, roy

54、alty-free licenses under the patents to make, use and sell apparatus which complies with the standard.不過,IBM公司制造、使用和出售符合標準的設備被準予非獨家免版稅許可。有關The terms, conditions and scope of the licenses are set out in notices published

55、in the May 13, 1975 and August 31, 1976 </p><p> ?。?1) DESAlternative Modes of Using the DES. FIPS PUB 81, DES Modes of Operation, describes four different modes for using the algorithm described in this sta

56、ndard.DES的可選模式。FIPS第81次出版,描述了四種不同的使用算法標準運行模式。 These four modes are called the Electronic Codebook (ECB) mode, the Cipher Block Chaining (CBC) mode, the Cipher Feedback (CFB) mode, and the Output Feedback (OFB) mode.這四個模式

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論