ImageVerifierCode 换一换
格式:PDF , 页数:20 ,大小:692.36KB ,
资源ID:427402      下载积分:5000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-427402.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(AIR FORCE FIPS-PUB-46-2-1993 DATA ENCRYPTION STANDARD (DES)《数据加密术标准》.pdf)为本站会员(eventdump275)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

AIR FORCE FIPS-PUB-46-2-1993 DATA ENCRYPTION STANDARD (DES)《数据加密术标准》.pdf

1、 U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology FIPS PUB 4612 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (Supersedes FIPS PUB 46-1 - 1988 January 22) DATA ENCRYPTION STANDARD (DES) CATEGORY COMPUTER SECURITY SUBCATEGORY: CRYPTOGRAPHY Re

2、affirmed 1993 December 30 Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-t FIPS PUB 46-2 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (Supersedes FIPS PUB 46-1 - 1988 January 22) DATA ENCRYPTION STANDARD (DES) CATEGORY COMPUTER SECURITY SUBC

3、ATEGORY CRYPTOGRAPHY Computer Systems Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Reaffirmed December 30, 1993 US. Department of Commerce Ronald H. Brown, Secretary Technology Admlnlrhion . Mary L. Good, Under Secretary for Tedinology National Institute of Standa

4、rds Arati Prabhakar, Diredor and Tech- Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Foreword The Federal Information Processing Standards Publication Series of the National Institute of Standards and Technology (NIST) is the official publication r

5、elating to standards and guidelines adopted and promulgated under the provisions of Section i i 1 (d) of the Federal Property and Administrative Services Act of 1949 as amended by the Computer Security Act of 1987, Public Law 100-235. These mandates have given the Secreaty of Commerce and NIST impor

6、tant respnsibilities for improving the utilization and management of computer and related telecommunications systems in the Federal Government. The NIST. through its Computer Systems Laboratory, provides leadership, technical guidance, and coordination of Government effortc in the development of sta

7、ndards and guidelines in these areas. Comments concerning Federal Information Processing Standards Publications are welcomed and should be addressed to the Director, Computer Systems Laboratory, National Institute of Standards and Technology, Gaihersburg, MD 20899. James H. Burrows, Director Cornput

8、er Systems Laboratory Abstract The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its electronic data systems. This publication specifies a cryptographic algorithm which may be us

9、ed by Federal organizations to protect sensitive data. Protection of data during transmission or while.in storage may be necessary to maintain the confidential- ity and integrity of the information represented by the data. The algorithm uniquely defines the mathematical steps required to transform d

10、ata into a cryptographic cipher and also to transform the cipher back to the original form. The Data Encryption Stan- dard is being made available for use by Federal agencies within the context of a total security program consisting o physical security procedures, good information man- agement pract

11、ices, and computer systemlnetwork access controls. This revision supersedes FIPS 46-1 in its entirety. Key words: computer secudy; data encryption standard; encryption; Federal Information Processing Standard (FIPS): security. National Institute of Standards and Technology Washington: 1993 Technical

12、 Information FIPS PUB 46-2 Service 18 pages (Dec. 30,1993) CODEN: FIPPAT Springfield, VA 22161 U.S. Government Printing Office For sale by the National U.S. Department of Commerce Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-FIPS PUB 46-2 Federal

13、Information Processing Standards Publication 46-2 1993 December 30 Announcing the DATA ENCRYPTION STANDARD (DES) Federal Information Processing Standards Publications (FIPS PUBS) are issued by the National Institute of Standards and Technology (NIST) after approval by the Secretary of Commerce pursu

14、ant to Section lll(d) of the Federal Property and Administrative Services Act of 1949 as amended by the Computer Security Act of 1987, Public Law 100-235. 1. Name of Standard. Data Encryption Standard (DES). 2. Categorg of Standard. Computer Security, Cryptography. 3. Explanation. The Data Encryptio

15、n Standard (DES) specifies a FIPS approved cryptographic algorithm as required by FIPS 140-1. This publication provides a complete description of a mathematical algorithm for encrypting (enciphering) and decrypting (deciphering) binary coded information. Encrypting data converts it to an unintelligi

16、ble form called cipher. Decrypting cipher converts the data back to its original form called plaintext. The algorithm described in this standard specifies both enciphering and deciphering operations which are based on a binary number called a key. A key consists of 64 binary digits (“0”s or “1”s) of

17、 which 56 bits are randomly generated and used directly by the algorithm. The other 8 bits, which are not used by the algorithm, are used for error detection. The 8 error detecting bits are set to make the parity of each 8-bit byte of the key odd, i.e., there is an odd number of “1”s in each 8-bit b

18、yte. Authorized users of encrypted computer data must have the key that was used to encipher the data in order to decrypt it. The encryption algorithm specified in this standard is commonly known among those using the standard. The unique key chosen for use in a particular application makes the resu

19、lts of encrypting data using the algorithm unique. Selection of a different key causes the cipher that is produced for any given set of inputs to be different. The cryptographic security of the data depends on the security provided for the key used to encipher and decipher the data. Data can be reco

20、vered from cipher only by using exactly the same key used to encipher it. Unauthorized recipients of the cipher who know the algorithm but do not have the correct key cannot derive the original data algorithmically. However, anyone who does have the key and the algorithm can easily decipher the ciph

21、er and obtain the original data. A standard algorithm based on a secure key thus provides a basis for exchanging encrypted computer data by issuing the key used to encipher it to those authorized to have the data. Data that is considered sensitive by the responsible authority, data that has a high v

22、alue, or data that represents a high value should be cryptographicalIy protected if it is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. A risk analysis should be performed under the direction of a responsible authority to determine potentia

23、l threats. The costs of providing cryptographic protection using this standard as well as alternative methods of providing this protection and their respective costs should be projected. A responsible authority then should make a decision, based on these analyses, whether or not to use cryptographic

24、 protection and this standard. Sometimes keys are generated in an encrypted form. A random -bit number is generated and defined to be the cipher formed by the encryption of a key using a key encrypting key. In this case the parity bits of the encrypted key cannot be set until after the kg is decrypt

25、ed. 1 Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-4. Approving Authority. Secretary of Commerce. 5. Maintenance Agency. US. Department of Commerce, National Institute of Standards and Technology, Computer Systems Laboratory. 6. Applicability. Thi

26、s standard may be used by Federal departments and agencies when the following con- ditions apply: 1. An authorized official or manager responsible for data security or the security of any computer system decides that cryptographic protection is required; and 2. The data is not classified according t

27、o the National Security Act of 1947, as amended, or the Atomic Energy Act of 1954, as amended. Federal agencies or departments which use cryptographic devices for protecting data classified according to either of these acts can use those devices for protecting unclassified data in lieu of the standa

28、rd. when implemented in accordance with FIPS 140-1. Other FIPS approved cryptographic algorithms may be used in addition to, or in lieu of, this standard In addition, this standard may be adopted and used by non-Federal Government organizations. Such use is encouraged when it provides the desired se

29、curity for commercial and private organizations. 7. Applications. Data encryption (cryptography) is utilized in various applications and environments. The specific utilization of encryption and the implementation of the DES will be based on many factors particular to the computer system and its asso

30、ciated components. In general, cryptography is used to protect data while it is being communicated between two points or while it is stored in a medium vulnerable to physical theft. Communication security provides protection to data by enciphering it at the transmitting point and deciphering it at t

31、he receiving point. File security provides protection to data by enciphering it when it is recorded on a storage medium and deciphering it when it is read back from the storage medium. In the first case, the key must be available at the transmitter and receiver simultaneously during communication. I

32、n the second case, the key must be maintained and accessible for the duration of the storage period. FIPS 171 provides approved methods for managing the keys used by the algorithm specified in this standard. 8. Implementations. Cryptographic modules which implement this standard shall conform to the

33、 require- ments of FIPS 140-1. The algorithm specified in this standard may be implemented in software, firmware, hardware, or any combination thereof. The specific implementation may depend on several factors such as the application, the environment, the technology used, etc. Implementations which

34、may comply with this standard include electronic devices (e.g., VISI chip packages), micro-processors using Read Only Memory (ROM), Programmable Read Only Memory (PROM), or Electronically Erasable Read Only Memory (EEROM), and mainframe computers using Random Access Memory (RAM). When the algorithm

35、is implemented in software or firmware, the processor on which the algorithm runs must be specified as part of the validation process. Implementations of the algorithm which are tested and validated by NIST will be considered as complying with the standard. Note that FIPS 140-1 places additional req

36、uirements on cryptographic modules for Government use. Information about devices that have been validated and procedures for testing and validating equipment for conformance with this standard and FIPS 140-1 are available from the National Institute of Standards and Technology, Computer Systems Labo

37、ratory, Gaithersburg, MD 20899. I 9. Export Control. Cryptographic devices and technical data regarding them are subject to Federal Govern- ment export controls as specified in Title 22, Code of Federal Regulations, Parts 120 through 128. Some exports of cryptographic modules implementing this stand

38、ard and technical data regarding them must comply with these Federal regulations and be licensed by the U.S. Department of State. Other exports of crypto- graphic modules implementing this standard and technical data regarding them fall under the 2 Provided by IHSNot for ResaleNo reproduction or net

39、working permitted without license from IHS-,-,-licensing authority of the Bureau of Export Administration of the U.S. Department of Commerce. The Depart- ment of Commerce is responsible for licensing cryptographic devices used for authentication, access control, proprietary software, automatic telle

40、r machines (ATMs), and certain devices used in other equipment and software. For advice concerning which agency has licensing authority for a particular cryptographic device, please contact the respective agencies. 10. Patents. Cryptographic devices implementing this standard may be covered by U.S.

41、and foreign patents issued to the International Business Machines Corporation. However, IBM has granted nonexclusive, royalty- free licenses under the patents to make, use and sell apparatus which complies with the standard. The terms, conditions and scope of the licenses are set out in notices publ

42、ished in the May 13,1975 and August 31,1976 issues of the Official Gazette of the United States Patent and Trademark Office (934 O.G. 452 and 949 O.G. 1717). 11. Alternative Modes of Using the DES. FIPS PUB 81, DES Modes of Operation, describes four different modes for using the algorithm described

43、in this standard. These four modes are called the Electronic Code- book (ECB) mode, the Cipher Block Chaining (CBC) mode, the Cipher Feedback (CFB) mode, and the Out- put Feedback (OFB) mode. ECB is a direct application of the DES algorithm to encrypt and decrypt data; CBC is an enhanced mode of ECB

44、 which chains together blocks of cipher text; CFB uses previously generated cipher text as input to the DES to generate pseudorandom outputs which are combined with the plaintext to produce cipher, thereby chaining together the resulting cipher; OFB is identical to CFB except that the pre- vious out

45、put of the DES is used as input in OFB while the previous cipher is used as input in CFB. OFB does not chain the cipher. 12. Implementation of this Standard. This standard became effective July 1977. It was reaffirmed in 1983, 1988, and 1993. It applies to all Federal agencies, contractors of Federa

46、l agencies, or other organizations that process information (using a computer or telecommunications system) on behalf of the Federal Government to accomplish a Federal function. Each Federal agency or department may issue internal directives for the use of this standard by their operating units base

47、d on their data security requirement determinations. FIPS 46-2 which revises the implementation of the Data Encryption Algorithm to include software, firmware, hard- ware, or any combination thereof, is effective June 30, 1994. This revised standard may be used in the interim period before the effec

48、tive date. NIST provides technical assistance to Federal agencies in implementing data encryption through the is- suance of guidelines and through individual reimbursable projects. The National Security Agency assists Fed- eral departments and agencies in communications security for classified appli

49、cations and in determining specific security requirements. Instructions and regulations for procuring data processing equipment utilizing this standard are included in the Federal Information Resources Management Regulation (FIRMR) Subpart 201-8.111-1. 13. Specifications. Federal Information Processing Standard (FIPS) 46-2, Data Encryption Standard (DES) (affixed). 14. Cross Index. and subpart 201.39.1002, Federal Standards. a. b. c. d. e. f. g. h. i. Federal Information Res

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1