AIR FORCE FIPS-PUB-46-2-1993 DATA ENCRYPTION STANDARD (DES)《数据加密术标准》.pdf

上传人:eventdump275 文档编号:427402 上传时间:2018-11-07 格式:PDF 页数:20 大小:692.36KB
下载 相关 举报
AIR FORCE FIPS-PUB-46-2-1993 DATA ENCRYPTION STANDARD (DES)《数据加密术标准》.pdf_第1页
第1页 / 共20页
AIR FORCE FIPS-PUB-46-2-1993 DATA ENCRYPTION STANDARD (DES)《数据加密术标准》.pdf_第2页
第2页 / 共20页
AIR FORCE FIPS-PUB-46-2-1993 DATA ENCRYPTION STANDARD (DES)《数据加密术标准》.pdf_第3页
第3页 / 共20页
AIR FORCE FIPS-PUB-46-2-1993 DATA ENCRYPTION STANDARD (DES)《数据加密术标准》.pdf_第4页
第4页 / 共20页
AIR FORCE FIPS-PUB-46-2-1993 DATA ENCRYPTION STANDARD (DES)《数据加密术标准》.pdf_第5页
第5页 / 共20页
亲,该文档总共20页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、 U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology FIPS PUB 4612 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (Supersedes FIPS PUB 46-1 - 1988 January 22) DATA ENCRYPTION STANDARD (DES) CATEGORY COMPUTER SECURITY SUBCATEGORY: CRYPTOGRAPHY Re

2、affirmed 1993 December 30 Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-t FIPS PUB 46-2 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (Supersedes FIPS PUB 46-1 - 1988 January 22) DATA ENCRYPTION STANDARD (DES) CATEGORY COMPUTER SECURITY SUBC

3、ATEGORY CRYPTOGRAPHY Computer Systems Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Reaffirmed December 30, 1993 US. Department of Commerce Ronald H. Brown, Secretary Technology Admlnlrhion . Mary L. Good, Under Secretary for Tedinology National Institute of Standa

4、rds Arati Prabhakar, Diredor and Tech- Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Foreword The Federal Information Processing Standards Publication Series of the National Institute of Standards and Technology (NIST) is the official publication r

5、elating to standards and guidelines adopted and promulgated under the provisions of Section i i 1 (d) of the Federal Property and Administrative Services Act of 1949 as amended by the Computer Security Act of 1987, Public Law 100-235. These mandates have given the Secreaty of Commerce and NIST impor

6、tant respnsibilities for improving the utilization and management of computer and related telecommunications systems in the Federal Government. The NIST. through its Computer Systems Laboratory, provides leadership, technical guidance, and coordination of Government effortc in the development of sta

7、ndards and guidelines in these areas. Comments concerning Federal Information Processing Standards Publications are welcomed and should be addressed to the Director, Computer Systems Laboratory, National Institute of Standards and Technology, Gaihersburg, MD 20899. James H. Burrows, Director Cornput

8、er Systems Laboratory Abstract The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its electronic data systems. This publication specifies a cryptographic algorithm which may be us

9、ed by Federal organizations to protect sensitive data. Protection of data during transmission or while.in storage may be necessary to maintain the confidential- ity and integrity of the information represented by the data. The algorithm uniquely defines the mathematical steps required to transform d

10、ata into a cryptographic cipher and also to transform the cipher back to the original form. The Data Encryption Stan- dard is being made available for use by Federal agencies within the context of a total security program consisting o physical security procedures, good information man- agement pract

11、ices, and computer systemlnetwork access controls. This revision supersedes FIPS 46-1 in its entirety. Key words: computer secudy; data encryption standard; encryption; Federal Information Processing Standard (FIPS): security. National Institute of Standards and Technology Washington: 1993 Technical

12、 Information FIPS PUB 46-2 Service 18 pages (Dec. 30,1993) CODEN: FIPPAT Springfield, VA 22161 U.S. Government Printing Office For sale by the National U.S. Department of Commerce Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-FIPS PUB 46-2 Federal

13、Information Processing Standards Publication 46-2 1993 December 30 Announcing the DATA ENCRYPTION STANDARD (DES) Federal Information Processing Standards Publications (FIPS PUBS) are issued by the National Institute of Standards and Technology (NIST) after approval by the Secretary of Commerce pursu

14、ant to Section lll(d) of the Federal Property and Administrative Services Act of 1949 as amended by the Computer Security Act of 1987, Public Law 100-235. 1. Name of Standard. Data Encryption Standard (DES). 2. Categorg of Standard. Computer Security, Cryptography. 3. Explanation. The Data Encryptio

15、n Standard (DES) specifies a FIPS approved cryptographic algorithm as required by FIPS 140-1. This publication provides a complete description of a mathematical algorithm for encrypting (enciphering) and decrypting (deciphering) binary coded information. Encrypting data converts it to an unintelligi

16、ble form called cipher. Decrypting cipher converts the data back to its original form called plaintext. The algorithm described in this standard specifies both enciphering and deciphering operations which are based on a binary number called a key. A key consists of 64 binary digits (“0”s or “1”s) of

17、 which 56 bits are randomly generated and used directly by the algorithm. The other 8 bits, which are not used by the algorithm, are used for error detection. The 8 error detecting bits are set to make the parity of each 8-bit byte of the key odd, i.e., there is an odd number of “1”s in each 8-bit b

18、yte. Authorized users of encrypted computer data must have the key that was used to encipher the data in order to decrypt it. The encryption algorithm specified in this standard is commonly known among those using the standard. The unique key chosen for use in a particular application makes the resu

19、lts of encrypting data using the algorithm unique. Selection of a different key causes the cipher that is produced for any given set of inputs to be different. The cryptographic security of the data depends on the security provided for the key used to encipher and decipher the data. Data can be reco

20、vered from cipher only by using exactly the same key used to encipher it. Unauthorized recipients of the cipher who know the algorithm but do not have the correct key cannot derive the original data algorithmically. However, anyone who does have the key and the algorithm can easily decipher the ciph

21、er and obtain the original data. A standard algorithm based on a secure key thus provides a basis for exchanging encrypted computer data by issuing the key used to encipher it to those authorized to have the data. Data that is considered sensitive by the responsible authority, data that has a high v

22、alue, or data that represents a high value should be cryptographicalIy protected if it is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. A risk analysis should be performed under the direction of a responsible authority to determine potentia

23、l threats. The costs of providing cryptographic protection using this standard as well as alternative methods of providing this protection and their respective costs should be projected. A responsible authority then should make a decision, based on these analyses, whether or not to use cryptographic

24、 protection and this standard. Sometimes keys are generated in an encrypted form. A random -bit number is generated and defined to be the cipher formed by the encryption of a key using a key encrypting key. In this case the parity bits of the encrypted key cannot be set until after the kg is decrypt

25、ed. 1 Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-4. Approving Authority. Secretary of Commerce. 5. Maintenance Agency. US. Department of Commerce, National Institute of Standards and Technology, Computer Systems Laboratory. 6. Applicability. Thi

26、s standard may be used by Federal departments and agencies when the following con- ditions apply: 1. An authorized official or manager responsible for data security or the security of any computer system decides that cryptographic protection is required; and 2. The data is not classified according t

27、o the National Security Act of 1947, as amended, or the Atomic Energy Act of 1954, as amended. Federal agencies or departments which use cryptographic devices for protecting data classified according to either of these acts can use those devices for protecting unclassified data in lieu of the standa

28、rd. when implemented in accordance with FIPS 140-1. Other FIPS approved cryptographic algorithms may be used in addition to, or in lieu of, this standard In addition, this standard may be adopted and used by non-Federal Government organizations. Such use is encouraged when it provides the desired se

29、curity for commercial and private organizations. 7. Applications. Data encryption (cryptography) is utilized in various applications and environments. The specific utilization of encryption and the implementation of the DES will be based on many factors particular to the computer system and its asso

30、ciated components. In general, cryptography is used to protect data while it is being communicated between two points or while it is stored in a medium vulnerable to physical theft. Communication security provides protection to data by enciphering it at the transmitting point and deciphering it at t

31、he receiving point. File security provides protection to data by enciphering it when it is recorded on a storage medium and deciphering it when it is read back from the storage medium. In the first case, the key must be available at the transmitter and receiver simultaneously during communication. I

32、n the second case, the key must be maintained and accessible for the duration of the storage period. FIPS 171 provides approved methods for managing the keys used by the algorithm specified in this standard. 8. Implementations. Cryptographic modules which implement this standard shall conform to the

33、 require- ments of FIPS 140-1. The algorithm specified in this standard may be implemented in software, firmware, hardware, or any combination thereof. The specific implementation may depend on several factors such as the application, the environment, the technology used, etc. Implementations which

34、may comply with this standard include electronic devices (e.g., VISI chip packages), micro-processors using Read Only Memory (ROM), Programmable Read Only Memory (PROM), or Electronically Erasable Read Only Memory (EEROM), and mainframe computers using Random Access Memory (RAM). When the algorithm

35、is implemented in software or firmware, the processor on which the algorithm runs must be specified as part of the validation process. Implementations of the algorithm which are tested and validated by NIST will be considered as complying with the standard. Note that FIPS 140-1 places additional req

36、uirements on cryptographic modules for Government use. Information about devices that have been validated and procedures for testing and validating equipment for conformance with this standard and FIPS 140-1 are available from the National Institute of Standards and Technology, Computer Systems Labo

37、ratory, Gaithersburg, MD 20899. I 9. Export Control. Cryptographic devices and technical data regarding them are subject to Federal Govern- ment export controls as specified in Title 22, Code of Federal Regulations, Parts 120 through 128. Some exports of cryptographic modules implementing this stand

38、ard and technical data regarding them must comply with these Federal regulations and be licensed by the U.S. Department of State. Other exports of crypto- graphic modules implementing this standard and technical data regarding them fall under the 2 Provided by IHSNot for ResaleNo reproduction or net

39、working permitted without license from IHS-,-,-licensing authority of the Bureau of Export Administration of the U.S. Department of Commerce. The Depart- ment of Commerce is responsible for licensing cryptographic devices used for authentication, access control, proprietary software, automatic telle

40、r machines (ATMs), and certain devices used in other equipment and software. For advice concerning which agency has licensing authority for a particular cryptographic device, please contact the respective agencies. 10. Patents. Cryptographic devices implementing this standard may be covered by U.S.

41、and foreign patents issued to the International Business Machines Corporation. However, IBM has granted nonexclusive, royalty- free licenses under the patents to make, use and sell apparatus which complies with the standard. The terms, conditions and scope of the licenses are set out in notices publ

42、ished in the May 13,1975 and August 31,1976 issues of the Official Gazette of the United States Patent and Trademark Office (934 O.G. 452 and 949 O.G. 1717). 11. Alternative Modes of Using the DES. FIPS PUB 81, DES Modes of Operation, describes four different modes for using the algorithm described

43、in this standard. These four modes are called the Electronic Code- book (ECB) mode, the Cipher Block Chaining (CBC) mode, the Cipher Feedback (CFB) mode, and the Out- put Feedback (OFB) mode. ECB is a direct application of the DES algorithm to encrypt and decrypt data; CBC is an enhanced mode of ECB

44、 which chains together blocks of cipher text; CFB uses previously generated cipher text as input to the DES to generate pseudorandom outputs which are combined with the plaintext to produce cipher, thereby chaining together the resulting cipher; OFB is identical to CFB except that the pre- vious out

45、put of the DES is used as input in OFB while the previous cipher is used as input in CFB. OFB does not chain the cipher. 12. Implementation of this Standard. This standard became effective July 1977. It was reaffirmed in 1983, 1988, and 1993. It applies to all Federal agencies, contractors of Federa

46、l agencies, or other organizations that process information (using a computer or telecommunications system) on behalf of the Federal Government to accomplish a Federal function. Each Federal agency or department may issue internal directives for the use of this standard by their operating units base

47、d on their data security requirement determinations. FIPS 46-2 which revises the implementation of the Data Encryption Algorithm to include software, firmware, hard- ware, or any combination thereof, is effective June 30, 1994. This revised standard may be used in the interim period before the effec

48、tive date. NIST provides technical assistance to Federal agencies in implementing data encryption through the is- suance of guidelines and through individual reimbursable projects. The National Security Agency assists Fed- eral departments and agencies in communications security for classified appli

49、cations and in determining specific security requirements. Instructions and regulations for procuring data processing equipment utilizing this standard are included in the Federal Information Resources Management Regulation (FIRMR) Subpart 201-8.111-1. 13. Specifications. Federal Information Processing Standard (FIPS) 46-2, Data Encryption Standard (DES) (affixed). 14. Cross Index. and subpart 201.39.1002, Federal Standards. a. b. c. d. e. f. g. h. i. Federal Information Res

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1