2023年全國(guó)碩士研究生考試考研英語(yǔ)一試題真題(含答案詳解+作文范文)_第1頁(yè)
已閱讀1頁(yè),還剩6頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、<p>  DATA ENCRYPTION STANDARD (DES)</p><p>  Federal Information Processing Standards Publications (FIPS PUBS) are issued by the National Bureau of Standards in accordance with section 111 (f) (2) of t

2、he Federal Property and Administrative Services Act of 1949, as amended, Public Law 89-306 (79 Stat 1127), Executive Order 11717 (38 FR 12315, dated May 11, 1973), and Part 6 of Title 15 Code of Federal Regulations.</

3、p><p>  Name of Standard. Data Encryption Standard (DES).</p><p>  Category of Standard. Computer Security.</p><p>  Explanation. The Data Encryption Standard (DES) specifies a FIPS ap

4、proved cryptographic algorithm as required by FIPS 140-1. This publication provides a complete description of a mathematical algorithm for encrypting (enciphering) and decrypting (deciphering) binary coded information. E

5、ncrypting data converts it to an unintelligible form called cipher. Decrypting cipher converts the data back to its original form called plaintext. The algorithm described in this standard specifies both encipheri</p&

6、gt;<p>  A key consists of 64 binary digits ("O"s or "1"s) of which 56 bits are randomly generated and used directly by the algorithm. The other 8 bits, which are not used by the algorithm, are

7、 used for error detection. The 8 error detecting bits are set to make the parity of each 8-bit byte of the key odd, i.e., there is an odd number of "1"s in each 8-bit byte1. Authorized users of encrypted comput

8、er data must have the key that was used to encipher the data in order to decrypt it. The encryption algori</p><p>  Data can be recovered from cipher only by using exactly the same key used to encipher it. U

9、nauthorized recipients of the cipher who know the algorithm but do not have the correct key cannot derive the original data algorithmically. However, anyone who does have the key and the algorithm can easily decipher the

10、 cipher and obtain the original data. A standard algorithm based on a secure key thus provides a basis for exchanging encrypted computer data by issuing the key used to encipher it to those</p><p>  Data tha

11、t is considered sensitive by the responsible authority, data that has a high value, or data that represents a high value should be cryptographically protected if it is vulnerable to unauthorized disclosure or undetected

12、modification during transmission or while in storage. A risk analysis should be performed under the direction of a responsible authority to determine potential threats. The costs of providing cryptographic protection usi

13、ng this standard as well as alternative methods of p</p><p>  Approving Authority. Secretary of Commerce.</p><p>  Maintenance Agency. U.S. Department of Commerce, National Institute of Standard

14、s and Technology, Computer Systems Laboratory.</p><p>  Applicability. This standard may be used by Federal departments and agencies when the following conditions apply:</p><p>  An authorized o

15、fficial or manager responsible for data security or the security of any computer system decides that cryptographic protection is required; </p><p> ?、赥he data is not classified according to the National Sec

16、urity Act of 1947, as amended, or the Atomic Energy Act of 1954, as amended. </p><p>  Federal agencies or departments which use cryptographic devices for protecting data classified according to either of th

17、ese acts can use those devices for protecting unclassified data in lieu of the standard. </p><p>  Other FIPS approved cryptographic algorithms may be used in addition to, or in lieu of, this standard when i

18、mplemented in accordance with FIPS 140-1. </p><p>  In addition, this standard may be adopted and used by non-Federal Government organizations. Such use is encouraged when it provides the desired security fo

19、r commercial and private organizations.</p><p>  Applications. Data encryption (cryptography) is utilized in various applications and environments. The specific utilization of encryption and the implementati

20、on of the DES will be based on many factors particular to the computer system and its associated components. In general, cryptography is used to protect data while it is being communicated between two points or while it

21、is stored in a medium vulnerable to physical theft. Communication security provides protection to data by enciphering it a</p><p>  Implementations. Cryptographic modules which implement this standard shall

22、conform to the requirements of FIPS 140-1. The algorithm specified in this standard may be implemented in software, firmware, hardware, or any combination thereof. The specific implementation may depend on several factor

23、s such as the application, the environment, the technology used, etc. Implementations which may comply with this standard include electronic devices (e.g., VLSI chip packages), micro-processors using Read </p><

24、;p>  Export Control. Cryptographic devices and technical data regarding them are subject to Federal Government export controls as specified in Title 22, Code of Federal Regulations, Parts 120 through 128. Some exports

25、 of cryptographic modules implementing this standard and technical data regarding them must comply with these Federal regulations and be licensed by the U.S. Department of State. Other exports of cryptographic modules im

26、plementing this standard and technical data regarding them fall unde</p><p>  Patents. Cryptographic devices implementing this standard may be covered by U.S. and foreign patents issued to the International

27、Business Machines Corporation. However, IBM has granted nonexclusive, royalty-free licenses under the patents to make, use and sell apparatus which complies with the standard. The terms, conditions and scope of the licen

28、ses are set out in notices published in the May 13, 1975 and August 31, 1976 issues of the Official Gazette of the United States Patent and Trademark O</p><p> ?。?1) Alternative Modes of Using the DES. FIPS

29、PUB 81, DES Modes of Operation, describes four different modes for using the algorithm described in this standard. These four modes are called the Electronic Codebook (ECB) mode, the Cipher Block Chaining (CBC) mode, the

30、 Cipher Feedback (CFB) mode, and the Output Feedback (OFB) mode. ECB is a direct application of the DES algorithm to encrypt and decrypt data; CBC is an enhanced mode of ECB which chains together blocks of cipher text; C

31、FB uses previo</p><p>  數(shù)據(jù)加密標(biāo)準(zhǔn)( DES )</p><p>  聯(lián)邦信息處理標(biāo)準(zhǔn)出版物(符合FIPS出版)是由國(guó)家標(biāo)準(zhǔn)局根據(jù)第111條(六) ( 2 )1949年修訂的聯(lián)邦財(cái)產(chǎn)和行政管理服務(wù)法,公法89-306 ( 79統(tǒng)計(jì)1127年) ,行政命令11717 ( 聯(lián)邦條例法典12315-38 ,日期1973年5月11日) ,以及聯(lián)邦條例法典15-6。<

32、;/p><p> ?。?)標(biāo)準(zhǔn)的Name of Standard. Data Encryption Standard (DES).名稱。數(shù)據(jù)加密標(biāo)準(zhǔn)( DES )。</p><p>  (2)Category of Standard. Computer Security.種類(lèi)標(biāo)準(zhǔn)。計(jì)算機(jī)安全。</p><p> ?。?)Explanation. The Data Enc

33、ryption Standard (DES) specifies a FIPS approved cryptographic algorithm as required by FIPS 140-1.解釋。數(shù)據(jù)加密標(biāo)準(zhǔn)( DES )指定了一個(gè)符合FIPS批準(zhǔn)的加密算法的要求,符合FIPS 140-1第。 This publication provides a complete description of a mathematical a

34、lgorithm for encrypting (enciphering) and decrypting (deciphering) binary coded information.這本刊物提供了一個(gè)完整說(shuō)明的數(shù)學(xué)算法加密(加密)和解密(解密)二進(jìn)制編碼的信息。 Encrypting data converts it to an unintelligible form called cipher.加密就是把數(shù)據(jù)轉(zhuǎn)換為密文。 Decry

35、pting cipher converts the data b</p><p>  一個(gè)密鑰由64個(gè)二進(jìn)制數(shù)字組成(“O”或“1”),其中56位是隨機(jī)生成,并直接利用該算法。 算法不用The other 8 bits, which are not used by the algorithm, are used for error detection.其他8位,這8位用于錯(cuò)誤檢測(cè)。The 8 error dete

36、cting bits are set to make the parity of each 8-bit byte of the key odd, ie, there is an odd number of "1"s in each 8-bit byte錯(cuò)誤檢測(cè)位設(shè)置使平價(jià)每8位字節(jié)中有一個(gè)關(guān)鍵字是奇數(shù)個(gè),比如在每個(gè)8位字節(jié)有一個(gè)單數(shù)個(gè)“1” 。加密數(shù)據(jù)計(jì)算機(jī)授權(quán)用戶必須具備密鑰,這是用來(lái)加密數(shù)據(jù)和解密的。The en

37、cryption algorithm specified in this standard is commonly known among those using the standard.那些使用該標(biāo)準(zhǔn)的普遍認(rèn)為該標(biāo)準(zhǔn)為加密算法標(biāo)準(zhǔn)。 The un</p><p>  數(shù)據(jù)可以用用于加密的密鑰來(lái)恢復(fù)。 Unauthorized recipients of the cipher who know the algo

38、rithm but do not have the correct key cannot derive the original data algorithmically.未經(jīng)授權(quán)的密文接收者知道算法但是沒(méi)有正確的密鑰是不能恢復(fù)明文的。 However, anyone who does have the key and the algorithm can easily decipher the cipher and obtain the

39、 original data.然而,誰(shuí)知道密鑰和算法就可以輕松地破譯密碼并獲取原始數(shù)據(jù)。 A standard algorithm based on a secure key thus provides a basis for exchanging encrypted computer data by issuing the key used to encipher it to those authorized </p>

40、<p>  如果具有較高價(jià)值或者表現(xiàn)出高價(jià)值的數(shù)據(jù)很容易受到未經(jīng)授權(quán)者獲得或在傳輸過(guò)程或者存儲(chǔ)中進(jìn)行修改未被發(fā)現(xiàn),主管部門(mén)認(rèn)為這樣敏感的數(shù)據(jù)一個(gè)受到密碼保護(hù)。主管部門(mén)履行的A risk analysis should be performed under the direction of a responsible authority to determine potential threats.風(fēng)險(xiǎn)分析應(yīng)確定潛在的威脅。 T

41、he costs of providing cryptographic protection using this standard as well as alternative methods of providing this protection and their respective costs should be projected.使用這個(gè)標(biāo)準(zhǔn)既要選擇密碼保護(hù)的方法又要預(yù)計(jì)各自的費(fèi)用。 A responsible auth

42、ority then should make a decision, based on these analyses, whether or </p><p> ?。?)Approving Authority. Secretary of Commerce.審批機(jī)關(guān)。商務(wù)部長(zhǎng)。</p><p> ?。?)維修機(jī)構(gòu)。美國(guó)商業(yè)部,國(guó)家標(biāo)準(zhǔn)與技術(shù)研究所,計(jì)算機(jī)系統(tǒng)實(shí)驗(yàn)室。</p>&

43、lt;p>  (6) Applicability. This standard may be used by Federal departments and agencies when the following conditions apply:適用性。當(dāng)以下條件滿足時(shí)聯(lián)邦部門(mén)和機(jī)構(gòu)可能會(huì)用這個(gè)標(biāo)準(zhǔn):</p><p> ?、僖唤?jīng)授權(quán)的官員或管理員負(fù)責(zé)保護(hù)數(shù)據(jù)安全或任何計(jì)算機(jī)系統(tǒng)的安全,取決于加密保護(hù);&l

44、t;/p><p> ?、谛拚?947年的國(guó)家安全法或1954年的原子能法,將數(shù)據(jù)歸類(lèi)。</p><p>  聯(lián)邦機(jī)構(gòu)或部門(mén)使用加密裝置,保護(hù)機(jī)密數(shù)據(jù),根據(jù)上述兩種情況可以使用這些設(shè)備來(lái)代替標(biāo)準(zhǔn)保護(hù)未保密的數(shù)據(jù)。 </p><p>  其他符合FIPS批準(zhǔn)的加密算法,按照FIPS 140-1執(zhí)行可用于除或代替這個(gè)標(biāo)準(zhǔn)。</p><p>  此外

45、,這一標(biāo)準(zhǔn)可能會(huì)被采納并在非聯(lián)邦政府組織使用。 Such use is encouraged when it provides the desired security for commercial and private organizations.鼓勵(lì)商業(yè)和私人組織使用,它提供了理想的安全。</p><p>  (7)Applications. Data encryption (cryptography) i

46、s utilized in various applications and environments.應(yīng)用。數(shù)據(jù)加密(加密)運(yùn)用在各種應(yīng)用軟件和環(huán)境。The specific utilization of encryption and the implementation of the DES will be based on many factors particular to the computer system and its

47、 associated components.具體DES加密和執(zhí)行應(yīng)用將基于許多因素,特別是計(jì)算機(jī)系統(tǒng)及其相關(guān)部件。 In general, cryptography is used to protect data while it is being communicated between two points or while it is stored in a medium vulnerable to physical theft

48、.一般,加密是用來(lái)在兩</p><p> ?。?)Implementations. Cryptographic modules which implement this standard shall conform to the requirements of FIPS 140-1.執(zhí)行。加密模塊遵照FIPS 140-1的要求執(zhí)行這個(gè)標(biāo)準(zhǔn)。The algorithm specified in this stand

49、ard may be implemented in software, firmware, hardware, or any combination thereof.這個(gè)標(biāo)準(zhǔn)指定的算法可能在軟件,固件,硬件,或任何組合物上實(shí)施。The specific implementation may depend on several factors such as the application, the environment, the te

50、chnology used, etc. Implementations which may comply with this standard include electronic dev</p><p> ?。?)出口管制。加密裝置和技術(shù)數(shù)據(jù)受到美國(guó)聯(lián)邦政府聯(lián)邦條例法典22條120-128部分的出口管制。Some exports of cryptographic modules implementing thi

51、s standard and technical data regarding them must comply with these Federal regulations and be licensed by the US Department of State.一些實(shí)施這一標(biāo)準(zhǔn)出口的加密模塊和技術(shù)方面的數(shù)據(jù),它們必須遵照這些聯(lián)邦法規(guī)并獲得美國(guó)國(guó)務(wù)院許可。Other exports of cryptographic modules

52、implementing this standard and technical data regarding them fall under the licensing authority of the Bureau of Export Administration of the US Department of Commerce.其他實(shí)施這一標(biāo)準(zhǔn)出</p><p> ?。?0)Patents. Cryptog

53、raphic devices implementing this standard may be covered by US and foreign patents issued to the International Business Machines Corporation.專利權(quán)。實(shí)施這一標(biāo)準(zhǔn)的加密裝置可能涵蓋美國(guó)和外國(guó)專利發(fā)給國(guó)際商用機(jī)器公司。However, IBM has granted nonexclusive, roy

54、alty-free licenses under the patents to make, use and sell apparatus which complies with the standard.不過(guò),IBM公司制造、使用和出售符合標(biāo)準(zhǔn)的設(shè)備被準(zhǔn)予非獨(dú)家免版稅許可。有關(guān)The terms, conditions and scope of the licenses are set out in notices published

55、in the May 13, 1975 and August 31, 1976 </p><p>  (11) DESAlternative Modes of Using the DES. FIPS PUB 81, DES Modes of Operation, describes four different modes for using the algorithm described in this sta

56、ndard.DES的可選模式。FIPS第81次出版,描述了四種不同的使用算法標(biāo)準(zhǔn)運(yùn)行模式。 These four modes are called the Electronic Codebook (ECB) mode, the Cipher Block Chaining (CBC) mode, the Cipher Feedback (CFB) mode, and the Output Feedback (OFB) mode.這四個(gè)模式

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫(kù)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論