Traditional Culture Encyclopedia - Traditional stories - The content and typical algorithm of symmetric cryptosystem
The content and typical algorithm of symmetric cryptosystem
Algorithms: DES (Data Encryption Standard) algorithm and its variants Triple DES (Triple DES) and GDES (Generalized DES); Ideas; In Europe; FEAL N and RC5 in Japan.
Triple DES uses two independent 56-bit keys to encrypt the exchanged information three times, so that its effective length reaches 1 12 bits. RC2 and RC4 are patented symmetric encryption algorithms of RSA Data Security Company, which use variable key length algorithm. By specifying different key lengths, C2 and RC4 can improve or decrease the security.
Extended data:
Basic mode of cryptographic system:
The usual cryptosystem uses shift method, substitution method and algebraic method to transform encryption and decryption, and one or the combination of several methods can be used as the basic way of data transformation. The following example illustrates:
Displacement method is also called replacement method. The Shift method rearranges the characters in plain text, and the characters themselves remain unchanged, but their positions have changed.
For example, the simplest example: write the letters and characters in the text upside down.
Or send ciphertext with a fixed length.
579 1 ecni SYLDIPAT DEVLOBES AHYTIRUC ESATAD * * .
Baidu encyclopedia-private key
Baidu encyclopedia-password system
- Related articles
- How to play the applet? How to open a WeChat applet?
- What is the smart site
- Understanding of Wushu and how to improve the technical level of Wushu
- Traditional Wushu teaching methods
- Discover the real Japanese noodle dish
- How to contribute to the national poetry contest?
- Give up your seat and write 400 words.
- How to write the profile of the inheritor of the Zen Dance of the Middle Way
- What other accessories do you need to keep birds?
- What is Puritanism? What are its teachings?