search
HomeCommon ProblemWhat is the most representative of symmetric encryption algorithms?

What is the most representative of symmetric encryption algorithms?

Dec 31, 2020 pm 03:54 PM
Symmetric encryption algorithm

The most representative of the symmetric encryption algorithms is: DES encryption algorithm; DES encryption uses a block encryption method, using a 56-bit key to encrypt 64-bit plaintext, and finally generates 64-bit ciphertext; algorithm characteristics: The grouping is relatively short, the key is too short, the password life cycle is short, and the operation speed is slow.

What is the most representative of symmetric encryption algorithms?

#The operating environment of this article: Windows 7 system, Dell G3 computer.

The most classic and representative algorithm among symmetric encryption algorithms is the DES encryption algorithm.

DES algorithm is a symmetric cryptography system in cryptography, also known as the American Data Encryption Standard. It is a symmetric cryptography encryption algorithm developed by IBM in the United States in 1972. The plaintext is grouped by 64 bits, and the key is 64 bits long. The key is actually 56 bits participating in the DES operation (the 8th, 16th, 24th, 32nd, 40th, 48th, 56th, and 64th bits are check bits, making each password The keys have an odd number. 1) The encryption method of grouping the plaintext group and the 56-bit key to form a ciphertext group by bitwise substitution or exchange.

Basic principle:

There are three entry parameters: key, data, mode. key is the key used for encryption and decryption, data is the data for encryption and decryption, and mode is its working mode. When the mode is encryption mode, the plaintext is grouped according to 64 bits to form a plaintext group, and the key is used to encrypt the data. When the mode is decryption mode, the key is used to decrypt the data. In actual application, the key only uses 56 bits out of 64 bits, so that it has high security.

DES features:

The DES algorithm has extremely high security. In addition to using the exhaustive search method to attack the DES algorithm, no more effective method has been found. The exhaustive space of a 56-bit key is 2^56, which means that if a computer is capable of detecting one million keys per second, it will take nearly 2285 years to search for all keys. time, it can be seen that this is difficult to achieve. However, this does not mean that DES is unbreakable. In fact, with the development of hardware technology and the Internet, the possibility of cracking is becoming more and more likely, and the time required is getting less and less. Parallel processing takes hours using specially designed hardware.

In order to overcome the shortcoming of the small key space of DES, people have proposed a variant of triple DES.

If you want to read more related articles, please visit PHP Chinese website! !

The above is the detailed content of What is the most representative of symmetric encryption algorithms?. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
Will R.E.P.O. Have Crossplay?
1 months agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

VSCode Windows 64-bit Download

VSCode Windows 64-bit Download

A free and powerful IDE editor launched by Microsoft

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.