【正文】
設(shè),我們可以認(rèn)為 p對應(yīng) e。我們可以嘗試者將密文中的字母替 換,看是否像一個消息的輪廓。通過允許任意代換,密鑰空間將會急劇增大。 ( 2) 需測試的密鑰只有 25 個。 Caesar 密碼 已知最早的代換密碼是由 Julius Caesar 發(fā)明的 Caesar 密碼。對通信方的身份進(jìn)行真實(shí)性認(rèn)證。由于公鑰密碼體制加解密所需要的計(jì)算量很大 ,在 長沙學(xué)院畢業(yè)設(shè)計(jì) (論文 ) 9 需要傳輸大量信息時(shí)效率不高。因此,公鑰密碼學(xué)是當(dāng)今社會信息安全技術(shù)的核心,它不僅可以實(shí)現(xiàn)加密功能,而且可以實(shí)現(xiàn)數(shù)字簽名,身份認(rèn)證、消息認(rèn) 證等功能 [8]。 公鑰密碼學(xué) 在當(dāng)今高度信息化、數(shù)字化的社會里,隨著信息高速公路的建設(shè)和計(jì)算機(jī)網(wǎng)絡(luò)特別是因特網(wǎng)的迅猛發(fā)展,人們已經(jīng)開始習(xí)慣于通過各種先進(jìn)的通信手段傳遞重要的數(shù)據(jù)、 長沙學(xué)院畢業(yè)設(shè)計(jì) (論文 ) 8 圖象和話音等信息進(jìn)行各種學(xué)術(shù)交流、乃至網(wǎng)絡(luò)貿(mào)易。上述運(yùn)算的基本要求是不允許有信息丟失(即所有的運(yùn)算都是可逆的)。加密的時(shí)候先產(chǎn)生一個形如K=[K1,K2,? ,Kj]的密鑰。對稱密碼的這些特點(diǎn)使其能夠廣泛地應(yīng)用。輸入密文和密鑰可以用解密算法恢復(fù)出明文。 ( 2) 加密算法:加密算法對明文進(jìn)行各種代換或變換。首先,我們來定義一些術(shù)語。又比如,某某公司開發(fā)的程序源代碼可能含有該公司的版權(quán)信息,并且放在某個標(biāo)準(zhǔn)的位置。不過在很多情況下,分析者可以得到更多的信 息。 這種攻擊最容易防范,因?yàn)楣粽邠碛械男畔⒘孔钌?,不過攻擊者通??梢缘玫礁嘈畔?。如果對文本進(jìn)行加密攻擊者就沒這么容易了解到文本的具體內(nèi)容,在不知道密鑰的情況下也不會輕易進(jìn)行篡改。經(jīng)典密碼學(xué)現(xiàn)在仍未消失,經(jīng)常出現(xiàn)在智力游戲之中。 密碼學(xué)是一門跨學(xué)科科目,從很多領(lǐng)域衍生而來:它可以被看做是信息理論,卻使用了大量的數(shù)學(xué)領(lǐng)域的工具,眾所周知的如數(shù)論和有限數(shù)學(xué)。 自 19 世紀(jì)以來,由于電報(bào)特別是無線電報(bào)的廣泛使用,為密碼通信和第三者的截 長沙學(xué)院畢業(yè)設(shè)計(jì) (論文 ) 3 收都提供了極為有利的條件。二十世紀(jì)初,產(chǎn)生了最初的可以實(shí)用的機(jī)械式和電動式密碼機(jī),同時(shí)出現(xiàn)了商業(yè)密碼機(jī)公司和市場。這種新的密碼體制,引起了密碼學(xué)界的廣泛注意和探討。它的現(xiàn)實(shí)研究成果,特別是各國政府現(xiàn)用的密碼編制及破譯手段都具有高度的機(jī)密性。 為了不使計(jì)算機(jī)內(nèi)的某些重要系統(tǒng)被入侵者訪問、篡改或者修改,密碼學(xué)成為了一門單獨(dú)的學(xué)科。對于共享系統(tǒng),如時(shí)間共享系統(tǒng),以及通過公共電話網(wǎng)、數(shù)據(jù)網(wǎng)或 Inter 可訪問的系統(tǒng),尤其如此。 關(guān)鍵詞 :信息安全 , 密鑰 , DES, 加密 , 解密 長沙學(xué)院畢業(yè)設(shè)計(jì) (論文 ) II ABSTRACT The information technology rapid development, caused people’s life appearance to have the very big change, simultaneously the information technology also promoted society development. In the puter work thorough popularization information time, information itself is the time, is the wealth. How protects the information security to cause it not to be stole and as for not to tamper with or destruction, has bee the major issue which now generally pays attention . The password is useful and effectible method. This article mainly introduces the DES encryption and decipher algorithm java language realization, three aspects elaborated from key fresh、 the encryption principle DES、 the decryption principle DES algorithm entire has worked. And in this foundation, in windows environment, realizes the encryption and decryption algorithm using java, pletes a local document by the window contact surface way to add the decipher demonstration. The article divides into five to blow. First chapter promulgates cryptology from the modern electronic technology development to be important in scientific domain, thus explained chooses this topic to take the graduation project originally. Second chapter narrated the cryptology elementary knowledge. Third chapter is this article key point, take narrates the DES history as the beginning, explain the DES algorithm principle, meanwhile how to make the encryption key、 encrypts the DES、 decrypts the DES as the line. Fourth chapter makes the simple introduction to the window contact surface, explain the working process of the decipher demonstration and the DES working pattern. The fifth chapter explained that DES adds/the decipher algorithm system design mentality, as well as it realizes the method specifically. Keywords:Information security,Key,DES,Encryption,Decipher 長沙學(xué)院畢業(yè)設(shè)計(jì) (論文 ) III 目 錄 摘 要 ............................................................................................................ I ABSTRACT ..................................................................................................II 第 1 章 緒論 ................................................................................................. 1 引言 .............................................................................................................................. 1 本課題的研究意義 ...................................................................................................... 3 攻擊 ............................................................................................................................. 4 第 2 章 密碼學(xué)的基礎(chǔ)知識 ........................................................................... 6 對稱密碼的模型 .......................................................................................................... 6 密碼編碼學(xué) .................................................................................................................. 7 公鑰密碼學(xué) .................................................................................................................. 7 Caesar 密碼 ................................................................................................................. 9 單表代換密碼 ............................................................................................................ 10 Playfair 密碼 .............................................................................................................. 12 Hill 密碼 .................................................................................................................... 13 多表代換密碼 ........................................................................................................... 15 一次一密 ................................................................................................................... 17 置換技術(shù) ................................................................................................................. 18 轉(zhuǎn)輪機(jī) ..................................................................................................................... 19 隱寫術(shù) ..................................................................................................................... 20 MD5 ........................................................................................................................ 21 第 3 章 數(shù)據(jù)加密標(biāo)準(zhǔn) DES ........................................................................... 23 簡化 DES .................................................................................................................... 23 SDES 的密鑰產(chǎn)生 ..............................................................................