用新的高级加密标准(AES)保持你的数据安全毕业论文外文翻译.doc
《用新的高级加密标准(AES)保持你的数据安全毕业论文外文翻译.doc》由会员分享,可在线阅读,更多相关《用新的高级加密标准(AES)保持你的数据安全毕业论文外文翻译.doc(15页珍藏版)》请在三一办公上搜索。
1、Keep Your Data Secure with the New Advanced Encryption StandardJames McCaffreySUMMARYThe Advanced Encryption Standard (AES) is a National Institute of Standards and Technology specification for the encryption of electronic data. It is expected to become the accepted means of encrypting digital infor
2、mation, including financial, telecommunications, and government data. This article presents an overview of AES and explains the algorithms it uses.After reading this article you will be able to encrypt data using AES, test AES-based software, and use AES encryption in your systems.Note that the code
3、 presented in this article and any other implementation based on this article is subject to applicable Federal cryptographic module export controls (see Commercial Encryption Export Controls for the exact regulations).AES is a new cryptographic algorithm that can be used to protect electronic data.
4、Specifically, AES is an iterative, symmetric-key block cipher that can use keys of 128, 192, and 256 bits, and encrypts and decrypts data in blocks of 128 bits (16 bytes). Unlike public-key ciphers, which use a pair of keys, symmetric-key ciphers use the same key to encrypt and decrypt data. Encrypt
5、ed data returned by block ciphers have the same number of bits that the input data had. Iterative ciphers use a loop structure that repeatedly performs permutations and substitutions of the input data. Figure 1 shows AES in action encrypting and then decrypting a 16-byte block of data using a 192-bi
6、t key.Figure 1 Some DataAES is the successor to the older Data Encryption Standard (DES). DES was approved as a Federal standard in 1977 and remained viable until 1998 when a combination of advances in hardware, software, and cryptanalysis theory allowed a DES-encrypted message to be decrypted in 56
7、 hours. Since that time numerous other successful attacks on DES-encrypted data have been made and DES is now considered past its useful lifetime.In late 1999, the Rijndael (pronounced rain doll) algorithm, created by researchers Joan Daemen and Vincent Rijmen, was selected by the NIST as the propos
8、al that best met the design criteria of security, implementation efficiency, versatility, and simplicity. Although the terms AES and Rijndael are sometimes used interchangeably, they are distinct. AES is widely expected to become the de facto standard for encrypting all forms of electronic data incl
9、uding data used in commercial applications such as banking and financial transactions, telecommunications, and private and Federal information.Overview of the AES AlgorithmThe AES algorithm is based on permutations and substitutions. Permutations are rearrangements of data, and substitutions replace
10、 one unit of data with another. AES performs permutations and substitutions using several different techniques. To illustrate these techniques, lets walk through a concrete example of AES encryption using the data shown in Figure 1.The following is the 128-bit value that you will encrypt with the in
11、dexes array:00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15The 192-bit key value is:00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 170 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23Figure 2 SboxWhen the AES constructor is called
12、, two tables that will be used by the encryption method are initialized. The first table is a substitution box named Sbox. It is a 16 16 matrix. The first five rows and columns of Sbox are shown in Figure 2. Behind the scenes, the encryption routine takes the key array and uses it to generate a key
13、schedule table named w, shown in Figure 3.Figure 3 Key Sched.The first Nk (6) rows of w are seeded with the original key value (0x00 through 0x17) and the remaining rows are generated from the seed key. The variable Nk represents the size of the seed key in 32-bit words. Youll see exactly how w is g
14、enerated later when I examine the AES implementation. The point is that there are now many keys to use instead of just one. These new keys are called the round keys to distinguish them from the original seed key.Figure 4 StateThe AES encryption routine begins by copying the 16-byte input array into
15、a 44 byte matrix named State (see Figure 4). The AES encryption algorithm is named Cipher and operates on State and can be described in pseudocode (see Figure 5).The encryption algorithm performs a preliminary processing step thats called AddRoundKey in the specification. AddRoundKey performs a byte
16、-by-byte XOR operation on the State matrix using the first four rows of the key schedule, and XORs input Stater,c with round keys table wc,r.For example, if the first row of the State matrix holds the bytes 00, 44, 88, cc , and the first column of the key schedule is 00, 04, 08, 0c , then the new va
17、lue of State0,2 is the result of XORing State0,2 (0x88) with w2,0 (0x08), or 0x80:1 0 0 0 1 0 0 00 0 0 0 1 0 0 0 XOR1 0 0 0 0 0 0 0The main loop of the AES encryption algorithm performs four different operations on the State matrix, called SubBytes, ShiftRows, MixColumns, and AddRoundKey in the spec
18、ification. The AddRoundKey operation is the same as the preliminary AddRoundKey except that each time AddRoundKey is called, the next four rows of the key schedule are used. The SubBytes routine is a substitution operation that takes each byte in the State matrix and substitutes a new byte determine
19、d by the Sbox table. For example, if the value of State0,1 is 0x40 and you want to find its substitute, you take the value at State0,1 (0x40) and let x equal the left digit (4) and y equal the right digit (0). Then you use x and y as indexes into the Sbox table to find the substitution value, as sho
20、wn in Figure 2.ShiftRows is a permutation operation that rotates bytes in the State matrix to the left. Figure 6 shows how ShiftRows works on State. Row 0 of State is rotated 0 positions to the left, row 1 is rotated 1 position left, row 2 is rotated 2 positions left, and row 3 is rotated 3 position
21、s left.Figure 6 Running ShiftRows on StateThe MixColumns operation is a substitution operation that is the trickiest part of the AES algorithm to understand. It replaces each byte with the result of mathematical field additions and multiplications of values in the bytes column. I will explain the de
22、tails of special field addition and multiplication in the next section.Suppose the value at State0,1 is 0x09, and the other values in column 1 are 0x60, 0xe1, and 0x04; then the new value for State0,1 is shown in the following:State0,1 = (State0,1 * 0x01) + (State1,1 * 0x02) +(State2,1 * 0x03) +(Sta
23、te3,1 * 0x01) = (0x09 * 0x01) + (0x60 * 0x02) + (0xe1 * 0x03) +(0x04 * 0x01) = 0x57The addition and multiplication are special mathematical field operations, not the usual addition and multiplication on integers.The four operations SubBytes, ShiftRows, MixColumns, and AddRoundKey are called inside a
24、 loop that executes Nr timesthe number of rounds for a given key size, less 1. The number of rounds that the encryption algorithm uses is either 10, 12, or 14 and depends on whether the seed key size is 128, 192, or 256 bits. In this example, because Nr equals 12, the four operations are called 11 t
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 用新的高级加密标准AES保持你的数据安全 毕业论文外文翻译 高级 加密 标准 AES 保持 数据 安全 毕业论文 外文 翻译

链接地址:https://www.31ppt.com/p-3988605.html