密码学电子书_密码学中的电子密码书(ECB)

电子密码书(ECB)是块密码的一种操作模式,允许并行加密,但不适合小块或有重复模式的数据,因为它可能导致相同的明文对应相同的密文。ECB在密码分析中易被破解,且如果密文块被重新排序,只会影响对应明文块,不会影响解密过程。使用ECB的安全挑战包括明文块的相同性可能导致密码分析和数据篡改。
摘要由CSDN通过智能技术生成

密码学电子书

This Electronic Code Book (ECB) is cryptography as a mode of operation for a block cipher, with the characters the main things that every feasible block of plaintext or an original text has a corresponding characteristic of ciphertext value and vice versa. In other words, the same or main plaintext or original value will always result or work in the same ciphertext value. Electronic Code Book(ECB) is used when a volume or character of plaintext is separated or divided into several blocks of data, each or every of which is then encrypted independently divides it of other blocks. Otherwise, Electronic Code Book has the ability or capacity to support or promote a separate encrypted key for each block type in cryptography.

电子密码书(ECB)是一种密码术,是一种针对分组密码的操作模式,其特征是,每个可行的明文或原始文本块均具有对应的密文值特征,反之亦然。 换句话说,相同或主要的明文或原始值将始终产生或使用相同的密文值。 电子卷书(ECB)用于将明文的卷或字符分开或分为几个数据块,然后分别加密每个或每个数据块,然后将其分为其他块。 否则,电子密码书具有为密码术中的每个块类型支持或促进单独的加密密钥的能力。

However, this Electronic Code Book is not a good system or process to use with small or little block sizes (for example, less than 40 bits in a plain text) and identical or properly encryption modes in cryptography. This is due to some particular words and phrases that may be reused again often enough or more so that the same repetitive or repeated part-blocks of ciphertext can emerge or mixed, laying the groundwork for a codebook attack where the plaintext or original text patterns are fairly obvious for this. However, security or privacy may be better if random pad bits are added to each block in cryptography.
On the other hand, 64-bit or larger or greater blocks should contain enough or more unique characteristics (entropy) to make a codebook attack unlikely to succeed in this ECB.

但是,此电子书不是一个很好的系统或过程,不能使用很小或很小的块大小(例如,纯文本中少于40位)以及密码学中相同或适当的加密模式。 这是由于某些特定的单词和短语可能经常或多次重复使用,从而使相同的重复或重复的密文分块出现或混合在一起,从而为进行纯文本或原始文本模式的密码本攻击打下了基础。对此很明显。 但是,如果将随机填充比特添加到加密中的每个块,则安全性或隐私性可能会更好。
另一方面,64位或更大或更大的块应包含足够或更多的独特特征(熵),以使密码本攻击不太可能在此ECB中成功。

In the form of error correction, any bit errors or defects in a ciphertext block affect decryption of that block only of plaintext. This is the Chaining dependency is never an issue in that reordering of the ciphertext blocks will only rebook the corresponding plaintext or original text blocks, but never affect decryption in cryptography.

以纠错的形式,密文块中的任何位错误或缺陷都只会影响该明文块的解密。 这是Chaining依赖性永远不会成为问题,因为密文块的重新排序只会重新预订相应的纯文本或原始文本块,而不会影响密码术中的解密。

ECB


Image source: https://www.geeksforgeeks.org/block-cipher-modes-of-operation

图片来源:https://www.geeksforgeeks.org/block-cipher-modes-of-operation

使用欧洲央行的优势 (Advantages of using ECB)

  • The parallel encryption of particular blocks of bits is possible or feasible, thus it is a faster way of encryption for this.

    特定位块的并行加密是可行或可行的,因此这是一种更快的加密方式。

  • The simple way of a block cipher is this ECB mode of operation.

    分组密码的简单方法是这种ECB操作模式。

使用ECB的缺点 (Disadvantages of using ECB)

  • This is prone to cryptanalysis in cryptography since there is a direct or straight relationship between plaintext or original text and ciphertext.

    由于明文或原始文本与密文之间存在直接或直接的关系,因此在密码学中易于进行密码分析。

(Example)

Different from apart from using a password or message to generate an encryption key, which completes encrypted the keyspace, we have the problem of the algorithm used to process the plain text or original text. If this is ECB we have repeating cipher blocks for the same plain text or original text.

除了使用密码或消息生成加密密钥来完成对密钥空间的加密以外,我们还有用于处理纯文本或原始文本的算法问题。 如果这是ECB,则对于相同的纯文本或原始文本,我们将重复密码块。

As I take "eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee" and encrypt with as the 3-DES and a cryptography key of "bill12345" we get,

当我将“ eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee”作为3-DES和“ bill12345”的加密密钥进行加密时,我们得到:

1122900B30BF1183 1122900B30BF1183 1122900B30BF11831 122900B30BF1183 1122900B30BF1183 1122900B30BF1183 7591F6A1D8B4FC8A

Here, we can see that the word "e...e" values are always coded with the same ciphertext in cryptography. As 3-DES has message blocks of 64-bits, then 8 'e' values will fill each block in the way of cryptography.

在这里,我们可以看到单词“ e ... e”的值在密码学中始终使用相同的密文编码。 由于3-DES具有64位消息块,因此8个“ e”值将以加密方式填充每个块。

    [eeeeeeee] [eeeeeeee] [eeeeeeeee]
    [eeeeeeee] [eeeeeeee] [eeeeeeee]
    [eeeeee PADDING]

Here, we can say that the word "eeeeeeee" maps to the cipher text of 1122900B30BF1183 as cipher text.

在这里,我们可以说单词“ eeeeeeee”作为密文映射到1122900B30BF1183的密文。

安全挑战 (Security Challenges)

The ECB mode is rather simple in realization for the cryptography. It is possible or feasible to encrypt/decrypt the blocks of data or characters in parallel as there is no dependence between blocks of the plaintext or original text. In case of failure or failure of the encryption/decryption in the cryptography, the mistake extends only within one block and doesn't influence others for this.

ECB模式对于加密而言非常简单。 并行加密/解密数据或字符块是可能的或可行的,因为在明文或原始文本的块之间没有依赖性。 如果密码术失败或加密/解密失败,则错误仅在一个块内延伸,而不会对此造成影响。

Limitations or Restriction of ECB encryption scheme,

ECB加密方案的限制或限制,

  • If blocks of the clear or original text are identical or similar to the corresponding blocks of the ciphertext will be identical or similar too. Otherwise if in the ciphertext some blocks are identical or similar, the corresponding or particular blocks of the clear or original text are identical or similar too. The cryptanalyst of cryptography can decipher or encrypt only one of these blocks of cryptography to find the contents of all of them.

    如果明文或原始文本的块与密文的相应块相同或相似,那么它们也将相同或相似。 否则,如果密文中的某些块相同或相似,则明文或原始文本的相应或特定块也相同或相似。 密码学的密码分析员只能解密或加密这些密码学块中的一个,以查找所有密码学块的内容。

  • In another way case the blocks are independent or free itself becomes possible or feasible to replace or change some blocks of the ciphertext without knowledge of a cryptography key. The malefactor can change the part of blocks in the message with blocks intercepted during the previous message on the same cryptography key.

    在另一种情况下,块是独立的或自由的,在不知道密码密钥的情况下替换或更改密文的某些块本身成为可能或可行的。 恶意因素可以更改消息中块的一部分,而在同一加密密钥上的上一条消息期间会截获这些块。

  • In fact case of drop or insertion at least of one bit into ciphertext there will be a shift or replaced of bits and borders of blocks that will lead to wrong or incorrect decoding or decrypt of all subsequent blocks ciphertext in cryptography (it can be fixed or mixed by realization of control or work methods of borders of ciphertext blocks in the cryptography).

    实际上,在密文中丢弃或插入至少一位的情况下,将对块的位和边界进行移位或替换,这将导致对密码学中所有后续块密文进行错误或不正确的解码或解密(可以固定或固定)。通过实现密码术中密文块边界的控制或工作方法来实现混合)。

翻译自: https://www.includehelp.com/cryptography/electronic-code-book-ecb.aspx

密码学电子书

MMX-密码学籍包-共3部分.zip.002 注意:本资源一共三部分,只有把三部分都下载了放在同一目录下才能完全解压缩成功! 详细内容见这里: http://blog.csdn.net/bjarnecpp/article/details/79012425 本压缩包包含籍 计算机安全和密码学.Computer.Security.And.Cryptography.pdf 英文版 《深入浅出密码学——常用加密技术原理与应用》-有签.pdf 程序员密码学.pdf 计算机加密解密200例-带签.pdf 计算密码学+卢开澄-走向数学丛.pdf 经典密码学与现代密码学.pdf 带自制 密码学的数学基础-英文版-Jeffrey+Hoffstein.pdf 密码编码学:加密方法的C与C++实现.pdf -带密码编码学与网络安全 原理与实践(原第5版)和习题解答 共2本.pdf 密码学基础[以色列]Oded.Goldreich 英文三本.zip 密码学-加密演算法-带目录.pdf 密码学原理与实践-冯登国译-带签.pdf 《密码学实践》电子工业出版社,作者是(美)弗格森 椭圆曲线及其在密码学的应用(英文).pdf 椭圆曲线密码学导论.pdf 应用密码学:协议、算法与c源程序.PDF(两本,一本完整版,一本不完整高清文字版).zip 应用密码学(英文版 Applied Cryptography - Bruce Schneier 2nd ed).pdf 应用密码学——协议、算法、C源程序.pdf 战争的数学——军事密码学,李长生,邹祁编著.pdf 信息论、编码与密码学 田丽华.pdf 应用密码学手册 英文版 Handbook of Applied Cryptography.pdf -有签 文字版
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值