Data Encryption Standard - определение. Что такое Data Encryption Standard
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

Что (кто) такое Data Encryption Standard - определение

EARLY UNCLASSIFIED SYMMETRIC-KEY BLOCK CIPHER
DataEncryptionStandard; Data Encryption Algorithm; Data encryption standard; Single DES; DES (cryptography)
  • DES cracking machine]] contained 256,856 custom chips and could brute-force a DES key in a matter of days—the photo shows a DES Cracker circuit board fitted with several Deep Crack chips.
Найдено результатов: 4407
Data Encryption Standard         
(DES) The NBS's popular, standard encryption algorithm. It is a product cipher that operates on 64-bit blocks of data, using a 56-bit key. It is defined in FIPS 46-1 (1988) (which supersedes FIPS 46 (1977)). DES is identical to the ANSI standard Data Encryption Algorithm (DEA) defined in ANSI X3.92-1981. DES has been implemented in VLSI. SunOS provides a des command which can make use of DES hardware if fitted. Neither the software nor the hardware are supposed to be distributed outside the USA. Unix manual pages: des(1), des(3), des(4). (1994-12-06)
Data Encryption Standard         
The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryptography.
Data Encryption Algorithm         
(DEA) An ANSI standard defined in ANSI X3.92-1981. It is identical to the Data Encryption Standard (DES). (1994-12-06)
International Data Encryption Algorithm         
BLOCK CIPHER
IDEA encryption algorithm; IDEA (cipher); Idea encryption; Proposed Encryption Standard; IDEA cipher; PES (cipher); IDEA cypher; Improved Proposed Encryption Standard; IPES cipher
<algorithm, cryptography> (IDEA) A conventional encryption algorithm, written by Xuejia Lai and James Massey, in 1992. It is a block cipher, considered to be the best and most secure available, and operates on 64-bit blocks with a 128 bit key. It is used by Pretty Good Privacy. (1996-03-07)
Authenticated encryption         
  • E&M approach
  • EtM approach
  • MtE approach
CIPHERS WHICH SIMULTANEOUSLY ASSURE CONFIDENTIALITY AND AUTHENTICITY
AEAD block cipher modes of operation; AEAD; Encrypt-then-MAC; Encrypt-and-MAC; MAC-then-Encrypt; Authenticated Encryption with Associated Data; Authenticated encryption with associated data; Authenticated Encryption; Generic composition; Authenticated cipher; AE scheme; Additional authenticated data
Authenticated Encryption (AE) and Authenticated Encryption with Associated Data (AEAD) are forms of encryption which simultaneously assure the confidentiality and authenticity of data.
Transparent data encryption         
TECHNOLOGY EMPLOYED BY BOTH MICROSOFT AND ORACLE TO ENCRYPT DATABASE CONTENT
Transparent Data Encryption
Transparent Data Encryption (often abbreviated to TDE) is a technology employed by Microsoft, IBM and Oracle to encrypt database files. TDE offers encryption at file level.
triple DES         
BLOCK CIPHER
3DES; Triple-DES; DES-EDE; DESede; TDES; Double DES; Triple des; Triple Data Encryption Standard; TDEA; 3DES-EDE; TripleDES; 3des; Triple DEA; 3-DES; Triple Data Encryption Algorithm; Des3; Sweet32
<cryptography> A product cipher which, like DES, operates on 64-bit data blocks. There are several forms, each of which uses the DES cipher 3 times. Some forms use two 56-bit keys, some use three. The DES "modes of operation" may also be used with triple-DES. (1995-05-11)
Deniable encryption         
ENCRYPTION TECHNIQUE
Deniable Encryption
In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists.See http://www.
Triple DES         
BLOCK CIPHER
3DES; Triple-DES; DES-EDE; DESede; TDES; Double DES; Triple des; Triple Data Encryption Standard; TDEA; 3DES-EDE; TripleDES; 3des; Triple DEA; 3-DES; Triple Data Encryption Algorithm; Des3; Sweet32
In cryptography, Triple DES (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The Data Encryption Standard's (DES) 56-bit key is no longer considered adequate in the face of modern cryptanalytic techniques and supercomputing power.
Identity-based encryption         
  • ID Based Encryption: Offline and Online Steps
Identity based encryption; ID-based encryption; Identity-Based Encryption; Hierarchical identity-based encryption
ID-based encryption, or identity-based encryption (IBE), is an important primitive of ID-based cryptography. As such it is a type of public-key encryption in which the public key of a user is some unique information about the identity of the user (e.

Википедия

Data Encryption Standard

The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryptography.

Developed in the early 1970s at IBM and based on an earlier design by Horst Feistel, the algorithm was submitted to the National Bureau of Standards (NBS) following the agency's invitation to propose a candidate for the protection of sensitive, unclassified electronic government data. In 1976, after consultation with the National Security Agency (NSA), the NBS selected a slightly modified version (strengthened against differential cryptanalysis, but weakened against brute-force attacks), which was published as an official Federal Information Processing Standard (FIPS) for the United States in 1977.

The publication of an NSA-approved encryption standard led to its quick international adoption and widespread academic scrutiny. Controversies arose from classified design elements, a relatively short key length of the symmetric-key block cipher design, and the involvement of the NSA, raising suspicions about a backdoor. The S-boxes that had prompted those suspicions were designed by the NSA to remove a backdoor they secretly knew (differential cryptanalysis). However, the NSA also ensured that the key size was drastically reduced so that they could break the cipher by brute force attack. The intense academic scrutiny the algorithm received over time led to the modern understanding of block ciphers and their cryptanalysis.

DES is insecure due to the relatively short 56-bit key size. In January 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes (see chronology). There are also some analytical results which demonstrate theoretical weaknesses in the cipher, although they are infeasible in practice. The algorithm is believed to be practically secure in the form of Triple DES, although there are theoretical attacks. This cipher has been superseded by the Advanced Encryption Standard (AES). DES has been withdrawn as a standard by the National Institute of Standards and Technology.

Some documents distinguish between the DES standard and its algorithm, referring to the algorithm as the DEA (Data Encryption Algorithm).