📄 rfc2612.txt
字号:
ROTK1=06 ROTK2=10 ROTK3=06 ROTK4=07 MASK1=ae5e85f6 MASK2=d1f789b0 MASK3=e2113794 MASK4=db8768c0 OUT=b4fb78a74bbacccbfa45c36c23ed997e R=7 ROTK1=09 ROTK2=1d ROTK3=08 ROTK4=1f MASK1=1a000d83 MASK2=dc6d0e51 MASK3=3b65ccaf MASK4=b0470998 OUT=1cedb6d94abb223765f0fb9364a8f07f R=8 ROTK1=09 ROTK2=0a ROTK3=01 ROTK4=0d MASK1=d500ec2c MASK2=77e23f6f MASK3=3d1422b2 MASK4=0e4c04aa OUT=b3289009a03b021d54cec6628712c165Adams & Gilchrist Informational [Page 13]RFC 2612 The CAST-256 Encryption Algorithm June 1999 R=9 ROTK1=1b ROTK2=0d ROTK3=0b ROTK4=14 MASK1=f9b1a192 MASK2=aded6200 MASK3=0fc10d02 MASK4=d8bdb797 OUT=a4d8f6d0abd8613d241fff3c2ba02882 R=10 ROTK1=17 ROTK2=1d ROTK3=1c ROTK4=17 MASK1=a81550e2 MASK2=44e56b22 MASK3=ac97284c MASK4=e1021ad2 OUT=61a3f74a9a5da18d53a25ce8f3302357 R=11 ROTK1=19 ROTK2=1e ROTK3=11 ROTK4=02 MASK1=b09d0346 MASK2=15167c69 MASK3=19990bbd MASK4=a9258551 OUT=ca5ad45111a662f740c9a94b1d43dfb6 R=12 ROTK1=10 ROTK2=0d ROTK3=08 ROTK4=01 MASK1=69d0c348 MASK2=c8a3d81d MASK3=d2714d62 MASK4=8cc3f35a OUT=1b386c0210dcadcbdd0e41aa08a7a7e8 CT=1b386c0210dcadcbdd0e41aa08a7a7e8 R=1 ROTK1=10 ROTK2=0d ROTK3=08 ROTK4=01 MASK1=69d0c348 MASK2=c8a3d81d MASK3=d2714d62 MASK4=8cc3f35a OUT=ca5ad45111a662f740c9a94b1d43dfb6 R=2 ROTK1=19 ROTK2=1e ROTK3=11 ROTK4=02 MASK1=b09d0346 MASK2=15167c69 MASK3=19990bbd MASK4=a9258551 OUT=61a3f74a9a5da18d53a25ce8f3302357 R=3 ROTK1=17 ROTK2=1d ROTK3=1c ROTK4=17 MASK1=a81550e2 MASK2=44e56b22 MASK3=ac97284c MASK4=e1021ad2 OUT=a4d8f6d0abd8613d241fff3c2ba02882 R=4 ROTK1=1b ROTK2=0d ROTK3=0b ROTK4=14 MASK1=f9b1a192 MASK2=aded6200 MASK3=0fc10d02 MASK4=d8bdb797 OUT=b3289009a03b021d54cec6628712c165 R=5 ROTK1=09 ROTK2=0a ROTK3=01 ROTK4=0d MASK1=d500ec2c MASK2=77e23f6f MASK3=3d1422b2 MASK4=0e4c04aa OUT=1cedb6d94abb223765f0fb9364a8f07fAdams & Gilchrist Informational [Page 14]RFC 2612 The CAST-256 Encryption Algorithm June 1999 R=6 ROTK1=09 ROTK2=1d ROTK3=08 ROTK4=1f MASK1=1a000d83 MASK2=dc6d0e51 MASK3=3b65ccaf MASK4=b0470998 OUT=b4fb78a74bbacccbfa45c36c23ed997e R=7 ROTK1=06 ROTK2=10 ROTK3=06 ROTK4=07 MASK1=ae5e85f6 MASK2=d1f789b0 MASK3=e2113794 MASK4=db8768c0 OUT=cf003a27ba91d2346ddfa8ec76bdf029 R=8 ROTK1=01 ROTK2=0f ROTK3=0f ROTK4=11 MASK1=34422fa1 MASK2=745d0d3c MASK3=0804535e MASK4=42de73d8 OUT=fab3a20243c1c67bf1759f40c4b732e8 R=9 ROTK1=0f ROTK2=00 ROTK3=15 ROTK4=08 MASK1=5b1b847c MASK2=3d700297 MASK3=310383e1 MASK4=a1a19785 OUT=d3507d51934db5335cebdbb550b774b6 R=10 ROTK1=13 ROTK2=19 ROTK3=15 ROTK4=18 MASK1=c5b5a24e MASK2=20577cc0 MASK3=e58b12aa MASK4=a87da0f1 OUT=1fd808cfd82ac7354728e719a4cc0ebe R=11 ROTK1=1a ROTK2=1d ROTK3=19 ROTK4=1f MASK1=d7f04aaf MASK2=76a4b0c2 MASK3=7364327b MASK4=fe0602c3 OUT=4d468c8ca43c1ab66eae0bb9062fe876 R=12 ROTK1=1e ROTK2=1a ROTK3=1b ROTK4=16 MASK1=21daa501 MASK2=fcdfc612 MASK3=62f629b3 MASK4=9ec93bfa OUT=00000000000000000000000000000000 PT=00000000000000000000000000000000 ========== KEYSIZE=256 KEY=2342bb9efa38542cbed0ac83940ac2988d7c47ce264908461cc1b5137ae6b604 PT=00000000000000000000000000000000Adams & Gilchrist Informational [Page 15]RFC 2612 The CAST-256 Encryption Algorithm June 1999 R=1 ROTK1=08 ROTK2=12 ROTK3=0e ROTK4=17 MASK1=420b1cef MASK2=03f07e80 MASK3=cd2ab3ee MASK4=15371a16 OUT=f6c3b9a6ffd8a31ce04dbcf7772f1536 R=2 ROTK1=0a ROTK2=04 ROTK3=01 ROTK4=13 MASK1=bc6025e3 MASK2=d54f5aba MASK3=17fa667a MASK4=bb8a840e OUT=9477ef6fd7d6fce3dcaa27d6132465ee R=3 ROTK1=1e ROTK2=0d ROTK3=10 ROTK4=01 MASK1=446c0950 MASK2=b4542da0 MASK3=523baa91 MASK4=4a914503 OUT=c056ec5748ecd90f992cf07f3529160f R=4 ROTK1=15 ROTK2=0e ROTK3=0d ROTK4=09 MASK1=4106d4de MASK2=9ce441e7 MASK3=2c390c3b MASK4=52d1b516 OUT=7bcc57d80603b6c7b9ca75eea5cb1c2d R=5 ROTK1=09 ROTK2=16 ROTK3=08 ROTK4=16 MASK1=2827db72 MASK2=7920623f MASK3=10948a1a MASK4=b639f290 OUT=d62686a2b01d11837fb6a46c79fc1816 R=6 ROTK1=1f ROTK2=11 ROTK3=17 ROTK4=0a MASK1=85fcd124 MASK2=c567c5fe MASK3=a4113025 MASK4=ce949239 OUT=1b03a108d6f1878e03a62e72c9c97662 R=7 ROTK1=1d ROTK2=06 ROTK3=0b ROTK4=1c MASK1=c0e98900 MASK2=8832532c MASK3=d7403525 MASK4=26ed4609 OUT=b11d972f22ed26d085189ca3b6c79d36 R=8 ROTK1=0b ROTK2=04 ROTK3=0e ROTK4=19 MASK1=69b1d027 MASK2=e628d930 MASK3=4904b3cd MASK4=51fad71a OUT=4265774a393a8a32ed78c5c1571893e4 R=9 ROTK1=1a ROTK2=0f ROTK3=09 ROTK4=10 MASK1=4b81b846 MASK2=9f1d941b MASK3=ebb8fe8a MASK4=6616847e OUT=f4f1322a076d4f5eb2d14dc75815ccf1Adams & Gilchrist Informational [Page 16]RFC 2612 The CAST-256 Encryption Algorithm June 1999 R=10 ROTK1=1b ROTK2=00 ROTK3=01 ROTK4=01 MASK1=2cf3fd07 MASK2=75580ec1 MASK3=513614b9 MASK4=478097ef OUT=57c3a554eafe71dc6a33fe0bda83f566 R=11 ROTK1=1c ROTK2=0b ROTK3=1b ROTK4=1f MASK1=4fdf26fe MASK2=a4850785 MASK3=615eadd0 MASK4=9b507d47 OUT=dd9940f4f2e1786ab6f2bdee519a407e R=12 ROTK1=0f ROTK2=09 ROTK3=1d ROTK4=02 MASK1=4bd673d3 MASK2=36399d66 MASK3=63385006 MASK4=0579675f OUT=4f6a2038286897b9c9870136553317fa CT=4f6a2038286897b9c9870136553317fa R=1 ROTK1=0f ROTK2=09 ROTK3=1d ROTK4=02 MASK1=4bd673d3 MASK2=36399d66 MASK3=63385006 MASK4=0579675f OUT=dd9940f4f2e1786ab6f2bdee519a407e R=2 ROTK1=1c ROTK2=0b ROTK3=1b ROTK4=1f MASK1=4fdf26fe MASK2=a4850785 MASK3=615eadd0 MASK4=9b507d47 OUT=57c3a554eafe71dc6a33fe0bda83f566 R=3 ROTK1=1b ROTK2=00 ROTK3=01 ROTK4=01 MASK1=2cf3fd07 MASK2=75580ec1 MASK3=513614b9 MASK4=478097ef OUT=f4f1322a076d4f5eb2d14dc75815ccf1 R=4 ROTK1=1a ROTK2=0f ROTK3=09 ROTK4=10 MASK1=4b81b846 MASK2=9f1d941b MASK3=ebb8fe8a MASK4=6616847e OUT=4265774a393a8a32ed78c5c1571893e4 R=5 ROTK1=0b ROTK2=04 ROTK3=0e ROTK4=19 MASK1=69b1d027 MASK2=e628d930 MASK3=4904b3cd MASK4=51fad71a OUT=b11d972f22ed26d085189ca3b6c79d36 R=6 ROTK1=1d ROTK2=06 ROTK3=0b ROTK4=1c MASK1=c0e98900 MASK2=8832532c MASK3=d7403525 MASK4=26ed4609 OUT=1b03a108d6f1878e03a62e72c9c97662Adams & Gilchrist Informational [Page 17]RFC 2612 The CAST-256 Encryption Algorithm June 1999 R=7 ROTK1=1f ROTK2=11 ROTK3=17 ROTK4=0a MASK1=85fcd124 MASK2=c567c5fe MASK3=a4113025 MASK4=ce949239 OUT=d62686a2b01d11837fb6a46c79fc1816 R=8 ROTK1=09 ROTK2=16 ROTK3=08 ROTK4=16 MASK1=2827db72 MASK2=7920623f MASK3=10948a1a MASK4=b639f290 OUT=7bcc57d80603b6c7b9ca75eea5cb1c2d R=9 ROTK1=15 ROTK2=0e ROTK3=0d ROTK4=09 MASK1=4106d4de MASK2=9ce441e7 MASK3=2c390c3b MASK4=52d1b516 OUT=c056ec5748ecd90f992cf07f3529160f R=10 ROTK1=1e ROTK2=0d ROTK3=10 ROTK4=01 MASK1=446c0950 MASK2=b4542da0 MASK3=523baa91 MASK4=4a914503 OUT=9477ef6fd7d6fce3dcaa27d6132465ee R=11 ROTK1=0a ROTK2=04 ROTK3=01 ROTK4=13 MASK1=bc6025e3 MASK2=d54f5aba MASK3=17fa667a MASK4=bb8a840e OUT=f6c3b9a6ffd8a31ce04dbcf7772f1536 R=12 ROTK1=08 ROTK2=12 ROTK3=0e ROTK4=17 MASK1=420b1cef MASK2=03f07e80 MASK3=cd2ab3ee MASK4=15371a16 OUT=00000000000000000000000000000000 PT=00000000000000000000000000000000Adams & Gilchrist Informational [Page 18]RFC 2612 The CAST-256 Encryption Algorithm June 1999Full Copyright Statement Copyright (C) The Internet Society (1999). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Acknowledgement Funding for the RFC Editor function is currently provided by the Internet Society.Adams & Gilchrist Informational [Page 19]
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -