⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 des.man

📁 一个DES、3DES加解密的库文件
💻 MAN
字号:
.TH DES 1 .SH NAMEdes - encrypt or decrypt data using Data Encryption Standard.SH SYNOPSIS.B des(.B \-e|.B \-E) | (.B \-d|.B \-D) | (.B \-\fR[\fPcC\fR][\fPckname\fR]\fP) |[.B \-b3hfs] [.B \-k.I key]] [.B \-u\fR[\fIuuname\fR][.I input-file[.I output-file] ].SH DESCRIPTION.B desencrypts and decrypts data using theData Encryption Standard algorithm.One of.B \-e, \-E(for encrypt) or.B \-d, \-D(for decrypt) must be specified.It is also possible to use.B \-cor.B \-Cin conjunction or instead of the a encrypt/decrypt option to generatea 16 character hexadecimal checksum, generated via the.I des_cbc_cksum..LPTwo standard encryption modes are supported by the.B desprogram, Cipher Block Chaining (the default) and Electronic Code Book(specified with.B \-b)..LPThe key used for the DESalgorithm is obtained by prompting the user unless the.B `\-k.I key'option is given.If the key is an argument to the.B descommand, it is potentially visible to users executing.BR ps (1)or a derivative.  To minimise this possibility,.B destakes care to destroy the key argument immediately upon entry.If your shell keeps a history file be careful to make sure it is notworld readable..LPSince this program attempts to maintain compatability with sunOS'sdes(1) command, there are 2 different methods used to convert the usersupplied key to a des key.Whenever and one or more of.B \-E, \-D, \-Cor.B \-3options are used, the key conversion procedure will not be compatiblewith the sunOS des(1) version but will use all the user suppliedcharacter to generate the des key..B descommand reads from standard input unless.I input-fileis specified and writes to standard output unless.I output-fileis given..SH OPTIONS.TP.B \-bSelect ECB(eight bytes at a time) encryption mode..TP.B \-3Encrypt using triple encryption.By default triple cbc encryption is used but if the.B \-boption is used then triple ecb encryption is performed.If the key is less than 8 characters long, the flag has no effect..TP.B \-eEncrypt data using an 8 byte key in a manner compatible with sunOSdes(1)..TP.B \-EEncrypt data using a key of nearly unlimited length (1024 bytes).This will product a more secure encryption..TP.B \-dDecrypt data that was encrypted with the \-e option..TP.B \-DDecrypt data that was encrypted with the \-E option..TP.B \-cGenerate a 16 character hexadecimal cbc checksum and output this tostderr.If a filename was specified after the.B \-coption, the checksum is output to that file.The checksum is generated using a key generated in a sunOS compatiblemanner..TP.B \-CA cbc checksum is generated in the same manner as described for the.B \-coption but the DES key is generated in the same manner as used for the.B \-Eand.B \-Doptions.TP.B \-fDoes nothing - allowed for compatibility with sunOS des(1) command..TP.B \-sDoes nothing - allowed for compatibility with sunOS des(1) command..TP.B "\-k \fIkey\fP"Use the encryption .I keyspecified..TP.B "\-h"The.I keyis assumed to be a 16 character hexadecimal number.If the.B "\-3"option is used the key is assumed to be a 32 character hexadecimalnumber..TP.B \-uThis flag is used to read and write uuencoded files.  If decrypting,the input file is assumed to contain uuencoded, DES encrypted data.If encrypting, the characters following the -u are used as the name ofthe uuencoded file to embed in the begin line of the uuencodedoutput.  If there is no name specified after the -u, the name text.deswill be embedded in the header..SH SEE ALSO.B ps (1).B des_crypt(3).SH BUGS.LPThe problem with using the.B -eoption is the short key length.It would be better to use a real 56-bit key rather than anASCII-based 56-bit pattern.  Knowing that the key was derived from ASCIIradically reduces the time necessary for a brute-force cryptographic attack.My attempt to remove this problem is to add an alternative text-key toDES-key function.  This alternative function (accessed via.B -E, -D, -Sand.B -3)uses DES to help generate the key..LPBe carefully when using the -u option.  Doing des -ud <filename> willnot decrypt filename (the -u option will gobble the d option)..LPThe VMS operating system operates in a world where files are always amultiple of 512 bytes.  This causes problems when encrypted data issend from unix to VMS since a 88 byte file will suddenly be paddedwith 424 null bytes.  To get around this problem, use the -u optionto uuencode the data before it is send to the VMS system..SH AUTHOR.LPEric Young (eay@psych.psy.uq.oz.au), Psychology Department,University of Queensland, Australia.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -