⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 des.1

📁 3DES加解密C源码
💻 1
字号:
.TH DES 1 "04 October 1993" "Linux" "Linux Programmer's Manual".SH NAMEdes - encrypt or decrypt data using Data Encryption Standard.SH SYNOPSIS.PPdes -e | -d [ -b ] [ -h ] [ -k.B key].SH DESCRIPTION.B desis a filter that encrypts or decrypts standard input to standard outputwith the Data Encryption Standard (DES).Either -e (encrypt) or -d (decrypt) must be specified. If the key is notgiven on the command line with the -k option the command will prompt for ittwice, suppressing echo and comparing the two responses to guard againstmistyping..PThe -h flag controls how the key string is to be interpreted.Without the -h flag, the key is an ASCII string.Since DES ignores the loworder bit of each key byte, thehigh order bit is set for odd parity, thus retaining the information containedin the low order bit.If the -h flag is set, the key string is interpreted as16 hex/ASCII characters; the low order bit of each byte is again ignored as perthe DES algorithm.This allows the use of any arbitrary 56-bit key, including bytes representingcontrol characters that could not be typed if the -h option were not used..PPBy default, DES Cipher Block Chaining (CBC) mode is used, with an initialvector (IV) of all zeros; if the -b option is specified, Electronic CodeBook (ECB) mode is used instead..PPExcept for the -h option, this command is compatible with the.B descommand on the Sun Microsystems workstation..PPIf the -k option is not specified, you will be asked for a key (it will notbe displayed to your terminal as you type it)..SH "SEE ALSO"Sun Microsystems DES(1) manual page, which describes in detail howthe length of the file is encoded in the last block of ciphertext.Also see the DES(3) manual page, included with this package. This describesthe libdes.a archive and it's functions, which are the basis of thispackage. These functions are used extensively within the.B desprogram..SH BUGSIt would be better to use a real 56-bit key rather then anASCII-based 56-bit pattern. Knowing that the key was derivedfrom ASCII radically reduces the time necessary for abrute-force cryptographic attack..SH AUTHORSPhil Karn, KA9QChris Cappuccio (chris@g386bsd.first.gmd.de)

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -