在线咨询
eetop公众号 创芯大讲堂 创芯人才网
切换到宽版

EETOP 创芯网论坛 (原名:电子顶级开发网)

手机号码,快捷登录

手机号码,快捷登录

找回密码

  登录   注册  

快捷导航
搜帖子
123
返回列表 发新帖
楼主: peterc478

About CMOS VLSI Design

[复制链接]
发表于 2009-9-2 10:42:51 | 显示全部楼层
Multi2 encryption algorithm questionsFrom: malexgreen (malexgreen_at_hotmail.com)
Date: 07/02/03
Date: 2 Jul 2003 09:10:47 -0700Hi:
I have a couple of questions regarding the MULTI-2 encryption
algorithm:
Based on the ISO standard, the encryption algorithm is described as
working using four individual stages, each of which does
arithmetic/logical operations on the plaintext and datakey [size=1em]64 bits at
a time, with the data key taking the system key ([size=1em]32 bits at a time) to
encrypt the datakey into a working key. Here are my questions:
For the plaintext [size=1em]encryption data path, does the output of pi-1
directly feed into the input of pi-2, and so on and so forth.
Also for the key schedule datapath, does the most significant 4-byte
section of the system key go into pi-2, following by the two next most
significant 4-byte chunks into pi-3, etc, etc. or is it the other way
around? Thanks.
Relevant Pages
  • How good an encryption algorithm is this?
    ... Must be capable of encrypting strings to a byte array, ... back again to the same string ... Encryption algorithm must also return the exact number of bytes of the ...
    (microsoft.public.dotnet.languages.csharp)
  • How good an encryption algorithm is this?
    ... Must be capable of encrypting strings to a byte array, ... back again to the same string ... Encryption algorithm must also return the exact number of bytes of the ...
    (microsoft.public.vc.language)
  • Re: Unix Password Encryption Procedures
    ... I know that most Unix machines either use the DES encryption algorithm ... such thing as the "MD5 encryption algorithm". ... Some administrators have also been known to setup systems to authenticate ...
    (comp.unix.admin)
  • Re: how to send data using crypto keys?
    ... The ONLY unbreakable encryption algorithm is One Time Pads. ... EVERY algorithm that re-uses keys or computes new keys in a ...
    (comp.security.misc)
  • Re: UsernameToken Encryption with TripleDES
    ... EncryptionMethod passed in the request. ... > The default encryption algorithm for UsernameToken, ... > at [size=1em]server side by config or programmatically. ...
    (microsoft.public.dotnet.framework.webservices.enhancements)


We are proud to have Web Hosting and Rack Housing from 9 Net Avenue Deutschland.
(16)




                               
登录/注册后可看大图
www.derkeiler.com  > Newsgroups  > sci.crypt  > 2003-07      


                               
登录/注册后可看大图





                               
登录/注册后可看大图
发表于 2009-11-24 14:51:41 | 显示全部楼层
找好久了,謝謝你。
头像被屏蔽
发表于 2009-11-28 13:46:25 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
发表于 2010-9-9 08:47:09 | 显示全部楼层
谢谢,同时在找电子版的书
发表于 2010-10-9 22:55:09 | 显示全部楼层
good!!!!!!!!!!!!!!!
发表于 2010-10-12 10:09:51 | 显示全部楼层
good.......................
您需要登录后才可以回帖 登录 | 注册

本版积分规则

关闭

站长推荐 上一条 /1 下一条


小黑屋| 手机版| 关于我们| 联系我们| 在线咨询| 隐私声明| EETOP 创芯网
( 京ICP备:10050787号 京公网安备:11010502037710 )

GMT+8, 2024-11-19 20:25 , Processed in 0.017015 second(s), 6 queries , Gzip On, Redis On.

eetop公众号 创芯大讲堂 创芯人才网
快速回复 返回顶部 返回列表