|
发表于 2009-9-2 10:42:51
|
显示全部楼层
Multi2 encryption algorithm questionsFrom: malexgreen (malexgreen_at_hotmail.com)
Date: 07/02/03
Date: 2 Jul 2003 09:10:47 -0700Hi:
I have a couple of questions regarding the MULTI-2 encryption
algorithm:
Based on the ISO standard, the encryption algorithm is described as
working using four individual stages, each of which does
arithmetic/logical operations on the plaintext and datakey [size=1em]64 bits at
a time, with the data key taking the system key ([size=1em]32 bits at a time) to
encrypt the datakey into a working key. Here are my questions:
For the plaintext [size=1em]encryption data path, does the output of pi-1
directly feed into the input of pi-2, and so on and so forth.
Also for the key schedule datapath, does the most significant 4-byte
section of the system key go into pi-2, following by the two next most
significant 4-byte chunks into pi-3, etc, etc. or is it the other way
around? Thanks.
Relevant Pages- How good an encryption algorithm is this?
... Must be capable of encrypting strings to a byte array, ... back again to the same string ... Encryption algorithm must also return the exact number of bytes of the ...
(microsoft.public.dotnet.languages.csharp) - How good an encryption algorithm is this?
... Must be capable of encrypting strings to a byte array, ... back again to the same string ... Encryption algorithm must also return the exact number of bytes of the ...
(microsoft.public.vc.language) - Re: Unix Password Encryption Procedures
... I know that most Unix machines either use the DES encryption algorithm ... such thing as the "MD5 encryption algorithm". ... Some administrators have also been known to setup systems to authenticate ...
(comp.unix.admin) - Re: how to send data using crypto keys?
... The ONLY unbreakable encryption algorithm is One Time Pads. ... EVERY algorithm that re-uses keys or computes new keys in a ...
(comp.security.misc) - Re: UsernameToken Encryption with TripleDES
... EncryptionMethod passed in the request. ... > The default encryption algorithm for UsernameToken, ... > at [size=1em]server side by config or programmatically. ...
(microsoft.public.dotnet.framework.webservices.enhancements)
|
|
We are proud to have Web Hosting and Rack Housing from 9 Net Avenue Deutschland.
(16)
www.derkeiler.com > Newsgroups > sci.crypt > 2003-07
|
|